Searched refs:auth_len (Results 1 - 22 of 22) sorted by relevance

/external/tcpdump/
H A Dprint-bfd.c92 uint8_t auth_len; member in struct:bfd_auth_header_t
253 bfd_auth_header->auth_len));
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Dikev2.c522 u8 method, const u8 *auth, size_t auth_len)
537 size_t auth_len)
567 if (auth_len != prf->hash_len ||
568 os_memcmp_const(auth, auth_data, auth_len) != 0) {
571 auth, auth_len);
587 const u8 *auth, size_t auth_len)
596 if (auth_len < 4) {
604 auth_len -= 4;
607 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len);
612 auth_len);
521 ikev2_process_auth_cert(struct ikev2_responder_data *data, u8 method, const u8 *auth, size_t auth_len) argument
535 ikev2_process_auth_secret(struct ikev2_responder_data *data, u8 method, const u8 *auth, size_t auth_len) argument
586 ikev2_process_auth(struct ikev2_responder_data *data, const u8 *auth, size_t auth_len) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Dikev2.c590 u8 method, const u8 *auth, size_t auth_len)
605 size_t auth_len)
635 if (auth_len != prf->hash_len ||
636 os_memcmp_const(auth, auth_data, auth_len) != 0) {
639 auth, auth_len);
653 const u8 *auth, size_t auth_len)
662 if (auth_len < 4) {
670 auth_len -= 4;
673 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len);
678 auth_len);
589 ikev2_process_auth_cert(struct ikev2_initiator_data *data, u8 method, const u8 *auth, size_t auth_len) argument
603 ikev2_process_auth_secret(struct ikev2_initiator_data *data, u8 method, const u8 *auth, size_t auth_len) argument
652 ikev2_process_auth(struct ikev2_initiator_data *data, const u8 *auth, size_t auth_len) argument
[all...]
/external/wpa_supplicant_8/src/eap_peer/
H A Dikev2.c522 u8 method, const u8 *auth, size_t auth_len)
537 size_t auth_len)
567 if (auth_len != prf->hash_len ||
568 os_memcmp_const(auth, auth_data, auth_len) != 0) {
571 auth, auth_len);
587 const u8 *auth, size_t auth_len)
596 if (auth_len < 4) {
604 auth_len -= 4;
607 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len);
612 auth_len);
521 ikev2_process_auth_cert(struct ikev2_responder_data *data, u8 method, const u8 *auth, size_t auth_len) argument
535 ikev2_process_auth_secret(struct ikev2_responder_data *data, u8 method, const u8 *auth, size_t auth_len) argument
586 ikev2_process_auth(struct ikev2_responder_data *data, const u8 *auth, size_t auth_len) argument
[all...]
/external/wpa_supplicant_8/src/eap_server/
H A Dikev2.c590 u8 method, const u8 *auth, size_t auth_len)
605 size_t auth_len)
635 if (auth_len != prf->hash_len ||
636 os_memcmp_const(auth, auth_data, auth_len) != 0) {
639 auth, auth_len);
653 const u8 *auth, size_t auth_len)
662 if (auth_len < 4) {
670 auth_len -= 4;
673 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len);
678 auth_len);
589 ikev2_process_auth_cert(struct ikev2_initiator_data *data, u8 method, const u8 *auth, size_t auth_len) argument
603 ikev2_process_auth_secret(struct ikev2_initiator_data *data, u8 method, const u8 *auth, size_t auth_len) argument
652 ikev2_process_auth(struct ikev2_initiator_data *data, const u8 *auth, size_t auth_len) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Dikev2.c522 u8 method, const u8 *auth, size_t auth_len)
537 size_t auth_len)
567 if (auth_len != prf->hash_len ||
568 os_memcmp_const(auth, auth_data, auth_len) != 0) {
571 auth, auth_len);
587 const u8 *auth, size_t auth_len)
596 if (auth_len < 4) {
604 auth_len -= 4;
607 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len);
612 auth_len);
521 ikev2_process_auth_cert(struct ikev2_responder_data *data, u8 method, const u8 *auth, size_t auth_len) argument
