/external/openssh/ |
H A D | session.h | 51 char *auth_data; member in struct:Session
|
/external/tcpdump/ |
H A D | print-bfd.c | 101 u_int8_t auth_data; member in struct:bfd_auth_header_t
|
/external/kernel-headers/original/uapi/linux/ |
H A D | ip.h | 114 __u8 auth_data[0]; /* Variable len but >=4. Mind the 64 bit alignment! */ member in struct:ip_auth_hdr
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | ikev2_common.c | 376 u8 *auth_data) 418 (const u8 **) &sign_data, &sign_len, auth_data) < 0) 370 ikev2_derive_auth_data(int prf_alg, const struct wpabuf *sign_msg, const u8 *ID, size_t ID_len, u8 ID_type, struct ikev2_keys *keys, int initiator, const u8 *shared_secret, size_t shared_secret_len, const u8 *nonce, size_t nonce_len, const u8 *key_pad, size_t key_pad_len, u8 *auth_data) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | ikev2.c | 539 u8 auth_data[IKEV2_MAX_HASH_LEN]; local 555 auth_data) < 0) { 568 os_memcmp_const(auth, auth_data, auth_len) != 0) { 573 auth_data, prf->hash_len);
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | ikev2.c | 607 u8 auth_data[IKEV2_MAX_HASH_LEN]; local 623 auth_data) < 0) { 636 os_memcmp_const(auth, auth_data, auth_len) != 0) { 641 auth_data, prf->hash_len);
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | ikev2_common.c | 376 u8 *auth_data) 418 (const u8 **) &sign_data, &sign_len, auth_data) < 0) 370 ikev2_derive_auth_data(int prf_alg, const struct wpabuf *sign_msg, const u8 *ID, size_t ID_len, u8 ID_type, struct ikev2_keys *keys, int initiator, const u8 *shared_secret, size_t shared_secret_len, const u8 *nonce, size_t nonce_len, const u8 *key_pad, size_t key_pad_len, u8 *auth_data) argument
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | ikev2.c | 539 u8 auth_data[IKEV2_MAX_HASH_LEN]; local 555 auth_data) < 0) { 568 os_memcmp_const(auth, auth_data, auth_len) != 0) { 573 auth_data, prf->hash_len);
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | ikev2.c | 607 u8 auth_data[IKEV2_MAX_HASH_LEN]; local 623 auth_data) < 0) { 636 os_memcmp_const(auth, auth_data, auth_len) != 0) { 641 auth_data, prf->hash_len);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | ikev2_common.c | 376 u8 *auth_data) 418 (const u8 **) &sign_data, &sign_len, auth_data) < 0) 370 ikev2_derive_auth_data(int prf_alg, const struct wpabuf *sign_msg, const u8 *ID, size_t ID_len, u8 ID_type, struct ikev2_keys *keys, int initiator, const u8 *shared_secret, size_t shared_secret_len, const u8 *nonce, size_t nonce_len, const u8 *key_pad, size_t key_pad_len, u8 *auth_data) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | ikev2.c | 539 u8 auth_data[IKEV2_MAX_HASH_LEN]; local 555 auth_data) < 0) { 568 os_memcmp_const(auth, auth_data, auth_len) != 0) { 573 auth_data, prf->hash_len);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | ikev2.c | 607 u8 auth_data[IKEV2_MAX_HASH_LEN]; local 623 auth_data) < 0) { 636 os_memcmp_const(auth, auth_data, auth_len) != 0) { 641 auth_data, prf->hash_len);
|