Home
last modified time | relevance | path

Searched refs:message_len (Results 1 – 25 of 28) sorted by relevance

12

/third_party/openssl/crypto/ec/curve448/
Deddsa.c163 const uint8_t *message, size_t message_len, in ossl_c448_ed448_sign() argument
198 || !EVP_DigestUpdate(hashctx, message, message_len)) { in ossl_c448_ed448_sign()
239 || !EVP_DigestUpdate(hashctx, message, message_len) in ossl_c448_ed448_sign()
284 const uint8_t *message, size_t message_len, in ossl_c448_ed448_verify() argument
338 || !EVP_DigestUpdate(hashctx, message, message_len) in ossl_c448_ed448_verify()
377 size_t message_len, const uint8_t public_key[57], in ossl_ed448_sign() argument
382 message_len, 0, context, context_len, in ossl_ed448_sign()
387 ossl_ed448_verify(OSSL_LIB_CTX *ctx, const uint8_t *message, size_t message_len, in ossl_ed448_verify() argument
392 message_len, 0, context, (uint8_t)context_len, in ossl_ed448_verify()
Ded448.h69 const uint8_t *message, size_t message_len,
124 const uint8_t *message, size_t message_len,
/third_party/node/deps/openssl/openssl/crypto/ec/curve448/
Deddsa.c163 const uint8_t *message, size_t message_len, in ossl_c448_ed448_sign() argument
198 || !EVP_DigestUpdate(hashctx, message, message_len)) { in ossl_c448_ed448_sign()
239 || !EVP_DigestUpdate(hashctx, message, message_len) in ossl_c448_ed448_sign()
284 const uint8_t *message, size_t message_len, in ossl_c448_ed448_verify() argument
338 || !EVP_DigestUpdate(hashctx, message, message_len) in ossl_c448_ed448_verify()
377 size_t message_len, const uint8_t public_key[57], in ossl_ed448_sign() argument
382 message_len, 0, context, context_len, in ossl_ed448_sign()
387 ossl_ed448_verify(OSSL_LIB_CTX *ctx, const uint8_t *message, size_t message_len, in ossl_ed448_verify() argument
392 message_len, 0, context, (uint8_t)context_len, in ossl_ed448_verify()
Ded448.h69 const uint8_t *message, size_t message_len,
124 const uint8_t *message, size_t message_len,
/third_party/node/deps/openssl/openssl/include/crypto/
Decx.h97 ossl_ed25519_sign(uint8_t *out_sig, const uint8_t *message, size_t message_len,
101 ossl_ed25519_verify(const uint8_t *message, size_t message_len,
110 size_t message_len, const uint8_t public_key[57],
115 ossl_ed448_verify(OSSL_LIB_CTX *ctx, const uint8_t *message, size_t message_len,
/third_party/openssl/include/crypto/
Decx.h97 ossl_ed25519_sign(uint8_t *out_sig, const uint8_t *message, size_t message_len,
101 ossl_ed25519_verify(const uint8_t *message, size_t message_len,
110 size_t message_len, const uint8_t public_key[57],
115 ossl_ed448_verify(OSSL_LIB_CTX *ctx, const uint8_t *message, size_t message_len,
/third_party/gn/src/base/
Dlogging.cc292 const size_t message_len = strlen(message); in RawLog() local
294 while (bytes_written < message_len) { in RawLog()
296 message_len - bytes_written)); in RawLog()
304 if (message_len > 0 && message[message_len - 1] != '\n') { in RawLog()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/
Deap_server_teap.c1729 u32 message_len = 0, outer_tlv_len; in eap_teap_process() local
1745 message_len = WPA_GET_BE32(pos); in eap_teap_process()
1748 if (message_len < 4) { in eap_teap_process()
1767 message_len, outer_tlv_len); in eap_teap_process()
1774 if (message_len && in eap_teap_process()
1775 (message_len < outer_tlv_len || in eap_teap_process()
1776 message_len < 4 + outer_tlv_len)) { in eap_teap_process()
1798 wpabuf_put_be32(resp, message_len - 4 - outer_tlv_len); in eap_teap_process()
/third_party/node/deps/openssl/openssl/crypto/bn/
Dbn_rand.c253 size_t message_len, BN_CTX *ctx) in BN_generate_dsa_nonce() argument
302 || !EVP_DigestUpdate(mdctx, message, message_len) in BN_generate_dsa_nonce()
/third_party/openssl/crypto/bn/
Dbn_rand.c253 size_t message_len, BN_CTX *ctx) in BN_generate_dsa_nonce() argument
