/external/wpa_supplicant_8/src/eap_common/ |
D | eap_ikev2_common.c | 73 size_t icv_len; in eap_ikev2_validate_icv() local 83 icv_len = integ->hash_len; in eap_ikev2_validate_icv() 85 if (end - pos < (int) icv_len) { in eap_ikev2_validate_icv() 98 wpabuf_len(msg) - icv_len, icv) < 0) { in eap_ikev2_validate_icv() 103 if (os_memcmp_const(icv, end - icv_len, icv_len) != 0) { in eap_ikev2_validate_icv() 106 icv, icv_len); in eap_ikev2_validate_icv() 108 end - icv_len, icv_len); in eap_ikev2_validate_icv() 115 return icv_len; in eap_ikev2_validate_icv()
|
D | eap_eke_common.c | 587 size_t block_size, icv_len, pad; in eap_eke_prot() local 596 icv_len = SHA1_MAC_LEN; in eap_eke_prot() 598 icv_len = SHA256_MAC_LEN; in eap_eke_prot() 606 if (*prot_len < block_size + data_len + pad + icv_len) { in eap_eke_prot() 630 pos += icv_len; in eap_eke_prot() 641 size_t block_size, icv_len; in eap_eke_decrypt_prot() local 650 icv_len = SHA1_MAC_LEN; in eap_eke_decrypt_prot() 652 icv_len = SHA256_MAC_LEN; in eap_eke_decrypt_prot() 656 if (prot_len < 2 * block_size + icv_len || in eap_eke_decrypt_prot() 657 (prot_len - icv_len) % block_size) in eap_eke_decrypt_prot() [all …]
|
/external/libnl/lib/route/link/ |
D | macsec.c | 56 uint16_t icv_len; member 109 info->icv_len = DEFAULT_ICV_LEN; in macsec_alloc() 148 info->icv_len = nla_get_u8(tb[IFLA_MACSEC_ICV_LEN]); in macsec_parse() 278 info->cipher_suite, info->icv_len); in macsec_dump_details() 315 if (info->cipher_suite != MACSEC_DEFAULT_CIPHER_ID || info->icv_len != DEFAULT_ICV_LEN) { in macsec_put_attrs() 317 NLA_PUT_U8(msg, IFLA_MACSEC_ICV_LEN, info->icv_len); in macsec_put_attrs() 370 diff |= MACSEC_DIFF(ICV_LEN, a->icv_len != b->icv_len); in macsec_compare() 551 int rtnl_link_macsec_set_icv_len(struct rtnl_link *link, uint16_t icv_len) in rtnl_link_macsec_set_icv_len() argument 557 if (icv_len > MACSEC_STD_ICV_LEN) in rtnl_link_macsec_set_icv_len() 560 info->icv_len = icv_len; in rtnl_link_macsec_set_icv_len() [all …]
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_ikev2.c | 139 size_t send_len, plen, icv_len = 0; in eap_ikev2_build_msg() local 170 icv_len = integ->hash_len; in eap_ikev2_build_msg() 172 plen += icv_len; in eap_ikev2_build_msg() 193 msg, len, wpabuf_put(resp, icv_len)); in eap_ikev2_build_msg() 250 int icv_len = eap_ikev2_validate_icv( in eap_ikev2_process_icv() local 253 if (icv_len < 0) in eap_ikev2_process_icv() 256 *end -= icv_len; in eap_ikev2_process_icv()
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_ikev2.c | 137 size_t send_len, plen, icv_len = 0; in eap_ikev2_build_msg() local 166 icv_len = integ->hash_len; in eap_ikev2_build_msg() 168 plen += icv_len; in eap_ikev2_build_msg() 189 msg, len, wpabuf_put(req, icv_len)); in eap_ikev2_build_msg() 262 int icv_len = eap_ikev2_validate_icv( in eap_ikev2_process_icv() local 265 if (icv_len < 0) in eap_ikev2_process_icv() 268 *end -= icv_len; in eap_ikev2_process_icv()
|
/external/iproute2/ip/ |
D | ipmacsec.c | 51 __u8 icv_len; member 587 static void print_cipher_suite(const char *prefix, __u64 cid, __u8 icv_len) in print_cipher_suite() argument 590 cs_id_to_name(cid), icv_len); in print_cipher_suite() 1175 if (cipher.icv_len) in macsec_parse_opt() 1177 get_icvlen(&cipher.icv_len, *argv); in macsec_parse_opt() 1286 if (cipher.icv_len) in macsec_parse_opt() 1288 &cipher.icv_len, sizeof(cipher.icv_len)); in macsec_parse_opt()
|
/external/kernel-headers/original/uapi/rdma/ |
D | ib_user_ioctl_verbs.h | 157 __u32 icv_len; member
|
/external/wpa_supplicant_8/src/pae/ |
D | ieee802_1x_kay.c | 65 .icv_len = DEFAULT_ICV_LEN, 1853 if (mka_alg_tbl[participant->kay->mka_algindex].icv_len != in ieee802_1x_mka_get_icv_length() 1858 length += mka_alg_tbl[participant->kay->mka_algindex].icv_len; in ieee802_1x_mka_get_icv_length() 1876 if (mka_alg_tbl[participant->kay->mka_algindex].icv_len != in ieee802_1x_mka_encode_icv_body() 1930 < mka_alg_tbl[participant->kay->mka_algindex].icv_len) in ieee802_1x_mka_decode_icv_body() 3167 if (len < mka_alg_tbl[kay->mka_algindex].icv_len || in ieee802_1x_kay_mkpdu_sanity_check() 3170 buf, len - mka_alg_tbl[kay->mka_algindex].icv_len, icv)) { in ieee802_1x_kay_mkpdu_sanity_check() 3183 msg_icv, mka_alg_tbl[kay->mka_algindex].icv_len); in ieee802_1x_kay_mkpdu_sanity_check() 3185 mka_alg_tbl[kay->mka_algindex].icv_len) != 0) { in ieee802_1x_kay_mkpdu_sanity_check() 3189 icv, mka_alg_tbl[kay->mka_algindex].icv_len); in ieee802_1x_kay_mkpdu_sanity_check()
|
D | ieee802_1x_kay_i.h | 67 size_t icv_len; member
|
/external/libnl/lib/xfrm/ |
D | sa.c | 1665 …ams (struct xfrmnl_sa* sa, char* alg_name, unsigned int* key_len, unsigned int* icv_len, char* key) in xfrmnl_sa_get_aead_params() argument 1673 if (icv_len) in xfrmnl_sa_get_aead_params() 1674 *icv_len = sa->aead->alg_icv_len; in xfrmnl_sa_get_aead_params() 1684 …t xfrmnl_sa* sa, const char* alg_name, unsigned int key_len, unsigned int icv_len, const char* key) in xfrmnl_sa_set_aead_params() argument 1698 b->alg_icv_len = icv_len; in xfrmnl_sa_set_aead_params()
|