/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
H A D | mschapv2.c | 45 size_t username_len; in mschapv2_derive_response() local 50 username_len = identity_len; in mschapv2_derive_response() 51 username = mschapv2_remove_domain(identity, &username_len); in mschapv2_derive_response() 53 username, username_len); in mschapv2_derive_response() 60 username, username_len); in mschapv2_derive_response() 67 username, username_len, in mschapv2_derive_response() 71 username, username_len, nt_response, in mschapv2_derive_response() 78 username, username_len, in mschapv2_derive_response() 84 username, username_len, in mschapv2_derive_response()
|
H A D | eap_mschapv2.c | 520 size_t username_len, password_len, new_password_len; in eap_mschapv2_change_password() 526 username = eap_get_config_identity(sm, &username_len); in eap_mschapv2_change_password() 532 username = mschapv2_remove_domain(username, &username_len); in eap_mschapv2_change_password() 593 username, username_len); in eap_mschapv2_change_password() 597 username, username_len, in eap_mschapv2_change_password() 608 username, username_len, in eap_mschapv2_change_password()
|
H A D | mschapv2.h | 18 int mschapv2_derive_response(const u8 *username, size_t username_len,
|
H A D | eap.h | 375 const u8 **username, size_t *username_len,
|
H A D | eap.c | 612 const u8 **username, size_t *username_len, in eap_peer_get_erp_info() 641 *username_len = pos - erp->keyname_nai; in eap_peer_get_erp_info() 653 if (*username_len == 0 || *realm_len == 0 || *rrk_len == 0) in eap_peer_get_erp_info() 611 eap_peer_get_erp_info(struct eap_sm *sm, struct eap_peer_config *config, const u8 **username, size_t *username_len, const u8 **realm, size_t *realm_len, u16 *erp_next_seq_num, const u8 **rrk, size_t *rrk_len) eap_peer_get_erp_info() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
H A D | mschapv2.c | 45 size_t username_len; in mschapv2_derive_response() local 50 username_len = identity_len; in mschapv2_derive_response() 51 username = mschapv2_remove_domain(identity, &username_len); in mschapv2_derive_response() 53 username, username_len); in mschapv2_derive_response() 60 username, username_len); in mschapv2_derive_response() 67 username, username_len, in mschapv2_derive_response() 71 username, username_len, nt_response, in mschapv2_derive_response() 78 username, username_len, in mschapv2_derive_response() 84 username, username_len, in mschapv2_derive_response()
|
H A D | eap_mschapv2.c | 520 size_t username_len, password_len, new_password_len; in eap_mschapv2_change_password() 526 username = eap_get_config_identity(sm, &username_len); in eap_mschapv2_change_password() 532 username = mschapv2_remove_domain(username, &username_len); in eap_mschapv2_change_password() 593 username, username_len); in eap_mschapv2_change_password() 597 username, username_len, in eap_mschapv2_change_password() 608 username, username_len, in eap_mschapv2_change_password()
|
H A D | mschapv2.h | 18 int mschapv2_derive_response(const u8 *username, size_t username_len,
|
H A D | eap.h | 374 const u8 **username, size_t *username_len,
|
H A D | eap.c | 620 const u8 **username, size_t *username_len, in eap_peer_get_erp_info() 649 *username_len = pos - erp->keyname_nai; in eap_peer_get_erp_info() 661 if (*username_len == 0 || *realm_len == 0 || *rrk_len == 0) in eap_peer_get_erp_info() 619 eap_peer_get_erp_info(struct eap_sm *sm, struct eap_peer_config *config, const u8 **username, size_t *username_len, const u8 **realm, size_t *realm_len, u16 *erp_next_seq_num, const u8 **rrk, size_t *rrk_len) eap_peer_get_erp_info() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | ms_funcs.h | 13 const u8 *username, size_t username_len, 18 const u8 *username, size_t username_len, 24 const u8 *username, size_t username_len, 29 const u8 *username, size_t username_len, 37 const u8 *username, size_t username_len, u8 *challenge);
|
