Home
last modified time | relevance | path

Searched refs:username_len (Results 1 - 25 of 31) sorted by relevance

12

/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/
H A Dmschapv2.c45 size_t username_len; in mschapv2_derive_response() local
50 username_len = identity_len; in mschapv2_derive_response()
51 username = mschapv2_remove_domain(identity, &username_len); in mschapv2_derive_response()
53 username, username_len); in mschapv2_derive_response()
60 username, username_len); in mschapv2_derive_response()
67 username, username_len, in mschapv2_derive_response()
71 username, username_len, nt_response, in mschapv2_derive_response()
78 username, username_len, in mschapv2_derive_response()
84 username, username_len, in mschapv2_derive_response()
H A Deap_mschapv2.c520 size_t username_len, password_len, new_password_len; in eap_mschapv2_change_password()
526 username = eap_get_config_identity(sm, &username_len); in eap_mschapv2_change_password()
532 username = mschapv2_remove_domain(username, &username_len); in eap_mschapv2_change_password()
593 username, username_len); in eap_mschapv2_change_password()
597 username, username_len, in eap_mschapv2_change_password()
608 username, username_len, in eap_mschapv2_change_password()
H A Dmschapv2.h18 int mschapv2_derive_response(const u8 *username, size_t username_len,
H A Deap.h375 const u8 **username, size_t *username_len,
H A Deap.c612 const u8 **username, size_t *username_len, in eap_peer_get_erp_info()
641 *username_len = pos - erp->keyname_nai; in eap_peer_get_erp_info()
653 if (*username_len == 0 || *realm_len == 0 || *rrk_len == 0) in eap_peer_get_erp_info()
611 eap_peer_get_erp_info(struct eap_sm *sm, struct eap_peer_config *config, const u8 **username, size_t *username_len, const u8 **realm, size_t *realm_len, u16 *erp_next_seq_num, const u8 **rrk, size_t *rrk_len) eap_peer_get_erp_info() argument
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/
H A Dmschapv2.c45 size_t username_len; in mschapv2_derive_response() local
50 username_len = identity_len; in mschapv2_derive_response()
51 username = mschapv2_remove_domain(identity, &username_len); in mschapv2_derive_response()
53 username, username_len); in mschapv2_derive_response()
60 username, username_len); in mschapv2_derive_response()
67 username, username_len, in mschapv2_derive_response()
71 username, username_len, nt_response, in mschapv2_derive_response()
78 username, username_len, in mschapv2_derive_response()
84 username, username_len, in mschapv2_derive_response()
H A Deap_mschapv2.c520 size_t username_len, password_len, new_password_len; in eap_mschapv2_change_password()
526 username = eap_get_config_identity(sm, &username_len); in eap_mschapv2_change_password()
532 username = mschapv2_remove_domain(username, &username_len); in eap_mschapv2_change_password()
593 username, username_len); in eap_mschapv2_change_password()
597 username, username_len, in eap_mschapv2_change_password()
608 username, username_len, in eap_mschapv2_change_password()
H A Dmschapv2.h18 int mschapv2_derive_response(const u8 *username, size_t username_len,
H A Deap.h374 const u8 **username, size_t *username_len,
H A Deap.c620 const u8 **username, size_t *username_len, in eap_peer_get_erp_info()
649 *username_len = pos - erp->keyname_nai; in eap_peer_get_erp_info()
661 if (*username_len == 0 || *realm_len == 0 || *rrk_len == 0) in eap_peer_get_erp_info()
619 eap_peer_get_erp_info(struct eap_sm *sm, struct eap_peer_config *config, const u8 **username, size_t *username_len, const u8 **realm, size_t *realm_len, u16 *erp_next_seq_num, const u8 **rrk, size_t *rrk_len) eap_peer_get_erp_info() argument
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
H A Dms_funcs.h13 const u8 *username, size_t username_len,
18 const u8 *username, size_t username_len,
24 const u8 *username, size_t username_len,
29 const u8 *username, size_t username_len,
37 const u8 *username, size_t username_len, u8 *challenge);
H A Dms_funcs.c77 * @username_len: Length of username
82 const u8 *username, size_t username_len, u8 *challenge) in challenge_hash()
93 len[2] = username_len; in challenge_hash()
165 * @username_len: Length of username
172 const u8 *username, size_t username_len, in generate_nt_response()
180 username_len, challenge) || in generate_nt_response()
193 * @username_len: Length of username
200 const u8 *username, size_t username_len, in generate_nt_response_pwhash()
207 username, username_len, in generate_nt_response_pwhash()
222 * @username_len
81 challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, u8 *challenge) challenge_hash() argument
