/external/tcpdump/ |
D | print-bfd.c | 95 uint8_t auth_len; member 192 bfd_auth_header->auth_len)); in auth_print() 209 if (bfd_auth_header->auth_len < AUTH_PASSWORD_FIELD_MIN_LEN || in auth_print() 210 bfd_auth_header->auth_len > AUTH_PASSWORD_FIELD_MAX_LEN) { in auth_print() 212 bfd_auth_header->auth_len)); in auth_print() 218 if (fn_printn(ndo, pptr, bfd_auth_header->auth_len - 3, in auth_print() 239 if (bfd_auth_header->auth_len != AUTH_MD5_FIELD_LEN) { in auth_print() 241 bfd_auth_header->auth_len)); in auth_print() 270 if (bfd_auth_header->auth_len != AUTH_SHA1_FIELD_LEN) { in auth_print() 272 bfd_auth_header->auth_len)); in auth_print()
|
/external/wpa_supplicant_8/src/eap_server/ |
D | ikev2.c | 590 u8 method, const u8 *auth, size_t auth_len) in ikev2_process_auth_cert() argument 605 size_t auth_len) in ikev2_process_auth_secret() argument 635 if (auth_len != prf->hash_len || in ikev2_process_auth_secret() 636 os_memcmp_const(auth, auth_data, auth_len) != 0) { in ikev2_process_auth_secret() 639 auth, auth_len); in ikev2_process_auth_secret() 653 const u8 *auth, size_t auth_len) in ikev2_process_auth() argument 662 if (auth_len < 4) { in ikev2_process_auth() 670 auth_len -= 4; in ikev2_process_auth() 673 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len); in ikev2_process_auth() 678 auth_len); in ikev2_process_auth() [all …]
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | ikev2.c | 522 u8 method, const u8 *auth, size_t auth_len) in ikev2_process_auth_cert() argument 537 size_t auth_len) in ikev2_process_auth_secret() argument 567 if (auth_len != prf->hash_len || in ikev2_process_auth_secret() 568 os_memcmp_const(auth, auth_data, auth_len) != 0) { in ikev2_process_auth_secret() 571 auth, auth_len); in ikev2_process_auth_secret() 587 const u8 *auth, size_t auth_len) in ikev2_process_auth() argument 596 if (auth_len < 4) { in ikev2_process_auth() 604 auth_len -= 4; in ikev2_process_auth() 607 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len); in ikev2_process_auth() 612 auth_len); in ikev2_process_auth() [all …]
|
/external/wpa_supplicant_8/src/eap_common/ |
D | eap_eke_common.c | 433 os_memset(zeros, 0, sess->auth_len); in eap_eke_shared_secret() 434 if (eap_eke_prf(sess->prf, zeros, sess->auth_len, modexp, dh->prime_len, in eap_eke_shared_secret() 438 sess->shared_secret, sess->auth_len); in eap_eke_shared_secret() 713 sess->ka, sess->auth_len); in eap_eke_auth() 715 return eap_eke_prf(sess->prf, sess->ka, sess->auth_len, in eap_eke_auth() 731 sess->auth_len = eap_eke_auth_len(prf); in eap_eke_session_init() 735 if (sess->prf_len < 0 || sess->nonce_len < 0 || sess->auth_len < 0 || in eap_eke_session_init()
|
D | eap_eke_common.h | 75 int auth_len; member
|
D | ikev2_common.h | 307 size_t auth_len; member
|
D | ikev2_common.c | 313 payloads->auth_len = pdatalen; in ikev2_parse_payloads()
|
/external/openssh/ |
D | cipher.c | 75 u_int auth_len; member 156 if (auth_only && c->auth_len == 0) in cipher_alg_list() 195 return (c->auth_len); in cipher_authlen()
|
/external/dhcpcd-6.8.2/ |
D | dhcp.c | 718 uint8_t *n_params = NULL, auth_len; in make_message() local 1021 auth_len = 0; in make_message() 1036 auth_len = (uint8_t)alen; in make_message() 1041 *p++ = auth_len; in make_message() 1043 p += auth_len; in make_message() 1055 if (ifo->auth.options & DHCPCD_AUTH_SEND && auth_len != 0) in make_message() 1057 m, len, 4, type, auth, auth_len); in make_message() 1141 size_t auth_len; in read_lease() local 1184 auth = get_option(ifp->ctx, dhcp, DHO_AUTHENTICATION, &auth_len); in read_lease() 1188 auth, auth_len) == NULL) in read_lease() [all …]
|
D | dhcp6.c | 516 uint16_t u16, n_options, auth_len; in dhcp6_makemessage() local 721 auth_len = 0; in dhcp6_makemessage() 733 auth_len = (uint16_t)alen; in dhcp6_makemessage() 734 len += sizeof(*o) + auth_len; in dhcp6_makemessage() 942 if (ifo->auth.options & DHCPCD_AUTH_SEND && auth_len != 0) { in dhcp6_makemessage() 945 o->len = htons((uint16_t)auth_len); in dhcp6_makemessage()
|