Searched refs:secbuf (Results 1 - 5 of 5) sorted by relevance
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/media/dvb/dvb-core/ |
H A D | dvb_demux.c | 138 u8 xor = f->filter.filter_value[i] ^ feed->feed.sec.secbuf[i]; 149 return feed->cb.sec(feed->feed.sec.secbuf, feed->feed.sec.seclen, 167 section_syntax_indicator = ((sec->secbuf[1] & 0x80) != 0); 169 demux->check_crc32(feed, sec->secbuf, sec->seclen)) 196 if (sec->secbuf[0] != 0xff || sec->secbuf[n - 1] != 0xff) { 201 printk(" %02x", sec->secbuf[i]); 208 sec->secbuf = sec->secbuf_base; 261 /* to be sure always set secbuf */ 262 sec->secbuf [all...] |
H A D | demux.h | 159 u8 *secbuf; member in struct:dmx_section_feed
|
/netgear-R7000-V1.0.7.12_1.2.5/src/router/ppp/pppd/ |
H A D | auth.c | 1415 char secbuf[MAXWORDLEN]; local 1418 strlcpy(secbuf, passwd, sizeof(secbuf)); 1422 secbuf[0] = 0; 1431 ret = scan_authfile(f, client, server, secbuf, &addrs, &opts, filename); 1444 len = strlen(secbuf); 1449 BCOPY(secbuf, secret, len); 1450 BZERO(secbuf, sizeof(secbuf));
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/ppp-2.4.4/pppd/ |
H A D | auth.c | 1953 char secbuf[MAXWORDLEN]; local 1956 strlcpy(secbuf, passwd, sizeof(secbuf)); 1958 if ( (*chap_passwd_hook)(client, secbuf) < 0) { 1967 secbuf[0] = 0; 1976 ret = scan_authfile(f, client, server, secbuf, &addrs, &opts, filename, 0); 1989 len = strlen(secbuf); 1994 BCOPY(secbuf, secret, len); 1995 BZERO(secbuf, sizeof(secbuf)); [all...] |
H A D | eap.c | 430 unsigned char secbuf[MAXWORDLEN], clear[8], *sp, *dp; local 465 sizeof (secbuf)) { 470 secbuf); 475 if (!DesDecrypt(secbuf, clear)) { 497 sp = secbuf + 8; 517 esp->es_server.ea_name, (char *)secbuf, 1) != 0) { 521 id = strtol((char *)secbuf, &cp, 10);
|
Completed in 51 milliseconds