/external/tcpdump/ |
H A D | print-bfd.c | 100 u_int8_t auth_len; member in struct:bfd_auth_header_t 260 bfd_auth_header->auth_len);
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | ikev2.c | 522 u8 method, const u8 *auth, size_t auth_len) 537 size_t auth_len) 567 if (auth_len != prf->hash_len || 568 os_memcmp_const(auth, auth_data, auth_len) != 0) { 571 auth, auth_len); 587 const u8 *auth, size_t auth_len) 596 if (auth_len < 4) { 604 auth_len -= 4; 607 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len); 612 auth_len); 521 ikev2_process_auth_cert(struct ikev2_responder_data *data, u8 method, const u8 *auth, size_t auth_len) argument 535 ikev2_process_auth_secret(struct ikev2_responder_data *data, u8 method, const u8 *auth, size_t auth_len) argument 586 ikev2_process_auth(struct ikev2_responder_data *data, const u8 *auth, size_t auth_len) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | ikev2.c | 590 u8 method, const u8 *auth, size_t auth_len) 605 size_t auth_len) 635 if (auth_len != prf->hash_len || 636 os_memcmp_const(auth, auth_data, auth_len) != 0) { 639 auth, auth_len); 653 const u8 *auth, size_t auth_len) 662 if (auth_len < 4) { 670 auth_len -= 4; 673 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len); 678 auth_len); 589 ikev2_process_auth_cert(struct ikev2_initiator_data *data, u8 method, const u8 *auth, size_t auth_len) argument 603 ikev2_process_auth_secret(struct ikev2_initiator_data *data, u8 method, const u8 *auth, size_t auth_len) argument 652 ikev2_process_auth(struct ikev2_initiator_data *data, const u8 *auth, size_t auth_len) argument [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | ikev2.c | 522 u8 method, const u8 *auth, size_t auth_len) 537 size_t auth_len) 567 if (auth_len != prf->hash_len || 568 os_memcmp_const(auth, auth_data, auth_len) != 0) { 571 auth, auth_len); 587 const u8 *auth, size_t auth_len) 596 if (auth_len < 4) { 604 auth_len -= 4; 607 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len); 612 auth_len); 521 ikev2_process_auth_cert(struct ikev2_responder_data *data, u8 method, const u8 *auth, size_t auth_len) argument 535 ikev2_process_auth_secret(struct ikev2_responder_data *data, u8 method, const u8 *auth, size_t auth_len) argument 586 ikev2_process_auth(struct ikev2_responder_data *data, const u8 *auth, size_t auth_len) argument [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | ikev2.c | 590 u8 method, const u8 *auth, size_t auth_len) 605 size_t auth_len) 635 if (auth_len != prf->hash_len || 636 os_memcmp_const(auth, auth_data, auth_len) != 0) { 639 auth, auth_len); 653 const u8 *auth, size_t auth_len) 662 if (auth_len < 4) { 670 auth_len -= 4; 673 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len); 678 auth_len); 589 ikev2_process_auth_cert(struct ikev2_initiator_data *data, u8 method, const u8 *auth, size_t auth_len) argument 603 ikev2_process_auth_secret(struct ikev2_initiator_data *data, u8 method, const u8 *auth, size_t auth_len) argument 652 ikev2_process_auth(struct ikev2_initiator_data *data, const u8 *auth, size_t auth_len) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | ikev2.c | 522 u8 method, const u8 *auth, size_t auth_len) 537 size_t auth_len) 567 if (auth_len != prf->hash_len || 568 os_memcmp_const(auth, auth_data, auth_len) != 0) { 571 auth, auth_len); 587 const u8 *auth, size_t auth_len) 596 if (auth_len < 4) { 604 auth_len -= 4; 607 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len); 612 auth_len); 521 ikev2_process_auth_cert(struct ikev2_responder_data *data, u8 method, const u8 *auth, size_t auth_len) argument 535 ikev2_process_auth_secret(struct ikev2_responder_data *data, u8 method, const u8 *auth, size_t auth_len) argument 586 ikev2_process_auth(struct ikev2_responder_data *data, const u8 *auth, size_t auth_len) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | ikev2.c | 590 u8 method, const u8 *auth, size_t auth_len) 605 size_t auth_len) 635 if (auth_len != prf->hash_len || 636 os_memcmp_const(auth, auth_data, auth_len) != 0) { 639 auth, auth_len); 653 const u8 *auth, size_t auth_len) 662 if (auth_len < 4) { 670 auth_len -= 4; 673 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len); 678 auth_len); 589 ikev2_process_auth_cert(struct ikev2_initiator_data *data, u8 method, const u8 *auth, size_t auth_len) argument 603 ikev2_process_auth_secret(struct ikev2_initiator_data *data, u8 method, const u8 *auth, size_t auth_len) argument 652 ikev2_process_auth(struct ikev2_initiator_data *data, const u8 *auth, size_t auth_len) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_eke_common.c | 441 os_memset(zeros, 0, sess->auth_len); 442 if (eap_eke_prf(sess->prf, zeros, sess->auth_len, modexp, dh->prime_len, 446 sess->shared_secret, sess->auth_len); 723 sess->ka, sess->auth_len); 725 return eap_eke_prf(sess->prf, sess->ka, sess->auth_len, 745 sess->auth_len = eap_eke_auth_len(prf); 746 if (sess->auth_len < 0)
