/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_record.c | 21 * @rl: Pointer to TLS record layer data 30 int tlsv1_record_set_cipher_suite(struct tlsv1_record_layer *rl, argument 38 rl->cipher_suite = cipher_suite; 45 rl->hash_alg = CRYPTO_HASH_ALG_HMAC_MD5; 46 rl->hash_size = MD5_MAC_LEN; 48 rl->hash_alg = CRYPTO_HASH_ALG_HMAC_SHA1; 49 rl->hash_size = SHA1_MAC_LEN; 51 rl->hash_alg = CRYPTO_HASH_ALG_HMAC_SHA256; 52 rl->hash_size = SHA256_MAC_LEN; 59 rl 75 tlsv1_record_change_write_cipher(struct tlsv1_record_layer *rl) argument 109 tlsv1_record_change_read_cipher(struct tlsv1_record_layer *rl) argument 150 tlsv1_record_send(struct tlsv1_record_layer *rl, u8 content_type, u8 *buf, size_t buf_size, const u8 *payload, size_t payload_len, size_t *out_len) argument 278 tlsv1_record_receive(struct tlsv1_record_layer *rl, const u8 *in_data, size_t in_len, u8 *out_data, size_t *out_len, u8 *alert) argument [all...] |
H A D | tlsv1_record.h | 60 int tlsv1_record_set_cipher_suite(struct tlsv1_record_layer *rl, 62 int tlsv1_record_change_write_cipher(struct tlsv1_record_layer *rl); 63 int tlsv1_record_change_read_cipher(struct tlsv1_record_layer *rl); 64 int tlsv1_record_send(struct tlsv1_record_layer *rl, u8 content_type, u8 *buf, 67 int tlsv1_record_receive(struct tlsv1_record_layer *rl,
|
H A D | tlsv1_client.c | 64 if (tls_prf(conn->rl.tls_version, 78 key_block_len = 2 * (conn->rl.hash_size + conn->rl.key_material_len); 79 if (conn->rl.tls_version == TLS_VERSION_1) 80 key_block_len += 2 * conn->rl.iv_size; 81 if (tls_prf(conn->rl.tls_version, 94 os_memcpy(conn->rl.write_mac_secret, pos, conn->rl.hash_size); 95 pos += conn->rl.hash_size; 97 os_memcpy(conn->rl [all...] |
H A D | tlsv1_server.c | 71 if (tls_prf(conn->rl.tls_version, 85 key_block_len = 2 * (conn->rl.hash_size + conn->rl.key_material_len + 86 conn->rl.iv_size); 87 if (tls_prf(conn->rl.tls_version, 100 os_memcpy(conn->rl.read_mac_secret, pos, conn->rl.hash_size); 101 pos += conn->rl.hash_size; 103 os_memcpy(conn->rl.write_mac_secret, pos, conn->rl [all...] |
H A D | tlsv1_server_write.c | 85 WPA_PUT_BE16(pos, conn->rl.tls_version); 139 if (tlsv1_record_send(&conn->rl, TLS_CONTENT_TYPE_HANDSHAKE, 163 suite = tls_get_cipher_suite(conn->rl.cipher_suite); 224 if (tlsv1_record_send(&conn->rl, TLS_CONTENT_TYPE_HANDSHAKE, 254 suite = tls_get_cipher_suite(conn->rl.cipher_suite); 260 if (!tls_server_key_exchange_allowed(conn->rl.cipher_suite)) { 443 if (conn->rl.tls_version >= TLS_VERSION_1_2) { 446 conn->rl.tls_version, conn->client_random, 494 conn->rl.tls_version, conn->client_random, 550 if (tlsv1_record_send(&conn->rl, TLS_CONTENT_TYPE_HANDSHAK [all...] |
H A D | tlsv1_client_write.c | 113 if (tlsv1_record_send(&conn->rl, TLS_CONTENT_TYPE_HANDSHAKE, 190 if (tlsv1_record_send(&conn->rl, TLS_CONTENT_TYPE_HANDSHAKE, 379 suite = tls_get_cipher_suite(conn->rl.cipher_suite); 412 if (tlsv1_record_send(&conn->rl, TLS_CONTENT_TYPE_HANDSHAKE, 474 if (conn->rl.tls_version == TLS_VERSION_1_2) { 539 if (conn->rl.tls_version >= TLS_VERSION_1_2) { 583 if (tlsv1_record_send(&conn->rl, TLS_CONTENT_TYPE_HANDSHAKE, 611 if (tlsv1_record_send(&conn->rl, TLS_CONTENT_TYPE_CHANGE_CIPHER_SPEC, 620 if (tlsv1_record_change_write_cipher(&conn->rl) < 0) { 647 if (conn->rl [all...] |