H A D | ms_funcs.c | 77 * @username_len: Length of username 82 const u8 *username, size_t username_len, u8 *challenge) in challenge_hash() 93 len[2] = username_len; in challenge_hash() 165 * @username_len: Length of username 172 const u8 *username, size_t username_len, in generate_nt_response() 180 username_len, challenge) || in generate_nt_response() 193 * @username_len: Length of username 200 const u8 *username, size_t username_len, in generate_nt_response_pwhash() 207 username, username_len, in generate_nt_response_pwhash() 222 * @username_len 81 challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, u8 *challenge) challenge_hash() argument 171 generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password, size_t password_len, u8 *response) generate_nt_response() argument 198 generate_nt_response_pwhash(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password_hash, u8 *response) generate_nt_response_pwhash() argument 227 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) generate_authenticator_response_pwhash() argument 283 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) generate_authenticator_response() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | ms_funcs.h | 13 const u8 *username, size_t username_len, 18 const u8 *username, size_t username_len, 24 const u8 *username, size_t username_len, 29 const u8 *username, size_t username_len, 37 const u8 *username, size_t username_len, u8 *challenge);
|
H A D | ms_funcs.c | 77 * @username_len: Length of username 82 const u8 *username, size_t username_len, u8 *challenge) in challenge_hash() 93 len[2] = username_len; in challenge_hash() 165 * @username_len: Length of username 172 const u8 *username, size_t username_len, in generate_nt_response() 180 username_len, challenge) || in generate_nt_response() 193 * @username_len: Length of username 200 const u8 *username, size_t username_len, in generate_nt_response_pwhash() 207 username, username_len, in generate_nt_response_pwhash() 222 * @username_len 81 challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, u8 *challenge) challenge_hash() argument 171 generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password, size_t password_len, u8 *response) generate_nt_response() argument 198 generate_nt_response_pwhash(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password_hash, u8 *response) generate_nt_response_pwhash() argument 227 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) generate_authenticator_response_pwhash() argument 283 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) generate_authenticator_response() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
H A D | eap_server_mschapv2.c | 290 size_t username_len, user_len; in eap_mschapv2_process_response() local 343 username_len = sm->identity_len; in eap_mschapv2_process_response() 344 for (i = 0; i < username_len; i++) { in eap_mschapv2_process_response() 346 username_len -= i + 1; in eap_mschapv2_process_response() 367 username, username_len, challenge) == 0) { in eap_mschapv2_process_response() 369 username, username_len, in eap_mschapv2_process_response() 375 if (username_len != user_len || in eap_mschapv2_process_response() 376 os_memcmp(username, user, username_len) != 0) { in eap_mschapv2_process_response() 379 "name", username, username_len); in eap_mschapv2_process_response() 387 username, username_len); in eap_mschapv2_process_response() [all...] |
H A D | eap_server_ttls.c | 700 size_t username_len, i; in eap_ttls_process_phase2_mschapv2() local 732 username_len = sm->identity_len; in eap_ttls_process_phase2_mschapv2() 733 for (i = 0; i < username_len; i++) { in eap_ttls_process_phase2_mschapv2() 735 username_len -= i + 1; in eap_ttls_process_phase2_mschapv2() 764 username, username_len); in eap_ttls_process_phase2_mschapv2() 772 username, username_len, in eap_ttls_process_phase2_mschapv2() 777 username, username_len, in eap_ttls_process_phase2_mschapv2() 789 username, username_len, challenge2) == 0) { in eap_ttls_process_phase2_mschapv2() 791 username, username_len, in eap_ttls_process_phase2_mschapv2() 805 username, username_len, nt_respons in eap_ttls_process_phase2_mschapv2() [all...] |
