/external/wpa_supplicant_8/src/eap_peer/ |
ikev2.c | 556 u8 method, const u8 *auth, size_t auth_len) 571 size_t auth_len) 601 if (auth_len != prf->hash_len || 602 os_memcmp(auth, auth_data, auth_len) != 0) { 605 auth, auth_len); 621 const u8 *auth, size_t auth_len) 630 if (auth_len < 4) { 638 auth_len -= 4; 641 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len); 646 auth_len); [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
ikev2.c | 590 u8 method, const u8 *auth, size_t auth_len) 605 size_t auth_len) 635 if (auth_len != prf->hash_len || 636 os_memcmp(auth, auth_data, auth_len) != 0) { 639 auth, auth_len); 653 const u8 *auth, size_t auth_len) 662 if (auth_len < 4) { 670 auth_len -= 4; 673 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len); 678 auth_len); [all...] |
/external/srtp/srtp/ |
ekt.c | 251 * The function call srtcp_ekt_trailer(ekt, auth_len, auth_tag ) 262 unsigned *auth_len,
|
srtp.c | 1639 unsigned auth_len; local [all...] |
/external/tcpdump/ |
print-bfd.c | 100 u_int8_t auth_len; member in struct:bfd_auth_header_t 256 bfd_auth_header->auth_len);
|
/external/wpa_supplicant_8/src/eap_common/ |
ikev2_common.h | 311 size_t auth_len; member in struct:ikev2_payloads
|
ikev2_common.c | 375 payloads->auth_len = pdatalen;
|
/external/libppp/src/ |
radius.c | 116 #define AUTH_LEN 16 151 char R[AUTH_LEN]; /* variable names as per rfc2548 */ 168 if (rad_request_authenticator(r->cx.rad, R, sizeof R) != AUTH_LEN) { 184 MD5Update(&Context, R, AUTH_LEN); [all...] |
/external/chromium/net/base/ |
net_util.cc | 1623 int auth_len = host_and_port_end - host_and_port_begin; local [all...] |