/external/tcpdump/ |
H A D | print-bfd.c | 100 u_int8_t auth_len; member in struct:bfd_auth_header_t 260 bfd_auth_header->auth_len);
|
/external/srtp/srtp/ |
H A D | ekt.c | 251 * The function call srtcp_ekt_trailer(ekt, auth_len, auth_tag ) 262 unsigned *auth_len, 261 srtcp_ekt_trailer(ekt_stream_t ekt, unsigned *auth_len, void **auth_tag, void *tag_copy) argument
|
H A D | srtp.c | 1639 unsigned auth_len; local 1722 auth_len = *pkt_octet_len - tag_len; 1723 auth_tag = (uint8_t *)hdr + auth_len; 1737 auth_len += tag_len; 1781 auth_len, tmp_tag);
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_eke_common.h | 75 int auth_len; member in struct:eap_eke_session
|
H A D | ikev2_common.h | 307 size_t auth_len; member in struct:ikev2_payloads
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_eke_common.h | 75 int auth_len; member in struct:eap_eke_session
|
H A D | ikev2_common.h | 307 size_t auth_len; member in struct:ikev2_payloads
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_eke_common.h | 75 int auth_len; member in struct:eap_eke_session
|
H A D | ikev2_common.h | 307 size_t auth_len; member in struct:ikev2_payloads
|
/external/openssh/ |
H A D | cipher.c | 66 u_int auth_len; member in struct:sshcipher 139 if (auth_only && c->auth_len == 0) 178 return (c->auth_len);
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | ikev2.c | 522 u8 method, const u8 *auth, size_t auth_len) 537 size_t auth_len) 567 if (auth_len != prf->hash_len || 568 os_memcmp_const(auth, auth_data, auth_len) != 0) { 571 auth, auth_len); 587 const u8 *auth, size_t auth_len) 596 if (auth_len < 4) { 604 auth_len -= 4; 607 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len); 612 auth_len); 521 ikev2_process_auth_cert(struct ikev2_responder_data *data, u8 method, const u8 *auth, size_t auth_len) argument 535 ikev2_process_auth_secret(struct ikev2_responder_data *data, u8 method, const u8 *auth, size_t auth_len) argument 586 ikev2_process_auth(struct ikev2_responder_data *data, const u8 *auth, size_t auth_len) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | ikev2.c | 590 u8 method, const u8 *auth, size_t auth_len) 605 size_t auth_len) 635 if (auth_len != prf->hash_len || 636 os_memcmp_const(auth, auth_data, auth_len) != 0) { 639 auth, auth_len); 653 const u8 *auth, size_t auth_len) 662 if (auth_len < 4) { 670 auth_len -= 4; 673 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len); 678 auth_len); 589 ikev2_process_auth_cert(struct ikev2_initiator_data *data, u8 method, const u8 *auth, size_t auth_len) argument 603 ikev2_process_auth_secret(struct ikev2_initiator_data *data, u8 method, const u8 *auth, size_t auth_len) argument 652 ikev2_process_auth(struct ikev2_initiator_data *data, const u8 *auth, size_t auth_len) argument [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | ikev2.c | 522 u8 method, const u8 *auth, size_t auth_len) 537 size_t auth_len) 567 if (auth_len != prf->hash_len || 568 os_memcmp_const(auth, auth_data, auth_len) != 0) { 571 auth, auth_len); 587 const u8 *auth, size_t auth_len) 596 if (auth_len < 4) { 604 auth_len -= 4; 607 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len); 612 auth_len); 521 ikev2_process_auth_cert(struct ikev2_responder_data *data, u8 method, const u8 *auth, size_t auth_len) argument 535 ikev2_process_auth_secret(struct ikev2_responder_data *data, u8 method, const u8 *auth, size_t auth_len) argument 586 ikev2_process_auth(struct ikev2_responder_data *data, const u8 *auth, size_t auth_len) argument [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | ikev2.c | 590 u8 method, const u8 *auth, size_t auth_len) 605 size_t auth_len) 635 if (auth_len != prf->hash_len || 636 os_memcmp_const(auth, auth_data, auth_len) != 0) { 639 auth, auth_len); 653 const u8 *auth, size_t auth_len) 662 if (auth_len < 4) { 670 auth_len -= 4; 673 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len); 678 auth_len); 589 ikev2_process_auth_cert(struct ikev2_initiator_data *data, u8 method, const u8 *auth, size_t auth_len) argument 603 ikev2_process_auth_secret(struct ikev2_initiator_data *data, u8 method, const u8 *auth, size_t auth_len) argument 652 ikev2_process_auth(struct ikev2_initiator_data *data, const u8 *auth, size_t auth_len) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | ikev2.c | 522 u8 method, const u8 *auth, size_t auth_len) 537 size_t auth_len) 567 if (auth_len != prf->hash_len || 568 os_memcmp_const(auth, auth_data, auth_len) != 0) { 571 auth, auth_len); 587 const u8 *auth, size_t auth_len) 596 if (auth_len < 4) { 604 auth_len -= 4; 607 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len); 612 auth_len); 521 ikev2_process_auth_cert(struct ikev2_responder_data *data, u8 method, const u8 *auth, size_t auth_len) argument 535 ikev2_process_auth_secret(struct ikev2_responder_data *data, u8 method, const u8 *auth, size_t auth_len) argument 586 ikev2_process_auth(struct ikev2_responder_data *data, const u8 *auth, size_t auth_len) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | ikev2.c | 590 u8 method, const u8 *auth, size_t auth_len) 605 size_t auth_len) 635 if (auth_len != prf->hash_len || 636 os_memcmp_const(auth, auth_data, auth_len) != 0) { 639 auth, auth_len); 653 const u8 *auth, size_t auth_len) 662 if (auth_len < 4) { 670 auth_len -= 4; 673 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len); 678 auth_len); 589 ikev2_process_auth_cert(struct ikev2_initiator_data *data, u8 method, const u8 *auth, size_t auth_len) argument 603 ikev2_process_auth_secret(struct ikev2_initiator_data *data, u8 method, const u8 *auth, size_t auth_len) argument 652 ikev2_process_auth(struct ikev2_initiator_data *data, const u8 *auth, size_t auth_len) argument [all...] |