/external/scapy/scapy/layers/tls/crypto/ |
D | prf.py | 22 def _tls_P_hash(secret, seed, req_len, hm): argument 40 n = (req_len + hash_len - 1) // hash_len 50 return res[:req_len] 53 def _tls_P_MD5(secret, seed, req_len): argument 54 return _tls_P_hash(secret, seed, req_len, _tls_hmac_algs["HMAC-MD5"]) 56 def _tls_P_SHA1(secret, seed, req_len): argument 57 return _tls_P_hash(secret, seed, req_len, _tls_hmac_algs["HMAC-SHA"]) 59 def _tls_P_SHA256(secret, seed, req_len): argument 60 return _tls_P_hash(secret, seed, req_len, _tls_hmac_algs["HMAC-SHA256"]) 62 def _tls_P_SHA384(secret, seed, req_len): argument [all …]
|
/external/llvm/test/Transforms/GVN/ |
D | 2009-06-17-InvalidPRE.ll | 9 define void @m_adj(%struct.mbuf* %mp, i32 %req_len) nounwind optsize { 12 %1 = icmp slt i32 %req_len, 0 ; <i1> [#uses=1] 29 %len.0.ph = phi i32 [ %2, %bb2 ], [ %req_len, %bb4.preheader ] ; <i32> [#uses=1] 65 %23 = sub i32 %req_len, %len.0 ; <i32> [#uses=1]
|
/external/llvm-project/llvm/test/Transforms/GVN/PRE/ |
D | 2009-06-17-InvalidPRE.ll | 10 define void @m_adj(%struct.mbuf* %mp, i32 %req_len) nounwind optsize { 13 %1 = icmp slt i32 %req_len, 0 ; <i1> [#uses=1] 30 %len.0.ph = phi i32 [ %2, %bb2 ], [ %req_len, %bb4.preheader ] ; <i32> [#uses=1] 66 %23 = sub i32 %req_len, %len.0 ; <i32> [#uses=1]
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_peap.c | 238 size_t req_len; in eap_peap_build_phase2_req() local 249 req_len = wpabuf_len(buf); in eap_peap_build_phase2_req() 251 req, req_len); in eap_peap_build_phase2_req() 256 req_len -= sizeof(struct eap_hdr); in eap_peap_build_phase2_req() 259 wpabuf_set(&msgbuf, req, req_len); in eap_peap_build_phase2_req() 274 size_t req_len; in eap_peap_build_phase2_soh() local 290 req_len = wpabuf_len(buf); in eap_peap_build_phase2_soh() 293 req, req_len); in eap_peap_build_phase2_soh() 296 req_len -= sizeof(struct eap_hdr); in eap_peap_build_phase2_soh() 297 wpabuf_set(&msgbuf, req, req_len); in eap_peap_build_phase2_soh() [all …]
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_mschapv2.c | 240 size_t req_len, u8 id) in eap_mschapv2_challenge() argument 250 if (req_len < sizeof(*req) + 1) { in eap_mschapv2_challenge() 252 "(len %lu)", (unsigned long) req_len); in eap_mschapv2_challenge() 258 len = req_len - sizeof(*req) - 1; in eap_mschapv2_challenge() 346 size_t req_len, u8 id) in eap_mschapv2_success() argument 353 len = req_len - sizeof(*req); in eap_mschapv2_success() 653 size_t req_len, u8 id) in eap_mschapv2_failure() argument 658 size_t len = req_len - sizeof(*req); in eap_mschapv2_failure()
|
/external/oss-fuzz/projects/nginx/fuzz/ |
D | http_request_fuzzer.cc | 261 size_t req_len = strlen(req_string); in DEFINE_PROTO_FUZZER() local 265 request.data_len = req_len; in DEFINE_PROTO_FUZZER()
|
/external/igt-gpu-tools/lib/ |
D | igt_chamelium_stream.c | 368 void *req_buf, size_t req_len, in chamelium_stream_call() argument 371 if (!chamelium_stream_write_request(client, type, req_buf, req_len)) in chamelium_stream_call()
|
/external/usrsctp/usrsctplib/ |
D | user_mbuf.c | 1430 m_adj(struct mbuf *mp, int req_len) in m_adj() argument 1432 int len = req_len; in m_adj() 1455 m->m_pkthdr.len -= (req_len - len); in m_adj()
|
/external/wpa_supplicant_8/src/tls/ |
D | tlsv1_server_read.c | 50 const u8 *req, size_t req_len) in tls_process_status_request_item() argument 56 end = req + req_len; in tls_process_status_request_item()
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | sme.c | 2643 u8 req_len = 2 + WLAN_SA_QUERY_TR_ID_LEN; in sme_send_sa_query_req() local 2673 if (ocv_insert_extended_oci(&ci, req + req_len) < 0) in sme_send_sa_query_req() 2676 req_len += OCV_OCI_EXTENDED_LEN; in sme_send_sa_query_req() 2682 req, req_len, 0) < 0) in sme_send_sa_query_req()
|