/freebsd/sys/contrib/libsodium/test/default/ |
H A D | aead_aes256gcm.c | 3099 size_t message_len; in tv() local 3114 message_len = strlen(tests[i].message_hex) / 2; in tv() 3116 sodium_hex2bin(message, message_len, in tv() 3125 detached_ciphertext_len = message_len; in tv() 3128 sodium_hex2bin(expected_ciphertext, message_len, in tv() 3145 memcmp(mac, expected_ciphertext + message_len, in tv() 3156 message, message_len, in tv() 3198 assert((size_t) found_message_len == message_len); in tv() 3199 if (memcmp(decrypted, message, message_len) != 0) { in tv() 3202 memset(decrypted, 0xd0, message_len); in tv() [all …]
|
/freebsd/crypto/openssl/crypto/ec/curve448/ |
H A D | eddsa.c | 163 const uint8_t *message, size_t message_len, in ossl_c448_ed448_sign() argument 198 || !EVP_DigestUpdate(hashctx, message, message_len)) { in ossl_c448_ed448_sign() 239 || !EVP_DigestUpdate(hashctx, message, message_len) in ossl_c448_ed448_sign() 284 const uint8_t *message, size_t message_len, in ossl_c448_ed448_verify() argument 338 || !EVP_DigestUpdate(hashctx, message, message_len) in ossl_c448_ed448_verify() 377 size_t message_len, const uint8_t public_key[57], in ossl_ed448_sign() argument 382 message_len, 0, context, context_len, in ossl_ed448_sign() 387 ossl_ed448_verify(OSSL_LIB_CTX *ctx, const uint8_t *message, size_t message_len, in ossl_ed448_verify() argument 392 message_len, 0, context, (uint8_t)context_len, in ossl_ed448_verify()
|
H A D | ed448.h | 69 const uint8_t *message, size_t message_len, 124 const uint8_t *message, size_t message_len,
|
/freebsd/crypto/openssh/regress/misc/sk-dummy/ |
H A D | sk-dummy.c | 308 sig_ecdsa(const uint8_t *message, size_t message_len, in sig_ecdsa() argument 344 if (message_len != SHA256_DIGEST_LENGTH) { in sig_ecdsa() 345 skdebug(__func__, "bad message len %zu", message_len); in sig_ecdsa() 349 dump("message", message, message_len); in sig_ecdsa() 364 SHA256Update(&ctx, message, message_len); in sig_ecdsa() 404 sig_ed25519(const uint8_t *message, size_t message_len, in sig_ed25519() argument 423 if (message_len != SHA256_DIGEST_LENGTH) { in sig_ed25519() 424 skdebug(__func__, "bad message len %zu", message_len); in sig_ed25519() 428 dump("message", message, message_len); in sig_ed25519() 441 memcpy(signbuf + o, message, message_len); in sig_ed25519() [all …]
|
/freebsd/contrib/tcpdump/ |
H A D | print-someip.c | 86 uint32_t message_len; in someip_print() local 110 message_len = GET_BE_U_4(bp); in someip_print() 112 ND_PRINT(", len %u", message_len); in someip_print()
|
/freebsd/crypto/openssl/include/crypto/ |
H A D | ecx.h | 97 ossl_ed25519_sign(uint8_t *out_sig, const uint8_t *message, size_t message_len, 101 ossl_ed25519_verify(const uint8_t *message, size_t message_len, 110 size_t message_len, const uint8_t public_key[57], 115 ossl_ed448_verify(OSSL_LIB_CTX *ctx, const uint8_t *message, size_t message_len,
|
/freebsd/crypto/openssl/crypto/bn/ |
H A D | bn_rand.c | 253 size_t message_len, BN_CTX *ctx) in BN_generate_dsa_nonce() argument 302 || !EVP_DigestUpdate(mdctx, message, message_len) in BN_generate_dsa_nonce()
|
/freebsd/contrib/wpa/src/eap_server/ |
H A D | eap_server_teap.c | 1888 u32 message_len = 0, outer_tlv_len; in eap_teap_process() local 1904 message_len = WPA_GET_BE32(pos); in eap_teap_process() 1907 if (message_len < 4) { in eap_teap_process() 1926 message_len, outer_tlv_len); in eap_teap_process() 1933 if (message_len && in eap_teap_process() 1934 (message_len < outer_tlv_len || in eap_teap_process() 1935 message_len < 4 + outer_tlv_len)) { in eap_teap_process() 1957 wpabuf_put_be32(resp, message_len - 4 - outer_tlv_len); in eap_teap_process()
|
/freebsd/contrib/opencsd/decoder/source/c_api/ |
H A D | ocsd_c_api.cpp | 497 … ocsd_get_last_err(ocsd_trc_index_t *index, uint8_t *chan_id, char *message, const int message_len) in ocsd_get_last_err() argument 509 strncpy(message, err_str.c_str(), message_len - 1); in ocsd_get_last_err() 510 message[message_len - 1] = 0; in ocsd_get_last_err()
|
/freebsd/contrib/opencsd/decoder/include/opencsd/c_api/ |
H A D | opencsd_c_api.h | 423 …ocsd_get_last_err(ocsd_trc_index_t *index, uint8_t *chan_id, char *message, const int message_len);
|
/freebsd/crypto/openssh/ |
H A D | ssh-sk.c | 71 int (*sk_sign)(int alg, const uint8_t *message, size_t message_len, 87 int ssh_sk_sign(int alg, const uint8_t *message, size_t message_len,
|
/freebsd/crypto/openssl/include/openssl/ |
H A D | bn.h | 552 size_t message_len, BN_CTX *ctx);
|
/freebsd/crypto/openssl/crypto/ec/ |
H A D | curve25519.c | 5443 ossl_ed25519_sign(uint8_t *out_sig, const uint8_t *message, size_t message_len, in ossl_ed25519_sign() argument 5470 || !EVP_DigestUpdate(hash_ctx, message, message_len) in ossl_ed25519_sign() 5481 || !EVP_DigestUpdate(hash_ctx, message, message_len) in ossl_ed25519_sign() 5500 ossl_ed25519_verify(const uint8_t *message, size_t message_len, in ossl_ed25519_verify() argument 5567 || !EVP_DigestUpdate(hash_ctx, message, message_len) in ossl_ed25519_verify()
|
/freebsd/contrib/googletest/docs/ |
H A D | gmock_cook_book.md | 503 const char* message, size_t message_len) = 0; 520 const char* message, size_t message_len) override { 523 Log(severity, full_filename, std::string(message, message_len));
|