Searched refs:spi_size (Results 1 – 11 of 11) sorted by relevance
/external/ipsec-tools/src/racoon/ |
D | isakmp_inf.c | 404 if(notify->spi_size > 0) { 405 if (ntohs(notify->h.len) < sizeof(*notify) + notify->spi_size) { 410 spi = val2str((char *)(notify + 1), notify->spi_size); 416 ntohl(notify->doi), notify->proto_id, spi, notify->spi_size); 424 l = ntohs(notify->h.len) - sizeof(*notify) - notify->spi_size; 427 nraw += sizeof(*notify) + notify->spi_size; 483 if (tlen != num_spi * delete->spi_size) { 502 if (delete->spi_size != sizeof(isakmp_index)) { 506 delete->spi_size, delete->proto_id); 528 if (delete->spi_size != sizeof(u_int32_t)) { [all …]
|
D | isakmp.h | 206 u_int8_t spi_size; /* SPI Size */ member 315 u_int8_t spi_size; /* SPI Size */ member 379 u_int8_t spi_size; /* SPI Size */ member 422 u_int8_t spi_size; /* SPI Size */ member
|
D | security.c | 114 bp = (caddr_t)prop + sizeof(struct isakmp_pl_p) + prop->spi_size; 116 (sizeof(struct isakmp_pl_p) + prop->spi_size);
|
D | proposal.c | 777 if (sizeof(newpr->spi) < p->prop->spi_size) { 779 "invalid spi size %d.\n", p->prop->spi_size); 789 newpr->spisize = p->prop->spi_size; 793 spi -= p->prop->spi_size; 794 memcpy(spi, p->prop + 1, p->prop->spi_size); 805 t->prop->spi_size, t->prop->num_t,
|
D | ipsec_doi.c | 229 sizeof(struct isakmp_pl_p) + s->prop->spi_size; 251 + s->prop->spi_size; 347 prop->spi_size, prop->num_t); 1065 if (p->prop->spi_size != r->prop->spi_size) { 1068 p->prop->spi_size); 1375 if (check_spi_size(prop->proto_id, prop->spi_size) < 0) 1474 bp = (caddr_t)prop + sizeof(struct isakmp_pl_p) + prop->spi_size; 1476 - (sizeof(struct isakmp_pl_p) + prop->spi_size); 1581 newtlen += p->prop->spi_size; 1602 + p->prop->spi_size; [all …]
|
D | isakmp_quick.c | 1539 n->spi_size = sizeof(iph2->approval->head->spisize);
|
/external/tcpdump/ |
D | print-isakmp.c | 187 uint8_t spi_size; /* SPI Size */ member 276 uint8_t spi_size; /* SPI Size */ member 316 uint8_t spi_size; /* SPI Size */ member 341 uint8_t spi_size; /* SPI Size */ member 393 uint8_t spi_size; /* SPI Size */ member 1068 if (prop.spi_size) { in ikev1_p_print() 1070 if (!rawprint(ndo, (caddr_t)(p + 1), prop.spi_size)) in ikev1_p_print() 1074 ext = (struct isakmp_gen *)((u_char *)(p + 1) + prop.spi_size); in ikev1_p_print() 1699 if (n.spi_size) { in ikev1_n_print() 1701 if (!rawprint(ndo, (caddr_t)(p + 1), n.spi_size)) in ikev1_n_print() [all …]
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | ikev2.c | 227 p->spi_size, p->num_transforms); in ikev2_parse_proposal() 251 if (p->spi_size > pend - ppos) { in ikev2_parse_proposal() 256 if (p->spi_size) { in ikev2_parse_proposal() 258 ppos, p->spi_size); in ikev2_parse_proposal() 259 ppos += p->spi_size; in ikev2_parse_proposal() 267 if (p->spi_size != 0) { in ikev2_parse_proposal()
|
/external/wpa_supplicant_8/src/eap_server/ |
D | ikev2.c | 235 p->spi_size, p->num_transforms); in ikev2_parse_proposal() 259 if (p->spi_size > pend - ppos) { in ikev2_parse_proposal() 264 if (p->spi_size) { in ikev2_parse_proposal() 266 ppos, p->spi_size); in ikev2_parse_proposal() 267 ppos += p->spi_size; in ikev2_parse_proposal() 275 if (p->spi_size != 0) { in ikev2_parse_proposal()
|
/external/wpa_supplicant_8/src/eap_common/ |
D | ikev2_common.h | 49 u8 spi_size; member
|
/external/ipsec-tools/ |
D | ChangeLog | 183 checking spi_size but it's not. I'm not sure this patch is correct,
|