/third_party/node/deps/openssl/openssl/crypto/rsa/ |
H A D | rsa_sign.c | 243 const unsigned char *m, size_t m_len) in encode_pkcs1() 259 dig_info_len = di_prefix_len + m_len; in encode_pkcs1() 266 memcpy(dig_info + di_prefix_len, m, m_len); in encode_pkcs1() 273 int RSA_sign(int type, const unsigned char *m, unsigned int m_len, in RSA_sign() argument 283 return rsa->meth->rsa_sign(type, m, m_len, sigret, siglen, rsa) > 0; in RSA_sign() 293 if (m_len != SSL_SIG_LENGTH) { in RSA_sign() 300 if (!encode_pkcs1(&tmps, &encoded_len, type, m, m_len)) in RSA_sign() 331 int ossl_rsa_verify(int type, const unsigned char *m, unsigned int m_len, in ossl_rsa_verify() argument 373 if (m_len != SSL_SIG_LENGTH) { in ossl_rsa_verify() 393 if (m_len ! in ossl_rsa_verify() 242 encode_pkcs1(unsigned char **out, size_t *out_len, int type, const unsigned char *m, size_t m_len) encode_pkcs1() argument 449 RSA_verify(int type, const unsigned char *m, unsigned int m_len, const unsigned char *sigbuf, unsigned int siglen, RSA *rsa) RSA_verify() argument [all...] |
H A D | rsa_saos.c | 24 const unsigned char *m, unsigned int m_len, in RSA_sign_ASN1_OCTET_STRING() 33 sig.length = m_len; in RSA_sign_ASN1_OCTET_STRING() 61 unsigned int m_len, unsigned char *sigbuf, in RSA_verify_ASN1_OCTET_STRING() 89 if (((unsigned int)sig->length != m_len) || in RSA_verify_ASN1_OCTET_STRING() 90 (memcmp(m, sig->data, m_len) != 0)) { in RSA_verify_ASN1_OCTET_STRING() 23 RSA_sign_ASN1_OCTET_STRING(int type, const unsigned char *m, unsigned int m_len, unsigned char *sigret, unsigned int *siglen, RSA *rsa) RSA_sign_ASN1_OCTET_STRING() argument 59 RSA_verify_ASN1_OCTET_STRING(int dtype, const unsigned char *m, unsigned int m_len, unsigned char *sigbuf, unsigned int siglen, RSA *rsa) RSA_verify_ASN1_OCTET_STRING() argument
|
/third_party/openssl/crypto/rsa/ |
H A D | rsa_sign.c | 243 const unsigned char *m, size_t m_len) in encode_pkcs1() 259 dig_info_len = di_prefix_len + m_len; in encode_pkcs1() 266 memcpy(dig_info + di_prefix_len, m, m_len); in encode_pkcs1() 273 int RSA_sign(int type, const unsigned char *m, unsigned int m_len, in RSA_sign() argument 283 return rsa->meth->rsa_sign(type, m, m_len, sigret, siglen, rsa) > 0; in RSA_sign() 293 if (m_len != SSL_SIG_LENGTH) { in RSA_sign() 300 if (!encode_pkcs1(&tmps, &encoded_len, type, m, m_len)) in RSA_sign() 331 int ossl_rsa_verify(int type, const unsigned char *m, unsigned int m_len, in ossl_rsa_verify() argument 373 if (m_len != SSL_SIG_LENGTH) { in ossl_rsa_verify() 393 if (m_len ! in ossl_rsa_verify() 242 encode_pkcs1(unsigned char **out, size_t *out_len, int type, const unsigned char *m, size_t m_len) encode_pkcs1() argument 449 RSA_verify(int type, const unsigned char *m, unsigned int m_len, const unsigned char *sigbuf, unsigned int siglen, RSA *rsa) RSA_verify() argument [all...] |
H A D | rsa_saos.c | 24 const unsigned char *m, unsigned int m_len, in RSA_sign_ASN1_OCTET_STRING() 33 sig.length = m_len; in RSA_sign_ASN1_OCTET_STRING() 61 unsigned int m_len, unsigned char *sigbuf, in RSA_verify_ASN1_OCTET_STRING() 89 if (((unsigned int)sig->length != m_len) || in RSA_verify_ASN1_OCTET_STRING() 90 (memcmp(m, sig->data, m_len) != 0)) { in RSA_verify_ASN1_OCTET_STRING() 23 RSA_sign_ASN1_OCTET_STRING(int type, const unsigned char *m, unsigned int m_len, unsigned char *sigret, unsigned int *siglen, RSA *rsa) RSA_sign_ASN1_OCTET_STRING() argument 59 RSA_verify_ASN1_OCTET_STRING(int dtype, const unsigned char *m, unsigned int m_len, unsigned char *sigbuf, unsigned int siglen, RSA *rsa) RSA_verify_ASN1_OCTET_STRING() argument
