Home
last modified time | relevance | path

Searched refs:m_len (Results 1 – 23 of 23) sorted by relevance

/third_party/gstreamer/gstplugins_bad/ext/sctp/usrsctp/usrsctplib/
Duser_mbuf.c88 m->m_len = 0; in mbuf_constructor_dup()
412 mb->m_len = length; in m_uiotombuf()
430 len += m->m_len; in m_length()
589 m->m_len = 0; in mb_ctor_mbuf()
730 …_DEBUG_USR, "%p: m_len = %ld, m_type = %x, m_next = %p.\n", (void *)m, m->m_len, m->m_type, (void …
855 if (n->m_len >= len) in m_pullup()
859 len -= m->m_len; in m_pullup()
866 m->m_len = 0; in m_pullup()
870 space = (int)(&m->m_dat[MLEN] - (m->m_data + m->m_len)); in m_pullup()
872 count = min(min(max(len, max_protohdr), space), n->m_len); in m_pullup()
[all …]
Duser_mbuf.h220 #define m_len m_hdr.mh_len macro
358 - ((m)->m_data + (m)->m_len) : 0) : \
359 &(m)->m_dat[MLEN] - ((m)->m_data + (m)->m_len))
376 _mm->m_len += _mplen; \
Duser_ip6_var.h111 if ((m)->m_len >= (off) + (len)) \
116 KASSERT(t->m_len >= tmp + (len), \
Duser_socket.c3324 mm->m_len = min((int)M_SIZE(mm), remaining);
3325 m->m_pkthdr.len += mm->m_len;
3326 remaining -= mm->m_len;
/third_party/openssl/crypto/rsa/
Drsa_sign.c243 const unsigned char *m, size_t m_len) in encode_pkcs1() argument
259 dig_info_len = di_prefix_len + m_len; in encode_pkcs1()
266 memcpy(dig_info + di_prefix_len, m, m_len); in encode_pkcs1()
273 int RSA_sign(int type, const unsigned char *m, unsigned int m_len, in RSA_sign() argument
283 return rsa->meth->rsa_sign(type, m, m_len, sigret, siglen, rsa); in RSA_sign()
293 if (m_len != SSL_SIG_LENGTH) { in RSA_sign()
300 if (!encode_pkcs1(&tmps, &encoded_len, type, m, m_len)) in RSA_sign()
331 int ossl_rsa_verify(int type, const unsigned char *m, unsigned int m_len, in ossl_rsa_verify() argument
373 if (m_len != SSL_SIG_LENGTH) { in ossl_rsa_verify()
393 if (m_len != 16) { in ossl_rsa_verify()
[all …]
Drsa_saos.c24 const unsigned char *m, unsigned int m_len, in RSA_sign_ASN1_OCTET_STRING() argument
33 sig.length = m_len; in RSA_sign_ASN1_OCTET_STRING()
61 unsigned int m_len, unsigned char *sigbuf, in RSA_verify_ASN1_OCTET_STRING() argument
89 if (((unsigned int)sig->length != m_len) || in RSA_verify_ASN1_OCTET_STRING()
90 (memcmp(m, sig->data, m_len) != 0)) { in RSA_verify_ASN1_OCTET_STRING()
/third_party/vk-gl-cts/external/vulkancts/modules/vulkan/amber/
DvktAmberTestCaseUtil.cpp37 size_t m_len; member in vkt::cts_amber::AmberIndexFileParser
58 while (m_idx < m_len && isWhitespace(m_str[m_idx])) in skipWhitespace()
67 while (m_idx < m_len && m_str[m_idx] != '\n') in skipCommentLine()
82 if (m_idx >= m_len || m_str[m_idx] != c) in expect()
92 while (m_idx < m_len && i < m_fieldLen && m_str[m_idx] != '"') in captureString()
113 m_len = m_str.length(); in AmberIndexFileParser()
132 if (m_idx < m_len) in parse()
157 while (m_idx < m_len && m_str[m_idx] == ',') in parse()
/third_party/vk-gl-cts/external/vulkancts/modules_no_buildgn/vulkan/amber/
DvktAmberTestCaseUtil.cpp37 size_t m_len; member in vkt::cts_amber::AmberIndexFileParser
58 while (m_idx < m_len && isWhitespace(m_str[m_idx])) in skipWhitespace()
67 while (m_idx < m_len && m_str[m_idx] != '\n') in skipCommentLine()
82 if (m_idx >= m_len || m_str[m_idx] != c) in expect()
92 while (m_idx < m_len && i < m_fieldLen && m_str[m_idx] != '"') in captureString()
113 m_len = m_str.length(); in AmberIndexFileParser()
132 if (m_idx < m_len) in parse()
157 while (m_idx < m_len && m_str[m_idx] == ',') in parse()
/third_party/openssl/crypto/evp/
Dp_verify.c22 unsigned int m_len = 0; in EVP_VerifyFinal_ex() local
27 if (!EVP_DigestFinal_ex(ctx, m, &m_len)) in EVP_VerifyFinal_ex()
39 rv = EVP_DigestFinal_ex(tmp_ctx, m, &m_len); in EVP_VerifyFinal_ex()
