/dports/irc/hexchat/hexchat-2.16.0/plugins/fishlim/tests/ |
H A D | tests.c | 58 int key_len, message_len = 0; in test_ecb() local 67 for (message_len = 1; message_len < 1000; ++message_len) { in test_ecb() 98 int key_len, message_len = 0; in test_cbc() local 107 for (message_len = 1; message_len < 1000; ++message_len) { in test_cbc() 132 int i, message_len = 0; in test_base64_len() local 136 for (message_len = 1; message_len < 1000; ++message_len) { in test_base64_len() 153 int i, message_len = 0; in test_base64_fish_len() local 158 for (message_len = 1; message_len < 1000; ++message_len) { in test_base64_fish_len() 175 int key_len, message_len = 0; in test_base64_ecb_len() local 184 for (message_len = 1; message_len < 1000; ++message_len) { in test_base64_ecb_len() [all …]
|
/dports/ports-mgmt/dialog4ports-static/dialog-1.1-20120706/ |
H A D | dialog.pl | 38 $message_len++; 58 $message_len++; 73 $message_len++; 96 $message_len++; 129 $message_len++; 155 $message_len++; 187 $message_len++; 216 $message_len++; 256 $message_len++; 289 $message_len++; [all …]
|
/dports/security/liboqs/liboqs-0.7.0/src/sig/sphincs/ |
H A D | sig_sphincs.h | 15 …t8_t *signature, size_t *signature_len, const uint8_t *message, size_t message_len, const uint8_t … 16 …S_SIG_sphincs_haraka_128f_robust_verify(const uint8_t *message, size_t message_len, const uint8_t … 26 …t8_t *signature, size_t *signature_len, const uint8_t *message, size_t message_len, const uint8_t … 37 …t8_t *signature, size_t *signature_len, const uint8_t *message, size_t message_len, const uint8_t … 48 …t8_t *signature, size_t *signature_len, const uint8_t *message, size_t message_len, const uint8_t … 59 …t8_t *signature, size_t *signature_len, const uint8_t *message, size_t message_len, const uint8_t … 70 …t8_t *signature, size_t *signature_len, const uint8_t *message, size_t message_len, const uint8_t … 81 …t8_t *signature, size_t *signature_len, const uint8_t *message, size_t message_len, const uint8_t … 92 …t8_t *signature, size_t *signature_len, const uint8_t *message, size_t message_len, const uint8_t … 103 …t8_t *signature, size_t *signature_len, const uint8_t *message, size_t message_len, const uint8_t … [all …]
|
H A D | sig_sphincs_haraka_128f_simple.c | 58 …t8_t *signature, size_t *signature_len, const uint8_t *message, size_t message_len, const uint8_t … in OQS_SIG_sphincs_haraka_128f_simple_sign() argument 63 …128FSIMPLE_AESNI_crypto_sign_signature(signature, signature_len, message, message_len, secret_key); in OQS_SIG_sphincs_haraka_128f_simple_sign() 66 …128FSIMPLE_CLEAN_crypto_sign_signature(signature, signature_len, message, message_len, secret_key); in OQS_SIG_sphincs_haraka_128f_simple_sign() 70 …128FSIMPLE_CLEAN_crypto_sign_signature(signature, signature_len, message, message_len, secret_key); in OQS_SIG_sphincs_haraka_128f_simple_sign() 74 …S_SIG_sphincs_haraka_128f_simple_verify(const uint8_t *message, size_t message_len, const uint8_t … in OQS_SIG_sphincs_haraka_128f_simple_verify() argument 79 …AKA128FSIMPLE_AESNI_crypto_sign_verify(signature, signature_len, message, message_len, public_key); in OQS_SIG_sphincs_haraka_128f_simple_verify() 82 …AKA128FSIMPLE_CLEAN_crypto_sign_verify(signature, signature_len, message, message_len, public_key); in OQS_SIG_sphincs_haraka_128f_simple_verify() 86 …AKA128FSIMPLE_CLEAN_crypto_sign_verify(signature, signature_len, message, message_len, public_key); in OQS_SIG_sphincs_haraka_128f_simple_verify()
|
