Home
last modified time | relevance | path

Searched refs:auth_len (Results 1 – 10 of 10) sorted by relevance

/external/tcpdump/
Dprint-bfd.c95 uint8_t auth_len; member
192 bfd_auth_header->auth_len)); in auth_print()
209 if (bfd_auth_header->auth_len < AUTH_PASSWORD_FIELD_MIN_LEN || in auth_print()
210 bfd_auth_header->auth_len > AUTH_PASSWORD_FIELD_MAX_LEN) { in auth_print()
212 bfd_auth_header->auth_len)); in auth_print()
218 if (fn_printn(ndo, pptr, bfd_auth_header->auth_len - 3, in auth_print()
239 if (bfd_auth_header->auth_len != AUTH_MD5_FIELD_LEN) { in auth_print()
241 bfd_auth_header->auth_len)); in auth_print()
270 if (bfd_auth_header->auth_len != AUTH_SHA1_FIELD_LEN) { in auth_print()
272 bfd_auth_header->auth_len)); in auth_print()
/external/wpa_supplicant_8/src/eap_server/
Dikev2.c590 u8 method, const u8 *auth, size_t auth_len) in ikev2_process_auth_cert() argument
605 size_t auth_len) in ikev2_process_auth_secret() argument
635 if (auth_len != prf->hash_len || in ikev2_process_auth_secret()
636 os_memcmp_const(auth, auth_data, auth_len) != 0) { in ikev2_process_auth_secret()
639 auth, auth_len); in ikev2_process_auth_secret()
653 const u8 *auth, size_t auth_len) in ikev2_process_auth() argument
662 if (auth_len < 4) { in ikev2_process_auth()
670 auth_len -= 4; in ikev2_process_auth()
673 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len); in ikev2_process_auth()
678 auth_len); in ikev2_process_auth()
[all …]
/external/wpa_supplicant_8/src/eap_peer/
Dikev2.c522 u8 method, const u8 *auth, size_t auth_len) in ikev2_process_auth_cert() argument
537 size_t auth_len) in ikev2_process_auth_secret() argument
567 if (auth_len != prf->hash_len || in ikev2_process_auth_secret()
568 os_memcmp_const(auth, auth_data, auth_len) != 0) { in ikev2_process_auth_secret()
571 auth, auth_len); in ikev2_process_auth_secret()
587 const u8 *auth, size_t auth_len) in ikev2_process_auth() argument
596 if (auth_len < 4) { in ikev2_process_auth()
604 auth_len -= 4; in ikev2_process_auth()
607 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len); in ikev2_process_auth()
612 auth_len); in ikev2_process_auth()
[all …]
/external/wpa_supplicant_8/src/eap_common/
Deap_eke_common.c433 os_memset(zeros, 0, sess->auth_len); in eap_eke_shared_secret()
434 if (eap_eke_prf(sess->prf, zeros, sess->auth_len, modexp, dh->prime_len, in eap_eke_shared_secret()
438 sess->shared_secret, sess->auth_len); in eap_eke_shared_secret()
713 sess->ka, sess->auth_len); in eap_eke_auth()
715 return eap_eke_prf(sess->prf, sess->ka, sess->auth_len, in eap_eke_auth()
731 sess->auth_len = eap_eke_auth_len(prf); in eap_eke_session_init()
735 if (sess->prf_len < 0 || sess->nonce_len < 0 || sess->auth_len < 0 || in eap_eke_session_init()
Deap_eke_common.h75 int auth_len; member
Dikev2_common.h307 size_t auth_len; member
Dikev2_common.c313 payloads->auth_len = pdatalen; in ikev2_parse_payloads()
/external/openssh/
Dcipher.c75 u_int auth_len; member
156 if (auth_only && c->auth_len == 0) in cipher_alg_list()
195 return (c->auth_len); in cipher_authlen()
/external/dhcpcd-6.8.2/
Ddhcp.c718 uint8_t *n_params = NULL, auth_len; in make_message() local
1021 auth_len = 0; in make_message()
1036 auth_len = (uint8_t)alen; in make_message()
1041 *p++ = auth_len; in make_message()
1043 p += auth_len; in make_message()
1055 if (ifo->auth.options & DHCPCD_AUTH_SEND && auth_len != 0) in make_message()
1057 m, len, 4, type, auth, auth_len); in make_message()
1141 size_t auth_len; in read_lease() local
1184 auth = get_option(ifp->ctx, dhcp, DHO_AUTHENTICATION, &auth_len); in read_lease()
1188 auth, auth_len) == NULL) in read_lease()
[all …]
Ddhcp6.c516 uint16_t u16, n_options, auth_len; in dhcp6_makemessage() local
721 auth_len = 0; in dhcp6_makemessage()
733 auth_len = (uint16_t)alen; in dhcp6_makemessage()
734 len += sizeof(*o) + auth_len; in dhcp6_makemessage()
942 if (ifo->auth.options & DHCPCD_AUTH_SEND && auth_len != 0) { in dhcp6_makemessage()
945 o->len = htons((uint16_t)auth_len); in dhcp6_makemessage()