Home
last modified time | relevance | path

Searched refs:req_len (Results 1 – 9 of 9) sorted by relevance

/external/scapy/scapy/layers/tls/crypto/
Dprf.py22 def _tls_P_hash(secret, seed, req_len, hm): argument
40 n = (req_len + hash_len - 1) // hash_len
50 return res[:req_len]
53 def _tls_P_MD5(secret, seed, req_len): argument
54 return _tls_P_hash(secret, seed, req_len, _tls_hmac_algs["HMAC-MD5"])
56 def _tls_P_SHA1(secret, seed, req_len): argument
57 return _tls_P_hash(secret, seed, req_len, _tls_hmac_algs["HMAC-SHA"])
59 def _tls_P_SHA256(secret, seed, req_len): argument
60 return _tls_P_hash(secret, seed, req_len, _tls_hmac_algs["HMAC-SHA256"])
62 def _tls_P_SHA384(secret, seed, req_len): argument
[all …]
/external/wpa_supplicant_8/src/eap_server/
Deap_server_peap.c238 size_t req_len; in eap_peap_build_phase2_req() local
249 req_len = wpabuf_len(buf); in eap_peap_build_phase2_req()
251 req, req_len); in eap_peap_build_phase2_req()
256 req_len -= sizeof(struct eap_hdr); in eap_peap_build_phase2_req()
259 wpabuf_set(&msgbuf, req, req_len); in eap_peap_build_phase2_req()
274 size_t req_len; in eap_peap_build_phase2_soh() local
290 req_len = wpabuf_len(buf); in eap_peap_build_phase2_soh()
293 req, req_len); in eap_peap_build_phase2_soh()
296 req_len -= sizeof(struct eap_hdr); in eap_peap_build_phase2_soh()
297 wpabuf_set(&msgbuf, req, req_len); in eap_peap_build_phase2_soh()
[all …]
/external/swiftshader/third_party/LLVM/test/Transforms/GVN/
D2009-06-17-InvalidPRE.ll9 define void @m_adj(%struct.mbuf* %mp, i32 %req_len) nounwind optsize {
12 %1 = icmp slt i32 %req_len, 0 ; <i1> [#uses=1]
29 %len.0.ph = phi i32 [ %2, %bb2 ], [ %req_len, %bb4.preheader ] ; <i32> [#uses=1]
65 %23 = sub i32 %req_len, %len.0 ; <i32> [#uses=1]
/external/swiftshader/third_party/llvm-7.0/llvm/test/Transforms/GVN/PRE/
D2009-06-17-InvalidPRE.ll10 define void @m_adj(%struct.mbuf* %mp, i32 %req_len) nounwind optsize {
13 %1 = icmp slt i32 %req_len, 0 ; <i1> [#uses=1]
30 %len.0.ph = phi i32 [ %2, %bb2 ], [ %req_len, %bb4.preheader ] ; <i32> [#uses=1]
66 %23 = sub i32 %req_len, %len.0 ; <i32> [#uses=1]
/external/llvm/test/Transforms/GVN/
D2009-06-17-InvalidPRE.ll9 define void @m_adj(%struct.mbuf* %mp, i32 %req_len) nounwind optsize {
12 %1 = icmp slt i32 %req_len, 0 ; <i1> [#uses=1]
29 %len.0.ph = phi i32 [ %2, %bb2 ], [ %req_len, %bb4.preheader ] ; <i32> [#uses=1]
65 %23 = sub i32 %req_len, %len.0 ; <i32> [#uses=1]
/external/wpa_supplicant_8/src/eap_peer/
Deap_mschapv2.c240 size_t req_len, u8 id) in eap_mschapv2_challenge() argument
250 if (req_len < sizeof(*req) + 1) { in eap_mschapv2_challenge()
252 "(len %lu)", (unsigned long) req_len); in eap_mschapv2_challenge()
258 len = req_len - sizeof(*req) - 1; in eap_mschapv2_challenge()
346 size_t req_len, u8 id) in eap_mschapv2_success() argument
353 len = req_len - sizeof(*req); in eap_mschapv2_success()
653 size_t req_len, u8 id) in eap_mschapv2_failure() argument
658 size_t len = req_len - sizeof(*req); in eap_mschapv2_failure()
/external/wpa_supplicant_8/src/tls/
Dtlsv1_server_read.c50 const u8 *req, size_t req_len) in tls_process_status_request_item() argument
56 end = req + req_len; in tls_process_status_request_item()
/external/wpa_supplicant_8/wpa_supplicant/
Dsme.c2319 u8 req_len = 2 + WLAN_SA_QUERY_TR_ID_LEN; in sme_send_sa_query_req() local
2339 if (ocv_insert_extended_oci(&ci, req + req_len) < 0) in sme_send_sa_query_req()
2342 req_len += OCV_OCI_EXTENDED_LEN; in sme_send_sa_query_req()
2348 req, req_len, 0) < 0) in sme_send_sa_query_req()
/external/webrtc/webrtc/test/channel_transport/
Dudp_transport_impl.cc2549 int req_len = len - sizeof(*nlmp); in LocalHostAddressIPV6()
2551 if (req_len < 0 || len > status) in LocalHostAddressIPV6()