/external/wpa_supplicant_8/src/eap_common/ |
eap_ikev2_common.c | 74 u8 icv[IKEV2_MAX_HASH_LEN]; local 80 "transform / cannot validate ICV"); 92 wpa_printf(MSG_DEBUG, "EAP-IKEV2: No SK_a for ICV validation"); 98 wpabuf_len(msg) - icv_len, icv) < 0) { 99 wpa_printf(MSG_INFO, "EAP-IKEV2: Could not calculate ICV"); 103 if (os_memcmp_const(icv, end - icv_len, icv_len) != 0) { 104 wpa_printf(MSG_INFO, "EAP-IKEV2: Invalid ICV"); 105 wpa_hexdump(MSG_DEBUG, "EAP-IKEV2: Calculated ICV", 106 icv, icv_len); 107 wpa_hexdump(MSG_DEBUG, "EAP-IKEV2: Received ICV", [all...] |
eap_eke_common.c | 664 u8 icv[EAP_EKE_MAX_HASH_LEN]; local 683 prot_len - block_size - icv_len, icv) < 0) 685 if (os_memcmp_const(icv, prot + prot_len - icv_len, icv_len) != 0) { 686 wpa_printf(MSG_INFO, "EAP-EKE: ICV mismatch in Prot() data");
|
ikev2_common.c | 537 u8 *icv, *iv; local 594 icv = wpabuf_put(msg, integ_alg->hash_len); 602 wpabuf_len(msg) - integ_alg->hash_len, icv);
|
/external/bzip2/ |
compress.c | 361 register UInt16 icv; local 365 icv = mtfv[gs+(nn)]; \ 366 cost01 += s->len_pack[icv][0]; \ 367 cost23 += s->len_pack[icv][1]; \ 368 cost45 += s->len_pack[icv][2]; \ 390 UInt16 icv = mtfv[i]; local 391 for (t = 0; t < nGroups; t++) cost[t] += s->len[t][icv];
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_pax.c | 221 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", rpos, EAP_PAX_ICV_LEN); 315 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", rpos, EAP_PAX_ICV_LEN); 334 const u8 *icv, *pos; local 411 icv = pos + len - EAP_PAX_ICV_LEN; 412 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", icv, EAP_PAX_ICV_LEN); 422 if (os_memcmp_const(icv, icvbuf, EAP_PAX_ICV_LEN) != 0) { 423 wpa_printf(MSG_DEBUG, "EAP-PAX: invalid ICV - ignoring the " 425 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: expected ICV",
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_pax.c | 113 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", pos, EAP_PAX_ICV_LEN); 159 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", pos, EAP_PAX_ICV_LEN); 190 u8 icvbuf[EAP_PAX_ICV_LEN], *icv; local 262 wpa_printf(MSG_INFO, "EAP-PAX: No ICV in the packet"); 265 icv = wpabuf_mhead_u8(respData) + mlen - EAP_PAX_ICV_LEN; 266 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", icv, EAP_PAX_ICV_LEN); 271 if (os_memcmp_const(icvbuf, icv, EAP_PAX_ICV_LEN) != 0) { 272 wpa_printf(MSG_INFO, "EAP-PAX: Invalid ICV"); 273 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: Expected ICV", [all...] |
/external/opencv3/modules/ts/include/opencv2/ts/ |
ts_perf.hpp | 274 bool icv; member in struct:perf::ImplData 289 ipp = icv = ocl = ipp_mt = false; 344 icv = ((flags&CV_IMPL_IPP) > 0); 347 icv = 0;
|
/external/wpa_supplicant_8/src/pae/ |
ieee802_1x_kay_i.h | 170 int (*icv_hash)(const u8 *ick, const u8 *msg, size_t msg_len, u8 *icv); 416 u8 icv[0]; member in struct:ieee802_1x_mka_icv_body
|
ieee802_1x_kay.c | 54 /* 128-bit CAK, KEK, ICK, ICV */ 941 "KaY: MKA Peer Packet Body Length (%d bytes) is less than the Parameter Set Header Length (%d bytes) + the Parameter Set Body Length (%d bytes) + %d bytes of ICV", 2885 u8 icv[MAX_ICV_LEN]; local [all...] |