|
/third_party/vk-gl-cts/external/vulkancts/modules_no_buildgn/vulkan/amber/ |
H A D | vktAmberTestCaseUtil.cpp | 37 size_t m_len; member in vkt::cts_amber::AmberIndexFileParser 58 while (m_idx < m_len && isWhitespace(m_str[m_idx])) in skipWhitespace() 67 while (m_idx < m_len && m_str[m_idx] != '\n') in skipCommentLine() 82 if (m_idx >= m_len || m_str[m_idx] != c) in expect() 92 while (m_idx < m_len && i < m_fieldLen && m_str[m_idx] != '"') in captureString() 113 m_len = m_str.length(); in AmberIndexFileParser() 132 if (m_idx < m_len) in parse() 157 while (m_idx < m_len && m_str[m_idx] == ',') in parse()
|
/third_party/vk-gl-cts/external/vulkancts/modules/vulkan/amber/ |
H A D | vktAmberTestCaseUtil.cpp | 37 size_t m_len; member in vkt::cts_amber::AmberIndexFileParser 58 while (m_idx < m_len && isWhitespace(m_str[m_idx])) in skipWhitespace() 67 while (m_idx < m_len && m_str[m_idx] != '\n') in skipCommentLine() 82 if (m_idx >= m_len || m_str[m_idx] != c) in expect() 92 while (m_idx < m_len && i < m_fieldLen && m_str[m_idx] != '"') in captureString() 113 m_len = m_str.length(); in AmberIndexFileParser() 132 if (m_idx < m_len) in parse() 157 while (m_idx < m_len && m_str[m_idx] == ',') in parse()
|
/third_party/node/deps/openssl/openssl/crypto/evp/ |
H A D | p_sign.c | 22 unsigned int m_len = 0; in EVP_SignFinal_ex() local 29 if (!EVP_DigestFinal_ex(ctx, m, &m_len)) in EVP_SignFinal_ex() 41 rv = EVP_DigestFinal_ex(tmp_ctx, m, &m_len); in EVP_SignFinal_ex() 56 if (EVP_PKEY_sign(pkctx, sigret, &sltmp, m, m_len) <= 0) in EVP_SignFinal_ex()
|
H A D | p_verify.c | 22 unsigned int m_len = 0; in EVP_VerifyFinal_ex() local 27 if (!EVP_DigestFinal_ex(ctx, m, &m_len)) in EVP_VerifyFinal_ex() 39 rv = EVP_DigestFinal_ex(tmp_ctx, m, &m_len); in EVP_VerifyFinal_ex() 53 i = EVP_PKEY_verify(pkctx, sigbuf, siglen, m, m_len); in EVP_VerifyFinal_ex()
|
/third_party/openssl/crypto/evp/ |
H A D | p_sign.c | 22 unsigned int m_len = 0; in EVP_SignFinal_ex() local 29 if (!EVP_DigestFinal_ex(ctx, m, &m_len)) in EVP_SignFinal_ex() 41 rv = EVP_DigestFinal_ex(tmp_ctx, m, &m_len); in EVP_SignFinal_ex() 56 if (EVP_PKEY_sign(pkctx, sigret, &sltmp, m, m_len) <= 0) in EVP_SignFinal_ex()
|
H A D | p_verify.c | 22 unsigned int m_len = 0; in EVP_VerifyFinal_ex() local 27 if (!EVP_DigestFinal_ex(ctx, m, &m_len)) in EVP_VerifyFinal_ex() 39 rv = EVP_DigestFinal_ex(tmp_ctx, m, &m_len); in EVP_VerifyFinal_ex() 53 i = EVP_PKEY_verify(pkctx, sigbuf, siglen, m, m_len); in EVP_VerifyFinal_ex()
|
/third_party/node/deps/openssl/openssl/crypto/pem/ |
H A D | pem_sign.c | 33 unsigned int m_len; in PEM_SignFinal() local 41 if (EVP_SignFinal(ctx, m, &m_len, pkey) <= 0) in PEM_SignFinal() 44 i = EVP_EncodeBlock(sigret, m, m_len); in PEM_SignFinal()
|
/third_party/openssl/crypto/pem/ |
H A D | pem_sign.c | 33 unsigned int m_len; in PEM_SignFinal() local 41 if (EVP_SignFinal(ctx, m, &m_len, pkey) <= 0) in PEM_SignFinal() 44 i = EVP_EncodeBlock(sigret, m, m_len); in PEM_SignFinal()
|
/third_party/curl/lib/ |
H A D | http1.c | 140 size_t m_len, target_len, hv_len, scheme_len, authority_len, path_len; in start_req() local 152 m_len = p - parser->line; in start_req() 158 for(i = parser->line_len; i > m_len; --i) { in start_req() 194 else if(!strncmp("CONNECT", m, m_len)) { in start_req() 245 result = Curl_http_req_make2(&parser->req, m, m_len, url, scheme_default); in start_req() 252 result = Curl_http_req_make(&parser->req, m, m_len, scheme, scheme_len, in start_req()
|
H A D | http.h | 278 const char *method, size_t m_len, 284 const char *method, size_t m_len,
