Home
last modified time | relevance | path

Searched refs:message_len (Results 1 – 21 of 21) sorted by relevance

/third_party/openssl/crypto/ec/curve448/
Deddsa.c134 const uint8_t *message, size_t message_len, in c448_ed448_sign() argument
168 || !EVP_DigestUpdate(hashctx, message, message_len)) { in c448_ed448_sign()
208 || !EVP_DigestUpdate(hashctx, message, message_len) in c448_ed448_sign()
249 const uint8_t *message, size_t message_len, in c448_ed448_verify() argument
303 || !EVP_DigestUpdate(hashctx, message, message_len) in c448_ed448_verify()
338 int ED448_sign(uint8_t *out_sig, const uint8_t *message, size_t message_len, in ED448_sign() argument
343 message_len, 0, context, context_len) in ED448_sign()
347 int ED448_verify(const uint8_t *message, size_t message_len, in ED448_verify() argument
351 return c448_ed448_verify(signature, public_key, message, message_len, 0, in ED448_verify()
Dcurve448_local.h19 int ED448_sign(uint8_t *out_sig, const uint8_t *message, size_t message_len,
23 int ED448_verify(const uint8_t *message, size_t message_len,
Ded448.h65 const uint8_t *message, size_t message_len,
115 const uint8_t *message, size_t message_len,
/third_party/gn/src/base/
Dlogging.cc292 const size_t message_len = strlen(message); in RawLog() local
294 while (bytes_written < message_len) { in RawLog()
296 message_len - bytes_written)); in RawLog()
304 if (message_len > 0 && message[message_len - 1] != '\n') { in RawLog()
/third_party/openssl/crypto/bn/
Dbn_rand.c207 size_t message_len, BN_CTX *ctx) in BN_generate_dsa_nonce() argument
244 SHA512_Update(&sha, message, message_len); in BN_generate_dsa_nonce()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/
Deap_server_teap.c1729 u32 message_len = 0, outer_tlv_len; in eap_teap_process() local
1745 message_len = WPA_GET_BE32(pos); in eap_teap_process()
1748 if (message_len < 4) { in eap_teap_process()
1767 message_len, outer_tlv_len); in eap_teap_process()
1774 if (message_len && in eap_teap_process()
1775 (message_len < outer_tlv_len || in eap_teap_process()
1776 message_len < 4 + outer_tlv_len)) { in eap_teap_process()
1798 wpabuf_put_be32(resp, message_len - 4 - outer_tlv_len); in eap_teap_process()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/
Deap_server_teap.c1888 u32 message_len = 0, outer_tlv_len; in eap_teap_process() local
1904 message_len = WPA_GET_BE32(pos); in eap_teap_process()
1907 if (message_len < 4) { in eap_teap_process()
1926 message_len, outer_tlv_len); in eap_teap_process()
1933 if (message_len && in eap_teap_process()
1934 (message_len < outer_tlv_len || in eap_teap_process()
1935 message_len < 4 + outer_tlv_len)) { in eap_teap_process()
1957 wpabuf_put_be32(resp, message_len - 4 - outer_tlv_len); in eap_teap_process()
/third_party/protobuf/python/google/protobuf/pyext/
Ddescriptor_pool.cc575 Py_ssize_t message_len; in AddSerializedFile() local
585 if (PyBytes_AsStringAndSize(serialized_pb, &message_type, &message_len) < 0) { in AddSerializedFile()
590 if (!file_proto.ParseFromArray(message_type, message_len)) { in AddSerializedFile()
/third_party/node/src/
Dnode_api.h117 size_t message_len);
Dnode_api.cc743 size_t message_len) { in napi_fatal_error() argument
755 if (message_len != NAPI_AUTO_LENGTH) { in napi_fatal_error()
757 const_cast<char*>(message), message_len); in napi_fatal_error()
Dnode_crypto.h574 bool CheckCCMMessageLength(int message_len);
Dnode_crypto.cc3855 bool CipherBase::CheckCCMMessageLength(int message_len) { in CheckCCMMessageLength() argument
3859 if (message_len > max_message_size_) { in CheckCCMMessageLength()
/third_party/ejdb/src/bindings/ejdb2_node/
Dnode_api.h117 size_t message_len);
/third_party/openssl/crypto/ec/
Dec_local.h657 int ED25519_sign(uint8_t *out_sig, const uint8_t *message, size_t message_len,
659 int ED25519_verify(const uint8_t *message, size_t message_len,
Dcurve25519.c5432 int ED25519_sign(uint8_t *out_sig, const uint8_t *message, size_t message_len, in ED25519_sign() argument
5451 SHA512_Update(&hash_ctx, message, message_len); in ED25519_sign()
5461 SHA512_Update(&hash_ctx, message, message_len); in ED25519_sign()
5476 int ED25519_verify(const uint8_t *message, size_t message_len, in ED25519_verify() argument
5532 SHA512_Update(&hash_ctx, message, message_len); in ED25519_verify()
/third_party/glib/gio/
Dgdbusprivate.c726 gssize message_len; in _g_dbus_worker_do_read_cb() local
729 message_len = g_dbus_message_bytes_needed ((guchar *) worker->read_buffer, in _g_dbus_worker_do_read_cb()
732 if (message_len == -1) in _g_dbus_worker_do_read_cb()
740 worker->read_buffer_bytes_wanted = message_len; in _g_dbus_worker_do_read_cb()
/third_party/ffmpeg/libavformat/
Dhttp.c469 int ret, body = 0, reply_code, message_len; in http_write_reply() local
508 message_len = snprintf(message, sizeof(message), in http_write_reply()
524 message_len = snprintf(message, sizeof(message), in http_write_reply()
536 if ((ret = ffurl_write(s->hd, message, message_len)) < 0) in http_write_reply()
/third_party/openssl/include/openssl/
Dbn.h508 size_t message_len, BN_CTX *ctx);
/third_party/mbedtls/tests/suites/
Dtest_suite_ssl.function2634 size_t message_len = 10;
2640 TEST_ASSERT( mbedtls_test_message_queue_push_info( &queue, message_len )
2641 == (int) message_len );
/third_party/googletest/docs/
Dgmock_cook_book.md500 const char* message, size_t message_len) = 0;
517 const char* message, size_t message_len) override {
520 Log(severity, full_filename, std::string(message, message_len));
/third_party/node/doc/api/
Dn-api.md1299 size_t message_len);
1306 * `[in] message_len`: The length of the message in bytes, or `NAPI_AUTO_LENGTH`