Home
last modified time | relevance | path

Searched refs:auth_len (Results 1 – 17 of 17) sorted by relevance

/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/
Dwpa_auth_ft.c71 const u8 *auth, const size_t auth_len, in wpa_ft_rrb_decrypt() argument
76 size_t ad_len[3] = { ETH_ALEN, auth_len, sizeof(type) }; in wpa_ft_rrb_decrypt()
82 wpa_hexdump(MSG_DEBUG, "FT(RRB): authenticated TLVs", auth, auth_len); in wpa_ft_rrb_decrypt()
475 const u8 *auth, const size_t auth_len, in wpa_ft_rrb_encrypt() argument
479 size_t ad_len[3] = { ETH_ALEN, auth_len, sizeof(type) }; in wpa_ft_rrb_encrypt()
486 wpa_hexdump(MSG_DEBUG, "FT(RRB): authenticated TLVs", auth, auth_len); in wpa_ft_rrb_encrypt()
527 size_t plain_len = 0, auth_len = 0; in wpa_ft_rrb_build() local
535 if (wpa_ft_rrb_lin(tlvs_auth, NULL, NULL, &auth, &auth_len) < 0) in wpa_ft_rrb_build()
538 *packet_len = sizeof(u16) + auth_len + plain_len; in wpa_ft_rrb_build()
550 tmp = os_realloc(auth, auth_len + pad_len); in wpa_ft_rrb_build()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/
Dwpa_auth_ft.c72 const u8 *auth, const size_t auth_len, in wpa_ft_rrb_decrypt() argument
77 size_t ad_len[3] = { ETH_ALEN, auth_len, sizeof(type) }; in wpa_ft_rrb_decrypt()
83 wpa_hexdump(MSG_DEBUG, "FT(RRB): authenticated TLVs", auth, auth_len); in wpa_ft_rrb_decrypt()
476 const u8 *auth, const size_t auth_len, in wpa_ft_rrb_encrypt() argument
480 size_t ad_len[3] = { ETH_ALEN, auth_len, sizeof(type) }; in wpa_ft_rrb_encrypt()
487 wpa_hexdump(MSG_DEBUG, "FT(RRB): authenticated TLVs", auth, auth_len); in wpa_ft_rrb_encrypt()
528 size_t plain_len = 0, auth_len = 0; in wpa_ft_rrb_build() local
536 if (wpa_ft_rrb_lin(tlvs_auth, NULL, NULL, &auth, &auth_len) < 0) in wpa_ft_rrb_build()
539 *packet_len = sizeof(u16) + auth_len + plain_len; in wpa_ft_rrb_build()
551 tmp = os_realloc(auth, auth_len + pad_len); in wpa_ft_rrb_build()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/
Dikev2.c523 u8 method, const u8 *auth, size_t auth_len) in ikev2_process_auth_cert() argument
538 size_t auth_len) in ikev2_process_auth_secret() argument
568 if (auth_len != prf->hash_len || in ikev2_process_auth_secret()
569 os_memcmp_const(auth, auth_data, auth_len) != 0) { in ikev2_process_auth_secret()
572 auth, auth_len); in ikev2_process_auth_secret()
588 const u8 *auth, size_t auth_len) in ikev2_process_auth() argument
597 if (auth_len < 4) { in ikev2_process_auth()
605 auth_len -= 4; in ikev2_process_auth()
608 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len); in ikev2_process_auth()
613 auth_len); in ikev2_process_auth()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/
Dikev2.c589 u8 method, const u8 *auth, size_t auth_len) in ikev2_process_auth_cert() argument
604 size_t auth_len) in ikev2_process_auth_secret() argument
634 if (auth_len != prf->hash_len || in ikev2_process_auth_secret()
635 os_memcmp_const(auth, auth_data, auth_len) != 0) { in ikev2_process_auth_secret()
638 auth, auth_len); in ikev2_process_auth_secret()
652 const u8 *auth, size_t auth_len) in ikev2_process_auth() argument
661 if (auth_len < 4) { in ikev2_process_auth()
669 auth_len -= 4; in ikev2_process_auth()
672 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len); in ikev2_process_auth()
677 auth_len); in ikev2_process_auth()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/
Dikev2.c589 u8 method, const u8 *auth, size_t auth_len) in ikev2_process_auth_cert() argument
604 size_t auth_len) in ikev2_process_auth_secret() argument
634 if (auth_len != prf->hash_len || in ikev2_process_auth_secret()
635 os_memcmp_const(auth, auth_data, auth_len) != 0) { in ikev2_process_auth_secret()
638 auth, auth_len); in ikev2_process_auth_secret()
652 const u8 *auth, size_t auth_len) in ikev2_process_auth() argument
661 if (auth_len < 4) { in ikev2_process_auth()
669 auth_len -= 4; in ikev2_process_auth()
