Searched refs:secbuf (Results 1 - 5 of 5) sorted by relevance

/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/media/dvb/dvb-core/
H A Ddvb_demux.c138 u8 xor = f->filter.filter_value[i] ^ feed->feed.sec.secbuf[i];
149 return feed->cb.sec(feed->feed.sec.secbuf, feed->feed.sec.seclen,
167 section_syntax_indicator = ((sec->secbuf[1] & 0x80) != 0);
169 demux->check_crc32(feed, sec->secbuf, sec->seclen))
196 if (sec->secbuf[0] != 0xff || sec->secbuf[n - 1] != 0xff) {
201 printk(" %02x", sec->secbuf[i]);
208 sec->secbuf = sec->secbuf_base;
261 /* to be sure always set secbuf */
262 sec->secbuf
[all...]
H A Ddemux.h159 u8 *secbuf; member in struct:dmx_section_feed
/netgear-R7000-V1.0.7.12_1.2.5/src/router/ppp/pppd/
H A Dauth.c1415 char secbuf[MAXWORDLEN]; local
1418 strlcpy(secbuf, passwd, sizeof(secbuf));
1422 secbuf[0] = 0;
1431 ret = scan_authfile(f, client, server, secbuf, &addrs, &opts, filename);
1444 len = strlen(secbuf);
1449 BCOPY(secbuf, secret, len);
1450 BZERO(secbuf, sizeof(secbuf));
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/ppp-2.4.4/pppd/
H A Dauth.c1953 char secbuf[MAXWORDLEN]; local
1956 strlcpy(secbuf, passwd, sizeof(secbuf));
1958 if ( (*chap_passwd_hook)(client, secbuf) < 0) {
1967 secbuf[0] = 0;
1976 ret = scan_authfile(f, client, server, secbuf, &addrs, &opts, filename, 0);
1989 len = strlen(secbuf);
1994 BCOPY(secbuf, secret, len);
1995 BZERO(secbuf, sizeof(secbuf));
[all...]
H A Deap.c430 unsigned char secbuf[MAXWORDLEN], clear[8], *sp, *dp; local
465 sizeof (secbuf)) {
470 secbuf);
475 if (!DesDecrypt(secbuf, clear)) {
497 sp = secbuf + 8;
517 esp->es_server.ea_name, (char *)secbuf, 1) != 0) {
521 id = strtol((char *)secbuf, &cp, 10);

Completed in 51 milliseconds