/external/boringssl/src/include/openssl/ |
D | curve25519.h | 84 size_t message_len, 90 OPENSSL_EXPORT int ED25519_verify(const uint8_t *message, size_t message_len,
|
/external/arm-trusted-firmware/plat/arm/css/sgi/ |
D | sgi_ras.c | 32 size_t message_len; member 142 header->message_len = 4; in sgi_ras_intr_handler()
|
/external/libchrome/base/ |
D | logging.cc | 1013 const size_t message_len = strlen(message); in RawLog() local 1015 while (bytes_written < message_len) { in RawLog() 1018 message_len - bytes_written)); in RawLog() 1026 if (message_len > 0 && message[message_len - 1] != '\n') { in RawLog()
|
/external/libese/libese-hw/nxp/pn80t/ |
D | common.c | 182 const uint32_t message_len = in nxp_pn80t_send_cooldown() local 189 ese->ops->hw_transmit(ese, message, message_len, 1); in nxp_pn80t_send_cooldown()
|
/external/grpc-grpc/src/php/ext/grpc/ |
D | call.c | 292 size_t message_len; in PHP_METHOD() local 480 byte_buffer_to_string(message, &message_str, &message_len); in PHP_METHOD() 485 message_len, false); in PHP_METHOD()
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_teap.c | 1872 u32 message_len = 0, outer_tlv_len; in eap_teap_process() local 1888 message_len = WPA_GET_BE32(pos); in eap_teap_process() 1891 if (message_len < 4) { in eap_teap_process() 1910 message_len, outer_tlv_len); in eap_teap_process() 1917 if (message_len && in eap_teap_process() 1918 (message_len < outer_tlv_len || in eap_teap_process() 1919 message_len < 4 + outer_tlv_len)) { in eap_teap_process() 1941 wpabuf_put_be32(resp, message_len - 4 - outer_tlv_len); in eap_teap_process()
|
/external/protobuf/python/google/protobuf/pyext/ |
D | descriptor_pool.cc | 575 Py_ssize_t message_len; in AddSerializedFile() local 585 if (PyBytes_AsStringAndSize(serialized_pb, &message_type, &message_len) < 0) { in AddSerializedFile() 590 if (!file_proto.ParseFromArray(message_type, message_len)) { in AddSerializedFile()
|
/external/boringssl/src/third_party/fiat/ |
D | curve25519.c | 1894 size_t message_len, const uint8_t private_key[64]) { in ED25519_sign() argument 1910 SHA512_Update(&hash_ctx, message, message_len); in ED25519_sign() 1922 SHA512_Update(&hash_ctx, message, message_len); in ED25519_sign() 1932 int ED25519_verify(const uint8_t *message, size_t message_len, in ED25519_verify() argument 1980 SHA512_Update(&hash_ctx, message, message_len); in ED25519_verify()
|
/external/conscrypt/common/src/jni/main/cpp/conscrypt/ |
D | native_crypto.cc | 536 size_t message_len) { in ecSignDigestWithPrivateKey() argument 538 if (message_len > std::numeric_limits<jsize>::max()) { in ecSignDigestWithPrivateKey() 543 env->NewByteArray(static_cast<jsize>(message_len))); in ecSignDigestWithPrivateKey() 556 memcpy(messageBytes.get(), message, message_len); in ecSignDigestWithPrivateKey() 572 const char* message, size_t message_len) { in rsaSignDigestWithPrivateKey() argument 573 if (message_len > std::numeric_limits<jsize>::max()) { in rsaSignDigestWithPrivateKey() 578 env->NewByteArray(static_cast<jsize>(message_len))); in rsaSignDigestWithPrivateKey() 591 memcpy(messageBytes.get(), message, message_len); in rsaSignDigestWithPrivateKey()
|
/external/googletest/googlemock/docs/ |
D | cook_book.md | 459 const char* message, size_t message_len) = 0; 476 const char* message, size_t message_len) { 479 Log(severity, full_filename, std::string(message, message_len));
|