/third_party/openssl/crypto/ec/curve448/ |
D | eddsa.c | 163 const uint8_t *message, size_t message_len, in ossl_c448_ed448_sign() argument 198 || !EVP_DigestUpdate(hashctx, message, message_len)) { in ossl_c448_ed448_sign() 239 || !EVP_DigestUpdate(hashctx, message, message_len) in ossl_c448_ed448_sign() 284 const uint8_t *message, size_t message_len, in ossl_c448_ed448_verify() argument 338 || !EVP_DigestUpdate(hashctx, message, message_len) in ossl_c448_ed448_verify() 377 size_t message_len, const uint8_t public_key[57], in ossl_ed448_sign() argument 382 message_len, 0, context, context_len, in ossl_ed448_sign() 387 ossl_ed448_verify(OSSL_LIB_CTX *ctx, const uint8_t *message, size_t message_len, in ossl_ed448_verify() argument 392 message_len, 0, context, (uint8_t)context_len, in ossl_ed448_verify()
|
D | ed448.h | 69 const uint8_t *message, size_t message_len, 124 const uint8_t *message, size_t message_len,
|
/third_party/node/deps/openssl/openssl/crypto/ec/curve448/ |
D | eddsa.c | 163 const uint8_t *message, size_t message_len, in ossl_c448_ed448_sign() argument 198 || !EVP_DigestUpdate(hashctx, message, message_len)) { in ossl_c448_ed448_sign() 239 || !EVP_DigestUpdate(hashctx, message, message_len) in ossl_c448_ed448_sign() 284 const uint8_t *message, size_t message_len, in ossl_c448_ed448_verify() argument 338 || !EVP_DigestUpdate(hashctx, message, message_len) in ossl_c448_ed448_verify() 377 size_t message_len, const uint8_t public_key[57], in ossl_ed448_sign() argument 382 message_len, 0, context, context_len, in ossl_ed448_sign() 387 ossl_ed448_verify(OSSL_LIB_CTX *ctx, const uint8_t *message, size_t message_len, in ossl_ed448_verify() argument 392 message_len, 0, context, (uint8_t)context_len, in ossl_ed448_verify()
|
D | ed448.h | 69 const uint8_t *message, size_t message_len, 124 const uint8_t *message, size_t message_len,
|
/third_party/node/deps/openssl/openssl/include/crypto/ |
D | ecx.h | 97 ossl_ed25519_sign(uint8_t *out_sig, const uint8_t *message, size_t message_len, 101 ossl_ed25519_verify(const uint8_t *message, size_t message_len, 110 size_t message_len, const uint8_t public_key[57], 115 ossl_ed448_verify(OSSL_LIB_CTX *ctx, const uint8_t *message, size_t message_len,
|
/third_party/openssl/include/crypto/ |
D | ecx.h | 97 ossl_ed25519_sign(uint8_t *out_sig, const uint8_t *message, size_t message_len, 101 ossl_ed25519_verify(const uint8_t *message, size_t message_len, 110 size_t message_len, const uint8_t public_key[57], 115 ossl_ed448_verify(OSSL_LIB_CTX *ctx, const uint8_t *message, size_t message_len,
|
/third_party/gn/src/base/ |
D | logging.cc | 292 const size_t message_len = strlen(message); in RawLog() local 294 while (bytes_written < message_len) { in RawLog() 296 message_len - bytes_written)); in RawLog() 304 if (message_len > 0 && message[message_len - 1] != '\n') { in RawLog()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
D | eap_server_teap.c | 1729 u32 message_len = 0, outer_tlv_len; in eap_teap_process() local 1745 message_len = WPA_GET_BE32(pos); in eap_teap_process() 1748 if (message_len < 4) { in eap_teap_process() 1767 message_len, outer_tlv_len); in eap_teap_process() 1774 if (message_len && in eap_teap_process() 1775 (message_len < outer_tlv_len || in eap_teap_process() 1776 message_len < 4 + outer_tlv_len)) { in eap_teap_process() 1798 wpabuf_put_be32(resp, message_len - 4 - outer_tlv_len); in eap_teap_process()
|
/third_party/node/deps/openssl/openssl/crypto/bn/ |
D | bn_rand.c | 253 size_t message_len, BN_CTX *ctx) in BN_generate_dsa_nonce() argument 302 || !EVP_DigestUpdate(mdctx, message, message_len) in BN_generate_dsa_nonce()
|
/third_party/openssl/crypto/bn/ |
D | bn_rand.c | 253 size_t message_len, BN_CTX *ctx) in BN_generate_dsa_nonce() argument 302 || !EVP_DigestUpdate(mdctx, message, message_len) in BN_generate_dsa_nonce()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
