/external/wpa_supplicant_8/src/eap_common/ |
D | eap_eke_common.c | 453 size_t label_len; in eap_eke_derive_ke_ki() local 474 label_len = os_strlen(label); in eap_eke_derive_ke_ki() 475 data_len = label_len + id_s_len + id_p_len; in eap_eke_derive_ke_ki() 479 os_memcpy(data, label, label_len); in eap_eke_derive_ke_ki() 480 os_memcpy(data + label_len, id_s, id_s_len); in eap_eke_derive_ke_ki() 481 os_memcpy(data + label_len + id_s_len, id_p, id_p_len); in eap_eke_derive_ke_ki() 506 size_t label_len; in eap_eke_derive_ka() local 515 label_len = os_strlen(label); in eap_eke_derive_ka() 516 data_len = label_len + id_s_len + id_p_len + 2 * sess->nonce_len; in eap_eke_derive_ka() 521 os_memcpy(pos, label, label_len); in eap_eke_derive_ka() [all …]
|
D | eap_peap_common.c | 22 size_t label_len = os_strlen(label); in peap_prfplus() local 30 len[1] = label_len; in peap_prfplus()
|
D | eap_sake_common.c | 216 size_t label_len = os_strlen(label) + 1; in eap_sake_kdf() local 221 len[0] = label_len; in eap_sake_kdf()
|
/external/chromium-trace/catapult/third_party/coverage/coverage/ |
D | debug.py | 70 label_len = max(len(l) for l, _d in info) 75 prefix = "%*s:" % (label_len, label) 77 yield "%*s %s" % (label_len+1, prefix, e) 80 yield "%*s: %s" % (label_len, label, data)
|
/external/toybox/toys/other/ |
D | blkid.c | 33 int magic_len, magic_offset, uuid_off, label_len, label_off; member 118 if (fstypes[i].label_len) in do_blkid() 119 printf(" LABEL=\"%.*s\"", fstypes[i].label_len, in do_blkid()
|
/external/wpa_supplicant_8/src/crypto/ |
D | sha1-prf.c | 36 size_t label_len = os_strlen(label) + 1; in sha1_prf() local 41 len[0] = label_len; in sha1_prf()
|
D | sha1-tprf.c | 35 size_t label_len = os_strlen(label); in sha1_t_prf() local 43 len[1] = label_len + 1; in sha1_t_prf()
|
/external/tcpdump/ |
D | print-dhcp6.c | 287 int label_len; /* Label length */ in dhcp6opt_print() local 728 label_len = *tp++; in dhcp6opt_print() 729 if (label_len < remain_len - 1) { in dhcp6opt_print() 730 ND_PRINT((ndo, "%.*s", label_len, tp)); in dhcp6opt_print() 731 tp += label_len; in dhcp6opt_print() 732 remain_len -= (label_len + 1); in dhcp6opt_print()
|
/external/boringssl/src/ssl/ |
D | t1_enc.c | 228 size_t secret_len, const char *label, size_t label_len, in tls1_prf() argument 244 (const uint8_t *)label, label_len, seed1, seed1_len, seed2, in tls1_prf() 255 secret, secret_len, (const uint8_t *)label, label_len, in tls1_prf() 574 const char *label, size_t label_len, in tls1_export_keying_material() argument 606 label_len, seed, seed_len, NULL, 0); in tls1_export_keying_material()
|
D | internal.h | 1034 size_t secret_len, const char *label, size_t label_len, 1168 size_t secret_len, const char *label, size_t label_len, 1180 const char *label, size_t label_len,
|
D | s3_enc.c | 169 size_t secret_len, const char *label, size_t label_len, in ssl3_prf() argument
|
D | ssl_lib.c | 1647 const char *label, size_t label_len, in SSL_export_keying_material() argument 1655 ssl, out, out_len, label, label_len, context, context_len, use_context); in SSL_export_keying_material()
|
/external/e2fsprogs/misc/ |
D | blkid.c | 140 static int label_len = 8, mtpt_len = 14; in pretty_print_line() local 153 label_len += w; in pretty_print_line() 162 len = pretty_print_word(label, label_len, len, 0); in pretty_print_line()
|
/external/boringssl/src/crypto/evp/ |
D | p_rsa.c | 570 size_t label_len) { in EVP_PKEY_CTX_set0_rsa_oaep_label() argument 571 int label_len_int = label_len; in EVP_PKEY_CTX_set0_rsa_oaep_label() 572 if (((size_t) label_len_int) != label_len) { in EVP_PKEY_CTX_set0_rsa_oaep_label() 577 EVP_PKEY_CTRL_RSA_OAEP_LABEL, label_len, in EVP_PKEY_CTX_set0_rsa_oaep_label()
|
/external/e2fsprogs/lib/blkid/ |
D | probe.h | 352 unsigned char label_len[2]; member 361 #define ocfslabellen(o) ((__u32)o.label_len[0] + (((__u32) o.label_len[1]) << 8)) 522 __u8 label_len; member
|
D | probe.c | 522 int label_len = 0, maxloop = 100; in probe_fat() local 619 if ((label_len = figure_label_len(vol_label, 11))) in probe_fat() 627 blkid_set_tag(probe->dev, "LABEL", (const char *) label, label_len); in probe_fat() 1178 blkid_set_tag(probe->dev, "LABEL", (char *)hfs->label, hfs->label_len); in probe_hfs() 1206 unsigned int label_len; in probe_hfsplus() local 1300 label_len = blkid_be16(key->unicode_len) * 2; in probe_hfsplus() 1302 key->unicode, label_len); in probe_hfsplus()
|
/external/libevent/ |
D | evdns.c | 962 u8 label_len; in name_parse() local 964 GET8(label_len); in name_parse() 965 if (!label_len) break; in name_parse() 966 if (label_len & 0xc0) { in name_parse() 970 j = (((int)label_len & 0x3f) << 8) + ptr_low; in name_parse() 978 if (label_len > 63) return -1; in name_parse() 983 if (cp + label_len >= end) return -1; in name_parse() 984 memcpy(cp, packet + j, label_len); in name_parse() 985 cp += label_len; in name_parse() 986 j += label_len; in name_parse() [all …]
|
D | ChangeLog | 581 o Use the label_len local variable in evdns instead of recalculating it over and over (ba01456)
|
/external/boringssl/src/include/openssl/ |
D | evp.h | 632 size_t label_len);
|
D | ssl.h | 1316 SSL *ssl, uint8_t *out, size_t out_len, const char *label, size_t label_len,
|