302 || !EVP_DigestUpdate(mdctx, message, message_len) in BN_generate_dsa_nonce()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/
Deap_server_teap.c1888 u32 message_len = 0, outer_tlv_len; in eap_teap_process() local
1904 message_len = WPA_GET_BE32(pos); in eap_teap_process()
1907 if (message_len < 4) { in eap_teap_process()
1926 message_len, outer_tlv_len); in eap_teap_process()
1933 if (message_len && in eap_teap_process()
1934 (message_len < outer_tlv_len || in eap_teap_process()
1935 message_len < 4 + outer_tlv_len)) { in eap_teap_process()
1957 wpabuf_put_be32(resp, message_len - 4 - outer_tlv_len); in eap_teap_process()
/third_party/protobuf/python/google/protobuf/pyext/
Ddescriptor_pool.cc575 Py_ssize_t message_len; in AddSerializedFile() local
585 if (PyBytes_AsStringAndSize(serialized_pb, &message_type, &message_len) < 0) { in AddSerializedFile()
590 if (!file_proto.ParseFromArray(message_type, message_len)) { in AddSerializedFile()
/third_party/node/src/
Djsvm_node_api.h98 size_t message_len);
Dnode_api.h117 size_t message_len);
Dnode_api.cc859 size_t message_len) { in jsvm_fatal_error() argument
869 if (message_len != JSVM_AUTO_LENGTH) { in jsvm_fatal_error()
870 message_string.assign(const_cast<char*>(message), message_len); in jsvm_fatal_error()
/third_party/node/src/crypto/
Dcrypto_cipher.h62 bool CheckCCMMessageLength(int message_len);
Dcrypto_cipher.cc639 bool CipherBase::CheckCCMMessageLength(int message_len) { in Init() argument
643 if (message_len > max_message_size_) { in Init()
/third_party/openssl/ohos_lite/crypto/ec/
Dec_local.h657 int ED25519_sign(uint8_t *out_sig, const uint8_t *message, size_t message_len,
659 int ED25519_verify(const uint8_t *message, size_t message_len,
Dcurve25519.c5432 int ED25519_sign(uint8_t *out_sig, const uint8_t *message, size_t message_len, in ED25519_sign() argument
5451 SHA512_Update(&hash_ctx, message, message_len); in ED25519_sign()
5461 SHA512_Update(&hash_ctx, message, message_len); in ED25519_sign()
5476 int ED25519_verify(const uint8_t *message, size_t message_len, in ED25519_verify() argument
5532 SHA512_Update(&hash_ctx, message, message_len); in ED25519_verify()
/third_party/ffmpeg/libavformat/
Dhttp.c535 int ret, body = 0, reply_code, message_len; in http_write_reply() local
574 message_len = snprintf(message, sizeof(message), in http_write_reply()
590 message_len = snprintf(message, sizeof(message), in http_write_reply()
602 if ((ret = ffurl_write(s->hd, message, message_len)) < 0) in http_write_reply()
/third_party/openssl/ohos_lite/include/openssl/
Dbn.h508 size_t message_len, BN_CTX *ctx);
/third_party/openssl/include/openssl/
Dbn.h552 size_t message_len, BN_CTX *ctx);
/third_party/node/deps/openssl/openssl/include/openssl/
Dbn.h552 size_t message_len, BN_CTX *ctx);
/third_party/node/deps/openssl/openssl/crypto/ec/
Dcurve25519.c5443 ossl_ed25519_sign(uint8_t *out_sig, const uint8_t *message, size_t message_len, in ossl_ed25519_sign() argument
5470 || !EVP_DigestUpdate(hash_ctx, message, message_len) in ossl_ed25519_sign()
5481 || !EVP_DigestUpdate(hash_ctx, message, message_len) in ossl_ed25519_sign()
5500 ossl_ed25519_verify(const uint8_t *message, size_t message_len, in ossl_ed25519_verify() argument
5567 || !EVP_DigestUpdate(hash_ctx, message, message_len) in ossl_ed25519_verify()
/third_party/openssl/crypto/ec/
Dcurve25519.c5443 ossl_ed25519_sign(uint8_t *out_sig, const uint8_t *message, size_t message_len, in ossl_ed25519_sign() argument
5470 || !EVP_DigestUpdate(hash_ctx, message, message_len) in ossl_ed25519_sign()
5481 || !EVP_DigestUpdate(hash_ctx, message, message_len) in ossl_ed25519_sign()
5500 ossl_ed25519_verify(const uint8_t *message, size_t message_len, in ossl_ed25519_verify() argument
5567 || !EVP_DigestUpdate(hash_ctx, message, message_len) in ossl_ed25519_verify()

12