|
H A D | eap_eke_common.h | 75 int auth_len; member in struct:eap_eke_session
|
H A D | ikev2_common.h | 307 size_t auth_len; member in struct:ikev2_payloads
|
H A D | ikev2_common.c | 310 payloads->auth_len = pdatalen;
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_eke_common.c | 441 os_memset(zeros, 0, sess->auth_len); 442 if (eap_eke_prf(sess->prf, zeros, sess->auth_len, modexp, dh->prime_len, 446 sess->shared_secret, sess->auth_len); 723 sess->ka, sess->auth_len); 725 return eap_eke_prf(sess->prf, sess->ka, sess->auth_len, 745 sess->auth_len = eap_eke_auth_len(prf); 746 if (sess->auth_len < 0)
|
H A D | eap_eke_common.h | 75 int auth_len; member in struct:eap_eke_session
|
H A D | ikev2_common.h | 307 size_t auth_len; member in struct:ikev2_payloads
|
H A D | ikev2_common.c | 310 payloads->auth_len = pdatalen;
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_eke_common.c | 441 os_memset(zeros, 0, sess->auth_len); 442 if (eap_eke_prf(sess->prf, zeros, sess->auth_len, modexp, dh->prime_len, 446 sess->shared_secret, sess->auth_len); 723 sess->ka, sess->auth_len); 725 return eap_eke_prf(sess->prf, sess->ka, sess->auth_len, 745 sess->auth_len = eap_eke_auth_len(prf); 746 if (sess->auth_len < 0)
|
H A D | eap_eke_common.h | 75 int auth_len; member in struct:eap_eke_session
|
H A D | ikev2_common.h | 307 size_t auth_len; member in struct:ikev2_payloads
|
H A D | ikev2_common.c | 310 payloads->auth_len = pdatalen;
|
/external/chromium_org/third_party/libsrtp/srtp/srtp/ |
H A D | ekt.c | 254 * The function call srtcp_ekt_trailer(ekt, auth_len, auth_tag ) 265 unsigned *auth_len, 264 srtcp_ekt_trailer(ekt_stream_t ekt, unsigned *auth_len, void **auth_tag, void *tag_copy) argument
|
H A D | srtp.c | 1842 unsigned auth_len; local 1916 auth_len = *pkt_octet_len - tag_len; 1917 auth_tag = (uint8_t *)hdr + auth_len; 1931 auth_len += tag_len; 1975 auth_len, tmp_tag);
|
/external/srtp/srtp/ |
H A D | ekt.c | 251 * The function call srtcp_ekt_trailer(ekt, auth_len, auth_tag ) 262 unsigned *auth_len, 261 srtcp_ekt_trailer(ekt_stream_t ekt, unsigned *auth_len, void **auth_tag, void *tag_copy) argument
|
H A D | srtp.c | 1639 unsigned auth_len; local 1722 auth_len = *pkt_octet_len - tag_len; 1723 auth_tag = (uint8_t *)hdr + auth_len; 1737 auth_len += tag_len; 1781 auth_len, tmp_tag);
|
/external/chromium_org/third_party/usrsctp/usrsctplib/netinet/ |
H A D | sctp_input.c | 1478 int auth_skipped, uint32_t auth_offset, uint32_t auth_len, 1497 int auth_skipped, uint32_t auth_offset, uint32_t auth_len, 1904 auth_skipped, auth_offset, auth_len, 2062 int auth_skipped, uint32_t auth_offset, uint32_t auth_len, 2268 sctp_m_getptr(m, auth_offset, auth_len, auth_chunk_buf); 2454 int auth_skipped, uint32_t auth_offset, uint32_t auth_len, 2754 auth_skipped, auth_offset, auth_len, 2765 ¬ification, auth_skipped, auth_offset, auth_len, 4518 uint32_t auth_offset = 0, auth_len = 0; local 4568 auth_len 1492 sctp_process_cookie_existing(struct mbuf *m, int iphlen, int offset, struct sockaddr *src, struct sockaddr *dst, struct sctphdr *sh, struct sctp_state_cookie *cookie, int cookie_len, struct sctp_inpcb *inp, struct sctp_tcb *stcb, struct sctp_nets **netp, struct sockaddr *init_src, int *notification, int auth_skipped, uint32_t auth_offset, uint32_t auth_len, uint8_t use_mflowid, uint32_t mflowid, uint32_t vrf_id, uint16_t port) argument 2057 sctp_process_cookie_new(struct mbuf *m, int iphlen, int offset, struct sockaddr *src, struct sockaddr *dst, struct sctphdr *sh, struct sctp_state_cookie *cookie, int cookie_len, struct sctp_inpcb *inp, struct sctp_nets **netp, struct sockaddr *init_src, int *notification, int auth_skipped, uint32_t auth_offset, uint32_t auth_len, uint8_t use_mflowid, uint32_t mflowid, uint32_t vrf_id, uint16_t port) argument 2450 sctp_handle_cookie_echo(struct mbuf *m, int iphlen, int offset, struct sockaddr *src, struct sockaddr *dst, struct sctphdr *sh, struct sctp_cookie_echo_chunk *cp, struct sctp_inpcb **inp_p, struct sctp_tcb **stcb, struct sctp_nets **netp, int auth_skipped, uint32_t auth_offset, uint32_t auth_len, struct sctp_tcb **locked_tcb, uint8_t use_mflowid, uint32_t mflowid, uint32_t vrf_id, uint16_t port) argument [all...] |
/external/chromium_org/net/base/ |
H A D | net_util.cc | 348 int auth_len = host_and_port_end - host_and_port_begin; local 350 url::Component auth_component(0, auth_len);
|