Lines Matching refs:data

179   const unsigned char* sig_data = signature.data<unsigned char>();
182 memset(out.data<void>(), 0, n * 2);
184 if (!ExtractP1363(sig_data, out.data<unsigned char>(), signature.size(), n))
197 const unsigned char* sig_data = out.data<unsigned char>();
212 unsigned char* data = nullptr;
213 int len = i2d_ECDSA_SIG(asn1_sig.get(), &data);
218 CHECK_NOT_NULL(data);
220 return ByteSource::Allocated(data, len);
310 SignBase::Error SignBase::Update(const char* data, size_t len) {
313 if (!EVP_DigestUpdate(mdctx_.get(), data, len))
379 const char* data, size_t size) {
382 return THROW_ERR_OUT_OF_RANGE(env, "data is too long");
383 Error err = sign->Update(data, size);
498 const char* data, size_t size) {
501 return THROW_ERR_OUT_OF_RANGE(env, "data is too long");
502 Error err = verify->Update(data, size);
529 const unsigned char* s = sig.data<unsigned char>();
573 if (signature.data() == nullptr)
589 data(std::move(other.data)),
607 tracker->TrackFieldWithSize("data", data.size());
638 ArrayBufferOrViewContents<char> data(args[offset + 5]);
639 if (UNLIKELY(!data.CheckSizeInt32())) {
640 THROW_ERR_OUT_OF_RANGE(env, "data is too big");
643 params->data = mode == kCryptoJobAsync
644 ? data.ToCopy()
645 : data.ToByteSource();
755 params.data.data<unsigned char>(),
756 params.data.size())) {
762 buf.data<unsigned char>(),
764 params.data.data<unsigned char>(),
765 params.data.size())) {
774 params.data.data<unsigned char>(),
775 params.data.size()) ||
782 context.get(), buf.data<unsigned char>(), &len)) {
798 buf.data<char>()[0] = 0;
801 params.signature.data<unsigned char>(),
803 params.data.data<unsigned char>(),
804 params.data.size()) == 1) {
805 buf.data<char>()[0] = 1;
824 *result = Boolean::New(env->isolate(), out->data<char>()[0] == 1);