Searched refs:secbuf (Results 1 - 3 of 3) sorted by relevance
/third_party/lwip/src/netif/ppp/ |
H A D | auth.c | 1928 char secbuf[MAXWORDLEN]; in get_secret() 1933 strlcpy(secbuf, ppp_settings.passwd, sizeof(secbuf)); in get_secret() 1935 if ( (*chap_passwd_hook)(client, secbuf) < 0) { in get_secret() 1943 secbuf[0] = 0; in get_secret() 1952 ret = scan_authfile(f, client, server, secbuf, &addrs, &opts, filename, 0); in get_secret() 1965 len = strlen(secbuf); in get_secret() 1970 MEMCPY(secret, secbuf, len); in get_secret() 1971 BZERO(secbuf, sizeof(secbuf)); in get_secret() [all...] |
H A D | eap.c | 427 unsigned char secbuf[MAXSECRETLEN], clear[8], *sp, *dp; in eap_figure_next_state() local 462 sizeof (secbuf)) { in eap_figure_next_state() 467 secbuf); in eap_figure_next_state() 473 if (!DesDecrypt(secbuf, clear)) { in eap_figure_next_state() 495 sp = secbuf + 8; in eap_figure_next_state() 516 pcb->eap.es_server.ea_name, (char *)secbuf, 1) != 0) { in eap_figure_next_state() 520 id = strtol((char *)secbuf, &cp, 10); in eap_figure_next_state()
|
/third_party/toybox/toys/pending/ |
H A D | fdisk.c | 91 static struct partition* part_offset(char *secbuf, int i) in part_offset() argument 93 return (struct partition*)(secbuf + 0x1be + i*(sizeof(struct partition))); in part_offset()
|
Completed in 7 milliseconds