Searched refs:auth_len (Results 1 - 25 of 25) sorted by relevance

/external/tcpdump/
H A Dprint-bfd.c100 u_int8_t auth_len; member in struct:bfd_auth_header_t
260 bfd_auth_header->auth_len);
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Dikev2.c522 u8 method, const u8 *auth, size_t auth_len)
537 size_t auth_len)
567 if (auth_len != prf->hash_len ||
568 os_memcmp_const(auth, auth_data, auth_len) != 0) {
571 auth, auth_len);
587 const u8 *auth, size_t auth_len)
596 if (auth_len < 4) {
604 auth_len -= 4;
607 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len);
612 auth_len);
521 ikev2_process_auth_cert(struct ikev2_responder_data *data, u8 method, const u8 *auth, size_t auth_len) argument
535 ikev2_process_auth_secret(struct ikev2_responder_data *data, u8 method, const u8 *auth, size_t auth_len) argument
586 ikev2_process_auth(struct ikev2_responder_data *data, const u8 *auth, size_t auth_len) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Dikev2.c590 u8 method, const u8 *auth, size_t auth_len)
605 size_t auth_len)
635 if (auth_len != prf->hash_len ||
636 os_memcmp_const(auth, auth_data, auth_len) != 0) {
639 auth, auth_len);
653 const u8 *auth, size_t auth_len)
662 if (auth_len < 4) {
670 auth_len -= 4;
673 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len);
678 auth_len);
589 ikev2_process_auth_cert(struct ikev2_initiator_data *data, u8 method, const u8 *auth, size_t auth_len) argument
603 ikev2_process_auth_secret(struct ikev2_initiator_data *data, u8 method, const u8 *auth, size_t auth_len) argument
652 ikev2_process_auth(struct ikev2_initiator_data *data, const u8 *auth, size_t auth_len) argument
[all...]
/external/wpa_supplicant_8/src/eap_peer/
H A Dikev2.c522 u8 method, const u8 *auth, size_t auth_len)
537 size_t auth_len)
567 if (auth_len != prf->hash_len ||
568 os_memcmp_const(auth, auth_data, auth_len) != 0) {
571 auth, auth_len);
587 const u8 *auth, size_t auth_len)
596 if (auth_len < 4) {
604 auth_len -= 4;
607 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len);
612 auth_len);
521 ikev2_process_auth_cert(struct ikev2_responder_data *data, u8 method, const u8 *auth, size_t auth_len) argument
535 ikev2_process_auth_secret(struct ikev2_responder_data *data, u8 method, const u8 *auth, size_t auth_len) argument
586 ikev2_process_auth(struct ikev2_responder_data *data, const u8 *auth, size_t auth_len) argument
[all...]
/external/wpa_supplicant_8/src/eap_server/
H A Dikev2.c590 u8 method, const u8 *auth, size_t auth_len)
605 size_t auth_len)
635 if (auth_len != prf->hash_len ||
636 os_memcmp_const(auth, auth_data, auth_len) != 0) {
639 auth, auth_len);
653 const u8 *auth, size_t auth_len)
662 if (auth_len < 4) {
670 auth_len -= 4;
673 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len);
678 auth_len);
589 ikev2_process_auth_cert(struct ikev2_initiator_data *data, u8 method, const u8 *auth, size_t auth_len) argument
603 ikev2_process_auth_secret(struct ikev2_initiator_data *data, u8 method, const u8 *auth, size_t auth_len) argument
652 ikev2_process_auth(struct ikev2_initiator_data *data, const u8 *auth, size_t auth_len) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Dikev2.c522 u8 method, const u8 *auth, size_t auth_len)
537 size_t auth_len)
567 if (auth_len != prf->hash_len ||
568 os_memcmp_const(auth, auth_data, auth_len) != 0) {
571 auth, auth_len);
587 const u8 *auth, size_t auth_len)
596 if (auth_len < 4) {
604 auth_len -= 4;
607 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len);
612 auth_len);
521 ikev2_process_auth_cert(struct ikev2_responder_data *data, u8 method, const u8 *auth, size_t auth_len) argument
535 ikev2_process_auth_secret(struct ikev2_responder_data *data, u8 method, const u8 *auth, size_t auth_len) argument
586 ikev2_process_auth(struct ikev2_responder_data *data, const u8 *auth, size_t auth_len) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Dikev2.c590 u8 method, const u8 *auth, size_t auth_len)
605 size_t auth_len)
635 if (auth_len != prf->hash_len ||
636 os_memcmp_const(auth, auth_data, auth_len) != 0) {
639 auth, auth_len);
653 const u8 *auth, size_t auth_len)
662 if (auth_len < 4) {
670 auth_len -= 4;
673 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len);
678 auth_len);
589 ikev2_process_auth_cert(struct ikev2_initiator_data *data, u8 method, const u8 *auth, size_t auth_len) argument
603 ikev2_process_auth_secret(struct ikev2_initiator_data *data, u8 method, const u8 *auth, size_t auth_len) argument
652 ikev2_process_auth(struct ikev2_initiator_data *data, const u8 *auth, size_t auth_len) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_eke_common.c441 os_memset(zeros, 0, sess->auth_len);
