/external/tcpdump/ |
D | print-bfd.c | 95 uint8_t auth_len; member 192 bfd_auth_header->auth_len)); in auth_print() 209 if (bfd_auth_header->auth_len < AUTH_PASSWORD_FIELD_MIN_LEN || in auth_print() 210 bfd_auth_header->auth_len > AUTH_PASSWORD_FIELD_MAX_LEN) { in auth_print() 212 bfd_auth_header->auth_len)); in auth_print() 218 if (fn_printn(ndo, pptr, bfd_auth_header->auth_len - 3, in auth_print() 239 if (bfd_auth_header->auth_len != AUTH_MD5_FIELD_LEN) { in auth_print() 241 bfd_auth_header->auth_len)); in auth_print() 270 if (bfd_auth_header->auth_len != AUTH_SHA1_FIELD_LEN) { in auth_print() 272 bfd_auth_header->auth_len)); in auth_print()
|
/external/wpa_supplicant_8/src/ap/ |
D | wpa_auth_ft.c | 72 const u8 *auth, const size_t auth_len, in wpa_ft_rrb_decrypt() argument 77 size_t ad_len[3] = { ETH_ALEN, auth_len, sizeof(type) }; in wpa_ft_rrb_decrypt() 83 wpa_hexdump(MSG_DEBUG, "FT(RRB): authenticated TLVs", auth, auth_len); in wpa_ft_rrb_decrypt() 476 const u8 *auth, const size_t auth_len, in wpa_ft_rrb_encrypt() argument 480 size_t ad_len[3] = { ETH_ALEN, auth_len, sizeof(type) }; in wpa_ft_rrb_encrypt() 487 wpa_hexdump(MSG_DEBUG, "FT(RRB): authenticated TLVs", auth, auth_len); in wpa_ft_rrb_encrypt() 528 size_t plain_len = 0, auth_len = 0; in wpa_ft_rrb_build() local 536 if (wpa_ft_rrb_lin(tlvs_auth, NULL, NULL, &auth, &auth_len) < 0) in wpa_ft_rrb_build() 539 *packet_len = sizeof(u16) + auth_len + plain_len; in wpa_ft_rrb_build() 551 tmp = os_realloc(auth, auth_len + pad_len); in wpa_ft_rrb_build() [all …]
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | ikev2.c | 523 u8 method, const u8 *auth, size_t auth_len) in ikev2_process_auth_cert() argument 538 size_t auth_len) in ikev2_process_auth_secret() argument 568 if (auth_len != prf->hash_len || in ikev2_process_auth_secret() 569 os_memcmp_const(auth, auth_data, auth_len) != 0) { in ikev2_process_auth_secret() 572 auth, auth_len); in ikev2_process_auth_secret() 588 const u8 *auth, size_t auth_len) in ikev2_process_auth() argument 597 if (auth_len < 4) { in ikev2_process_auth() 605 auth_len -= 4; in ikev2_process_auth() 608 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len); in ikev2_process_auth() 613 auth_len); in ikev2_process_auth() [all …]
|
/external/wpa_supplicant_8/src/eap_server/ |
D | ikev2.c | 589 u8 method, const u8 *auth, size_t auth_len) in ikev2_process_auth_cert() argument 604 size_t auth_len) in ikev2_process_auth_secret() argument 634 if (auth_len != prf->hash_len || in ikev2_process_auth_secret() 635 os_memcmp_const(auth, auth_data, auth_len) != 0) { in ikev2_process_auth_secret() 638 auth, auth_len); in ikev2_process_auth_secret() 652 const u8 *auth, size_t auth_len) in ikev2_process_auth() argument 661 if (auth_len < 4) { in ikev2_process_auth() 669 auth_len -= 4; in ikev2_process_auth() 672 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len); in ikev2_process_auth() 677 auth_len); in ikev2_process_auth() [all …]
|
/external/wpa_supplicant_8/src/eap_common/ |
D | eap_eke_common.c | 411 os_memset(zeros, 0, sess->auth_len); in eap_eke_shared_secret() 412 if (eap_eke_prf(sess->prf, zeros, sess->auth_len, modexp, dh->prime_len, in eap_eke_shared_secret() 416 sess->shared_secret, sess->auth_len); in eap_eke_shared_secret() 691 sess->ka, sess->auth_len); in eap_eke_auth() 693 return eap_eke_prf(sess->prf, sess->ka, sess->auth_len, in eap_eke_auth() 709 sess->auth_len = eap_eke_auth_len(prf); in eap_eke_session_init() 713 if (sess->prf_len < 0 || sess->nonce_len < 0 || sess->auth_len < 0 || in eap_eke_session_init()
|
D | eap_eke_common.h | 75 int auth_len; member
|
D | ikev2_common.h | 307 size_t auth_len; member
|
D | ikev2_common.c | 313 payloads->auth_len = pdatalen; in ikev2_parse_payloads()
|
/external/openssh/ |
D | cipher.c | 72 u_int auth_len; member 130 if (auth_only && c->auth_len == 0) in cipher_alg_list() 180 return (c->auth_len); in cipher_authlen()
|
/external/libsrtp2/srtp/ |
D | ekt.c | 270 unsigned *auth_len, in srtcp_ekt_trailer() argument
|
D | srtp.c | 4106 unsigned int auth_len; in srtp_unprotect_rtcp_mki() local 4245 auth_len = *pkt_octet_len - tag_len - mki_size; in srtp_unprotect_rtcp_mki() 4246 auth_tag = (uint8_t *)hdr + auth_len + mki_size; in srtp_unprotect_rtcp_mki() 4260 auth_len += tag_len; in srtp_unprotect_rtcp_mki() 4307 auth_len, tmp_tag); in srtp_unprotect_rtcp_mki()
|
/external/usrsctp/usrsctplib/netinet/ |
D | sctp_input.c | 1580 int auth_skipped, uint32_t auth_offset, uint32_t auth_len, 1599 int auth_skipped, uint32_t auth_offset, uint32_t auth_len, in sctp_process_cookie_existing() argument 2010 auth_skipped, auth_offset, auth_len, in sctp_process_cookie_existing() 2171 int auth_skipped, uint32_t auth_offset, uint32_t auth_len, argument 2380 if (auth_len <= SCTP_CHUNK_BUFFER_SIZE) { 2381 auth = (struct sctp_auth_chunk *)sctp_m_getptr(m, auth_offset, auth_len, auth_chunk_buf); 2575 int auth_skipped, uint32_t auth_offset, uint32_t auth_len, argument 2876 auth_skipped, auth_offset, auth_len, 2887 ¬ification, auth_skipped, auth_offset, auth_len, 4749 uint32_t auth_offset = 0, auth_len = 0; local [all …]
|