535 ikev2_process_auth_secret(struct ikev2_responder_data *data, u8 method, const u8 *auth, size_t auth_len) argument
586 ikev2_process_auth(struct ikev2_responder_data *data, const u8 *auth, size_t auth_len) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Dikev2.c590 u8 method, const u8 *auth, size_t auth_len)
605 size_t auth_len)
635 if (auth_len != prf->hash_len ||
636 os_memcmp_const(auth, auth_data, auth_len) != 0) {
639 auth, auth_len);
653 const u8 *auth, size_t auth_len)
662 if (auth_len < 4) {
670 auth_len -= 4;
673 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len);
678 auth_len);
589 ikev2_process_auth_cert(struct ikev2_initiator_data *data, u8 method, const u8 *auth, size_t auth_len) argument
603 ikev2_process_auth_secret(struct ikev2_initiator_data *data, u8 method, const u8 *auth, size_t auth_len) argument
652 ikev2_process_auth(struct ikev2_initiator_data *data, const u8 *auth, size_t auth_len) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_eke_common.c433 os_memset(zeros, 0, sess->auth_len);
434 if (eap_eke_prf(sess->prf, zeros, sess->auth_len, modexp, dh->prime_len,
438 sess->shared_secret, sess->auth_len);
713 sess->ka, sess->auth_len);
715 return eap_eke_prf(sess->prf, sess->ka, sess->auth_len,
731 sess->auth_len = eap_eke_auth_len(prf);
735 if (sess->prf_len < 0 || sess->nonce_len < 0 || sess->auth_len < 0 ||
H A Deap_eke_common.h75 int auth_len; member in struct:eap_eke_session
H A Dikev2_common.h307 size_t auth_len; member in struct:ikev2_payloads
H A Dikev2_common.c313 payloads->auth_len = pdatalen;
/external/wpa_supplicant_8/src/eap_common/
H A Deap_eke_common.c433 os_memset(zeros, 0, sess->auth_len);
434 if (eap_eke_prf(sess->prf, zeros, sess->auth_len, modexp, dh->prime_len,
438 sess->shared_secret, sess->auth_len);
713 sess->ka, sess->auth_len);
715 return eap_eke_prf(sess->prf, sess->ka, sess->auth_len,
731 sess->auth_len = eap_eke_auth_len(prf);
735 if (sess->prf_len < 0 || sess->nonce_len < 0 || sess->auth_len < 0 ||
H A Deap_eke_common.h75 int auth_len; member in struct:eap_eke_session
H A Dikev2_common.h307 size_t auth_len; member in struct:ikev2_payloads
H A Dikev2_common.c313 payloads->auth_len = pdatalen;
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_eke_common.c433 os_memset(zeros, 0, sess->auth_len);
434 if (eap_eke_prf(sess->prf, zeros, sess->auth_len, modexp, dh->prime_len,
438 sess->shared_secret, sess->auth_len);
713 sess->ka, sess->auth_len);
715 return eap_eke_prf(sess->prf, sess->ka, sess->auth_len,
731 sess->auth_len = eap_eke_auth_len(prf);
735 if (sess->prf_len < 0 || sess->nonce_len < 0 || sess->auth_len < 0 ||
H A Deap_eke_common.h75 int auth_len; member in struct:eap_eke_session
H A Dikev2_common.h307 size_t auth_len; member in struct:ikev2_payloads
H A Dikev2_common.c313 payloads->auth_len = pdatalen;
/external/openssh/
H A Dcipher.c66 u_int auth_len; member in struct:sshcipher
139 if (auth_only && c->auth_len == 0)
178 return (c->auth_len);
/external/dhcpcd-6.8.2/
H A Ddhcp.c718 uint8_t *n_params = NULL, auth_len; local
1021 auth_len = 0;
1036 auth_len = (uint8_t)alen;
1041 *p++ = auth_len;
1043 p += auth_len;
1055 if (ifo->auth.options & DHCPCD_AUTH_SEND && auth_len != 0)
1057 m, len, 4, type, auth, auth_len);
1141 size_t auth_len; local
1184 auth = get_option(ifp->ctx, dhcp, DHO_AUTHENTICATION, &auth_len);
1188 auth, auth_len)
2835 size_t auth_len; local
[all...]
H A Ddhcp6.c516 uint16_t u16, n_options, auth_len; local
721 auth_len = 0;
733 auth_len = (uint16_t)alen;
734 len += sizeof(*o) + auth_len;
942 if (ifo->auth.options & DHCPCD_AUTH_SEND && auth_len != 0) {
945 o->len = htons((uint16_t)auth_len);

Completed in 588 milliseconds