672 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len); in ikev2_process_auth()
677 auth_len); in ikev2_process_auth()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/
Dikev2.c521 u8 method, const u8 *auth, size_t auth_len) in ikev2_process_auth_cert() argument
536 size_t auth_len) in ikev2_process_auth_secret() argument
566 if (auth_len != prf->hash_len || in ikev2_process_auth_secret()
567 os_memcmp_const(auth, auth_data, auth_len) != 0) { in ikev2_process_auth_secret()
570 auth, auth_len); in ikev2_process_auth_secret()
586 const u8 *auth, size_t auth_len) in ikev2_process_auth() argument
595 if (auth_len < 4) { in ikev2_process_auth()
603 auth_len -= 4; in ikev2_process_auth()
606 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len); in ikev2_process_auth()
611 auth_len); in ikev2_process_auth()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/
Deap_eke_common.c411 os_memset(zeros, 0, sess->auth_len); in eap_eke_shared_secret()
412 if (eap_eke_prf(sess->prf, zeros, sess->auth_len, modexp, dh->prime_len, in eap_eke_shared_secret()
416 sess->shared_secret, sess->auth_len); in eap_eke_shared_secret()
691 sess->ka, sess->auth_len); in eap_eke_auth()
693 return eap_eke_prf(sess->prf, sess->ka, sess->auth_len, in eap_eke_auth()
709 sess->auth_len = eap_eke_auth_len(prf); in eap_eke_session_init()
713 if (sess->prf_len < 0 || sess->nonce_len < 0 || sess->auth_len < 0 || in eap_eke_session_init()
Deap_eke_common.h75 int auth_len; member
Dikev2_common.h307 size_t auth_len; member
Dikev2_common.c313 payloads->auth_len = pdatalen; in ikev2_parse_payloads()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/
Deap_eke_common.c411 os_memset(zeros, 0, sess->auth_len); in eap_eke_shared_secret()
412 if (eap_eke_prf(sess->prf, zeros, sess->auth_len, modexp, dh->prime_len, in eap_eke_shared_secret()
416 sess->shared_secret, sess->auth_len); in eap_eke_shared_secret()
691 sess->ka, sess->auth_len); in eap_eke_auth()
693 return eap_eke_prf(sess->prf, sess->ka, sess->auth_len, in eap_eke_auth()
709 sess->auth_len = eap_eke_auth_len(prf); in eap_eke_session_init()
713 if (sess->prf_len < 0 || sess->nonce_len < 0 || sess->auth_len < 0 || in eap_eke_session_init()
Deap_eke_common.h75 int auth_len; member
Dikev2_common.h307 size_t auth_len; member
Dikev2_common.c313 payloads->auth_len = pdatalen; in ikev2_parse_payloads()
/third_party/ffmpeg/libavformat/
Dsapdec.c94 int addr_type, auth_len; in sap_read_header() local
120 auth_len = recvbuf[1]; in sap_read_header()
127 pos += auth_len * 4; in sap_read_header()
/third_party/lwip/src/apps/smtp/
Dsmtp.c1072 size_t auth_len; in smtp_prepare_auth_or_mail() local
1077 auth_len = smtp_base64_encode(&s->tx_buf[SMTP_CMD_AUTHPLAIN_1_LEN], in smtp_prepare_auth_or_mail()
1080 …LWIP_ASSERT("string too long", auth_len <= (SMTP_TX_BUF_LEN-SMTP_CMD_AUTHPLAIN_1_LEN-SMTP_CMD_AUTH… in smtp_prepare_auth_or_mail()
1081 … *tx_buf_len = (u16_t)(SMTP_CMD_AUTHPLAIN_1_LEN + SMTP_CMD_AUTHPLAIN_2_LEN + (u16_t)auth_len); in smtp_prepare_auth_or_mail()
1082 SMEMCPY(&s->tx_buf[SMTP_CMD_AUTHPLAIN_1_LEN + auth_len], SMTP_CMD_AUTHPLAIN_2, in smtp_prepare_auth_or_mail()
/third_party/gstreamer/gstplugins_bad/ext/sctp/usrsctp/usrsctplib/netinet/
Dsctp_input.c1571 int auth_skipped, uint32_t auth_offset, uint32_t auth_len,
1590 int auth_skipped, uint32_t auth_offset, uint32_t auth_len, in sctp_process_cookie_existing() argument
2001 auth_skipped, auth_offset, auth_len, in sctp_process_cookie_existing()
2162 int auth_skipped, uint32_t auth_offset, uint32_t auth_len, argument
2371 if (auth_len <= SCTP_CHUNK_BUFFER_SIZE) {
2372 auth = (struct sctp_auth_chunk *)sctp_m_getptr(m, auth_offset, auth_len, auth_chunk_buf);
2566 int auth_skipped, uint32_t auth_offset, uint32_t auth_len, argument
2888 auth_skipped, auth_offset, auth_len,
2899 &notification, auth_skipped, auth_offset, auth_len,
4757 uint32_t auth_offset = 0, auth_len = 0; local
[all …]