442 if (eap_eke_prf(sess->prf, zeros, sess->auth_len, modexp, dh->prime_len,
446 sess->shared_secret, sess->auth_len);
723 sess->ka, sess->auth_len);
725 return eap_eke_prf(sess->prf, sess->ka, sess->auth_len,
745 sess->auth_len = eap_eke_auth_len(prf);
746 if (sess->auth_len < 0)
H A Deap_eke_common.h75 int auth_len; member in struct:eap_eke_session
H A Dikev2_common.h307 size_t auth_len; member in struct:ikev2_payloads
H A Dikev2_common.c310 payloads->auth_len = pdatalen;
/external/wpa_supplicant_8/src/eap_common/
H A Deap_eke_common.c441 os_memset(zeros, 0, sess->auth_len);
442 if (eap_eke_prf(sess->prf, zeros, sess->auth_len, modexp, dh->prime_len,
446 sess->shared_secret, sess->auth_len);
723 sess->ka, sess->auth_len);
725 return eap_eke_prf(sess->prf, sess->ka, sess->auth_len,
745 sess->auth_len = eap_eke_auth_len(prf);
746 if (sess->auth_len < 0)
H A Deap_eke_common.h75 int auth_len; member in struct:eap_eke_session
H A Dikev2_common.h307 size_t auth_len; member in struct:ikev2_payloads
H A Dikev2_common.c310 payloads->auth_len = pdatalen;
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_eke_common.c441 os_memset(zeros, 0, sess->auth_len);
442 if (eap_eke_prf(sess->prf, zeros, sess->auth_len, modexp, dh->prime_len,
446 sess->shared_secret, sess->auth_len);
723 sess->ka, sess->auth_len);
725 return eap_eke_prf(sess->prf, sess->ka, sess->auth_len,
745 sess->auth_len = eap_eke_auth_len(prf);
746 if (sess->auth_len < 0)
H A Deap_eke_common.h75 int auth_len; member in struct:eap_eke_session
H A Dikev2_common.h307 size_t auth_len; member in struct:ikev2_payloads
H A Dikev2_common.c310 payloads->auth_len = pdatalen;
/external/chromium_org/third_party/libsrtp/srtp/srtp/
H A Dekt.c254 * The function call srtcp_ekt_trailer(ekt, auth_len, auth_tag )
265 unsigned *auth_len,
264 srtcp_ekt_trailer(ekt_stream_t ekt, unsigned *auth_len, void **auth_tag, void *tag_copy) argument
H A Dsrtp.c1842 unsigned auth_len; local
1916 auth_len = *pkt_octet_len - tag_len;
1917 auth_tag = (uint8_t *)hdr + auth_len;
1931 auth_len += tag_len;
1975 auth_len, tmp_tag);
/external/srtp/srtp/
H A Dekt.c251 * The function call srtcp_ekt_trailer(ekt, auth_len, auth_tag )
262 unsigned *auth_len,
261 srtcp_ekt_trailer(ekt_stream_t ekt, unsigned *auth_len, void **auth_tag, void *tag_copy) argument
H A Dsrtp.c1639 unsigned auth_len; local
1722 auth_len = *pkt_octet_len - tag_len;
1723 auth_tag = (uint8_t *)hdr + auth_len;
1737 auth_len += tag_len;
1781 auth_len, tmp_tag);
/external/chromium_org/third_party/usrsctp/usrsctplib/netinet/
H A Dsctp_input.c1478 int auth_skipped, uint32_t auth_offset, uint32_t auth_len,
1497 int auth_skipped, uint32_t auth_offset, uint32_t auth_len,
1904 auth_skipped, auth_offset, auth_len,
2062 int auth_skipped, uint32_t auth_offset, uint32_t auth_len,
2268 sctp_m_getptr(m, auth_offset, auth_len, auth_chunk_buf);
2454 int auth_skipped, uint32_t auth_offset, uint32_t auth_len,
2754 auth_skipped, auth_offset, auth_len,
2765 &notification, auth_skipped, auth_offset, auth_len,
4518 uint32_t auth_offset = 0, auth_len = 0; local
4568 auth_len
1492 sctp_process_cookie_existing(struct mbuf *m, int iphlen, int offset, struct sockaddr *src, struct sockaddr *dst, struct sctphdr *sh, struct sctp_state_cookie *cookie, int cookie_len, struct sctp_inpcb *inp, struct sctp_tcb *stcb, struct sctp_nets **netp, struct sockaddr *init_src, int *notification, int auth_skipped, uint32_t auth_offset, uint32_t auth_len, uint8_t use_mflowid, uint32_t mflowid, uint32_t vrf_id, uint16_t port) argument
2057 sctp_process_cookie_new(struct mbuf *m, int iphlen, int offset, struct sockaddr *src, struct sockaddr *dst, struct sctphdr *sh, struct sctp_state_cookie *cookie, int cookie_len, struct sctp_inpcb *inp, struct sctp_nets **netp, struct sockaddr *init_src, int *notification, int auth_skipped, uint32_t auth_offset, uint32_t auth_len, uint8_t use_mflowid, uint32_t mflowid, uint32_t vrf_id, uint16_t port) argument
2450 sctp_handle_cookie_echo(struct mbuf *m, int iphlen, int offset, struct sockaddr *src, struct sockaddr *dst, struct sctphdr *sh, struct sctp_cookie_echo_chunk *cp, struct sctp_inpcb **inp_p, struct sctp_tcb **stcb, struct sctp_nets **netp, int auth_skipped, uint32_t auth_offset, uint32_t auth_len, struct sctp_tcb **locked_tcb, uint8_t use_mflowid, uint32_t mflowid, uint32_t vrf_id, uint16_t port) argument
[all...]
/external/chromium_org/net/base/
H A Dnet_util.cc348 int auth_len = host_and_port_end - host_and_port_begin; local
350 url::Component auth_component(0, auth_len);

Completed in 312 milliseconds