Home
last modified time | relevance | path

Searched refs:user_len (Results 1 - 13 of 13) sorted by relevance

/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/
H A Deap_server_mschapv2.c290 size_t username_len, user_len; in eap_mschapv2_process_response() local
353 user_len = name_len; in eap_mschapv2_process_response()
354 for (i = 0; i < user_len; i++) { in eap_mschapv2_process_response()
356 user_len -= i + 1; in eap_mschapv2_process_response()
375 if (username_len != user_len || in eap_mschapv2_process_response()
381 "name", user, user_len); in eap_mschapv2_process_response()
H A Deap_server_tls.c210 int user_len; in eap_tls_buildReq() local
212 user_len = os_snprintf(user, sizeof(user), "cert-%s", in eap_tls_buildReq()
214 if (eap_user_get(sm, (const u8 *) user, user_len, in eap_tls_buildReq()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/
H A Deap_server_mschapv2.c290 size_t username_len, user_len; in eap_mschapv2_process_response() local
353 user_len = name_len; in eap_mschapv2_process_response()
354 for (i = 0; i < user_len; i++) { in eap_mschapv2_process_response()
356 user_len -= i + 1; in eap_mschapv2_process_response()
375 if (username_len != user_len || in eap_mschapv2_process_response()
381 "name", user, user_len); in eap_mschapv2_process_response()
H A Deap_server_tls.c211 int user_len; in eap_tls_buildReq() local
213 user_len = os_snprintf(user, sizeof(user), "cert-%s", in eap_tls_buildReq()
215 if (eap_user_get(sm, (const u8 *) user, user_len, in eap_tls_buildReq()
/third_party/mbedtls/library/
H A Dpsa_crypto_pake.c159 size_t user_len = 0, peer_len = 0, password_len = 0; in mbedtls_psa_pake_setup() local
169 status = psa_crypto_driver_pake_get_user_len(inputs, &user_len); in mbedtls_psa_pake_setup()
190 user = mbedtls_calloc(1, user_len); in mbedtls_psa_pake_setup()
209 user_len, &actual_user_len); in mbedtls_psa_pake_setup()
H A Dpsa_crypto.c8321 size_t *user_len) in psa_crypto_driver_pake_get_user_len()
8323 if (inputs->user_len == 0) { in psa_crypto_driver_pake_get_user_len()
8327 *user_len = inputs->user_len; in psa_crypto_driver_pake_get_user_len()
8336 if (inputs->user_len == 0) { in psa_crypto_driver_pake_get_user()
8340 if (user_id_size < inputs->user_len) { in psa_crypto_driver_pake_get_user()
8344 memcpy(user_id, inputs->user, inputs->user_len); in psa_crypto_driver_pake_get_user()
8345 *user_id_len = inputs->user_len; in psa_crypto_driver_pake_get_user()
8505 if (operation->data.inputs.user_len != 0) { in psa_pake_set_user()
8519 operation->data.inputs.user_len in psa_pake_set_user()
8319 psa_crypto_driver_pake_get_user_len( const psa_crypto_driver_pake_inputs_t *inputs, size_t *user_len) psa_crypto_driver_pake_get_user_len() argument
[all...]
H A Dssl_tls.c1974 size_t user_len = 0; in mbedtls_ssl_set_hs_ecjpake_password_common() local
1991 user_len = sizeof(jpake_server_id); in mbedtls_ssl_set_hs_ecjpake_password_common()
1996 user_len = sizeof(jpake_client_id); in mbedtls_ssl_set_hs_ecjpake_password_common()
2001 status = psa_pake_set_user(&ssl->handshake->psa_pake_ctx, user, user_len); in mbedtls_ssl_set_hs_ecjpake_password_common()
/third_party/selinux/libselinux/src/
H A Dget_context_list.c139 size_t user_len = strlen(user); in get_context_user() local
226 if (SIZE_MAX - user_len < strlen(start) + 2) { in get_context_user()
232 usercon_len = user_len + strlen(start) + 2; in get_context_user()
/third_party/FreeBSD/sys/dev/usb/
H A Dusb_dev.h150 uint32_t user_len);
H A Dusb_dev.c2014 usb_read_symlink(uint8_t *user_ptr, uint32_t startentry, uint32_t user_len) in usb_read_symlink() argument
2043 if (temp > user_len) { in usb_read_symlink()
2090 user_len -= temp; in usb_read_symlink()
2095 if ((user_len != 0) && (error == 0)) { in usb_read_symlink()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/radius/
H A Dradius_server.c707 size_t user_len, id_len; in radius_server_get_new_session() local
716 &user_len, NULL) < 0) { in radius_server_get_new_session()
720 RADIUS_DUMP_ASCII("User-Name", user, user_len); in radius_server_get_new_session()
726 res = data->get_eap_user(data->conf_ctx, user, user_len, 0, tmp); in radius_server_get_new_session()
731 username = os_zalloc(user_len + 1); in radius_server_get_new_session()
733 os_memcpy(username, user, user_len); in radius_server_get_new_session()
757 sess->username = os_malloc(user_len * 4 + 1); in radius_server_get_new_session()
762 printf_encode(sess->username, user_len * 4 + 1, user, user_len); in radius_server_get_new_session()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/radius/
H A Dradius_server.c564 size_t user_len, id_len; in radius_server_get_new_session() local
573 &user_len, NULL) < 0) { in radius_server_get_new_session()
577 RADIUS_DUMP_ASCII("User-Name", user, user_len); in radius_server_get_new_session()
583 res = data->get_eap_user(data->conf_ctx, user, user_len, 0, tmp); in radius_server_get_new_session()
588 username = os_zalloc(user_len + 1); in radius_server_get_new_session()
590 os_memcpy(username, user, user_len); in radius_server_get_new_session()
614 sess->username = os_malloc(user_len * 4 + 1); in radius_server_get_new_session()
619 printf_encode(sess->username, user_len * 4 + 1, user, user_len); in radius_server_get_new_session()
/third_party/mbedtls/include/psa/
H A Dcrypto_extra.h1086 * \param[out] user_len User id length.
1095 size_t *user_len);
1783 size_t MBEDTLS_PRIVATE(user_len);

Completed in 37 milliseconds