HomeSort by relevance Sort by last modified time
    Searched defs:icv (Results 1 - 25 of 39) sorted by null

1 2

  /external/wpa_supplicant_8/src/eap_common/
eap_ikev2_common.c 74 u8 icv[IKEV2_MAX_HASH_LEN]; local
80 "transform / cannot validate ICV");
92 wpa_printf(MSG_DEBUG, "EAP-IKEV2: No SK_a for ICV validation");
98 wpabuf_len(msg) - icv_len, icv) < 0) {
99 wpa_printf(MSG_INFO, "EAP-IKEV2: Could not calculate ICV");
103 if (os_memcmp_const(icv, end - icv_len, icv_len) != 0) {
104 wpa_printf(MSG_INFO, "EAP-IKEV2: Invalid ICV");
105 wpa_hexdump(MSG_DEBUG, "EAP-IKEV2: Calculated ICV",
106 icv, icv_len);
107 wpa_hexdump(MSG_DEBUG, "EAP-IKEV2: Received ICV",
    [all...]
eap_eke_common.c 664 u8 icv[EAP_EKE_MAX_HASH_LEN]; local
683 prot_len - block_size - icv_len, icv) < 0)
685 if (os_memcmp_const(icv, prot + prot_len - icv_len, icv_len) != 0) {
686 wpa_printf(MSG_INFO, "EAP-EKE: ICV mismatch in Prot() data");
ikev2_common.c 537 u8 *icv, *iv; local
594 icv = wpabuf_put(msg, integ_alg->hash_len);
602 wpabuf_len(msg) - integ_alg->hash_len, icv);
  /external/bzip2/
compress.c 361 register UInt16 icv; local
365 icv = mtfv[gs+(nn)]; \
366 cost01 += s->len_pack[icv][0]; \
367 cost23 += s->len_pack[icv][1]; \
368 cost45 += s->len_pack[icv][2]; \
390 UInt16 icv = mtfv[i]; local
391 for (t = 0; t < nGroups; t++) cost[t] += s->len[t][icv];
  /external/wpa_supplicant_8/src/eap_peer/
eap_pax.c 221 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", rpos, EAP_PAX_ICV_LEN);
315 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", rpos, EAP_PAX_ICV_LEN);
334 const u8 *icv, *pos; local
411 icv = pos + len - EAP_PAX_ICV_LEN;
412 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", icv, EAP_PAX_ICV_LEN);
422 if (os_memcmp_const(icv, icvbuf, EAP_PAX_ICV_LEN) != 0) {
423 wpa_printf(MSG_DEBUG, "EAP-PAX: invalid ICV - ignoring the "
425 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: expected ICV",
  /external/wpa_supplicant_8/src/eap_server/
eap_server_pax.c 113 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", pos, EAP_PAX_ICV_LEN);
159 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", pos, EAP_PAX_ICV_LEN);
190 u8 icvbuf[EAP_PAX_ICV_LEN], *icv; local
262 wpa_printf(MSG_INFO, "EAP-PAX: No ICV in the packet");
265 icv = wpabuf_mhead_u8(respData) + mlen - EAP_PAX_ICV_LEN;
266 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", icv, EAP_PAX_ICV_LEN);
271 if (os_memcmp_const(icvbuf, icv, EAP_PAX_ICV_LEN) != 0) {
272 wpa_printf(MSG_INFO, "EAP-PAX: Invalid ICV");
273 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: Expected ICV",
    [all...]
  /external/opencv3/modules/ts/include/opencv2/ts/
ts_perf.hpp 274 bool icv; member in struct:perf::ImplData
289 ipp = icv = ocl = ipp_mt = false;
344 icv = ((flags&CV_IMPL_IPP) > 0);
347 icv = 0;
  /external/wpa_supplicant_8/src/pae/
ieee802_1x_kay_i.h 170 int (*icv_hash)(const u8 *ick, const u8 *msg, size_t msg_len, u8 *icv);
416 u8 icv[0]; member in struct:ieee802_1x_mka_icv_body
ieee802_1x_kay.c 54 /* 128-bit CAK, KEK, ICK, ICV */
941 "KaY: MKA Peer Packet Body Length (%d bytes) is less than the Parameter Set Header Length (%d bytes) + the Parameter Set Body Length (%d bytes) + %d bytes of ICV",
2885 u8 icv[MAX_ICV_LEN]; local
    [all...]