/external/scapy/scapy/layers/tls/crypto/ |
D | prf.py | 22 def _tls_P_hash(secret, seed, req_len, hm): argument 40 n = (req_len + hash_len - 1) // hash_len 50 return res[:req_len] 53 def _tls_P_MD5(secret, seed, req_len): argument 54 return _tls_P_hash(secret, seed, req_len, _tls_hmac_algs["HMAC-MD5"]) 56 def _tls_P_SHA1(secret, seed, req_len): argument 57 return _tls_P_hash(secret, seed, req_len, _tls_hmac_algs["HMAC-SHA"]) 59 def _tls_P_SHA256(secret, seed, req_len): argument 60 return _tls_P_hash(secret, seed, req_len, _tls_hmac_algs["HMAC-SHA256"]) 62 def _tls_P_SHA384(secret, seed, req_len): argument [all …]
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_peap.c | 238 size_t req_len; in eap_peap_build_phase2_req() local 249 req_len = wpabuf_len(buf); in eap_peap_build_phase2_req() 251 req, req_len); in eap_peap_build_phase2_req() 256 req_len -= sizeof(struct eap_hdr); in eap_peap_build_phase2_req() 259 wpabuf_set(&msgbuf, req, req_len); in eap_peap_build_phase2_req() 274 size_t req_len; in eap_peap_build_phase2_soh() local 290 req_len = wpabuf_len(buf); in eap_peap_build_phase2_soh() 293 req, req_len); in eap_peap_build_phase2_soh() 296 req_len -= sizeof(struct eap_hdr); in eap_peap_build_phase2_soh() 297 wpabuf_set(&msgbuf, req, req_len); in eap_peap_build_phase2_soh() [all …]
|
/external/swiftshader/third_party/LLVM/test/Transforms/GVN/ |
D | 2009-06-17-InvalidPRE.ll | 9 define void @m_adj(%struct.mbuf* %mp, i32 %req_len) nounwind optsize { 12 %1 = icmp slt i32 %req_len, 0 ; <i1> [#uses=1] 29 %len.0.ph = phi i32 [ %2, %bb2 ], [ %req_len, %bb4.preheader ] ; <i32> [#uses=1] 65 %23 = sub i32 %req_len, %len.0 ; <i32> [#uses=1]
|
/external/swiftshader/third_party/llvm-7.0/llvm/test/Transforms/GVN/PRE/ |
D | 2009-06-17-InvalidPRE.ll | 10 define void @m_adj(%struct.mbuf* %mp, i32 %req_len) nounwind optsize { 13 %1 = icmp slt i32 %req_len, 0 ; <i1> [#uses=1] 30 %len.0.ph = phi i32 [ %2, %bb2 ], [ %req_len, %bb4.preheader ] ; <i32> [#uses=1] 66 %23 = sub i32 %req_len, %len.0 ; <i32> [#uses=1]
|
/external/llvm/test/Transforms/GVN/ |
D | 2009-06-17-InvalidPRE.ll | 9 define void @m_adj(%struct.mbuf* %mp, i32 %req_len) nounwind optsize { 12 %1 = icmp slt i32 %req_len, 0 ; <i1> [#uses=1] 29 %len.0.ph = phi i32 [ %2, %bb2 ], [ %req_len, %bb4.preheader ] ; <i32> [#uses=1] 65 %23 = sub i32 %req_len, %len.0 ; <i32> [#uses=1]
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_mschapv2.c | 240 size_t req_len, u8 id) in eap_mschapv2_challenge() argument 250 if (req_len < sizeof(*req) + 1) { in eap_mschapv2_challenge() 252 "(len %lu)", (unsigned long) req_len); in eap_mschapv2_challenge() 258 len = req_len - sizeof(*req) - 1; in eap_mschapv2_challenge() 346 size_t req_len, u8 id) in eap_mschapv2_success() argument 353 len = req_len - sizeof(*req); in eap_mschapv2_success() 653 size_t req_len, u8 id) in eap_mschapv2_failure() argument 658 size_t len = req_len - sizeof(*req); in eap_mschapv2_failure()
|
/external/wpa_supplicant_8/src/tls/ |
D | tlsv1_server_read.c | 50 const u8 *req, size_t req_len) in tls_process_status_request_item() argument 56 end = req + req_len; in tls_process_status_request_item()
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | sme.c | 2319 u8 req_len = 2 + WLAN_SA_QUERY_TR_ID_LEN; in sme_send_sa_query_req() local 2339 if (ocv_insert_extended_oci(&ci, req + req_len) < 0) in sme_send_sa_query_req() 2342 req_len += OCV_OCI_EXTENDED_LEN; in sme_send_sa_query_req() 2348 req, req_len, 0) < 0) in sme_send_sa_query_req()
|
/external/webrtc/webrtc/test/channel_transport/ |
D | udp_transport_impl.cc | 2549 int req_len = len - sizeof(*nlmp); in LocalHostAddressIPV6() 2551 if (req_len < 0 || len > status) in LocalHostAddressIPV6()
|