/external/openssh/regress/misc/sk-dummy/ |
D | sk-dummy.c | 297 sig_ecdsa(const uint8_t *message, size_t message_len, in sig_ecdsa() argument 333 if (message_len != SHA256_DIGEST_LENGTH) { in sig_ecdsa() 334 skdebug(__func__, "bad message len %zu", message_len); in sig_ecdsa() 338 dump("message", message, message_len); in sig_ecdsa() 353 SHA256_Update(&ctx, message, message_len); in sig_ecdsa() 393 sig_ed25519(const uint8_t *message, size_t message_len, in sig_ed25519() argument 412 if (message_len != SHA256_DIGEST_LENGTH) { in sig_ed25519() 413 skdebug(__func__, "bad message len %zu", message_len); in sig_ed25519() 417 dump("message", message, message_len); in sig_ed25519() 430 memcpy(signbuf + o, message, message_len); in sig_ed25519() [all …]
|
/external/boringssl/src/include/openssl/ |
D | curve25519.h | 84 size_t message_len, 90 OPENSSL_EXPORT int ED25519_verify(const uint8_t *message, size_t message_len,
|
/external/rust/crates/quiche/deps/boringssl/src/include/openssl/ |
D | curve25519.h | 84 size_t message_len, 90 OPENSSL_EXPORT int ED25519_verify(const uint8_t *message, size_t message_len,
|
/external/arm-trusted-firmware/plat/arm/css/sgi/ |
D | sgi_ras.c | 32 size_t message_len; member 143 header->message_len = 4; in sgi_ras_intr_handler()
|
/external/libchrome/base/ |
D | logging.cc | 1013 const size_t message_len = strlen(message); in RawLog() local 1015 while (bytes_written < message_len) { in RawLog() 1018 message_len - bytes_written)); in RawLog() 1026 if (message_len > 0 && message[message_len - 1] != '\n') { in RawLog()
|
/external/openssh/ |
D | sk-api.h | 86 int sk_sign(uint32_t alg, const uint8_t *message, size_t message_len,
|
D | sk-usbhid.c | 80 int sk_sign(uint32_t alg, const uint8_t *message, size_t message_len, 159 try_device(fido_dev_t *dev, const uint8_t *message, size_t message_len, in try_device() argument 170 message_len)) != FIDO_OK) { in try_device() 202 find_device(const char *path, const uint8_t *message, size_t message_len, in find_device() argument 256 if (try_device(dev, message, message_len, application, in find_device()
|
D | ssh-sk.c | 62 int (*sk_sign)(int alg, const uint8_t *message, size_t message_len, 78 int ssh_sk_sign(int alg, const uint8_t *message, size_t message_len,
|
D | PROTOCOL.u2f | 301 int sk_sign(uint32_t alg, const uint8_t *message, size_t message_len,
|
/external/libese/libese-hw/nxp/pn80t/ |
D | common.c | 182 const uint32_t message_len = in nxp_pn80t_send_cooldown() local 189 ese->ops->hw_transmit(ese, message, message_len, 1); in nxp_pn80t_send_cooldown()
|
/external/grpc-grpc/src/php/ext/grpc/ |
D | call.c | 292 size_t message_len; in PHP_METHOD() local 480 byte_buffer_to_string(message, &message_str, &message_len); in PHP_METHOD() 485 message_len, false); in PHP_METHOD()
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_teap.c | 1888 u32 message_len = 0, outer_tlv_len; in eap_teap_process() local 1904 message_len = WPA_GET_BE32(pos); in eap_teap_process() 1907 if (message_len < 4) { in eap_teap_process() 1926 message_len, outer_tlv_len); in eap_teap_process() 1933 if (message_len && in eap_teap_process() 1934 (message_len < outer_tlv_len || in eap_teap_process() 1935 message_len < 4 + outer_tlv_len)) { in eap_teap_process() 1957 wpabuf_put_be32(resp, message_len - 4 - outer_tlv_len); in eap_teap_process()
|
/external/protobuf/python/google/protobuf/pyext/ |
D | descriptor_pool.cc | 575 Py_ssize_t message_len; in AddSerializedFile() local 585 if (PyBytes_AsStringAndSize(serialized_pb, &message_type, &message_len) < 0) { in AddSerializedFile() 590 if (!file_proto.ParseFromArray(message_type, message_len)) { in AddSerializedFile()
|
/external/rust/crates/quiche/deps/boringssl/src/crypto/curve25519/ |
D | curve25519.c | 1886 size_t message_len, const uint8_t private_key[64]) { in ED25519_sign() argument 1902 SHA512_Update(&hash_ctx, message, message_len); in ED25519_sign() 1914 SHA512_Update(&hash_ctx, message, message_len); in ED25519_sign() 1924 int ED25519_verify(const uint8_t *message, size_t message_len, in ED25519_verify() argument 1972 SHA512_Update(&hash_ctx, message, message_len); in ED25519_verify()
|
/external/boringssl/src/crypto/curve25519/ |
D | curve25519.c | 1886 size_t message_len, const uint8_t private_key[64]) { in ED25519_sign() argument 1902 SHA512_Update(&hash_ctx, message, message_len); in ED25519_sign() 1914 SHA512_Update(&hash_ctx, message, message_len); in ED25519_sign() 1924 int ED25519_verify(const uint8_t *message, size_t message_len, in ED25519_verify() argument 1972 SHA512_Update(&hash_ctx, message, message_len); in ED25519_verify()
|
/external/conscrypt/common/src/jni/main/cpp/conscrypt/ |
D | native_crypto.cc | 539 size_t message_len) { in ecSignDigestWithPrivateKey() argument 541 if (message_len > std::numeric_limits<jsize>::max()) { in ecSignDigestWithPrivateKey() 546 env->NewByteArray(static_cast<jsize>(message_len))); in ecSignDigestWithPrivateKey() 559 memcpy(messageBytes.get(), message, message_len); in ecSignDigestWithPrivateKey() 575 const char* message, size_t message_len) { in rsaSignDigestWithPrivateKey() argument 576 if (message_len > std::numeric_limits<jsize>::max()) { in rsaSignDigestWithPrivateKey() 581 env->NewByteArray(static_cast<jsize>(message_len))); in rsaSignDigestWithPrivateKey() 594 memcpy(messageBytes.get(), message, message_len); in rsaSignDigestWithPrivateKey()
|
/external/googletest/docs/ |
D | gmock_cook_book.md | 500 const char* message, size_t message_len) = 0; 517 const char* message, size_t message_len) override { 520 Log(severity, full_filename, std::string(message, message_len));
|