H A D | sig_sphincs_haraka_192f_simple.c | 58 …t8_t *signature, size_t *signature_len, const uint8_t *message, size_t message_len, const uint8_t … in OQS_SIG_sphincs_haraka_192f_simple_sign() argument 63 …192FSIMPLE_AESNI_crypto_sign_signature(signature, signature_len, message, message_len, secret_key); in OQS_SIG_sphincs_haraka_192f_simple_sign() 66 …192FSIMPLE_CLEAN_crypto_sign_signature(signature, signature_len, message, message_len, secret_key); in OQS_SIG_sphincs_haraka_192f_simple_sign() 70 …192FSIMPLE_CLEAN_crypto_sign_signature(signature, signature_len, message, message_len, secret_key); in OQS_SIG_sphincs_haraka_192f_simple_sign() 74 …S_SIG_sphincs_haraka_192f_simple_verify(const uint8_t *message, size_t message_len, const uint8_t … in OQS_SIG_sphincs_haraka_192f_simple_verify() argument 79 …AKA192FSIMPLE_AESNI_crypto_sign_verify(signature, signature_len, message, message_len, public_key); in OQS_SIG_sphincs_haraka_192f_simple_verify() 82 …AKA192FSIMPLE_CLEAN_crypto_sign_verify(signature, signature_len, message, message_len, public_key); in OQS_SIG_sphincs_haraka_192f_simple_verify() 86 …AKA192FSIMPLE_CLEAN_crypto_sign_verify(signature, signature_len, message, message_len, public_key); in OQS_SIG_sphincs_haraka_192f_simple_verify()
|
/dports/security/liboqs/liboqs-0.7.0/src/sig/picnic/ |
H A D | sig_picnic.h | 17 …t8_t *signature, size_t *signature_len, const uint8_t *message, size_t message_len, const uint8_t … 18 OQS_API OQS_STATUS OQS_SIG_picnic_L1_FS_verify(const uint8_t *message, size_t message_len, const ui… 31 …t8_t *signature, size_t *signature_len, const uint8_t *message, size_t message_len, const uint8_t … 45 …t8_t *signature, size_t *signature_len, const uint8_t *message, size_t message_len, const uint8_t … 59 …t8_t *signature, size_t *signature_len, const uint8_t *message, size_t message_len, const uint8_t … 73 …t8_t *signature, size_t *signature_len, const uint8_t *message, size_t message_len, const uint8_t … 101 …t8_t *signature, size_t *signature_len, const uint8_t *message, size_t message_len, const uint8_t … 115 …t8_t *signature, size_t *signature_len, const uint8_t *message, size_t message_len, const uint8_t … 143 …t8_t *signature, size_t *signature_len, const uint8_t *message, size_t message_len, const uint8_t … 157 …t8_t *signature, size_t *signature_len, const uint8_t *message, size_t message_len, const uint8_t … [all …]
|
H A D | sig_picnic.c | 149 …return common_picnic_sign(Picnic_L1_FS, secret_key, message, message_len, signature, signature_len… in OQS_SIG_picnic_L1_FS_sign() 153 …return common_picnic_verify(Picnic_L1_FS, public_key, message, message_len, signature, signature_l… in OQS_SIG_picnic_L1_FS_verify() 188 …return common_picnic_sign(Picnic_L1_UR, secret_key, message, message_len, signature, signature_len… in OQS_SIG_picnic_L1_UR_sign() 192 …return common_picnic_verify(Picnic_L1_UR, public_key, message, message_len, signature, signature_l… in OQS_SIG_picnic_L1_UR_verify() 266 …return common_picnic_sign(Picnic_L3_FS, secret_key, message, message_len, signature, signature_len… in OQS_SIG_picnic_L3_FS_sign() 305 …return common_picnic_sign(Picnic_L3_UR, secret_key, message, message_len, signature, signature_len… in OQS_SIG_picnic_L3_UR_sign() 383 …return common_picnic_sign(Picnic_L5_FS, secret_key, message, message_len, signature, signature_len… in OQS_SIG_picnic_L5_FS_sign() 423 …return common_picnic_sign(Picnic_L5_UR, secret_key, message, message_len, signature, signature_len… in OQS_SIG_picnic_L5_UR_sign() 499 return common_picnic_sign(Picnic3_L1, secret_key, message, message_len, signature, signature_len); in OQS_SIG_picnic3_L1_sign() 537 return common_picnic_sign(Picnic3_L3, secret_key, message, message_len, signature, signature_len); in OQS_SIG_picnic3_L3_sign() [all …]