|
H A D | http.c | 4598 const char *method, size_t m_len, in Curl_http_req_make() 4607 if(m_len + 1 > sizeof(req->method)) in Curl_http_req_make() 4613 memcpy(req->method, method, m_len); in Curl_http_req_make() 4755 const char *method, size_t m_len, in Curl_http_req_make2() 4763 if(m_len + 1 > sizeof(req->method)) in Curl_http_req_make2() 4769 memcpy(req->method, method, m_len); in Curl_http_req_make2() 4597 Curl_http_req_make(struct httpreq **preq, const char *method, size_t m_len, const char *scheme, size_t s_len, const char *authority, size_t a_len, const char *path, size_t p_len) Curl_http_req_make() argument 4754 Curl_http_req_make2(struct httpreq **preq, const char *method, size_t m_len, CURLU *url, const char *scheme_default) Curl_http_req_make2() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/ |
H A D | sae_pk.c | 546 bool ap, const u8 *m, size_t m_len, in sae_pk_hash_sig_data() 556 sig_data = wpabuf_alloc(tmp->prime_len * 6 + m_len + pubkey_len + in sae_pk_hash_sig_data() 579 wpabuf_put_data(sig_data, m, m_len); in sae_pk_hash_sig_data() 704 const u8 *m, size_t m_len, in sae_pk_valid_fingerprint() 723 hash_data_len = tmp->ssid_len + m_len + k_ap_len; in sae_pk_valid_fingerprint() 730 os_memcpy(pos, m, m_len); in sae_pk_valid_fingerprint() 731 pos += m_len; in sae_pk_valid_fingerprint() 545 sae_pk_hash_sig_data(struct sae_data *sae, size_t hash_len, bool ap, const u8 *m, size_t m_len, const u8 *pubkey, size_t pubkey_len, u8 *hash) sae_pk_hash_sig_data() argument 703 sae_pk_valid_fingerprint(struct sae_data *sae, const u8 *m, size_t m_len, const u8 *k_ap, size_t k_ap_len, int group) sae_pk_valid_fingerprint() argument
|
/third_party/node/deps/openssl/openssl/crypto/property/ |
H A D | property_parse.c | 44 static int match(const char *t[], const char m[], size_t m_len) in match() argument 48 if (OPENSSL_strncasecmp(s, m, m_len) == 0) { in match() 49 *t = skip_space(s + m_len); in match()
|
/third_party/openssl/crypto/property/ |
H A D | property_parse.c | 44 static int match(const char *t[], const char m[], size_t m_len) in match() argument 48 if (OPENSSL_strncasecmp(s, m, m_len) == 0) { in match() 49 *t = skip_space(s + m_len); in match()
|
/third_party/node/src/crypto/ |
H A D | crypto_sig.cc | 81 unsigned int m_len; in ValidateDSAParameters() local 83 if (!EVP_DigestFinal_ex(mdctx.get(), m, &m_len)) in ValidateDSAParameters() 100 &sig_len, m, m_len)) { in ValidateDSAParameters() 516 unsigned int m_len; in VerifyFinal() local 520 if (!EVP_DigestFinal_ex(mdctx.get(), m, &m_len)) in VerifyFinal() 530 const int r = EVP_PKEY_verify(pkctx.get(), s, sig.size(), m, m_len); in VerifyFinal()
|
/third_party/node/deps/openssl/openssl/include/crypto/ |
H A D | rsa.h | 103 unsigned int m_len, unsigned char *rm,
|
/third_party/openssl/include/crypto/ |
H A D | rsa.h | 103 unsigned int m_len, unsigned char *rm,
|
/third_party/node/deps/openssl/openssl/engines/ |
H A D | e_capi.c | 129 unsigned int m_len, unsigned char *sigret, 831 int capi_rsa_sign(int dtype, const unsigned char *m, unsigned int m_len, in capi_rsa_sign() argument
|
/third_party/openssl/engines/ |
H A D | e_capi.c | 129 unsigned int m_len, unsigned char *sigret, 831 int capi_rsa_sign(int dtype, const unsigned char *m, unsigned int m_len, in capi_rsa_sign() argument
|
/third_party/libabigail/tests/lib/ |
H A D | catch.hpp | 8508 size_t m_len = 0; 8541 m_len = m_end - m_pos; 8550 m_len = len; 8553 m_len = width - 1; 8578 if (m_len == 0) 8585 return addIndentAndSuffix(line().substr(m_pos, m_len)); 8589 m_pos += m_len;
|