/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
H A D | wpa_auth_ft.c | 60 * @auth_len: Length of authenticated TLVs in octets 72 const u8 *auth, const size_t auth_len, in wpa_ft_rrb_decrypt() 77 size_t ad_len[3] = { ETH_ALEN, auth_len, sizeof(type) }; in wpa_ft_rrb_decrypt() 83 wpa_hexdump(MSG_DEBUG, "FT(RRB): authenticated TLVs", auth, auth_len); in wpa_ft_rrb_decrypt() 476 const u8 *auth, const size_t auth_len, in wpa_ft_rrb_encrypt() 480 size_t ad_len[3] = { ETH_ALEN, auth_len, sizeof(type) }; in wpa_ft_rrb_encrypt() 487 wpa_hexdump(MSG_DEBUG, "FT(RRB): authenticated TLVs", auth, auth_len); in wpa_ft_rrb_encrypt() 528 size_t plain_len = 0, auth_len = 0; in wpa_ft_rrb_build() local 536 if (wpa_ft_rrb_lin(tlvs_auth, NULL, NULL, &auth, &auth_len) < 0) in wpa_ft_rrb_build() 539 *packet_len = sizeof(u16) + auth_len in wpa_ft_rrb_build() 70 wpa_ft_rrb_decrypt(const u8 *key, const size_t key_len, const u8 *enc, size_t enc_len, const u8 *auth, const size_t auth_len, const u8 *src_addr, u8 type, u8 **plain, size_t *plain_size) wpa_ft_rrb_decrypt() argument 474 wpa_ft_rrb_encrypt(const u8 *key, const size_t key_len, const u8 *plain, const size_t plain_len, const u8 *auth, const size_t auth_len, const u8 *src_addr, u8 type, u8 *enc) wpa_ft_rrb_encrypt() argument 882 size_t auth_len; global() member 925 wpa_ft_rrb_seq_req(struct wpa_authenticator *wpa_auth, struct ft_remote_seq *rkh_seq, const u8 *src_addr, const u8 *f_r0kh_id, size_t f_r0kh_id_len, const u8 *f_r1kh_id, const u8 *key, size_t key_len, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, int (*cb)(struct wpa_authenticator *wpa_auth, const u8 *src_addr, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, int no_defer)) wpa_ft_rrb_seq_req() argument 1024 wpa_ft_rrb_seq_chk(struct ft_remote_seq *rkh_seq, const u8 *src_addr, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, const char *msgtype, int no_defer) wpa_ft_rrb_seq_chk() argument 1094 wpa_ft_rrb_seq_accept(struct wpa_authenticator *wpa_auth, struct ft_remote_seq *rkh_seq, const u8 *src_addr, const u8 *auth, size_t auth_len, const char *msgtype) wpa_ft_rrb_seq_accept() argument 3801 wpa_ft_rrb_rx_pull(struct wpa_authenticator *wpa_auth, const u8 *src_addr, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, int no_defer) wpa_ft_rrb_rx_pull() argument 3958 wpa_ft_rrb_rx_r1(struct wpa_authenticator *wpa_auth, const u8 *src_addr, u8 type, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, const char *msgtype, u8 *s1kh_id_out, int (*cb)(struct wpa_authenticator *wpa_auth, const u8 *src_addr, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, int no_defer)) wpa_ft_rrb_rx_r1() argument 4188 wpa_ft_rrb_rx_resp(struct wpa_authenticator *wpa_auth, const u8 *src_addr, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, int no_defer) wpa_ft_rrb_rx_resp() argument 4242 wpa_ft_rrb_rx_push(struct wpa_authenticator *wpa_auth, const u8 *src_addr, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, int no_defer) wpa_ft_rrb_rx_push() argument 4260 wpa_ft_rrb_rx_seq(struct wpa_authenticator *wpa_auth, const u8 *src_addr, int type, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, struct ft_remote_seq **rkh_seq, u8 **key, size_t *key_len, struct ft_remote_r0kh **r0kh_out, struct ft_remote_r1kh **r1kh_out, struct ft_remote_r0kh **r0kh_wildcard_out, struct ft_remote_r1kh **r1kh_wildcard_out) wpa_ft_rrb_rx_seq() argument 4378 wpa_ft_rrb_rx_seq_req(struct wpa_authenticator *wpa_auth, const u8 *src_addr, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, int no_defer) wpa_ft_rrb_rx_seq_req() argument 4447 wpa_ft_rrb_rx_seq_resp(struct wpa_authenticator *wpa_auth, const u8 *src_addr, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, int no_defer) wpa_ft_rrb_rx_seq_resp() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