|
/dports/graphics/GraphicsMagick/GraphicsMagick-1.3.36/magick/ |
H A D | log.c | 534 message_len=0; in LogMagickEventList() local 710 … message_len+=MagickFormatString(&message[message_len],sizeof(message)-message_len,"\r"); in LogMagickEventList() 716 … message_len+=MagickFormatString(&message[message_len],sizeof(message)-message_len,"\n"); in LogMagickEventList() 722 … message_len+=MagickFormatString(&message[message_len],sizeof(message)-message_len,"%c",*p); in LogMagickEventList() 730 …message_len+=MagickFormatString(&message[message_len],sizeof(message)-message_len,"%.1024s",domain… in LogMagickEventList() 735 …message_len+=MagickFormatString(&message[message_len],sizeof(message)-message_len,"%.1024s",event); in LogMagickEventList() 740 …message_len+=MagickFormatString(&message[message_len],sizeof(message)-message_len,"%.1024s",functi… in LogMagickEventList() 745 … message_len+=MagickFormatString(&message[message_len],sizeof(message)-message_len,"%lu",line); in LogMagickEventList() 782 … message_len+=MagickFormatString(&message[message_len],sizeof(message)-message_len,"%%"); in LogMagickEventList() 783 … message_len+=MagickFormatString(&message[message_len],sizeof(message)-message_len,"%c",*p); in LogMagickEventList() [all …]
|
/dports/graphics/openjpeg/openjpeg-2.4.0/src/bin/wx/OPJViewer/source/ |
H A D | imagmxf.cpp | 123 if (msg[message_len] != '\n') in IMPLEMENT_DYNAMIC_CLASS() 124 message_len = MAX_MESSAGE_LEN; in IMPLEMENT_DYNAMIC_CLASS() 145 if (msg[message_len] != '\n') in error() 146 message_len = MAX_MESSAGE_LEN; in error() 167 if (msg[message_len] != '\n') in debug() 168 message_len = MAX_MESSAGE_LEN; in debug() 194 if (msg[message_len] != '\n') in mxf_error_callback() 195 message_len = MAX_MESSAGE_LEN; in mxf_error_callback() 208 if (msg[message_len] != '\n') in mxf_warning_callback() 209 message_len = MAX_MESSAGE_LEN; in mxf_warning_callback() [all …]
|
/dports/graphics/openjpeg15/openjpeg-version.1.5.2/applications/OPJViewer/source/ |
H A D | imagmxf.cpp | 118 if (msg[message_len] != '\n') in IMPLEMENT_DYNAMIC_CLASS() 119 message_len = MAX_MESSAGE_LEN; in IMPLEMENT_DYNAMIC_CLASS() 140 if (msg[message_len] != '\n') in error() 141 message_len = MAX_MESSAGE_LEN; in error() 162 if (msg[message_len] != '\n') in debug() 163 message_len = MAX_MESSAGE_LEN; in debug() 189 if (msg[message_len] != '\n') in mxf_error_callback() 190 message_len = MAX_MESSAGE_LEN; in mxf_error_callback() 203 if (msg[message_len] != '\n') in mxf_warning_callback() 204 message_len = MAX_MESSAGE_LEN; in mxf_warning_callback() [all …]
|
/dports/security/liboqs/liboqs-0.7.0/src/sig/rainbow/ |
H A D | sig_rainbow.h | 15 …t8_t *signature, size_t *signature_len, const uint8_t *message, size_t message_len, const uint8_t … 16 OQS_API OQS_STATUS OQS_SIG_rainbow_I_classic_verify(const uint8_t *message, size_t message_len, con… 26 …t8_t *signature, size_t *signature_len, const uint8_t *message, size_t message_len, const uint8_t … 37 …t8_t *signature, size_t *signature_len, const uint8_t *message, size_t message_len, const uint8_t … 38 OQS_API OQS_STATUS OQS_SIG_rainbow_I_compressed_verify(const uint8_t *message, size_t message_len, … 48 …t8_t *signature, size_t *signature_len, const uint8_t *message, size_t message_len, const uint8_t … 49 OQS_API OQS_STATUS OQS_SIG_rainbow_III_classic_verify(const uint8_t *message, size_t message_len, c… 70 …t8_t *signature, size_t *signature_len, const uint8_t *message, size_t message_len, const uint8_t … 81 …t8_t *signature, size_t *signature_len, const uint8_t *message, size_t message_len, const uint8_t … 82 OQS_API OQS_STATUS OQS_SIG_rainbow_V_classic_verify(const uint8_t *message, size_t message_len, con… [all …]
