HomeSort by relevance Sort by last modified time
    Searched refs:spi_size (Results 1 - 11 of 11) sorted by null

  /external/tcpdump/
isakmp.h 209 u_int8_t spi_size; /* SPI Size */ member in struct:isakmp_pl_p
310 u_int8_t spi_size; /* SPI Size */ member in struct:isakmp_pl_n
354 u_int8_t spi_size; /* SPI Size */ member in struct:isakmp_pl_d
print-isakmp.c 494 if (prop.spi_size) {
496 if (!rawprint((caddr_t)(p + 1), prop.spi_size))
500 ext = (struct isakmp_gen *)((u_char *)(p + 1) + prop.spi_size);
1047 if (n.spi_size) {
1049 if (!rawprint((caddr_t)(p + 1), n.spi_size))
1052 return (u_char *)(p + 1) + n.spi_size;
1067 if (n.spi_size) {
1069 if (!rawprint((caddr_t)(p + 1), n.spi_size))
1073 cp = (u_char *)(p + 1) + n.spi_size;
1102 item_len - sizeof(*p) - n.spi_size,
    [all...]
  /external/ipsec-tools/src/racoon/
isakmp_inf.c 405 if(notify->spi_size > 0) {
406 if (ntohs(notify->h.len) < sizeof(*notify) + notify->spi_size) {
408 "invalid spi_size in notification payload.\n");
411 spi = val2str((char *)(notify + 1), notify->spi_size);
417 ntohl(notify->doi), notify->proto_id, spi, notify->spi_size);
425 l = ntohs(notify->h.len) - sizeof(*notify) - notify->spi_size;
428 nraw += sizeof(*notify) + notify->spi_size;
484 if (tlen != num_spi * delete->spi_size) {
503 if (delete->spi_size != sizeof(isakmp_index)) {
507 delete->spi_size, delete->proto_id)
    [all...]
isakmp.h 206 u_int8_t spi_size; /* SPI Size */ member in struct:isakmp_pl_p
315 u_int8_t spi_size; /* SPI Size */ member in struct:isakmp_pl_n
379 u_int8_t spi_size; /* SPI Size */ member in struct:isakmp_pl_d
422 u_int8_t spi_size; /* SPI Size */ member in struct:isakmp_pl_ru
security.c 114 bp = (caddr_t)prop + sizeof(struct isakmp_pl_p) + prop->spi_size;
116 (sizeof(struct isakmp_pl_p) + prop->spi_size);
proposal.c 777 if (sizeof(newpr->spi) < p->prop->spi_size) {
779 "invalid spi size %d.\n", p->prop->spi_size);
789 newpr->spisize = p->prop->spi_size;
793 spi -= p->prop->spi_size;
794 memcpy(spi, p->prop + 1, p->prop->spi_size);
805 t->prop->spi_size, t->prop->num_t,
ipsec_doi.c 229 sizeof(struct isakmp_pl_p) + s->prop->spi_size;
251 + s->prop->spi_size;
347 prop->spi_size, prop->num_t);
1065 if (p->prop->spi_size != r->prop->spi_size) {
1068 p->prop->spi_size);
1371 if (check_spi_size(prop->proto_id, prop->spi_size) < 0)
    [all...]
isakmp_quick.c     [all...]
  /external/wpa_supplicant_8/src/eap_peer/
ikev2.c 253 p->spi_size, p->num_transforms);
277 if (ppos + p->spi_size > pend) {
282 if (p->spi_size) {
284 ppos, p->spi_size);
285 ppos += p->spi_size;
293 if (p->spi_size != 0) {
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
ikev2.c 235 p->spi_size, p->num_transforms);
259 if (ppos + p->spi_size > pend) {
264 if (p->spi_size) {
266 ppos, p->spi_size);
267 ppos += p->spi_size;
275 if (p->spi_size != 0) {
  /external/wpa_supplicant_8/src/eap_common/
ikev2_common.h 49 u8 spi_size; member in struct:ikev2_proposal
51 /* SPI of spi_size octets */

Completed in 333 milliseconds