/external/tcpdump/ |
isakmp.h | 209 u_int8_t spi_size; /* SPI Size */ member in struct:isakmp_pl_p 310 u_int8_t spi_size; /* SPI Size */ member in struct:isakmp_pl_n 354 u_int8_t spi_size; /* SPI Size */ member in struct:isakmp_pl_d
|
print-isakmp.c | 494 if (prop.spi_size) { 496 if (!rawprint((caddr_t)(p + 1), prop.spi_size)) 500 ext = (struct isakmp_gen *)((u_char *)(p + 1) + prop.spi_size); 1047 if (n.spi_size) { 1049 if (!rawprint((caddr_t)(p + 1), n.spi_size)) 1052 return (u_char *)(p + 1) + n.spi_size; 1067 if (n.spi_size) { 1069 if (!rawprint((caddr_t)(p + 1), n.spi_size)) 1073 cp = (u_char *)(p + 1) + n.spi_size; 1102 item_len - sizeof(*p) - n.spi_size, [all...] |
/external/ipsec-tools/src/racoon/ |
isakmp_inf.c | 405 if(notify->spi_size > 0) { 406 if (ntohs(notify->h.len) < sizeof(*notify) + notify->spi_size) { 408 "invalid spi_size in notification payload.\n"); 411 spi = val2str((char *)(notify + 1), notify->spi_size); 417 ntohl(notify->doi), notify->proto_id, spi, notify->spi_size); 425 l = ntohs(notify->h.len) - sizeof(*notify) - notify->spi_size; 428 nraw += sizeof(*notify) + notify->spi_size; 484 if (tlen != num_spi * delete->spi_size) { 503 if (delete->spi_size != sizeof(isakmp_index)) { 507 delete->spi_size, delete->proto_id) [all...] |
isakmp.h | 206 u_int8_t spi_size; /* SPI Size */ member in struct:isakmp_pl_p 315 u_int8_t spi_size; /* SPI Size */ member in struct:isakmp_pl_n 379 u_int8_t spi_size; /* SPI Size */ member in struct:isakmp_pl_d 422 u_int8_t spi_size; /* SPI Size */ member in struct:isakmp_pl_ru
|
security.c | 114 bp = (caddr_t)prop + sizeof(struct isakmp_pl_p) + prop->spi_size; 116 (sizeof(struct isakmp_pl_p) + prop->spi_size);
|
proposal.c | 777 if (sizeof(newpr->spi) < p->prop->spi_size) { 779 "invalid spi size %d.\n", p->prop->spi_size); 789 newpr->spisize = p->prop->spi_size; 793 spi -= p->prop->spi_size; 794 memcpy(spi, p->prop + 1, p->prop->spi_size); 805 t->prop->spi_size, t->prop->num_t,
|
ipsec_doi.c | 229 sizeof(struct isakmp_pl_p) + s->prop->spi_size; 251 + s->prop->spi_size; 347 prop->spi_size, prop->num_t); 1065 if (p->prop->spi_size != r->prop->spi_size) { 1068 p->prop->spi_size); 1371 if (check_spi_size(prop->proto_id, prop->spi_size) < 0) [all...] |
isakmp_quick.c | [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
ikev2.c | 253 p->spi_size, p->num_transforms); 277 if (ppos + p->spi_size > pend) { 282 if (p->spi_size) { 284 ppos, p->spi_size); 285 ppos += p->spi_size; 293 if (p->spi_size != 0) { [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
ikev2.c | 235 p->spi_size, p->num_transforms); 259 if (ppos + p->spi_size > pend) { 264 if (p->spi_size) { 266 ppos, p->spi_size); 267 ppos += p->spi_size; 275 if (p->spi_size != 0) {
|
/external/wpa_supplicant_8/src/eap_common/ |
ikev2_common.h | 49 u8 spi_size; member in struct:ikev2_proposal 51 /* SPI of spi_size octets */
|