|
/dports/devel/android-tools-adb/platform_system_core-android-9.0.0_r3/trusty/keymaster/ |
H A D | trusty_keymaster_device_test.cpp | 183 size_t message_len = params.modulus_size / 8; in TEST_F() local 190 EXPECT_EQ(message_len, siglen); in TEST_F() 274 size_t message_len = 1024 * 7; in TEST_F() local 296 size_t message_len = params.modulus_size / 8; in TEST_F() local 317 size_t message_len = params.modulus_size / 8; in TEST_F() local 340 size_t message_len = params.modulus_size / 8; in TEST_F() local 362 size_t message_len = params.modulus_size / 8; in TEST_F() local 384 size_t message_len = params.modulus_size / 8; in TEST_F() local 424 size_t message_len = 1024 * 7; in TEST_F() local 520 size_t message_len = params.modulus_size / 8; in TEST_F() local [all …]
|
H A D | trusty_keymaster_main.cpp | 188 size_t message_len = 1024 / 8; in test_import_rsa() local 189 std::unique_ptr<uint8_t[]> message(new uint8_t[message_len]); in test_import_rsa() 190 memset(message.get(), 'a', message_len); in test_import_rsa() 224 size_t message_len = 1024 / 8; in test_rsa() local 226 memset(message.get(), 'a', message_len); in test_rsa() 265 message_len) != 1) { in test_rsa() 292 size_t message_len = 30 /* arbitrary */; in test_import_ecdsa() local 294 memset(message.get(), 'a', message_len); in test_import_ecdsa() 328 size_t message_len = 30 /* arbitrary */; in test_ecdsa() local 330 memset(message.get(), 'a', message_len); in test_ecdsa() [all …]
|
/dports/devel/android-tools-fastboot/platform_system_core-platform-tools-29.0.5/trusty/keymaster/legacy/ |
H A D | trusty_keymaster_device_test.cpp | 182 size_t message_len = params.modulus_size / 8; in TEST_F() local 189 EXPECT_EQ(message_len, siglen); in TEST_F() 273 size_t message_len = 1024 * 7; in TEST_F() local 295 size_t message_len = params.modulus_size / 8; in TEST_F() local 316 size_t message_len = params.modulus_size / 8; in TEST_F() local 339 size_t message_len = params.modulus_size / 8; in TEST_F() local 361 size_t message_len = params.modulus_size / 8; in TEST_F() local 383 size_t message_len = params.modulus_size / 8; in TEST_F() local 423 size_t message_len = 1024 * 7; in TEST_F() local 519 size_t message_len = params.modulus_size / 8; in TEST_F() local [all …]
|
H A D | trusty_keymaster_main.cpp | 195 size_t message_len = 1024 / 8; in test_import_rsa() local 196 std::unique_ptr<uint8_t[]> message(new uint8_t[message_len]); in test_import_rsa() 197 memset(message.get(), 'a', message_len); in test_import_rsa() 231 size_t message_len = 1024 / 8; in test_rsa() local 233 memset(message.get(), 'a', message_len); in test_rsa() 272 message_len) != 1) { in test_rsa() 299 size_t message_len = 30 /* arbitrary */; in test_import_ecdsa() local 301 memset(message.get(), 'a', message_len); in test_import_ecdsa() 335 size_t message_len = 30 /* arbitrary */; in test_ecdsa() local 337 memset(message.get(), 'a', message_len); in test_ecdsa() [all …]
|
/dports/net/zerotier/ZeroTierOne-1.8.3/attic/historic/anode/libanode/ |
H A D | aes_digest.c | 22 void Anode_aes_digest(const void *const message,unsigned long message_len,void *const hash) in Anode_aes_digest() argument 28 const unsigned char *end = in + message_len; in Anode_aes_digest() 66 if (sizeof(message_len) >= 8) { /* 32/64 bit? this will get optimized out */ in Anode_aes_digest() 67 block[8] = (uint8_t)((uint64_t)message_len >> 56); in Anode_aes_digest() 68 block[9] = (uint8_t)((uint64_t)message_len >> 48); in Anode_aes_digest() 69 block[10] = (uint8_t)((uint64_t)message_len >> 40); in Anode_aes_digest() 70 block[11] = (uint8_t)((uint64_t)message_len >> 32); in Anode_aes_digest() 72 block[12] = (uint8_t)(message_len >> 24); in Anode_aes_digest() 73 block[13] = (uint8_t)(message_len >> 16); in Anode_aes_digest() 74 block[14] = (uint8_t)(message_len >> 8); in Anode_aes_digest() [all …]