H A D | wpa_auth_ft.c | 59 * @auth_len: Length of authenticated TLVs in octets 71 const u8 *auth, const size_t auth_len, in wpa_ft_rrb_decrypt() 76 size_t ad_len[3] = { ETH_ALEN, auth_len, sizeof(type) }; in wpa_ft_rrb_decrypt() 82 wpa_hexdump(MSG_DEBUG, "FT(RRB): authenticated TLVs", auth, auth_len); in wpa_ft_rrb_decrypt() 475 const u8 *auth, const size_t auth_len, in wpa_ft_rrb_encrypt() 479 size_t ad_len[3] = { ETH_ALEN, auth_len, sizeof(type) }; in wpa_ft_rrb_encrypt() 486 wpa_hexdump(MSG_DEBUG, "FT(RRB): authenticated TLVs", auth, auth_len); in wpa_ft_rrb_encrypt() 527 size_t plain_len = 0, auth_len = 0; in wpa_ft_rrb_build() local 535 if (wpa_ft_rrb_lin(tlvs_auth, NULL, NULL, &auth, &auth_len) < 0) in wpa_ft_rrb_build() 538 *packet_len = sizeof(u16) + auth_len in wpa_ft_rrb_build() 69 wpa_ft_rrb_decrypt(const u8 *key, const size_t key_len, const u8 *enc, size_t enc_len, const u8 *auth, const size_t auth_len, const u8 *src_addr, u8 type, u8 **plain, size_t *plain_size) wpa_ft_rrb_decrypt() argument 473 wpa_ft_rrb_encrypt(const u8 *key, const size_t key_len, const u8 *plain, const size_t plain_len, const u8 *auth, const size_t auth_len, const u8 *src_addr, u8 type, u8 *enc) wpa_ft_rrb_encrypt() argument 881 size_t auth_len; global() member 924 wpa_ft_rrb_seq_req(struct wpa_authenticator *wpa_auth, struct ft_remote_seq *rkh_seq, const u8 *src_addr, const u8 *f_r0kh_id, size_t f_r0kh_id_len, const u8 *f_r1kh_id, const u8 *key, size_t key_len, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, int (*cb)(struct wpa_authenticator *wpa_auth, const u8 *src_addr, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, int no_defer)) wpa_ft_rrb_seq_req() argument 1022 wpa_ft_rrb_seq_chk(struct ft_remote_seq *rkh_seq, const u8 *src_addr, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, const char *msgtype, int no_defer) wpa_ft_rrb_seq_chk() argument 1092 wpa_ft_rrb_seq_accept(struct wpa_authenticator *wpa_auth, struct ft_remote_seq *rkh_seq, const u8 *src_addr, const u8 *auth, size_t auth_len, const char *msgtype) wpa_ft_rrb_seq_accept() argument 3577 wpa_ft_rrb_rx_pull(struct wpa_authenticator *wpa_auth, const u8 *src_addr, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, int no_defer) wpa_ft_rrb_rx_pull() argument 3730 wpa_ft_rrb_rx_r1(struct wpa_authenticator *wpa_auth, const u8 *src_addr, u8 type, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, const char *msgtype, u8 *s1kh_id_out, int (*cb)(struct wpa_authenticator *wpa_auth, const u8 *src_addr, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, int no_defer)) wpa_ft_rrb_rx_r1() argument 3960 wpa_ft_rrb_rx_resp(struct wpa_authenticator *wpa_auth, const u8 *src_addr, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, int no_defer) wpa_ft_rrb_rx_resp() argument 4014 wpa_ft_rrb_rx_push(struct wpa_authenticator *wpa_auth, const u8 *src_addr, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, int no_defer) wpa_ft_rrb_rx_push() argument 4032 wpa_ft_rrb_rx_seq(struct wpa_authenticator *wpa_auth, const u8 *src_addr, int type, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, struct ft_remote_seq **rkh_seq, u8 **key, size_t *key_len, struct ft_remote_r0kh **r0kh_out, struct ft_remote_r1kh **r1kh_out, struct ft_remote_r0kh **r0kh_wildcard_out, struct ft_remote_r1kh **r1kh_wildcard_out) wpa_ft_rrb_rx_seq() argument 4150 wpa_ft_rrb_rx_seq_req(struct wpa_authenticator *wpa_auth, const u8 *src_addr, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, int no_defer) wpa_ft_rrb_rx_seq_req() argument 4215 wpa_ft_rrb_rx_seq_resp(struct wpa_authenticator *wpa_auth, const u8 *src_addr, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, int no_defer) wpa_ft_rrb_rx_seq_resp() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
