/external/scapy/scapy/layers/tls/crypto/ |
H A D | prf.py | 22 def _tls_P_hash(secret, seed, req_len, hm): 26 parameters have been added (hm and req_len): 32 - req_len : the length of data to be generated by iterating 40 n = (req_len + hash_len - 1) // hash_len 50 return res[:req_len] 53 def _tls_P_MD5(secret, seed, req_len): 54 return _tls_P_hash(secret, seed, req_len, _tls_hmac_algs["HMAC-MD5"]) 56 def _tls_P_SHA1(secret, seed, req_len): 57 return _tls_P_hash(secret, seed, req_len, _tls_hmac_algs["HMAC-SHA"]) 59 def _tls_P_SHA256(secret, seed, req_len) [all...] |
/external/valgrind/auxprogs/ |
H A D | valgrind-di-server.c | 732 ULong req_session_id = 0, req_offset = 0, req_len = 0; local 799 &req_offset, &req_len)) { 815 if (ok && (req_len == 0 || req_len > 4*1024*1024)) { 819 if (ok && req_len + req_offset > conn_state[conn_no].file_size) { 827 UChar* unzBuf = my_malloc(req_len); 829 unzBuf, req_len, req_offset); 830 if (nRead != req_len) { 845 UInt zLenMax = req_len + req_len / [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_mschapv2.c | 232 * @req_len: Length of the EAP-MSCHAPv2 data 240 size_t req_len, u8 id) 250 if (req_len < sizeof(*req) + 1) { 252 "(len %lu)", (unsigned long) req_len); 258 len = req_len - sizeof(*req) - 1; 337 * @req_len: Length of the EAP-MSCHAPv2 data 346 size_t req_len, u8 id) 353 len = req_len - sizeof(*req); 644 * @req_len: Length of the EAP-MSCHAPv2 data 653 size_t req_len, u 237 eap_mschapv2_challenge( struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, size_t req_len, u8 id) argument 342 eap_mschapv2_success(struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, size_t req_len, u8 id) argument 649 eap_mschapv2_failure(struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, size_t req_len, u8 id) argument [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_mschapv2.c | 232 * @req_len: Length of the EAP-MSCHAPv2 data 240 size_t req_len, u8 id) 250 if (req_len < sizeof(*req) + 1) { 252 "(len %lu)", (unsigned long) req_len); 258 len = req_len - sizeof(*req) - 1; 337 * @req_len: Length of the EAP-MSCHAPv2 data 346 size_t req_len, u8 id) 353 len = req_len - sizeof(*req); 644 * @req_len: Length of the EAP-MSCHAPv2 data 653 size_t req_len, u 237 eap_mschapv2_challenge( struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, size_t req_len, u8 id) argument 342 eap_mschapv2_success(struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, size_t req_len, u8 id) argument 649 eap_mschapv2_failure(struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, size_t req_len, u8 id) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_mschapv2.c | 232 * @req_len: Length of the EAP-MSCHAPv2 data 240 size_t req_len, u8 id) 250 if (req_len < sizeof(*req) + 1) { 252 "(len %lu)", (unsigned long) req_len); 258 len = req_len - sizeof(*req) - 1; 337 * @req_len: Length of the EAP-MSCHAPv2 data 346 size_t req_len, u8 id) 353 len = req_len - sizeof(*req); 644 * @req_len: Length of the EAP-MSCHAPv2 data 653 size_t req_len, u 237 eap_mschapv2_challenge( struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, size_t req_len, u8 id) argument 342 eap_mschapv2_success(struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, size_t req_len, u8 id) argument 649 eap_mschapv2_failure(struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, size_t req_len, u8 id) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_peap.c | 238 size_t req_len; local 249 req_len = wpabuf_len(buf); 251 req, req_len); 256 req_len -= sizeof(struct eap_hdr); 259 wpabuf_set(&msgbuf, req, req_len); 274 size_t req_len; local 290 req_len = wpabuf_len(buf); 293 req, req_len); 296 req_len -= sizeof(struct eap_hdr); 297 wpabuf_set(&msgbuf, req, req_len); 478 size_t req_len; local [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_peap.c | 238 size_t req_len; local 249 req_len = wpabuf_len(buf); 251 req, req_len); 256 req_len -= sizeof(struct eap_hdr); 259 wpabuf_set(&msgbuf, req, req_len); 274 size_t req_len; local 290 req_len = wpabuf_len(buf); 293 req, req_len); 296 req_len -= sizeof(struct eap_hdr); 297 wpabuf_set(&msgbuf, req, req_len); 478 size_t req_len; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_peap.c | 238 size_t req_len; local 249 req_len = wpabuf_len(buf); 251 req, req_len); 256 req_len -= sizeof(struct eap_hdr); 259 wpabuf_set(&msgbuf, req, req_len); 274 size_t req_len; local 290 req_len = wpabuf_len(buf); 293 req, req_len); 296 req_len -= sizeof(struct eap_hdr); 297 wpabuf_set(&msgbuf, req, req_len); 478 size_t req_len; local [all...] |
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_server_read.c | 50 const u8 *req, size_t req_len) 56 end = req + req_len; 49 tls_process_status_request_item(struct tlsv1_server *conn, const u8 *req, size_t req_len) argument
|
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_server_read.c | 50 const u8 *req, size_t req_len) 56 end = req + req_len; 49 tls_process_status_request_item(struct tlsv1_server *conn, const u8 *req, size_t req_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_server_read.c | 50 const u8 *req, size_t req_len) 56 end = req + req_len; 49 tls_process_status_request_item(struct tlsv1_server *conn, const u8 *req, size_t req_len) argument
|
/external/webrtc/webrtc/test/channel_transport/ |
H A D | udp_transport_impl.cc | 2549 int req_len = len - sizeof(*nlmp); 2551 if (req_len < 0 || len > status)
|