H A D | eap.h | 164 const u8 *username, size_t username_len,
|
H A D | eap_server.c | 2098 const u8 *username, size_t username_len, in eap_server_mschap_rx_callback() 2105 printf_encode(user, sizeof(user), username, username_len); in eap_server_mschap_rx_callback() 2097 eap_server_mschap_rx_callback(struct eap_sm *sm, const char *source, const u8 *username, size_t username_len, const u8 *challenge, const u8 *response) eap_server_mschap_rx_callback() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
H A D | eap_server_mschapv2.c | 290 size_t username_len, user_len; in eap_mschapv2_process_response() local 343 username_len = sm->identity_len; in eap_mschapv2_process_response() 344 for (i = 0; i < username_len; i++) { in eap_mschapv2_process_response() 346 username_len -= i + 1; in eap_mschapv2_process_response() 367 username, username_len, challenge) == 0) { in eap_mschapv2_process_response() 369 username, username_len, in eap_mschapv2_process_response() 375 if (username_len != user_len || in eap_mschapv2_process_response() 376 os_memcmp(username, user, username_len) != 0) { in eap_mschapv2_process_response() 379 "name", username, username_len); in eap_mschapv2_process_response() 387 username, username_len); in eap_mschapv2_process_response() [all...] |
H A D | eap_server_ttls.c | 701 size_t username_len, i; in eap_ttls_process_phase2_mschapv2() local 733 username_len = sm->identity_len; in eap_ttls_process_phase2_mschapv2() 734 for (i = 0; i < username_len; i++) { in eap_ttls_process_phase2_mschapv2() 736 username_len -= i + 1; in eap_ttls_process_phase2_mschapv2() 765 username, username_len); in eap_ttls_process_phase2_mschapv2() 773 username, username_len, in eap_ttls_process_phase2_mschapv2() 778 username, username_len, in eap_ttls_process_phase2_mschapv2() 790 username, username_len, challenge2) == 0) { in eap_ttls_process_phase2_mschapv2() 792 username, username_len, in eap_ttls_process_phase2_mschapv2() 806 username, username_len, nt_respons in eap_ttls_process_phase2_mschapv2() [all...] |
H A D | eap.h | 289 const u8 *username, size_t username_len,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eapol_supp/ |
H A D | eapol_supp_sm.h | 350 const u8 **username, size_t *username_len, 480 const u8 **username, size_t *username_len, in eapol_sm_get_erp_info() 479 eapol_sm_get_erp_info(struct eapol_sm *sm, struct eap_peer_config *config, const u8 **username, size_t *username_len, const u8 **realm, size_t *realm_len, u16 *erp_next_seq_num, const u8 **rrk, size_t *rrk_len) eapol_sm_get_erp_info() argument
|
H A D | eapol_supp_sm.c | 2243 const u8 **username, size_t *username_len, in eapol_sm_get_erp_info() 2251 return eap_peer_get_erp_info(sm->eap, config, username, username_len, in eapol_sm_get_erp_info() 2242 eapol_sm_get_erp_info(struct eapol_sm *sm, struct eap_peer_config *config, const u8 **username, size_t *username_len, const u8 **realm, size_t *realm_len, u16 *erp_next_seq_num, const u8 **rrk, size_t *rrk_len) eapol_sm_get_erp_info() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eapol_supp/ |
H A D | eapol_supp_sm.h | 365 const u8 **username, size_t *username_len, 495 const u8 **username, size_t *username_len, in eapol_sm_get_erp_info() 494 eapol_sm_get_erp_info(struct eapol_sm *sm, struct eap_peer_config *config, const u8 **username, size_t *username_len, const u8 **realm, size_t *realm_len, u16 *erp_next_seq_num, const u8 **rrk, size_t *rrk_len) eapol_sm_get_erp_info() argument
|
/third_party/ffmpeg/libavformat/ |
H A D | libsmbclient.c | 41 char *username, int username_len, in libsmbc_get_auth_data() 39 libsmbc_get_auth_data(SMBCCTX *c, const char *server, const char *share, char *workgroup, int workgroup_len, char *username, int username_len, char *password, int password_len) libsmbc_get_auth_data() argument
|