/third_party/gstreamer/gstplugins_bad/ext/sctp/usrsctp/usrsctplib/ |
D | user_mbuf.c | 88 m->m_len = 0; in mbuf_constructor_dup() 412 mb->m_len = length; in m_uiotombuf() 430 len += m->m_len; in m_length() 589 m->m_len = 0; in mb_ctor_mbuf() 730 …_DEBUG_USR, "%p: m_len = %ld, m_type = %x, m_next = %p.\n", (void *)m, m->m_len, m->m_type, (void … 855 if (n->m_len >= len) in m_pullup() 859 len -= m->m_len; in m_pullup() 866 m->m_len = 0; in m_pullup() 870 space = (int)(&m->m_dat[MLEN] - (m->m_data + m->m_len)); in m_pullup() 872 count = min(min(max(len, max_protohdr), space), n->m_len); in m_pullup() [all …]
|
D | user_mbuf.h | 220 #define m_len m_hdr.mh_len macro 358 - ((m)->m_data + (m)->m_len) : 0) : \ 359 &(m)->m_dat[MLEN] - ((m)->m_data + (m)->m_len)) 376 _mm->m_len += _mplen; \
|
D | user_ip6_var.h | 111 if ((m)->m_len >= (off) + (len)) \ 116 KASSERT(t->m_len >= tmp + (len), \
|
D | user_socket.c | 3324 mm->m_len = min((int)M_SIZE(mm), remaining); 3325 m->m_pkthdr.len += mm->m_len; 3326 remaining -= mm->m_len;
|
/third_party/openssl/crypto/rsa/ |
D | rsa_sign.c | 243 const unsigned char *m, size_t m_len) in encode_pkcs1() argument 259 dig_info_len = di_prefix_len + m_len; in encode_pkcs1() 266 memcpy(dig_info + di_prefix_len, m, m_len); in encode_pkcs1() 273 int RSA_sign(int type, const unsigned char *m, unsigned int m_len, in RSA_sign() argument 283 return rsa->meth->rsa_sign(type, m, m_len, sigret, siglen, rsa); in RSA_sign() 293 if (m_len != SSL_SIG_LENGTH) { in RSA_sign() 300 if (!encode_pkcs1(&tmps, &encoded_len, type, m, m_len)) in RSA_sign() 331 int ossl_rsa_verify(int type, const unsigned char *m, unsigned int m_len, in ossl_rsa_verify() argument 373 if (m_len != SSL_SIG_LENGTH) { in ossl_rsa_verify() 393 if (m_len != 16) { in ossl_rsa_verify() [all …]
|
D | rsa_saos.c | 24 const unsigned char *m, unsigned int m_len, in RSA_sign_ASN1_OCTET_STRING() argument 33 sig.length = m_len; in RSA_sign_ASN1_OCTET_STRING() 61 unsigned int m_len, unsigned char *sigbuf, in RSA_verify_ASN1_OCTET_STRING() argument 89 if (((unsigned int)sig->length != m_len) || in RSA_verify_ASN1_OCTET_STRING() 90 (memcmp(m, sig->data, m_len) != 0)) { in RSA_verify_ASN1_OCTET_STRING()
|
/third_party/vk-gl-cts/external/vulkancts/modules/vulkan/amber/ |
D | vktAmberTestCaseUtil.cpp | 37 size_t m_len; member in vkt::cts_amber::AmberIndexFileParser 58 while (m_idx < m_len && isWhitespace(m_str[m_idx])) in skipWhitespace() 67 while (m_idx < m_len && m_str[m_idx] != '\n') in skipCommentLine() 82 if (m_idx >= m_len || m_str[m_idx] != c) in expect() 92 while (m_idx < m_len && i < m_fieldLen && m_str[m_idx] != '"') in captureString() 113 m_len = m_str.length(); in AmberIndexFileParser() 132 if (m_idx < m_len) in parse() 157 while (m_idx < m_len && m_str[m_idx] == ',') in parse()
|
/third_party/vk-gl-cts/external/vulkancts/modules_no_buildgn/vulkan/amber/ |
D | vktAmberTestCaseUtil.cpp | 37 size_t m_len; member in vkt::cts_amber::AmberIndexFileParser 58 while (m_idx < m_len && isWhitespace(m_str[m_idx])) in skipWhitespace() 67 while (m_idx < m_len && m_str[m_idx] != '\n') in skipCommentLine() 82 if (m_idx >= m_len || m_str[m_idx] != c) in expect() 92 while (m_idx < m_len && i < m_fieldLen && m_str[m_idx] != '"') in captureString() 113 m_len = m_str.length(); in AmberIndexFileParser() 132 if (m_idx < m_len) in parse() 157 while (m_idx < m_len && m_str[m_idx] == ',') in parse()
|
/third_party/openssl/crypto/evp/ |
D | p_verify.c | 22 unsigned int m_len = 0; in EVP_VerifyFinal_ex() local 27 if (!EVP_DigestFinal_ex(ctx, m, &m_len)) in EVP_VerifyFinal_ex() 39 rv = EVP_DigestFinal_ex(tmp_ctx, m, &m_len); in EVP_VerifyFinal_ex() 53 i = EVP_PKEY_verify(pkctx, sigbuf, siglen, m, m_len); in EVP_VerifyFinal_ex()
|
