/external/wpa_supplicant_8/src/eap_common/ |
D | eap_eke_common.c | 453 size_t label_len; in eap_eke_derive_ke_ki() local 474 label_len = os_strlen(label); in eap_eke_derive_ke_ki() 475 data_len = label_len + id_s_len + id_p_len; in eap_eke_derive_ke_ki() 479 os_memcpy(data, label, label_len); in eap_eke_derive_ke_ki() 480 os_memcpy(data + label_len, id_s, id_s_len); in eap_eke_derive_ke_ki() 481 os_memcpy(data + label_len + id_s_len, id_p, id_p_len); in eap_eke_derive_ke_ki() 506 size_t label_len; in eap_eke_derive_ka() local 515 label_len = os_strlen(label); in eap_eke_derive_ka() 516 data_len = label_len + id_s_len + id_p_len + 2 * sess->nonce_len; in eap_eke_derive_ka() 521 os_memcpy(pos, label, label_len); in eap_eke_derive_ka() [all …]
|
D | eap_peap_common.c | 22 size_t label_len = os_strlen(label); in peap_prfplus() local 30 len[1] = label_len; in peap_prfplus()
|
D | eap_sake_common.c | 216 size_t label_len = os_strlen(label) + 1; in eap_sake_kdf() local 221 len[0] = label_len; in eap_sake_kdf()
|
/external/toybox/toys/other/ |
D | blkid.c | 33 int magic_len, magic_offset, uuid_off, label_len, label_off; member 118 if (fstypes[i].label_len) { in do_blkid() 121 len = fstypes[i].label_len; in do_blkid()
|
/external/syslinux/gpxe/src/crypto/ |
D | sha1extra.c | 51 const size_t label_len = strlen ( label ); in prf_sha1() local 60 memcpy ( in + label_len + 1, data, data_len ); in prf_sha1() 61 in_blknr = in + label_len + 1 + data_len; in prf_sha1()
|
/external/boringssl/src/ssl/ |
D | t1_enc.cc | 229 size_t label_len, const uint8_t *seed1, size_t seed1_len, in tls1_prf() argument 242 (const uint8_t *)label, label_len, seed1, seed1_len, seed2, in tls1_prf() 255 (const uint8_t *)label, label_len, seed1, seed1_len, seed2, in tls1_prf() 264 size_t secret_len, const char *label, size_t label_len, in ssl3_prf() argument 511 const char *label, size_t label_len, in SSL_export_keying_material() argument 524 return tls13_export_keying_material(ssl, out, out_len, label, label_len, in SSL_export_keying_material() 558 SSL_get_session(ssl)->master_key_length, label, label_len, in SSL_export_keying_material()
|
D | tls13_enc.cc | 70 const uint8_t *label, size_t label_len, in hkdf_expand_label() argument 77 if (!CBB_init(&cbb, 2 + 1 + strlen(kTLS13LabelVersion) + label_len + 1 + in hkdf_expand_label() 83 !CBB_add_bytes(&child, label, label_len) || in hkdf_expand_label() 101 const uint8_t *label, size_t label_len) { in derive_secret() argument 110 hs->hash_len, label, label_len, context_hash, in derive_secret() 323 const char *label, size_t label_len, in tls13_export_keying_material() argument 337 label_len, hash, hash_len, out_len); in tls13_export_keying_material()
|
D | ssl_transcript.cc | 384 size_t label_len = TLS_MD_SERVER_FINISH_CONST_SIZE; in SSL_TRANSCRIPT_finish_mac() local 387 label_len = TLS_MD_SERVER_FINISH_CONST_SIZE; in SSL_TRANSCRIPT_finish_mac() 399 label_len, digests, digests_len, NULL, 0)) { in SSL_TRANSCRIPT_finish_mac()
|
