/external/tcpdump/ |
H A D | print-bfd.c | 100 u_int8_t auth_len; member in struct:bfd_auth_header_t 256 bfd_auth_header->auth_len);
|
/external/srtp/srtp/ |
H A D | ekt.c | 251 * The function call srtcp_ekt_trailer(ekt, auth_len, auth_tag ) 262 unsigned *auth_len, 261 srtcp_ekt_trailer(ekt_stream_t ekt, unsigned *auth_len, void **auth_tag, void *tag_copy) argument
|
H A D | srtp.c | 1639 unsigned auth_len; local 1722 auth_len = *pkt_octet_len - tag_len; 1723 auth_tag = (uint8_t *)hdr + auth_len; 1737 auth_len += tag_len; 1781 auth_len, tmp_tag);
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | ikev2.c | 556 u8 method, const u8 *auth, size_t auth_len) 571 size_t auth_len) 601 if (auth_len != prf->hash_len || 602 os_memcmp(auth, auth_data, auth_len) != 0) { 605 auth, auth_len); 621 const u8 *auth, size_t auth_len) 630 if (auth_len < 4) { 638 auth_len -= 4; 641 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len); 646 auth_len); 555 ikev2_process_auth_cert(struct ikev2_responder_data *data, u8 method, const u8 *auth, size_t auth_len) argument 569 ikev2_process_auth_secret(struct ikev2_responder_data *data, u8 method, const u8 *auth, size_t auth_len) argument 620 ikev2_process_auth(struct ikev2_responder_data *data, const u8 *auth, size_t auth_len) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | ikev2.c | 590 u8 method, const u8 *auth, size_t auth_len) 605 size_t auth_len) 635 if (auth_len != prf->hash_len || 636 os_memcmp(auth, auth_data, auth_len) != 0) { 639 auth, auth_len); 653 const u8 *auth, size_t auth_len) 662 if (auth_len < 4) { 670 auth_len -= 4; 673 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len); 678 auth_len); 589 ikev2_process_auth_cert(struct ikev2_initiator_data *data, u8 method, const u8 *auth, size_t auth_len) argument 603 ikev2_process_auth_secret(struct ikev2_initiator_data *data, u8 method, const u8 *auth, size_t auth_len) argument 652 ikev2_process_auth(struct ikev2_initiator_data *data, const u8 *auth, size_t auth_len) argument [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | ikev2.c | 556 u8 method, const u8 *auth, size_t auth_len) 571 size_t auth_len) 601 if (auth_len != prf->hash_len || 602 os_memcmp(auth, auth_data, auth_len) != 0) { 605 auth, auth_len); 621 const u8 *auth, size_t auth_len) 630 if (auth_len < 4) { 638 auth_len -= 4; 641 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len); 646 auth_len); 555 ikev2_process_auth_cert(struct ikev2_responder_data *data, u8 method, const u8 *auth, size_t auth_len) argument 569 ikev2_process_auth_secret(struct ikev2_responder_data *data, u8 method, const u8 *auth, size_t auth_len) argument 620 ikev2_process_auth(struct ikev2_responder_data *data, const u8 *auth, size_t auth_len) argument [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | ikev2.c | 590 u8 method, const u8 *auth, size_t auth_len) 605 size_t auth_len) 635 if (auth_len != prf->hash_len || 636 os_memcmp(auth, auth_data, auth_len) != 0) { 639 auth, auth_len); 653 const u8 *auth, size_t auth_len) 662 if (auth_len < 4) { 670 auth_len -= 4; 673 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len); 678 auth_len); 589 ikev2_process_auth_cert(struct ikev2_initiator_data *data, u8 method, const u8 *auth, size_t auth_len) argument 603 ikev2_process_auth_secret(struct ikev2_initiator_data *data, u8 method, const u8 *auth, size_t auth_len) argument 652 ikev2_process_auth(struct ikev2_initiator_data *data, const u8 *auth, size_t auth_len) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | ikev2.c | 556 u8 method, const u8 *auth, size_t auth_len) 571 size_t auth_len) 601 if (auth_len != prf->hash_len || 602 os_memcmp(auth, auth_data, auth_len) != 0) { 605 auth, auth_len); 621 const u8 *auth, size_t auth_len) 630 if (auth_len < 4) { 638 auth_len -= 4; 641 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len); 646 auth_len); 555 ikev2_process_auth_cert(struct ikev2_responder_data *data, u8 method, const u8 *auth, size_t auth_len) argument 569 ikev2_process_auth_secret(struct ikev2_responder_data *data, u8 method, const u8 *auth, size_t auth_len) argument 620 ikev2_process_auth(struct ikev2_responder_data *data, const u8 *auth, size_t auth_len) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | ikev2.c | 590 u8 method, const u8 *auth, size_t auth_len) 605 size_t auth_len) 635 if (auth_len != prf->hash_len || 636 os_memcmp(auth, auth_data, auth_len) != 0) { 639 auth, auth_len); 653 const u8 *auth, size_t auth_len) 662 if (auth_len < 4) { 670 auth_len -= 4; 673 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len); 678 auth_len); 589 ikev2_process_auth_cert(struct ikev2_initiator_data *data, u8 method, const u8 *auth, size_t auth_len) argument 603 ikev2_process_auth_secret(struct ikev2_initiator_data *data, u8 method, const u8 *auth, size_t auth_len) argument 652 ikev2_process_auth(struct ikev2_initiator_data *data, const u8 *auth, size_t auth_len) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | ikev2_common.h | 311 size_t auth_len; member in struct:ikev2_payloads
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | ikev2_common.h | 311 size_t auth_len; member in struct:ikev2_payloads
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | ikev2_common.h | 311 size_t auth_len; member in struct:ikev2_payloads
|
/external/chromium/net/base/ |
H A D | net_util.cc | 1623 int auth_len = host_and_port_end - host_and_port_begin; local 1625 url_parse::Component auth_component(0, auth_len);
|