| /freebsd/sys/contrib/libsodium/test/default/ |
| H A D | aead_aes256gcm.c | 3099 size_t message_len; in tv() local 3114 message_len = strlen(tests[i].message_hex) / 2; in tv() 3115 message = (unsigned char *) sodium_malloc(message_len); in tv() 3116 sodium_hex2bin(message, message_len, in tv() 3124 ciphertext_len = message_len + crypto_aead_aes256gcm_ABYTES; in tv() 3125 detached_ciphertext_len = message_len; in tv() 3127 assert(strlen(tests[i].ciphertext_hex) == 2 * message_len); in tv() 3128 sodium_hex2bin(expected_ciphertext, message_len, in tv() 3132 sodium_hex2bin(expected_ciphertext + message_len, crypto_aead_aes256gcm_ABYTES, in tv() 3140 message, message_len, in tv() [all …]
|
| /freebsd/crypto/openssl/crypto/ec/curve448/ |
| H A D | eddsa.c | 159 const uint8_t *message, size_t message_len, in ossl_c448_ed448_sign() argument 194 || !EVP_DigestUpdate(hashctx, message, message_len)) { in ossl_c448_ed448_sign() 235 || !EVP_DigestUpdate(hashctx, message, message_len) in ossl_c448_ed448_sign() 291 const uint8_t *message, size_t message_len, in ossl_c448_ed448_verify() argument 343 || !EVP_DigestUpdate(hashctx, message, message_len) in ossl_c448_ed448_verify() 381 const uint8_t *message, size_t message_len, in ossl_ed448_sign() argument 387 message_len, phflag, context, context_len, in ossl_ed448_sign() 403 const uint8_t *message, size_t message_len, in ossl_ed448_verify() argument 409 message_len, phflag, context, (uint8_t)context_len, in ossl_ed448_verify()
|
| H A D | ed448.h | 68 const uint8_t *message, size_t message_len, 123 const uint8_t *message, size_t message_len,
|
| /freebsd/crypto/openssh/regress/misc/sk-dummy/ |
| H A D | sk-dummy.c | 308 sig_ecdsa(const uint8_t *message, size_t message_len, in sig_ecdsa() argument 344 if (message_len != SHA256_DIGEST_LENGTH) { in sig_ecdsa() 345 skdebug(__func__, "bad message len %zu", message_len); in sig_ecdsa() 349 dump("message", message, message_len); in sig_ecdsa() 364 SHA256Update(&ctx, message, message_len); in sig_ecdsa() 404 sig_ed25519(const uint8_t *message, size_t message_len, in sig_ed25519() argument 423 if (message_len != SHA256_DIGEST_LENGTH) { in sig_ed25519() 424 skdebug(__func__, "bad message len %zu", message_len); in sig_ed25519() 428 dump("message", message, message_len); in sig_ed25519() 441 memcpy(signbuf + o, message, message_len); in sig_ed25519() [all …]
|
| /freebsd/contrib/tcpdump/ |
| H A D | print-someip.c | 83 uint32_t message_len; in someip_print() local 107 message_len = GET_BE_U_4(bp); in someip_print() 109 ND_PRINT(", len %u", message_len); in someip_print()
|
| /freebsd/crypto/openssl/crypto/bn/ |
| H A D | bn_rand.c | 296 size_t message_len, BN_CTX *ctx) in ossl_bn_gen_dsa_nonce_fixed_top() argument 354 || !EVP_DigestUpdate(mdctx, message, message_len) in ossl_bn_gen_dsa_nonce_fixed_top() 399 size_t message_len, BN_CTX *ctx) in BN_generate_dsa_nonce() argument 404 message_len, ctx); in BN_generate_dsa_nonce()
|
| /freebsd/crypto/openssl/include/crypto/ |
| H A D | ecx.h | 110 const uint8_t *message, size_t message_len, 116 const uint8_t *message, size_t message_len,
|
| H A D | bn.h | 100 size_t message_len, BN_CTX *ctx);
|
| /freebsd/crypto/openssl/include/internal/ |
| H A D | deterministic_nonce.h | 19 size_t message_len,
|
| /freebsd/contrib/wpa/src/eap_server/ |
| H A D | eap_server_teap.c | 1921 u32 message_len = 0, outer_tlv_len; in eap_teap_process() local 1937 message_len = WPA_GET_BE32(pos); in eap_teap_process() 1940 if (message_len < 4) { in eap_teap_process() 1959 message_len, outer_tlv_len); in eap_teap_process() 1966 if (message_len && in eap_teap_process() 1967 (message_len < outer_tlv_len || in eap_teap_process() 1968 message_len < 4 + outer_tlv_len)) { in eap_teap_process() 1990 wpabuf_put_be32(resp, message_len - 4 - outer_tlv_len); in eap_teap_process()
|
| /freebsd/contrib/opencsd/decoder/source/c_api/ |
| H A D | ocsd_c_api.cpp | 497 … ocsd_get_last_err(ocsd_trc_index_t *index, uint8_t *chan_id, char *message, const int message_len) in ocsd_get_last_err() argument 509 strncpy(message, err_str.c_str(), message_len - 1); in ocsd_get_last_err() 510 message[message_len - 1] = 0; in ocsd_get_last_err()
|
| /freebsd/contrib/opencsd/decoder/include/opencsd/c_api/ |
| H A D | opencsd_c_api.h | 423 …ocsd_get_last_err(ocsd_trc_index_t *index, uint8_t *chan_id, char *message, const int message_len);
|
| /freebsd/crypto/openssh/ |
| H A D | ssh-sk.c | 72 int (*sk_sign)(int alg, const uint8_t *message, size_t message_len, 88 int ssh_sk_sign(int alg, const uint8_t *message, size_t message_len,
|
| /freebsd/crypto/openssl/include/openssl/ |
| H A D | bn.h | 558 size_t message_len, BN_CTX *ctx);
|
| /freebsd/contrib/googletest/docs/ |
| H A D | gmock_cook_book.md | 503 const char* message, size_t message_len) = 0; 520 const char* message, size_t message_len) override { 523 Log(severity, full_filename, std::string(message, message_len));
|