/external/tcpdump/ |
H A D | print-bfd.c | 101 u_int8_t auth_data; member in struct:bfd_auth_header_t
|
/external/chromium_org/chromeos/cryptohome/ |
H A D | homedir_methods.cc | 52 KeyAuthorizationData* auth_data = data->add_authorization_data(); local 55 auth_data->set_type( 59 auth_data->set_type( 70 KeyAuthorizationSecret* secret = auth_data->add_secrets();
|
/external/kernel-headers/original/uapi/linux/ |
H A D | ip.h | 114 __u8 auth_data[0]; /* Variable len but >=4. Mind the 64 bit alignment! */ member in struct:ip_auth_hdr
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | ikev2_common.c | 372 u8 *auth_data) 414 (const u8 **) &sign_data, &sign_len, auth_data) < 0) 366 ikev2_derive_auth_data(int prf_alg, const struct wpabuf *sign_msg, const u8 *ID, size_t ID_len, u8 ID_type, struct ikev2_keys *keys, int initiator, const u8 *shared_secret, size_t shared_secret_len, const u8 *nonce, size_t nonce_len, const u8 *key_pad, size_t key_pad_len, u8 *auth_data) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | ikev2.c | 539 u8 auth_data[IKEV2_MAX_HASH_LEN]; local 555 auth_data) < 0) { 568 os_memcmp_const(auth, auth_data, auth_len) != 0) { 573 auth_data, prf->hash_len);
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | ikev2.c | 607 u8 auth_data[IKEV2_MAX_HASH_LEN]; local 623 auth_data) < 0) { 636 os_memcmp_const(auth, auth_data, auth_len) != 0) { 641 auth_data, prf->hash_len);
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | ikev2_common.c | 372 u8 *auth_data) 414 (const u8 **) &sign_data, &sign_len, auth_data) < 0) 366 ikev2_derive_auth_data(int prf_alg, const struct wpabuf *sign_msg, const u8 *ID, size_t ID_len, u8 ID_type, struct ikev2_keys *keys, int initiator, const u8 *shared_secret, size_t shared_secret_len, const u8 *nonce, size_t nonce_len, const u8 *key_pad, size_t key_pad_len, u8 *auth_data) argument
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | ikev2.c | 539 u8 auth_data[IKEV2_MAX_HASH_LEN]; local 555 auth_data) < 0) { 568 os_memcmp_const(auth, auth_data, auth_len) != 0) { 573 auth_data, prf->hash_len);
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | ikev2.c | 607 u8 auth_data[IKEV2_MAX_HASH_LEN]; local 623 auth_data) < 0) { 636 os_memcmp_const(auth, auth_data, auth_len) != 0) { 641 auth_data, prf->hash_len);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | ikev2_common.c | 372 u8 *auth_data) 414 (const u8 **) &sign_data, &sign_len, auth_data) < 0) 366 ikev2_derive_auth_data(int prf_alg, const struct wpabuf *sign_msg, const u8 *ID, size_t ID_len, u8 ID_type, struct ikev2_keys *keys, int initiator, const u8 *shared_secret, size_t shared_secret_len, const u8 *nonce, size_t nonce_len, const u8 *key_pad, size_t key_pad_len, u8 *auth_data) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | ikev2.c | 539 u8 auth_data[IKEV2_MAX_HASH_LEN]; local 555 auth_data) < 0) { 568 os_memcmp_const(auth, auth_data, auth_len) != 0) { 573 auth_data, prf->hash_len);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | ikev2.c | 607 u8 auth_data[IKEV2_MAX_HASH_LEN]; local 623 auth_data) < 0) { 636 os_memcmp_const(auth, auth_data, auth_len) != 0) { 641 auth_data, prf->hash_len);
|
/external/openssl/crypto/bio/ |
H A D | bss_dgram.c | 876 int auth_data = 0, auth_forward = 0; local 914 if (*p == OPENSSL_SCTP_DATA_CHUNK_TYPE) auth_data = 1; 920 OPENSSL_assert(auth_data); 1190 int ii, auth_data = 0, auth_forward = 0; local 1204 if (*p == OPENSSL_SCTP_DATA_CHUNK_TYPE) auth_data = 1; 1210 if (!auth_data || !auth_forward)
|