D | eap_server_teap.c | 1888 u32 message_len = 0, outer_tlv_len; in eap_teap_process() local 1904 message_len = WPA_GET_BE32(pos); in eap_teap_process() 1907 if (message_len < 4) { in eap_teap_process() 1926 message_len, outer_tlv_len); in eap_teap_process() 1933 if (message_len && in eap_teap_process() 1934 (message_len < outer_tlv_len || in eap_teap_process() 1935 message_len < 4 + outer_tlv_len)) { in eap_teap_process() 1957 wpabuf_put_be32(resp, message_len - 4 - outer_tlv_len); in eap_teap_process()
|
/third_party/protobuf/python/google/protobuf/pyext/ |
D | descriptor_pool.cc | 575 Py_ssize_t message_len; in AddSerializedFile() local 585 if (PyBytes_AsStringAndSize(serialized_pb, &message_type, &message_len) < 0) { in AddSerializedFile() 590 if (!file_proto.ParseFromArray(message_type, message_len)) { in AddSerializedFile()
|
/third_party/node/src/ |
D | jsvm_node_api.h | 98 size_t message_len);
|
D | node_api.h | 117 size_t message_len);
|
D | node_api.cc | 859 size_t message_len) { in jsvm_fatal_error() argument 869 if (message_len != JSVM_AUTO_LENGTH) { in jsvm_fatal_error() 870 message_string.assign(const_cast<char*>(message), message_len); in jsvm_fatal_error()
|
/third_party/node/src/crypto/ |
D | crypto_cipher.h | 62 bool CheckCCMMessageLength(int message_len);
|
D | crypto_cipher.cc | 639 bool CipherBase::CheckCCMMessageLength(int message_len) { in Init() argument 643 if (message_len > max_message_size_) { in Init()
|
/third_party/openssl/ohos_lite/crypto/ec/ |
D | ec_local.h | 657 int ED25519_sign(uint8_t *out_sig, const uint8_t *message, size_t message_len, 659 int ED25519_verify(const uint8_t *message, size_t message_len,
|
D | curve25519.c | 5432 int ED25519_sign(uint8_t *out_sig, const uint8_t *message, size_t message_len, in ED25519_sign() argument 5451 SHA512_Update(&hash_ctx, message, message_len); in ED25519_sign() 5461 SHA512_Update(&hash_ctx, message, message_len); in ED25519_sign() 5476 int ED25519_verify(const uint8_t *message, size_t message_len, in ED25519_verify() argument 5532 SHA512_Update(&hash_ctx, message, message_len); in ED25519_verify()
|
/third_party/ffmpeg/libavformat/ |
D | http.c | 535 int ret, body = 0, reply_code, message_len; in http_write_reply() local 574 message_len = snprintf(message, sizeof(message), in http_write_reply() 590 message_len = snprintf(message, sizeof(message), in http_write_reply() 602 if ((ret = ffurl_write(s->hd, message, message_len)) < 0) in http_write_reply()
|
/third_party/openssl/ohos_lite/include/openssl/ |
D | bn.h | 508 size_t message_len, BN_CTX *ctx);
|
/third_party/openssl/include/openssl/ |
D | bn.h | 552 size_t message_len, BN_CTX *ctx);
|
/third_party/node/deps/openssl/openssl/include/openssl/ |
D | bn.h | 552 size_t message_len, BN_CTX *ctx);
|
/third_party/node/deps/openssl/openssl/crypto/ec/ |
D | curve25519.c | 5443 ossl_ed25519_sign(uint8_t *out_sig, const uint8_t *message, size_t message_len, in ossl_ed25519_sign() argument 5470 || !EVP_DigestUpdate(hash_ctx, message, message_len) in ossl_ed25519_sign() 5481 || !EVP_DigestUpdate(hash_ctx, message, message_len) in ossl_ed25519_sign() 5500 ossl_ed25519_verify(const uint8_t *message, size_t message_len, in ossl_ed25519_verify() argument 5567 || !EVP_DigestUpdate(hash_ctx, message, message_len) in ossl_ed25519_verify()
|
/third_party/openssl/crypto/ec/ |
D | curve25519.c | 5443 ossl_ed25519_sign(uint8_t *out_sig, const uint8_t *message, size_t message_len, in ossl_ed25519_sign() argument 5470 || !EVP_DigestUpdate(hash_ctx, message, message_len) in ossl_ed25519_sign() 5481 || !EVP_DigestUpdate(hash_ctx, message, message_len) in ossl_ed25519_sign() 5500 ossl_ed25519_verify(const uint8_t *message, size_t message_len, in ossl_ed25519_verify() argument 5567 || !EVP_DigestUpdate(hash_ctx, message, message_len) in ossl_ed25519_verify()
|