Home
last modified time | relevance | path

Searched refs:message_len (Results 1 – 17 of 17) sorted by relevance

/external/openssh/regress/misc/sk-dummy/
Dsk-dummy.c297 sig_ecdsa(const uint8_t *message, size_t message_len, in sig_ecdsa() argument
333 if (message_len != SHA256_DIGEST_LENGTH) { in sig_ecdsa()
334 skdebug(__func__, "bad message len %zu", message_len); in sig_ecdsa()
338 dump("message", message, message_len); in sig_ecdsa()
353 SHA256_Update(&ctx, message, message_len); in sig_ecdsa()
393 sig_ed25519(const uint8_t *message, size_t message_len, in sig_ed25519() argument
412 if (message_len != SHA256_DIGEST_LENGTH) { in sig_ed25519()
413 skdebug(__func__, "bad message len %zu", message_len); in sig_ed25519()
417 dump("message", message, message_len); in sig_ed25519()
430 memcpy(signbuf + o, message, message_len); in sig_ed25519()
[all …]
/external/boringssl/src/include/openssl/
Dcurve25519.h84 size_t message_len,
90 OPENSSL_EXPORT int ED25519_verify(const uint8_t *message, size_t message_len,
/external/rust/crates/quiche/deps/boringssl/src/include/openssl/
Dcurve25519.h84 size_t message_len,
90 OPENSSL_EXPORT int ED25519_verify(const uint8_t *message, size_t message_len,
/external/arm-trusted-firmware/plat/arm/css/sgi/
Dsgi_ras.c32 size_t message_len; member
143 header->message_len = 4; in sgi_ras_intr_handler()
/external/libchrome/base/
Dlogging.cc1013 const size_t message_len = strlen(message); in RawLog() local
1015 while (bytes_written < message_len) { in RawLog()
1018 message_len - bytes_written)); in RawLog()
1026 if (message_len > 0 && message[message_len - 1] != '\n') { in RawLog()
/external/openssh/
Dsk-api.h86 int sk_sign(uint32_t alg, const uint8_t *message, size_t message_len,
Dsk-usbhid.c80 int sk_sign(uint32_t alg, const uint8_t *message, size_t message_len,
159 try_device(fido_dev_t *dev, const uint8_t *message, size_t message_len, in try_device() argument
170 message_len)) != FIDO_OK) { in try_device()
202 find_device(const char *path, const uint8_t *message, size_t message_len, in find_device() argument
256 if (try_device(dev, message, message_len, application, in find_device()
Dssh-sk.c62 int (*sk_sign)(int alg, const uint8_t *message, size_t message_len,
78 int ssh_sk_sign(int alg, const uint8_t *message, size_t message_len,
DPROTOCOL.u2f301 int sk_sign(uint32_t alg, const uint8_t *message, size_t message_len,
/external/libese/libese-hw/nxp/pn80t/
Dcommon.c182 const uint32_t message_len = in nxp_pn80t_send_cooldown() local
189 ese->ops->hw_transmit(ese, message, message_len, 1); in nxp_pn80t_send_cooldown()
/external/grpc-grpc/src/php/ext/grpc/
Dcall.c292 size_t message_len; in PHP_METHOD() local
480 byte_buffer_to_string(message, &message_str, &message_len); in PHP_METHOD()
485 message_len, false); in PHP_METHOD()
/external/wpa_supplicant_8/src/eap_server/
Deap_server_teap.c1888 u32 message_len = 0, outer_tlv_len; in eap_teap_process() local
1904 message_len = WPA_GET_BE32(pos); in eap_teap_process()
1907 if (message_len < 4) { in eap_teap_process()
1926 message_len, outer_tlv_len); in eap_teap_process()
1933 if (message_len && in eap_teap_process()
1934 (message_len < outer_tlv_len || in eap_teap_process()
1935 message_len < 4 + outer_tlv_len)) { in eap_teap_process()
1957 wpabuf_put_be32(resp, message_len - 4 - outer_tlv_len); in eap_teap_process()
/external/protobuf/python/google/protobuf/pyext/
Ddescriptor_pool.cc575 Py_ssize_t message_len; in AddSerializedFile() local
585 if (PyBytes_AsStringAndSize(serialized_pb, &message_type, &message_len) < 0) { in AddSerializedFile()
590 if (!file_proto.ParseFromArray(message_type, message_len)) { in AddSerializedFile()
/external/rust/crates/quiche/deps/boringssl/src/crypto/curve25519/
Dcurve25519.c1886 size_t message_len, const uint8_t private_key[64]) { in ED25519_sign() argument
1902 SHA512_Update(&hash_ctx, message, message_len); in ED25519_sign()
1914 SHA512_Update(&hash_ctx, message, message_len); in ED25519_sign()
1924 int ED25519_verify(const uint8_t *message, size_t message_len, in ED25519_verify() argument
1972 SHA512_Update(&hash_ctx, message, message_len); in ED25519_verify()
/external/boringssl/src/crypto/curve25519/
Dcurve25519.c1886 size_t message_len, const uint8_t private_key[64]) { in ED25519_sign() argument
1902 SHA512_Update(&hash_ctx, message, message_len); in ED25519_sign()
1914 SHA512_Update(&hash_ctx, message, message_len); in ED25519_sign()
1924 int ED25519_verify(const uint8_t *message, size_t message_len, in ED25519_verify() argument
1972 SHA512_Update(&hash_ctx, message, message_len); in ED25519_verify()
/external/conscrypt/common/src/jni/main/cpp/conscrypt/
Dnative_crypto.cc539 size_t message_len) { in ecSignDigestWithPrivateKey() argument
541 if (message_len > std::numeric_limits<jsize>::max()) { in ecSignDigestWithPrivateKey()
546 env->NewByteArray(static_cast<jsize>(message_len))); in ecSignDigestWithPrivateKey()
559 memcpy(messageBytes.get(), message, message_len); in ecSignDigestWithPrivateKey()
575 const char* message, size_t message_len) { in rsaSignDigestWithPrivateKey() argument
576 if (message_len > std::numeric_limits<jsize>::max()) { in rsaSignDigestWithPrivateKey()
581 env->NewByteArray(static_cast<jsize>(message_len))); in rsaSignDigestWithPrivateKey()
594 memcpy(messageBytes.get(), message, message_len); in rsaSignDigestWithPrivateKey()
/external/googletest/docs/
Dgmock_cook_book.md500 const char* message, size_t message_len) = 0;
517 const char* message, size_t message_len) override {
520 Log(severity, full_filename, std::string(message, message_len));