H A D | eap_eke_common.c | 411 os_memset(zeros, 0, sess->auth_len); in eap_eke_shared_secret() 412 if (eap_eke_prf(sess->prf, zeros, sess->auth_len, modexp, dh->prime_len, in eap_eke_shared_secret() 416 sess->shared_secret, sess->auth_len); in eap_eke_shared_secret() 691 sess->ka, sess->auth_len); in eap_eke_auth() 693 return eap_eke_prf(sess->prf, sess->ka, sess->auth_len, in eap_eke_auth() 709 sess->auth_len = eap_eke_auth_len(prf); in eap_eke_session_init() 713 if (sess->prf_len < 0 || sess->nonce_len < 0 || sess->auth_len < 0 || in eap_eke_session_init()
|
H A D | eap_eke_common.h | 75 int auth_len; member
|
H A D | ikev2_common.h | 307 size_t auth_len; member
|
H A D | ikev2_common.c | 313 payloads->auth_len = pdatalen; in ikev2_parse_payloads()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
H A D | eap_eke_common.c | 411 os_memset(zeros, 0, sess->auth_len); in eap_eke_shared_secret() 412 if (eap_eke_prf(sess->prf, zeros, sess->auth_len, modexp, dh->prime_len, in eap_eke_shared_secret() 416 sess->shared_secret, sess->auth_len); in eap_eke_shared_secret() 691 sess->ka, sess->auth_len); in eap_eke_auth() 693 return eap_eke_prf(sess->prf, sess->ka, sess->auth_len, in eap_eke_auth() 709 sess->auth_len = eap_eke_auth_len(prf); in eap_eke_session_init() 713 if (sess->prf_len < 0 || sess->nonce_len < 0 || sess->auth_len < 0 || in eap_eke_session_init()
|
H A D | eap_eke_common.h | 75 int auth_len; member
|
H A D | ikev2_common.h | 307 size_t auth_len; member
|
H A D | ikev2_common.c | 313 payloads->auth_len = pdatalen; in ikev2_parse_payloads()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
H A D | ikev2.c | 521 u8 method, const u8 *auth, size_t auth_len) in ikev2_process_auth_cert() 536 size_t auth_len) in ikev2_process_auth_secret() 566 if (auth_len != prf->hash_len || in ikev2_process_auth_secret() 567 os_memcmp_const(auth, auth_data, auth_len) != 0) { in ikev2_process_auth_secret() 570 auth, auth_len); in ikev2_process_auth_secret() 586 const u8 *auth, size_t auth_len) in ikev2_process_auth() 595 if (auth_len < 4) { in ikev2_process_auth() 603 auth_len -= 4; in ikev2_process_auth() 606 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len); in ikev2_process_auth() 611 auth_len); in ikev2_process_auth() 520 ikev2_process_auth_cert(struct ikev2_responder_data *data, u8 method, const u8 *auth, size_t auth_len) ikev2_process_auth_cert() argument 534 ikev2_process_auth_secret(struct ikev2_responder_data *data, u8 method, const u8 *auth, size_t auth_len) ikev2_process_auth_secret() argument 585 ikev2_process_auth(struct ikev2_responder_data *data, const u8 *auth, size_t auth_len) ikev2_process_auth() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
