/external/tcpdump/ |
print-bfd.c | 95 uint8_t auth_len; member in struct:bfd_auth_header_t 192 bfd_auth_header->auth_len)); 209 if (bfd_auth_header->auth_len < AUTH_PASSWORD_FIELD_MIN_LEN || 210 bfd_auth_header->auth_len > AUTH_PASSWORD_FIELD_MAX_LEN) { 212 bfd_auth_header->auth_len)); 218 if (fn_printn(ndo, pptr, bfd_auth_header->auth_len - 3, 239 if (bfd_auth_header->auth_len != AUTH_MD5_FIELD_LEN) { 241 bfd_auth_header->auth_len)); 270 if (bfd_auth_header->auth_len != AUTH_SHA1_FIELD_LEN) { 272 bfd_auth_header->auth_len)); [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
eap_eke_common.h | 75 int auth_len; member in struct:eap_eke_session
|
ikev2_common.h | 307 size_t auth_len; member in struct:ikev2_payloads
|
/external/dhcpcd-6.8.2/ |
dhcp.c | 718 uint8_t *n_params = NULL, auth_len; local 1021 auth_len = 0; 1036 auth_len = (uint8_t)alen; 1041 *p++ = auth_len; 1043 p += auth_len; 1055 if (ifo->auth.options & DHCPCD_AUTH_SEND && auth_len != 0) 1057 m, len, 4, type, auth, auth_len); 1141 size_t auth_len; local 1184 auth = get_option(ifp->ctx, dhcp, DHO_AUTHENTICATION, &auth_len); 1188 auth, auth_len) == NULL 2835 size_t auth_len; local [all...] |
dhcp6.c | 516 uint16_t u16, n_options, auth_len; local 721 auth_len = 0; 733 auth_len = (uint16_t)alen; 734 len += sizeof(*o) + auth_len; 942 if (ifo->auth.options & DHCPCD_AUTH_SEND && auth_len != 0) { 945 o->len = htons((uint16_t)auth_len); [all...] |
/external/wpa_supplicant_8/src/ap/ |
wpa_auth_ft.c | 55 * @auth_len: Length of authenticated TLVs in octets 67 const u8 *auth, const size_t auth_len, 72 size_t ad_len[3] = { ETH_ALEN, auth_len, sizeof(type) }; 285 const u8 *auth, const size_t auth_len, 289 size_t ad_len[3] = { ETH_ALEN, auth_len, sizeof(type) }; 331 size_t plain_len = 0, auth_len = 0; local 337 if (wpa_ft_rrb_lin(tlvs_auth, NULL, &auth, &auth_len) < 0) 340 *packet_len = sizeof(u16) + auth_len + plain_len; 348 WPA_PUT_LE16(pos, auth_len); 350 os_memcpy(pos, auth, auth_len); 552 size_t auth_len; member in struct:ft_remote_item [all...] |