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_record.c | 21 * @rl: Pointer to TLS record layer data 30 int tlsv1_record_set_cipher_suite(struct tlsv1_record_layer *rl, argument 38 rl->cipher_suite = cipher_suite; 45 rl->hash_alg = CRYPTO_HASH_ALG_HMAC_MD5; 46 rl->hash_size = MD5_MAC_LEN; 48 rl->hash_alg = CRYPTO_HASH_ALG_HMAC_SHA1; 49 rl->hash_size = SHA1_MAC_LEN; 51 rl->hash_alg = CRYPTO_HASH_ALG_HMAC_SHA256; 52 rl->hash_size = SHA256_MAC_LEN; 59 rl 75 tlsv1_record_change_write_cipher(struct tlsv1_record_layer *rl) argument 109 tlsv1_record_change_read_cipher(struct tlsv1_record_layer *rl) argument 150 tlsv1_record_send(struct tlsv1_record_layer *rl, u8 content_type, u8 *buf, size_t buf_size, const u8 *payload, size_t payload_len, size_t *out_len) argument 278 tlsv1_record_receive(struct tlsv1_record_layer *rl, const u8 *in_data, size_t in_len, u8 *out_data, size_t *out_len, u8 *alert) argument [all...] |
H A D | tlsv1_record.h | 60 int tlsv1_record_set_cipher_suite(struct tlsv1_record_layer *rl, 62 int tlsv1_record_change_write_cipher(struct tlsv1_record_layer *rl); 63 int tlsv1_record_change_read_cipher(struct tlsv1_record_layer *rl); 64 int tlsv1_record_send(struct tlsv1_record_layer *rl, u8 content_type, u8 *buf, 67 int tlsv1_record_receive(struct tlsv1_record_layer *rl,
|
H A D | tlsv1_client.c | 64 if (tls_prf(conn->rl.tls_version, 78 key_block_len = 2 * (conn->rl.hash_size + conn->rl.key_material_len); 79 if (conn->rl.tls_version == TLS_VERSION_1) 80 key_block_len += 2 * conn->rl.iv_size; 81 if (tls_prf(conn->rl.tls_version, 94 os_memcpy(conn->rl.write_mac_secret, pos, conn->rl.hash_size); 95 pos += conn->rl.hash_size; 97 os_memcpy(conn->rl [all...] |
H A D | tlsv1_server.c | 71 if (tls_prf(conn->rl.tls_version, 85 key_block_len = 2 * (conn->rl.hash_size + conn->rl.key_material_len + 86 conn->rl.iv_size); 87 if (tls_prf(conn->rl.tls_version, 100 os_memcpy(conn->rl.read_mac_secret, pos, conn->rl.hash_size); 101 pos += conn->rl.hash_size; 103 os_memcpy(conn->rl.write_mac_secret, pos, conn->rl [all...] |
H A D | tlsv1_server_write.c | 85 WPA_PUT_BE16(pos, conn->rl.tls_version); 139 if (tlsv1_record_send(&conn->rl, TLS_CONTENT_TYPE_HANDSHAKE, 163 suite = tls_get_cipher_suite(conn->rl.cipher_suite); 224 if (tlsv1_record_send(&conn->rl, TLS_CONTENT_TYPE_HANDSHAKE, 254 suite = tls_get_cipher_suite(conn->rl.cipher_suite); 260 if (!tls_server_key_exchange_allowed(conn->rl.cipher_suite)) { 443 if (conn->rl.tls_version >= TLS_VERSION_1_2) { 446 conn->rl.tls_version, conn->client_random, 494 conn->rl.tls_version, conn->client_random, 550 if (tlsv1_record_send(&conn->rl, TLS_CONTENT_TYPE_HANDSHAK [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_record.c | 21 * @rl: Pointer to TLS record layer data 30 int tlsv1_record_set_cipher_suite(struct tlsv1_record_layer *rl, argument 38 rl->cipher_suite = cipher_suite; 45 rl->hash_alg = CRYPTO_HASH_ALG_HMAC_MD5; 46 rl->hash_size = MD5_MAC_LEN; 48 rl->hash_alg = CRYPTO_HASH_ALG_HMAC_SHA1; 49 rl->hash_size = SHA1_MAC_LEN; 51 rl->hash_alg = CRYPTO_HASH_ALG_HMAC_SHA256; 52 rl->hash_size = SHA256_MAC_LEN; 59 rl 75 tlsv1_record_change_write_cipher(struct tlsv1_record_layer *rl) argument 109 tlsv1_record_change_read_cipher(struct tlsv1_record_layer *rl) argument 150 tlsv1_record_send(struct tlsv1_record_layer *rl, u8 content_type, u8 *buf, size_t buf_size, const u8 *payload, size_t payload_len, size_t *out_len) argument 278 tlsv1_record_receive(struct tlsv1_record_layer *rl, const u8 *in_data, size_t in_len, u8 *out_data, size_t *out_len, u8 *alert) argument [all...] |