|
/dports/multimedia/gstreamer1-plugins-rust/gst-plugins-rs-d0466b3eee114207f851b37cae0015c0e718f021/cargo-crates/libsodium-sys-0.2.7/libsodium/test/default/ |
H A D | aead_aes256gcm.c | 3099 size_t message_len; in tv() local 3114 message_len = strlen(tests[i].message_hex) / 2; in tv() 3116 sodium_hex2bin(message, message_len, in tv() 3125 detached_ciphertext_len = message_len; in tv() 3128 sodium_hex2bin(expected_ciphertext, message_len, in tv() 3145 memcmp(mac, expected_ciphertext + message_len, in tv() 3156 message, message_len, in tv() 3198 assert((size_t) found_message_len == message_len); in tv() 3199 if (memcmp(decrypted, message, message_len) != 0) { in tv() 3202 memset(decrypted, 0xd0, message_len); in tv() [all …]
|
/dports/security/libsodium/libsodium-1.0.18/test/default/ |
H A D | aead_aes256gcm.c | 3099 size_t message_len; in tv() local 3114 message_len = strlen(tests[i].message_hex) / 2; in tv() 3116 sodium_hex2bin(message, message_len, in tv() 3125 detached_ciphertext_len = message_len; in tv() 3128 sodium_hex2bin(expected_ciphertext, message_len, in tv() 3145 memcmp(mac, expected_ciphertext + message_len, in tv() 3156 message, message_len, in tv() 3198 assert((size_t) found_message_len == message_len); in tv() 3199 if (memcmp(decrypted, message, message_len) != 0) { in tv() 3202 memset(decrypted, 0xd0, message_len); in tv() [all …]
|
/dports/security/py-pynacl/PyNaCl-1.4.0/src/libsodium/test/default/ |
H A D | aead_aes256gcm.c | 3099 size_t message_len; in tv() local 3114 message_len = strlen(tests[i].message_hex) / 2; in tv() 3116 sodium_hex2bin(message, message_len, in tv() 3125 detached_ciphertext_len = message_len; in tv() 3128 sodium_hex2bin(expected_ciphertext, message_len, in tv() 3145 memcmp(mac, expected_ciphertext + message_len, in tv() 3156 message, message_len, in tv() 3198 assert((size_t) found_message_len == message_len); in tv() 3199 if (memcmp(decrypted, message, message_len) != 0) { in tv() 3202 memset(decrypted, 0xd0, message_len); in tv() [all …]
|
/dports/devel/pijul/pijul-1.0.0.a55/cargo-crates/libsodium-sys-0.2.7/libsodium/test/default/ |
H A D | aead_aes256gcm.c | 3099 size_t message_len; in tv() local 3114 message_len = strlen(tests[i].message_hex) / 2; in tv() 3116 sodium_hex2bin(message, message_len, in tv() 3125 detached_ciphertext_len = message_len; in tv() 3128 sodium_hex2bin(expected_ciphertext, message_len, in tv() 3145 memcmp(mac, expected_ciphertext + message_len, in tv() 3156 message, message_len, in tv() 3198 assert((size_t) found_message_len == message_len); in tv() 3199 if (memcmp(decrypted, message, message_len) != 0) { in tv() 3202 memset(decrypted, 0xd0, message_len); in tv() [all …]
|
/dports/security/liboqs/liboqs-0.7.0/src/sig/dilithium/ |
H A D | sig_dilithium.h | 15 …t8_t *signature, size_t *signature_len, const uint8_t *message, size_t message_len, const uint8_t … 16 OQS_API OQS_STATUS OQS_SIG_dilithium_2_verify(const uint8_t *message, size_t message_len, const uin… 26 …t8_t *signature, size_t *signature_len, const uint8_t *message, size_t message_len, const uint8_t … 27 OQS_API OQS_STATUS OQS_SIG_dilithium_3_verify(const uint8_t *message, size_t message_len, const uin… 37 …t8_t *signature, size_t *signature_len, const uint8_t *message, size_t message_len, const uint8_t … 38 OQS_API OQS_STATUS OQS_SIG_dilithium_5_verify(const uint8_t *message, size_t message_len, const uin… 48 …t8_t *signature, size_t *signature_len, const uint8_t *message, size_t message_len, const uint8_t … 49 OQS_API OQS_STATUS OQS_SIG_dilithium_2_aes_verify(const uint8_t *message, size_t message_len, const… 59 …t8_t *signature, size_t *signature_len, const uint8_t *message, size_t message_len, const uint8_t … 60 OQS_API OQS_STATUS OQS_SIG_dilithium_3_aes_verify(const uint8_t *message, size_t message_len, const… [all …]
