Searched refs:encrypted_len (Results 1 – 5 of 5) sorted by relevance
/external/wpa_supplicant_8/src/eap_common/ |
D | ikev2_common.h | 311 size_t encrypted_len; member 322 const u8 *encrypted, size_t encrypted_len,
|
D | ikev2_common.c | 324 payloads->encrypted_len = pdatalen; in ikev2_parse_payloads() 432 const u8 *encrypted, size_t encrypted_len, in ikev2_decrypt_payload() argument 462 if (encrypted_len < iv_len + 1 + integ_alg->hash_len) { in ikev2_decrypt_payload() 470 end = encrypted + encrypted_len; in ikev2_decrypt_payload()
|
/external/wpa_supplicant_8/src/eap_server/ |
D | ikev2.c | 449 size_t encrypted_len, u8 next_payload) in ikev2_process_sa_init_encr() argument 458 hdr, encrypted, encrypted_len, in ikev2_process_sa_init_encr() 499 pl->encrypted_len, in ikev2_process_sa_init() 723 pl->encrypted_len, &decrypted_len); in ikev2_process_sa_auth()
|
/external/openssh/ |
D | sshkey.c | 3210 u_int blocksize, rounds, nkeys, encrypted_len, check1, check2; in sshkey_parse_private2() local 3277 (r = sshbuf_get_u32(decoded, &encrypted_len)) != 0) in sshkey_parse_private2() 3306 if (encrypted_len < blocksize || (encrypted_len % blocksize) != 0) { in sshkey_parse_private2() 3330 if ((r = sshbuf_reserve(decrypted, encrypted_len, &dp)) != 0 || in sshkey_parse_private2() 3341 if ((r = sshbuf_consume(decoded, encrypted_len)) != 0) in sshkey_parse_private2()
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | ikev2.c | 657 pl->encrypted_len, &decrypted_len); in ikev2_process_sa_auth()
|