Home
last modified time | relevance | path

Searched refs:message_len (Results 1 – 22 of 22) sorted by relevance

/third_party/openssl/crypto/ec/curve448/
Deddsa.c163 const uint8_t *message, size_t message_len, in ossl_c448_ed448_sign() argument
198 || !EVP_DigestUpdate(hashctx, message, message_len)) { in ossl_c448_ed448_sign()
239 || !EVP_DigestUpdate(hashctx, message, message_len) in ossl_c448_ed448_sign()
284 const uint8_t *message, size_t message_len, in ossl_c448_ed448_verify() argument
338 || !EVP_DigestUpdate(hashctx, message, message_len) in ossl_c448_ed448_verify()
377 size_t message_len, const uint8_t public_key[57], in ossl_ed448_sign() argument
382 message_len, 0, context, context_len, in ossl_ed448_sign()
387 ossl_ed448_verify(OSSL_LIB_CTX *ctx, const uint8_t *message, size_t message_len, in ossl_ed448_verify() argument
392 message_len, 0, context, (uint8_t)context_len, in ossl_ed448_verify()
Ded448.h69 const uint8_t *message, size_t message_len,
124 const uint8_t *message, size_t message_len,
/third_party/openssl/include/crypto/
Decx.h97 ossl_ed25519_sign(uint8_t *out_sig, const uint8_t *message, size_t message_len,
101 ossl_ed25519_verify(const uint8_t *message, size_t message_len,
110 size_t message_len, const uint8_t public_key[57],
115 ossl_ed448_verify(OSSL_LIB_CTX *ctx, const uint8_t *message, size_t message_len,
/third_party/gn/src/base/
Dlogging.cc292 const size_t message_len = strlen(message); in RawLog() local
294 while (bytes_written < message_len) { in RawLog()
296 message_len - bytes_written)); in RawLog()
304 if (message_len > 0 && message[message_len - 1] != '\n') { in RawLog()
/third_party/openssl/crypto/bn/
Dbn_rand.c253 size_t message_len, BN_CTX *ctx) in BN_generate_dsa_nonce() argument
302 || !EVP_DigestUpdate(mdctx, message, message_len) in BN_generate_dsa_nonce()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/
Deap_server_teap.c1729 u32 message_len = 0, outer_tlv_len; in eap_teap_process() local
1745 message_len = WPA_GET_BE32(pos); in eap_teap_process()
1748 if (message_len < 4) { in eap_teap_process()
1767 message_len, outer_tlv_len); in eap_teap_process()
1774 if (message_len && in eap_teap_process()
1775 (message_len < outer_tlv_len || in eap_teap_process()
1776 message_len < 4 + outer_tlv_len)) { in eap_teap_process()
1798 wpabuf_put_be32(resp, message_len - 4 - outer_tlv_len); in eap_teap_process()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/
Deap_server_teap.c1888 u32 message_len = 0, outer_tlv_len; in eap_teap_process() local
1904 message_len = WPA_GET_BE32(pos); in eap_teap_process()
1907 if (message_len < 4) { in eap_teap_process()
1926 message_len, outer_tlv_len); in eap_teap_process()
1933 if (message_len && in eap_teap_process()
1934 (message_len < outer_tlv_len || in eap_teap_process()
1935 message_len < 4 + outer_tlv_len)) { in eap_teap_process()
1957 wpabuf_put_be32(resp, message_len - 4 - outer_tlv_len); in eap_teap_process()
/third_party/protobuf/python/google/protobuf/pyext/
Ddescriptor_pool.cc575 Py_ssize_t message_len; in AddSerializedFile() local
585 if (PyBytes_AsStringAndSize(serialized_pb, &message_type, &message_len) < 0) { in AddSerializedFile()
590 if (!file_proto.ParseFromArray(message_type, message_len)) { in AddSerializedFile()
/third_party/ejdb/src/bindings/ejdb2_node/
Dnode_api.h117 size_t message_len);
/third_party/node/src/
Dnode_api.h117 size_t message_len);
Dnode_api.cc743 size_t message_len) { in napi_fatal_error() argument
755 if (message_len != NAPI_AUTO_LENGTH) { in napi_fatal_error()
757 const_cast<char*>(message), message_len); in napi_fatal_error()
Dnode_crypto.h574 bool CheckCCMMessageLength(int message_len);
Dnode_crypto.cc3855 bool CipherBase::CheckCCMMessageLength(int message_len) { in CheckCCMMessageLength() argument
3859 if (message_len > max_message_size_) { in CheckCCMMessageLength()
/third_party/openssl/ohos_lite/crypto/ec/
Dec_local.h657 int ED25519_sign(uint8_t *out_sig, const uint8_t *message, size_t message_len,
659 int ED25519_verify(const uint8_t *message, size_t message_len,
Dcurve25519.c5432 int ED25519_sign(uint8_t *out_sig, const uint8_t *message, size_t message_len, in ED25519_sign() argument
5451 SHA512_Update(&hash_ctx, message, message_len); in ED25519_sign()
5461 SHA512_Update(&hash_ctx, message, message_len); in ED25519_sign()
5476 int ED25519_verify(const uint8_t *message, size_t message_len, in ED25519_verify() argument
5532 SHA512_Update(&hash_ctx, message, message_len); in ED25519_verify()
/third_party/ffmpeg/libavformat/
Dhttp.c469 int ret, body = 0, reply_code, message_len; in http_write_reply() local
508 message_len = snprintf(message, sizeof(message), in http_write_reply()
524 message_len = snprintf(message, sizeof(message), in http_write_reply()
536 if ((ret = ffurl_write(s->hd, message, message_len)) < 0) in http_write_reply()
/third_party/openssl/ohos_lite/include/openssl/
Dbn.h508 size_t message_len, BN_CTX *ctx);
/third_party/openssl/include/openssl/
Dbn.h552 size_t message_len, BN_CTX *ctx);
/third_party/openssl/crypto/ec/
Dcurve25519.c5443 ossl_ed25519_sign(uint8_t *out_sig, const uint8_t *message, size_t message_len, in ossl_ed25519_sign() argument
5470 || !EVP_DigestUpdate(hash_ctx, message, message_len) in ossl_ed25519_sign()
5481 || !EVP_DigestUpdate(hash_ctx, message, message_len) in ossl_ed25519_sign()
5500 ossl_ed25519_verify(const uint8_t *message, size_t message_len, in ossl_ed25519_verify() argument
5567 || !EVP_DigestUpdate(hash_ctx, message, message_len) in ossl_ed25519_verify()
/third_party/mbedtls/tests/suites/
Dtest_suite_ssl.function2634 size_t message_len = 10;
2640 TEST_ASSERT( mbedtls_test_message_queue_push_info( &queue, message_len )
2641 == (int) message_len );
/third_party/googletest/docs/
Dgmock_cook_book.md500 const char* message, size_t message_len) = 0;
517 const char* message, size_t message_len) override {
520 Log(severity, full_filename, std::string(message, message_len));
/third_party/node/doc/api/
Dn-api.md1300 size_t message_len);
1307 * `[in] message_len`: The length of the message in bytes, or `NAPI_AUTO_LENGTH`