|
/dports/databases/pecl-mongodb/mongodb-1.9.1/src/libmongocrypt/src/ |
H A D | mongocrypt-status.c | 41 int32_t message_len) in mongocrypt_status_set() argument 47 if (message_len < 0) { in mongocrypt_status_set() 48 message_len = (int32_t) strlen (message) + 1; in mongocrypt_status_set() 49 } else if (message_len == 0) { in mongocrypt_status_set() 52 message_len = 1; in mongocrypt_status_set() 56 status->message = bson_malloc (message_len); in mongocrypt_status_set() 58 status->message[message_len - 1] = '\0'; in mongocrypt_status_set() 59 memcpy (status->message, message, message_len - 1); in mongocrypt_status_set() 60 status->len = message_len - 1; in mongocrypt_status_set()
|
/dports/multimedia/librist/librist-5c1f4a06ab46e16e6bba42fe7381d8353020a1fd/tools/ |
H A D | oob_shared.c | 43 …t oob_build_api_payload(char *buffer, char *sourceip, char *destip, char *message, int message_len) in oob_build_api_payload() argument 54 memcpy(buffer + sizeof(struct ipheader), message, message_len); in oob_build_api_payload() 55 int total_len = sizeof(struct ipheader) + message_len; in oob_build_api_payload() 62 char *oob_process_api_message(int buffer_len, char *buffer, int *message_len) in oob_process_api_message() argument 69 *message_len = RIST_OOB_ERROR_INVALID_LENGTH; in oob_process_api_message() 75 *message_len = RIST_OOB_ERROR_INVALID_PROTO; in oob_process_api_message() 81 *message_len = RIST_OOB_ERROR_INVALID_IDENT; in oob_process_api_message() 86 *message_len = buffer_len - header_size; in oob_process_api_message()
|
/dports/www/privoxy/privoxy-3.0.33-stable/ |
H A D | ssl_common.c | 329 size_t message_len = 0; in ssl_send_certificate_error() local 372 char message[message_len]; in ssl_send_certificate_error() 373 memset(message, 0, message_len); in ssl_send_certificate_error() 375 strlcpy(message, message_begin, message_len); in ssl_send_certificate_error() 376 strlcat(message, reason , message_len); in ssl_send_certificate_error() 377 strlcat(message, "</p>" , message_len); in ssl_send_certificate_error() 397 strlcat(message, "<pre>", message_len); in ssl_send_certificate_error() 404 message_len); in ssl_send_certificate_error() 405 strlcat(message, base64_buf, message_len); in ssl_send_certificate_error() 411 strlcat(message, message_end, message_len); in ssl_send_certificate_error() [all …]
|
/dports/devel/gnome-builder/gnome-builder-41.3/src/libide/foundry/ |
H A D | ide-build-log.c | 88 gsize message_len; in G_DEFINE_FINAL_TYPE() local 92 message_len = strlen (message); in G_DEFINE_FINAL_TYPE() 101 observer->callback (stream, message, message_len, observer->data); in G_DEFINE_FINAL_TYPE() 149 gsize message_len) in ide_build_log_via_main() argument 151 gchar *copied = g_strndup (message, message_len); in ide_build_log_via_main() 174 gssize message_len, in ide_build_log_observer() argument 181 if (message_len < 0) in ide_build_log_observer() 182 message_len = strlen (message); in ide_build_log_observer() 184 g_assert (message[message_len] == '\0'); in ide_build_log_observer() 192 observer->callback (stream, message, message_len, observer->data); in ide_build_log_observer() [all …]
|