/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
D | ikev2.c | 595 u8 method, const u8 *auth, size_t auth_len) in ikev2_process_auth_cert() argument 610 size_t auth_len) in ikev2_process_auth_secret() argument 640 if (auth_len != prf->hash_len || in ikev2_process_auth_secret() 641 os_memcmp(auth, auth_data, auth_len) != 0) { in ikev2_process_auth_secret() 644 auth, auth_len); in ikev2_process_auth_secret() 658 const u8 *auth, size_t auth_len) in ikev2_process_auth() argument 667 if (auth_len < 4) { in ikev2_process_auth() 675 auth_len -= 4; in ikev2_process_auth() 678 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len); in ikev2_process_auth() 683 auth_len); in ikev2_process_auth() [all …]
|
/external/wpa_supplicant_8/src/eap_server/ |
D | ikev2.c | 596 u8 method, const u8 *auth, size_t auth_len) in ikev2_process_auth_cert() argument 611 size_t auth_len) in ikev2_process_auth_secret() argument 641 if (auth_len != prf->hash_len || in ikev2_process_auth_secret() 642 os_memcmp(auth, auth_data, auth_len) != 0) { in ikev2_process_auth_secret() 645 auth, auth_len); in ikev2_process_auth_secret() 659 const u8 *auth, size_t auth_len) in ikev2_process_auth() argument 668 if (auth_len < 4) { in ikev2_process_auth() 676 auth_len -= 4; in ikev2_process_auth() 679 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len); in ikev2_process_auth() 684 auth_len); in ikev2_process_auth() [all …]
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | ikev2.c | 562 u8 method, const u8 *auth, size_t auth_len) in ikev2_process_auth_cert() argument 577 size_t auth_len) in ikev2_process_auth_secret() argument 607 if (auth_len != prf->hash_len || in ikev2_process_auth_secret() 608 os_memcmp(auth, auth_data, auth_len) != 0) { in ikev2_process_auth_secret() 611 auth, auth_len); in ikev2_process_auth_secret() 627 const u8 *auth, size_t auth_len) in ikev2_process_auth() argument 636 if (auth_len < 4) { in ikev2_process_auth() 644 auth_len -= 4; in ikev2_process_auth() 647 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len); in ikev2_process_auth() 652 auth_len); in ikev2_process_auth() [all …]
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
D | ikev2.c | 561 u8 method, const u8 *auth, size_t auth_len) in ikev2_process_auth_cert() argument 576 size_t auth_len) in ikev2_process_auth_secret() argument 606 if (auth_len != prf->hash_len || in ikev2_process_auth_secret() 607 os_memcmp(auth, auth_data, auth_len) != 0) { in ikev2_process_auth_secret() 610 auth, auth_len); in ikev2_process_auth_secret() 626 const u8 *auth, size_t auth_len) in ikev2_process_auth() argument 635 if (auth_len < 4) { in ikev2_process_auth() 643 auth_len -= 4; in ikev2_process_auth() 646 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len); in ikev2_process_auth() 651 auth_len); in ikev2_process_auth() [all …]
|
/external/tcpdump/ |
D | print-bfd.c | 100 u_int8_t auth_len; member 256 bfd_auth_header->auth_len); in bfd_print()
|
/external/srtp/srtp/ |
D | ekt.c | 262 unsigned *auth_len, in srtcp_ekt_trailer() argument
|
D | srtp.c | 1639 unsigned auth_len; in srtp_unprotect_rtcp() local 1722 auth_len = *pkt_octet_len - tag_len; in srtp_unprotect_rtcp() 1723 auth_tag = (uint8_t *)hdr + auth_len; in srtp_unprotect_rtcp() 1737 auth_len += tag_len; in srtp_unprotect_rtcp() 1781 auth_len, tmp_tag); in srtp_unprotect_rtcp()
|
/external/wpa_supplicant_8/src/eap_common/ |
D | ikev2_common.h | 317 size_t auth_len; member
|
D | ikev2_common.c | 381 payloads->auth_len = pdatalen; in ikev2_parse_payloads()
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
D | ikev2_common.h | 317 size_t auth_len; member
|
D | ikev2_common.c | 380 payloads->auth_len = pdatalen; in ikev2_parse_payloads()
|
/external/chromium/net/base/ |
D | net_util.cc | 1623 int auth_len = host_and_port_end - host_and_port_begin; in ParseHostAndPort() local 1625 url_parse::Component auth_component(0, auth_len); in ParseHostAndPort()
|