D | internal.h | 390 size_t label_len, const uint8_t *seed1, size_t seed1_len, in OPENSSL_MSVC_PRAGMA() 972 const char *label, size_t label_len, in OPENSSL_MSVC_PRAGMA()
|
/external/wpa_supplicant_8/src/crypto/ |
D | sha1-prf.c | 36 size_t label_len = os_strlen(label) + 1; in sha1_prf() local 41 len[0] = label_len; in sha1_prf()
|
D | sha1-tprf.c | 35 size_t label_len = os_strlen(label); in sha1_t_prf() local 43 len[1] = label_len + 1; in sha1_t_prf()
|
/external/tcpdump/ |
D | print-dhcp6.c | 291 int label_len; /* Label length */ in dhcp6opt_print() local 733 label_len = *tp++; in dhcp6opt_print() 734 if (label_len < remain_len - 1) { in dhcp6opt_print() 735 (void)fn_printn(ndo, tp, label_len, NULL); in dhcp6opt_print() 736 tp += label_len; in dhcp6opt_print() 737 remain_len -= (label_len + 1); in dhcp6opt_print()
|
/external/e2fsprogs/misc/ |
D | blkid.c | 151 static int label_len = 8, mtpt_len = 14; in pretty_print_line() local 164 label_len += w; in pretty_print_line() 174 len = pretty_print_word(label, label_len, len, 0); in pretty_print_line()
|
/external/libevent/ |
D | evdns.c | 962 u8 label_len; in name_parse() local 964 GET8(label_len); in name_parse() 965 if (!label_len) break; in name_parse() 966 if (label_len & 0xc0) { in name_parse() 970 j = (((int)label_len & 0x3f) << 8) + ptr_low; in name_parse() 978 if (label_len > 63) return -1; in name_parse() 983 if (cp + label_len >= end) return -1; in name_parse() 984 memcpy(cp, packet + j, label_len); in name_parse() 985 cp += label_len; in name_parse() 986 j += label_len; in name_parse() [all …]
|
D | ChangeLog | 581 o Use the label_len local variable in evdns instead of recalculating it over and over (ba01456)
|
/external/e2fsprogs/lib/blkid/ |
D | probe.h | 355 unsigned char label_len[2]; member 364 #define ocfslabellen(o) ((__u32)o.label_len[0] + (((__u32) o.label_len[1]) << 8)) 525 __u8 label_len; member
|
D | probe.c | 522 int label_len = 0, maxloop = 100; in probe_fat() local 621 if ((label_len = figure_label_len(vol_label, 11))) in probe_fat() 629 blkid_set_tag(probe->dev, "LABEL", (const char *) label, label_len); in probe_fat() 1182 blkid_set_tag(probe->dev, "LABEL", (char *)hfs->label, hfs->label_len); in probe_hfs() 1210 unsigned int label_len; in probe_hfsplus() local 1304 label_len = blkid_be16(key->unicode_len) * 2; in probe_hfsplus() 1306 key->unicode, label_len); in probe_hfsplus()
|
/external/syslinux/com32/gfxboot/ |
D | gfxboot.c | 821 int i, label_len; in boot() local 839 label_len = strlen(menu_ptr->menu_label); in boot() 842 if(strncmp(arg, menu_ptr->menu_label, label_len)) { in boot() 849 arg += label_len; in boot()
|
/external/boringssl/src/crypto/evp/ |
D | p_rsa.c | 613 size_t label_len) { in EVP_PKEY_CTX_set0_rsa_oaep_label() argument 614 if (label_len > INT_MAX) { in EVP_PKEY_CTX_set0_rsa_oaep_label() 619 EVP_PKEY_CTRL_RSA_OAEP_LABEL, (int)label_len, in EVP_PKEY_CTX_set0_rsa_oaep_label()
|
/external/boringssl/src/include/openssl/ |
D | evp.h | 709 size_t label_len);
|
D | ssl.h | 1528 SSL *ssl, uint8_t *out, size_t out_len, const char *label, size_t label_len,
|