D | p_sign.c | 22 unsigned int m_len = 0; in EVP_SignFinal_ex() local 29 if (!EVP_DigestFinal_ex(ctx, m, &m_len)) in EVP_SignFinal_ex() 41 rv = EVP_DigestFinal_ex(tmp_ctx, m, &m_len); in EVP_SignFinal_ex() 56 if (EVP_PKEY_sign(pkctx, sigret, &sltmp, m, m_len) <= 0) in EVP_SignFinal_ex()
|
/third_party/openssl/crypto/pem/ |
D | pem_sign.c | 33 unsigned int m_len; in PEM_SignFinal() local 41 if (EVP_SignFinal(ctx, m, &m_len, pkey) <= 0) in PEM_SignFinal() 44 i = EVP_EncodeBlock(sigret, m, m_len); in PEM_SignFinal()
|
/third_party/openssl/doc/man3/ |
D | RSA_sign_ASN1_OCTET_STRING.pod | 16 unsigned int m_len, unsigned char *sigret, 20 unsigned int m_len, unsigned char *sigbuf, 29 B<m_len> using the private key B<rsa> represented in DER using PKCS #1 43 B<m> of size B<m_len>. B<dummy> is ignored. B<rsa> is the signer's
|
D | RSA_sign.pod | 15 int RSA_sign(int type, const unsigned char *m, unsigned int m_len, 18 int RSA_verify(int type, const unsigned char *m, unsigned int m_len, 27 RSA_sign() signs the message digest B<m> of size B<m_len> using the 43 matches a given message digest B<m> of size B<m_len>. B<type> denotes
|
/third_party/gstreamer/gstplugins_bad/ext/sctp/usrsctp/usrsctplib/netinet/ |
D | sctp_crc32.c | 776 if (offset < (uint32_t)m->m_len) { in sctp_calculate_cksum() 779 offset -= m->m_len; in sctp_calculate_cksum() 785 (unsigned int)(m->m_len - offset)); in sctp_calculate_cksum() 791 (unsigned int)m->m_len); in sctp_calculate_cksum()
|
D | sctp_os_userspace.h | 790 #define SCTP_BUF_LEN(m) (m->m_len)
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/ |
D | sae_pk.c | 546 bool ap, const u8 *m, size_t m_len, in sae_pk_hash_sig_data() argument 556 sig_data = wpabuf_alloc(tmp->prime_len * 6 + m_len + pubkey_len + in sae_pk_hash_sig_data() 579 wpabuf_put_data(sig_data, m, m_len); in sae_pk_hash_sig_data() 704 const u8 *m, size_t m_len, in sae_pk_valid_fingerprint() argument 723 hash_data_len = tmp->ssid_len + m_len + k_ap_len; in sae_pk_valid_fingerprint() 730 os_memcpy(pos, m, m_len); in sae_pk_valid_fingerprint() 731 pos += m_len; in sae_pk_valid_fingerprint()
|
/third_party/openssl/crypto/property/ |
D | property_parse.c | 44 static int match(const char *t[], const char m[], size_t m_len) in match() argument 48 if (OPENSSL_strncasecmp(s, m, m_len) == 0) { in match() 49 *t = skip_space(s + m_len); in match()
|
/third_party/openssl/include/crypto/ |
D | rsa.h | 103 unsigned int m_len, unsigned char *rm,
|
/third_party/openssl/engines/ |
D | e_capi.c | 129 unsigned int m_len, unsigned char *sigret, 831 int capi_rsa_sign(int dtype, const unsigned char *m, unsigned int m_len, in capi_rsa_sign() argument
|
/third_party/node/src/ |
D | node_crypto.cc | 4676 unsigned int m_len; in Node_SignFinal() local 4678 if (!EVP_DigestFinal_ex(mdctx.get(), m, &m_len)) in Node_SignFinal() 4696 m_len) > 0) { in Node_SignFinal() 4917 unsigned int m_len; in VerifyFinal() local 4921 if (!EVP_DigestFinal_ex(mdctx.get(), m, &m_len)) in VerifyFinal() 4931 const int r = EVP_PKEY_verify(pkctx.get(), s, sig.size(), m, m_len); in VerifyFinal()
|
/third_party/gstreamer/gstplugins_bad/ext/sctp/usrsctp/usrsctplib/netinet6/ |
D | sctp6_usrreq.c | 203 if (m->m_len < offset) {
|
/third_party/libabigail/tests/lib/ |
D | catch.hpp | 8508 size_t m_len = 0; member in Catch::clara::TextFlow::Column::iterator 8541 m_len = m_end - m_pos; in calcLength() 8550 m_len = len; in calcLength() 8553 m_len = width - 1; in calcLength() 8578 if (m_len == 0) in iterator() 8585 return addIndentAndSuffix(line().substr(m_pos, m_len)); in operator *() 8589 m_pos += m_len; in operator ++()
|
/third_party/libbpf/.github/actions/build-selftests/ |
D | vmlinux.h | 47023 unsigned int m_len; member 48240 unsigned int m_len; member 48252 unsigned int m_len; member
|