/external/scapy/test/ |
ipsec.uts | 24 auth_algo='NULL', auth_key=None) 55 auth_algo='NULL', auth_key=None) 107 auth_algo='NULL', auth_key=None) 159 auth_algo='NULL', auth_key=None) 211 auth_algo='NULL', auth_key=None) 262 auth_algo='NULL', auth_key=None) 313 auth_algo='NULL', auth_key=None) 368 auth_algo='NULL', auth_key=None, 401 auth_algo='NULL', auth_key=None, 436 auth_algo='NULL', auth_key=None [all...] |
/external/boringssl/src/crypto/cipher_extra/ |
e_aesgcmsiv.c | 109 // aesgcmsiv_htable_init writes powers 1..8 of |auth_key| to |out_htable|. 111 const uint8_t auth_key[16]); 113 // aesgcmsiv_htable6_init writes powers 1..6 of |auth_key| to |out_htable|. 115 const uint8_t auth_key[16]); 217 // gcm_siv_asm_polyval evaluates POLYVAL at |auth_key| on the given plaintext 221 const uint8_t auth_key[16], 231 aesgcmsiv_htable_init(htable, auth_key); 237 aesgcmsiv_polyval_horner(out_tag, auth_key, ad, ad_blocks); 244 aesgcmsiv_polyval_horner(out_tag, auth_key, scratch, 1); 250 aesgcmsiv_polyval_horner(out_tag, auth_key, in, in_blocks) 681 uint8_t auth_key[16]; member in struct:gcm_siv_record_keys [all...] |
/tools/test/connectivity/acts/framework/acts/test_utils/net/ |
ipsec_test_utils.py | 77 auth_key, 88 6. auth_key : authentication key 95 crypt_algo, crypt_key, auth_algo, auth_key, trunc_bit, spis[0], 99 crypt_algo, crypt_key, auth_algo, auth_key, trunc_bit, spis[1], 239 auth_key = auth_method_key[k] 245 combo.append(auth_key)
|
/tools/test/connectivity/acts/tests/google/net/ |
IpSecTest.py | 129 auth_key = iutils.make_key(al) 156 auth_key, trunc_bits, udp_encap_a) 159 auth_key, trunc_bits, udp_encap_b) 232 auth_key = iutils.make_key(al) 259 auth_key, trunc_bits, udp_encap_a) 262 auth_key, trunc_bits, udp_encap_b) 326 auth_key = iutils.make_key(al) 349 auth_key, trunc_bits, udp_encap_a) 352 auth_key, trunc_bits, udp_encap_b)
|
/external/libcups/cups/ |
auth.c | 660 char auth_key[1024]; /* Buffer */ 691 auth_key, sizeof(auth_key))) 702 auth_right.name = auth_key; 761 auth_key, sizeof(auth_key)) && 816 auth_key, sizeof(auth_key)))
|
/kernel/tests/net/test/ |
pf_key.py | 239 encryption_key, auth, auth_key): 249 (SADB_EXT_KEY_AUTH, SadbKey((len(auth_key) * 8,)), auth_key),
|
pf_key_test.py | 27 AUTH_KEY = "af442892cdcd0ef650e9c299f9a8436a".decode("hex")
|
/frameworks/base/tests/net/java/com/android/server/ |
IpSecServiceParameterizedTest.java | 90 private static final byte[] AUTH_KEY = { 125 new IpSecAlgorithm(IpSecAlgorithm.AUTH_HMAC_SHA256, AUTH_KEY, AUTH_KEY.length * 4); 281 eq(AUTH_KEY),
|
IpSecServiceTest.java | 94 private static final byte[] AUTH_KEY = { 102 new IpSecAlgorithm(IpSecAlgorithm.AUTH_HMAC_SHA256, AUTH_KEY, AUTH_KEY.length * 4);
|
/external/scapy/scapy/layers/ |
ipsec.py | 760 auth_algo=None, auth_key=None, tunnel_header=None, nat_t_header=None): 769 @param auth_key: the integrity key 809 self.auth_key = auth_key 812 self.auth_key = None [all...] |
/cts/tests/tests/net/src/android/net/cts/ |
IpSecBaseTest.java | 66 protected static final byte[] AUTH_KEY = getKey(256); 437 AUTH_KEY, 438 AUTH_KEY.length * 4));
|
IpSecManagerTest.java | 252 AUTH_KEY, 253 AUTH_KEY.length * 8)) [all...] |
/device/linaro/bootloader/edk2/NetworkPkg/Application/IpsecConfig/ |
PolicyEntryOperation.h | 46 #define AUTH_KEY BIT(27)
|
PolicyEntryOperation.c | 821 *Mask |= AUTH_KEY;
984 } else if ((*Data)->AlgoInfo.EspAlgoInfo.AuthAlgoId != IPSEC_AALG_NONE && (*Mask & AUTH_KEY) == 0) {
1019 } else if ((*Data)->AlgoInfo.EspAlgoInfo.AuthAlgoId != IPSEC_AALG_NONE && (*Mask & AUTH_KEY) == 0) {
[all...] |
/external/webrtc/talk/session/media/ |
srtpfilter_unittest.cc | 565 uint8_t* auth_key = NULL; local 567 EXPECT_TRUE(f1_.GetRtpAuthParams(&auth_key, &auth_key_len, &auth_tag_len)); 568 EXPECT_TRUE(auth_key != NULL); [all...] |
channel.cc | 617 uint8_t* auth_key = NULL; 620 &auth_key, &key_len, 625 auth_key, auth_key + key_len); [all...] |
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/ |
WifiNetworkHistory.java | 73 private static final String AUTH_KEY = "AUTH"; 249 out.writeUTF(AUTH_KEY + SEPARATOR
|