/external/scapy/scapy/layers/tls/crypto/ |
D | prf.py | 22 def _tls_P_hash(secret, seed, req_len, hm): argument 40 n = (req_len + hash_len - 1) // hash_len 50 return res[:req_len] 53 def _tls_P_MD5(secret, seed, req_len): argument 54 return _tls_P_hash(secret, seed, req_len, _tls_hmac_algs["HMAC-MD5"]) 56 def _tls_P_SHA1(secret, seed, req_len): argument 57 return _tls_P_hash(secret, seed, req_len, _tls_hmac_algs["HMAC-SHA"]) 59 def _tls_P_SHA256(secret, seed, req_len): argument 60 return _tls_P_hash(secret, seed, req_len, _tls_hmac_algs["HMAC-SHA256"]) 62 def _tls_P_SHA384(secret, seed, req_len): argument [all …]
|
/external/valgrind/auxprogs/ |
D | valgrind-di-server.c | 732 ULong req_session_id = 0, req_offset = 0, req_len = 0; in handle_transaction() local 799 &req_offset, &req_len)) { in handle_transaction() 815 if (ok && (req_len == 0 || req_len > 4*1024*1024)) { in handle_transaction() 819 if (ok && req_len + req_offset > conn_state[conn_no].file_size) { in handle_transaction() 827 UChar* unzBuf = my_malloc(req_len); in handle_transaction() 829 unzBuf, req_len, req_offset); in handle_transaction() 830 if (nRead != req_len) { in handle_transaction() 845 UInt zLenMax = req_len + req_len / 4 + 1024; in handle_transaction() 848 Int lzo_rc = lzo1x_1_compress(unzBuf, req_len, in handle_transaction() 858 ("RDOK", req_session_id, req_offset, req_len, zLen, &buf); in handle_transaction() [all …]
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_peap.c | 238 size_t req_len; in eap_peap_build_phase2_req() local 249 req_len = wpabuf_len(buf); in eap_peap_build_phase2_req() 251 req, req_len); in eap_peap_build_phase2_req() 256 req_len -= sizeof(struct eap_hdr); in eap_peap_build_phase2_req() 259 wpabuf_set(&msgbuf, req, req_len); in eap_peap_build_phase2_req() 274 size_t req_len; in eap_peap_build_phase2_soh() local 290 req_len = wpabuf_len(buf); in eap_peap_build_phase2_soh() 293 req, req_len); in eap_peap_build_phase2_soh() 296 req_len -= sizeof(struct eap_hdr); in eap_peap_build_phase2_soh() 297 wpabuf_set(&msgbuf, req, req_len); in eap_peap_build_phase2_soh() [all …]
|
/external/swiftshader/third_party/LLVM/test/Transforms/GVN/ |
D | 2009-06-17-InvalidPRE.ll | 9 define void @m_adj(%struct.mbuf* %mp, i32 %req_len) nounwind optsize { 12 %1 = icmp slt i32 %req_len, 0 ; <i1> [#uses=1] 29 %len.0.ph = phi i32 [ %2, %bb2 ], [ %req_len, %bb4.preheader ] ; <i32> [#uses=1] 65 %23 = sub i32 %req_len, %len.0 ; <i32> [#uses=1]
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_mschapv2.c | 240 size_t req_len, u8 id) in eap_mschapv2_challenge() argument 250 if (req_len < sizeof(*req) + 1) { in eap_mschapv2_challenge() 252 "(len %lu)", (unsigned long) req_len); in eap_mschapv2_challenge() 258 len = req_len - sizeof(*req) - 1; in eap_mschapv2_challenge() 346 size_t req_len, u8 id) in eap_mschapv2_success() argument 353 len = req_len - sizeof(*req); in eap_mschapv2_success() 653 size_t req_len, u8 id) in eap_mschapv2_failure() argument 658 size_t len = req_len - sizeof(*req); in eap_mschapv2_failure()
|
/external/llvm/test/Transforms/GVN/ |
D | 2009-06-17-InvalidPRE.ll | 9 define void @m_adj(%struct.mbuf* %mp, i32 %req_len) nounwind optsize { 12 %1 = icmp slt i32 %req_len, 0 ; <i1> [#uses=1] 29 %len.0.ph = phi i32 [ %2, %bb2 ], [ %req_len, %bb4.preheader ] ; <i32> [#uses=1] 65 %23 = sub i32 %req_len, %len.0 ; <i32> [#uses=1]
|
/external/wpa_supplicant_8/src/tls/ |
D | tlsv1_server_read.c | 50 const u8 *req, size_t req_len) in tls_process_status_request_item() argument 56 end = req + req_len; in tls_process_status_request_item()
|
/external/webrtc/webrtc/test/channel_transport/ |
D | udp_transport_impl.cc | 2549 int req_len = len - sizeof(*nlmp); in LocalHostAddressIPV6() 2551 if (req_len < 0 || len > status) in LocalHostAddressIPV6()
|