H A D | ikev2.c | 589 u8 method, const u8 *auth, size_t auth_len) in ikev2_process_auth_cert() 604 size_t auth_len) in ikev2_process_auth_secret() 634 if (auth_len != prf->hash_len || in ikev2_process_auth_secret() 635 os_memcmp_const(auth, auth_data, auth_len) != 0) { in ikev2_process_auth_secret() 638 auth, auth_len); in ikev2_process_auth_secret() 652 const u8 *auth, size_t auth_len) in ikev2_process_auth() 661 if (auth_len < 4) { in ikev2_process_auth() 669 auth_len -= 4; in ikev2_process_auth() 672 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len); in ikev2_process_auth() 677 auth_len); in ikev2_process_auth() 588 ikev2_process_auth_cert(struct ikev2_initiator_data *data, u8 method, const u8 *auth, size_t auth_len) ikev2_process_auth_cert() argument 602 ikev2_process_auth_secret(struct ikev2_initiator_data *data, u8 method, const u8 *auth, size_t auth_len) ikev2_process_auth_secret() argument 651 ikev2_process_auth(struct ikev2_initiator_data *data, const u8 *auth, size_t auth_len) ikev2_process_auth() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
H A D | ikev2.c | 523 u8 method, const u8 *auth, size_t auth_len) in ikev2_process_auth_cert() 538 size_t auth_len) in ikev2_process_auth_secret() 568 if (auth_len != prf->hash_len || in ikev2_process_auth_secret() 569 os_memcmp_const(auth, auth_data, auth_len) != 0) { in ikev2_process_auth_secret() 572 auth, auth_len); in ikev2_process_auth_secret() 588 const u8 *auth, size_t auth_len) in ikev2_process_auth() 597 if (auth_len < 4) { in ikev2_process_auth() 605 auth_len -= 4; in ikev2_process_auth() 608 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len); in ikev2_process_auth() 613 auth_len); in ikev2_process_auth() 522 ikev2_process_auth_cert(struct ikev2_responder_data *data, u8 method, const u8 *auth, size_t auth_len) ikev2_process_auth_cert() argument 536 ikev2_process_auth_secret(struct ikev2_responder_data *data, u8 method, const u8 *auth, size_t auth_len) ikev2_process_auth_secret() argument 587 ikev2_process_auth(struct ikev2_responder_data *data, const u8 *auth, size_t auth_len) ikev2_process_auth() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
H A D | ikev2.c | 589 u8 method, const u8 *auth, size_t auth_len) in ikev2_process_auth_cert() 604 size_t auth_len) in ikev2_process_auth_secret() 634 if (auth_len != prf->hash_len || in ikev2_process_auth_secret() 635 os_memcmp_const(auth, auth_data, auth_len) != 0) { in ikev2_process_auth_secret() 638 auth, auth_len); in ikev2_process_auth_secret() 652 const u8 *auth, size_t auth_len) in ikev2_process_auth() 661 if (auth_len < 4) { in ikev2_process_auth() 669 auth_len -= 4; in ikev2_process_auth() 672 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len); in ikev2_process_auth() 677 auth_len); in ikev2_process_auth() 588 ikev2_process_auth_cert(struct ikev2_initiator_data *data, u8 method, const u8 *auth, size_t auth_len) ikev2_process_auth_cert() argument 602 ikev2_process_auth_secret(struct ikev2_initiator_data *data, u8 method, const u8 *auth, size_t auth_len) ikev2_process_auth_secret() argument 651 ikev2_process_auth(struct ikev2_initiator_data *data, const u8 *auth, size_t auth_len) ikev2_process_auth() argument [all...] |
/third_party/ffmpeg/libavformat/ |
H A D | sapdec.c | 93 int addr_type, auth_len; in sap_read_header() local 119 auth_len = recvbuf[1]; in sap_read_header() 126 pos += auth_len * 4; in sap_read_header()
|
/third_party/lwip/src/apps/smtp/ |
H A D | smtp.c | 1072 size_t auth_len; in smtp_prepare_auth_or_mail() local 1077 auth_len = smtp_base64_encode(&s->tx_buf[SMTP_CMD_AUTHPLAIN_1_LEN], in smtp_prepare_auth_or_mail() 1080 LWIP_ASSERT("string too long", auth_len <= (SMTP_TX_BUF_LEN-SMTP_CMD_AUTHPLAIN_1_LEN-SMTP_CMD_AUTHPLAIN_2_LEN)); in smtp_prepare_auth_or_mail() 1081 *tx_buf_len = (u16_t)(SMTP_CMD_AUTHPLAIN_1_LEN + SMTP_CMD_AUTHPLAIN_2_LEN + (u16_t)auth_len); in smtp_prepare_auth_or_mail() 1082 SMEMCPY(&s->tx_buf[SMTP_CMD_AUTHPLAIN_1_LEN + auth_len], SMTP_CMD_AUTHPLAIN_2, in smtp_prepare_auth_or_mail()
|