/external/boringssl/src/include/openssl/ |
D | curve25519.h | 84 size_t message_len, 90 OPENSSL_EXPORT int ED25519_verify(const uint8_t *message, size_t message_len,
|
/external/libchrome/base/ |
D | logging.cc | 1013 const size_t message_len = strlen(message); in RawLog() local 1015 while (bytes_written < message_len) { in RawLog() 1018 message_len - bytes_written)); in RawLog() 1026 if (message_len > 0 && message[message_len - 1] != '\n') { in RawLog()
|
/external/protobuf/python/google/protobuf/pyext/ |
D | descriptor_pool.cc | 412 Py_ssize_t message_len; in AddSerializedFile() local 422 if (PyBytes_AsStringAndSize(serialized_pb, &message_type, &message_len) < 0) { in AddSerializedFile() 427 if (!file_proto.ParseFromArray(message_type, message_len)) { in AddSerializedFile()
|
/external/libese/libese-hw/nxp/pn80t/ |
D | common.c | 182 const uint32_t message_len = in nxp_pn80t_send_cooldown() local 189 ese->ops->hw_transmit(ese, message, message_len, 1); in nxp_pn80t_send_cooldown()
|
/external/grpc-grpc/src/php/ext/grpc/ |
D | call.c | 292 size_t message_len; in PHP_METHOD() local 480 byte_buffer_to_string(message, &message_str, &message_len); in PHP_METHOD() 485 message_len, false); in PHP_METHOD()
|
/external/boringssl/src/third_party/fiat/ |
D | curve25519.c | 1894 size_t message_len, const uint8_t private_key[64]) { in ED25519_sign() argument 1910 SHA512_Update(&hash_ctx, message, message_len); in ED25519_sign() 1922 SHA512_Update(&hash_ctx, message, message_len); in ED25519_sign() 1932 int ED25519_verify(const uint8_t *message, size_t message_len, in ED25519_verify() argument 1980 SHA512_Update(&hash_ctx, message, message_len); in ED25519_verify()
|
/external/epid-sdk/epid/member/tiny/unittests/ |
D | sign-test.cc | 1002 size_t message_len = 0; in TEST_F() local 1016 << "EpidSign for message_len: " << message_len << " failed"; in TEST_F() 1018 << "EpidVerify for message_len: " << message_len << " failed"; in TEST_F()
|
/external/epid-sdk/epid/member/unittests/ |
D | sign-test.cc | 1080 size_t message_len = 0; in TEST_F() local 1094 << "EpidSign for message_len: " << message_len << " failed"; in TEST_F() 1096 << "EpidVerify for message_len: " << message_len << " failed"; in TEST_F()
|
/external/conscrypt/common/src/jni/main/cpp/conscrypt/ |
D | native_crypto.cc | 536 size_t message_len) { in ecSignDigestWithPrivateKey() argument 538 if (message_len > std::numeric_limits<jsize>::max()) { in ecSignDigestWithPrivateKey() 542 … ScopedLocalRef<jbyteArray> messageArray(env, env->NewByteArray(static_cast<jsize>(message_len))); in ecSignDigestWithPrivateKey() 555 memcpy(messageBytes.get(), message, message_len); in ecSignDigestWithPrivateKey() 571 const char* message, size_t message_len) { in rsaSignDigestWithPrivateKey() argument 572 if (message_len > std::numeric_limits<jsize>::max()) { in rsaSignDigestWithPrivateKey() 577 env->NewByteArray(static_cast<jsize>(message_len))); in rsaSignDigestWithPrivateKey() 590 memcpy(messageBytes.get(), message, message_len); in rsaSignDigestWithPrivateKey()
|
/external/mesa3d/src/intel/compiler/ |
D | brw_eu_emit.c | 2559 unsigned message_len, in brw_send_indirect_surface_message() argument 2589 brw_inst_set_mlen(devinfo, insn, message_len); in brw_send_indirect_surface_message()
|
/external/googletest/googlemock/docs/ |
D | CookBook.md | 315 const char* message, size_t message_len) = 0; 333 const char* message, size_t message_len) { 336 Log(severity, full_filename, std::string(message, message_len));
|