H A D | tlsv1_record.h | 60 int tlsv1_record_set_cipher_suite(struct tlsv1_record_layer *rl, 62 int tlsv1_record_change_write_cipher(struct tlsv1_record_layer *rl); 63 int tlsv1_record_change_read_cipher(struct tlsv1_record_layer *rl); 64 int tlsv1_record_send(struct tlsv1_record_layer *rl, u8 content_type, u8 *buf, 67 int tlsv1_record_receive(struct tlsv1_record_layer *rl,
|
H A D | tlsv1_client.c | 64 if (tls_prf(conn->rl.tls_version, 78 key_block_len = 2 * (conn->rl.hash_size + conn->rl.key_material_len); 79 if (conn->rl.tls_version == TLS_VERSION_1) 80 key_block_len += 2 * conn->rl.iv_size; 81 if (tls_prf(conn->rl.tls_version, 94 os_memcpy(conn->rl.write_mac_secret, pos, conn->rl.hash_size); 95 pos += conn->rl.hash_size; 97 os_memcpy(conn->rl [all...] |
H A D | tlsv1_server.c | 71 if (tls_prf(conn->rl.tls_version, 85 key_block_len = 2 * (conn->rl.hash_size + conn->rl.key_material_len + 86 conn->rl.iv_size); 87 if (tls_prf(conn->rl.tls_version, 100 os_memcpy(conn->rl.read_mac_secret, pos, conn->rl.hash_size); 101 pos += conn->rl.hash_size; 103 os_memcpy(conn->rl.write_mac_secret, pos, conn->rl [all...] |
H A D | tlsv1_server_write.c | 85 WPA_PUT_BE16(pos, conn->rl.tls_version); 139 if (tlsv1_record_send(&conn->rl, TLS_CONTENT_TYPE_HANDSHAKE, 163 suite = tls_get_cipher_suite(conn->rl.cipher_suite); 224 if (tlsv1_record_send(&conn->rl, TLS_CONTENT_TYPE_HANDSHAKE, 254 suite = tls_get_cipher_suite(conn->rl.cipher_suite); 260 if (!tls_server_key_exchange_allowed(conn->rl.cipher_suite)) { 443 if (conn->rl.tls_version >= TLS_VERSION_1_2) { 446 conn->rl.tls_version, conn->client_random, 494 conn->rl.tls_version, conn->client_random, 550 if (tlsv1_record_send(&conn->rl, TLS_CONTENT_TYPE_HANDSHAK [all...] |
/external/clang/test/CodeGen/ |
H A D | arm-atomics-m.c | 30 long long rl; local 31 __atomic_load(&l, &rl, memory_order_seq_cst); 33 rl = 0; 34 __atomic_store(&l, &rl, memory_order_seq_cst);
|
H A D | arm-atomics-m0.c | 30 long long rl; local 31 __atomic_load(&l, &rl, memory_order_seq_cst); 33 rl = 0; 34 __atomic_store(&l, &rl, memory_order_seq_cst);
|
H A D | arm-atomics.c | 32 long long rl; local 33 __atomic_load(&l, &rl, memory_order_seq_cst); 35 rl = 0; 36 __atomic_store(&l, &rl, memory_order_seq_cst);
|
H A D | arm-asm-variable.c | 9 register uint32_t rl asm("r1"); 17 : [_rl] "=&r" (rl), [_rh] "=&r" (rh) \
|
/external/nist-sip/java/gov/nist/javax/sip/parser/ |
H A D | RequestLineParser.java | 89 RequestLine rl = rlp.parse(); 90 System.out.println("encoded = " + rl.encode());
|
/external/wpa_supplicant_8/hostapd/src/utils/ |
H A D | pcsc_funcs.h | 36 #define scard_umts_auth(s, r, a, r2, rl, i, c, a2) -1
|
/external/wpa_supplicant_8/src/utils/ |
H A D | pcsc_funcs.h | 36 #define scard_umts_auth(s, r, a, r2, rl, i, c, a2) -1
|
/external/wpa_supplicant_8/wpa_supplicant/src/utils/ |
H A D | pcsc_funcs.h | 36 #define scard_umts_auth(s, r, a, r2, rl, i, c, a2) -1
|
/external/libxml2/ |
H A D | regressions.py | 74 rl = len(res) 76 if el != rl: 77 print 'Length of expected is %d, result is %d' % (el, rl) 79 for i in range(min(el, rl)): 83 if el > rl: 84 for i in range(rl, el): 87 elif rl > el: 88 for i in range (el, rl):
|