53 i = EVP_PKEY_verify(pkctx, sigbuf, siglen, m, m_len); in EVP_VerifyFinal_ex()
Dp_sign.c22 unsigned int m_len = 0; in EVP_SignFinal_ex() local
29 if (!EVP_DigestFinal_ex(ctx, m, &m_len)) in EVP_SignFinal_ex()
41 rv = EVP_DigestFinal_ex(tmp_ctx, m, &m_len); in EVP_SignFinal_ex()
56 if (EVP_PKEY_sign(pkctx, sigret, &sltmp, m, m_len) <= 0) in EVP_SignFinal_ex()
/third_party/openssl/crypto/pem/
Dpem_sign.c33 unsigned int m_len; in PEM_SignFinal() local
41 if (EVP_SignFinal(ctx, m, &m_len, pkey) <= 0) in PEM_SignFinal()
44 i = EVP_EncodeBlock(sigret, m, m_len); in PEM_SignFinal()
/third_party/openssl/doc/man3/
DRSA_sign_ASN1_OCTET_STRING.pod16 unsigned int m_len, unsigned char *sigret,
20 unsigned int m_len, unsigned char *sigbuf,
29 B<m_len> using the private key B<rsa> represented in DER using PKCS #1
43 B<m> of size B<m_len>. B<dummy> is ignored. B<rsa> is the signer's
DRSA_sign.pod15 int RSA_sign(int type, const unsigned char *m, unsigned int m_len,
18 int RSA_verify(int type, const unsigned char *m, unsigned int m_len,
27 RSA_sign() signs the message digest B<m> of size B<m_len> using the
43 matches a given message digest B<m> of size B<m_len>. B<type> denotes
/third_party/gstreamer/gstplugins_bad/ext/sctp/usrsctp/usrsctplib/netinet/
Dsctp_crc32.c776 if (offset < (uint32_t)m->m_len) { in sctp_calculate_cksum()
779 offset -= m->m_len; in sctp_calculate_cksum()
785 (unsigned int)(m->m_len - offset)); in sctp_calculate_cksum()
791 (unsigned int)m->m_len); in sctp_calculate_cksum()
Dsctp_os_userspace.h790 #define SCTP_BUF_LEN(m) (m->m_len)
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/
Dsae_pk.c546 bool ap, const u8 *m, size_t m_len, in sae_pk_hash_sig_data() argument
556 sig_data = wpabuf_alloc(tmp->prime_len * 6 + m_len + pubkey_len + in sae_pk_hash_sig_data()
579 wpabuf_put_data(sig_data, m, m_len); in sae_pk_hash_sig_data()
704 const u8 *m, size_t m_len, in sae_pk_valid_fingerprint() argument
723 hash_data_len = tmp->ssid_len + m_len + k_ap_len; in sae_pk_valid_fingerprint()
730 os_memcpy(pos, m, m_len); in sae_pk_valid_fingerprint()
731 pos += m_len; in sae_pk_valid_fingerprint()
/third_party/openssl/crypto/property/
Dproperty_parse.c44 static int match(const char *t[], const char m[], size_t m_len) in match() argument
48 if (OPENSSL_strncasecmp(s, m, m_len) == 0) { in match()
49 *t = skip_space(s + m_len); in match()
/third_party/openssl/include/crypto/
Drsa.h103 unsigned int m_len, unsigned char *rm,
/third_party/openssl/engines/
De_capi.c129 unsigned int m_len, unsigned char *sigret,
831 int capi_rsa_sign(int dtype, const unsigned char *m, unsigned int m_len, in capi_rsa_sign() argument
/third_party/node/src/
Dnode_crypto.cc4676 unsigned int m_len; in Node_SignFinal() local
4678 if (!EVP_DigestFinal_ex(mdctx.get(), m, &m_len)) in Node_SignFinal()
4696 m_len) > 0) { in Node_SignFinal()
4917 unsigned int m_len; in VerifyFinal() local
4921 if (!EVP_DigestFinal_ex(mdctx.get(), m, &m_len)) in VerifyFinal()
4931 const int r = EVP_PKEY_verify(pkctx.get(), s, sig.size(), m, m_len); in VerifyFinal()
/third_party/gstreamer/gstplugins_bad/ext/sctp/usrsctp/usrsctplib/netinet6/
Dsctp6_usrreq.c203 if (m->m_len < offset) {
/third_party/libabigail/tests/lib/
Dcatch.hpp8508 size_t m_len = 0; member in Catch::clara::TextFlow::Column::iterator
8541 m_len = m_end - m_pos; in calcLength()
8550 m_len = len; in calcLength()
8553 m_len = width - 1; in calcLength()
8578 if (m_len == 0) in iterator()
8585 return addIndentAndSuffix(line().substr(m_pos, m_len)); in operator *()
8589 m_pos += m_len; in operator ++()
/third_party/libbpf/.github/actions/build-selftests/
Dvmlinux.h47023 unsigned int m_len; member
48240 unsigned int m_len; member
48252 unsigned int m_len; member