171 generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password, size_t password_len, u8 *response) generate_nt_response() argument
198 generate_nt_response_pwhash(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password_hash, u8 *response) generate_nt_response_pwhash() argument
227 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) generate_authenticator_response_pwhash() argument
283 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) generate_authenticator_response() argument
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
H A Dms_funcs.h13 const u8 *username, size_t username_len,
18 const u8 *username, size_t username_len,
24 const u8 *username, size_t username_len,
29 const u8 *username, size_t username_len,
37 const u8 *username, size_t username_len, u8 *challenge);
H A Dms_funcs.c77 * @username_len: Length of username
82 const u8 *username, size_t username_len, u8 *challenge) in challenge_hash()
93 len[2] = username_len; in challenge_hash()
165 * @username_len: Length of username
172 const u8 *username, size_t username_len, in generate_nt_response()
180 username_len, challenge) || in generate_nt_response()
193 * @username_len: Length of username
200 const u8 *username, size_t username_len, in generate_nt_response_pwhash()
207 username, username_len, in generate_nt_response_pwhash()
222 * @username_len
81 challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, u8 *challenge) challenge_hash() argument
171 generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password, size_t password_len, u8 *response) generate_nt_response() argument
198 generate_nt_response_pwhash(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password_hash, u8 *response) generate_nt_response_pwhash() argument
227 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) generate_authenticator_response_pwhash() argument
283 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) generate_authenticator_response() argument
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/
H A Deap_server_mschapv2.c290 size_t username_len, user_len; in eap_mschapv2_process_response() local
343 username_len = sm->identity_len; in eap_mschapv2_process_response()
344 for (i = 0; i < username_len; i++) { in eap_mschapv2_process_response()
346 username_len -= i + 1; in eap_mschapv2_process_response()
367 username, username_len, challenge) == 0) { in eap_mschapv2_process_response()
369 username, username_len, in eap_mschapv2_process_response()
375 if (username_len != user_len || in eap_mschapv2_process_response()
376 os_memcmp(username, user, username_len) != 0) { in eap_mschapv2_process_response()
379 "name", username, username_len); in eap_mschapv2_process_response()
387 username, username_len); in eap_mschapv2_process_response()
[all...]
H A Deap_server_ttls.c700 size_t username_len, i; in eap_ttls_process_phase2_mschapv2() local
732 username_len = sm->identity_len; in eap_ttls_process_phase2_mschapv2()
733 for (i = 0; i < username_len; i++) { in eap_ttls_process_phase2_mschapv2()
735 username_len -= i + 1; in eap_ttls_process_phase2_mschapv2()
764 username, username_len); in eap_ttls_process_phase2_mschapv2()
772 username, username_len, in eap_ttls_process_phase2_mschapv2()
777 username, username_len, in eap_ttls_process_phase2_mschapv2()
789 username, username_len, challenge2) == 0) { in eap_ttls_process_phase2_mschapv2()
791 username, username_len, in eap_ttls_process_phase2_mschapv2()
805 username, username_len, nt_respons in eap_ttls_process_phase2_mschapv2()
[all...]
H A Deap.h164 const u8 *username, size_t username_len,
H A Deap_server.c2098 const u8 *username, size_t username_len, in eap_server_mschap_rx_callback()
2105 printf_encode(user, sizeof(user), username, username_len); in eap_server_mschap_rx_callback()
2097 eap_server_mschap_rx_callback(struct eap_sm *sm, const char *source, const u8 *username, size_t username_len, const u8 *challenge, const u8 *response) eap_server_mschap_rx_callback() argument
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/
H A Deap_server_mschapv2.c290 size_t username_len, user_len; in eap_mschapv2_process_response() local
343 username_len = sm->identity_len; in eap_mschapv2_process_response()
344 for (i = 0; i < username_len; i++) { in eap_mschapv2_process_response()
346 username_len -= i + 1; in eap_mschapv2_process_response()
367 username, username_len, challenge) == 0) { in eap_mschapv2_process_response()
369 username, username_len, in eap_mschapv2_process_response()
375 if (username_len != user_len || in eap_mschapv2_process_response()
376 os_memcmp(username, user, username_len) != 0) { in eap_mschapv2_process_response()
379 "name", username, username_len); in eap_mschapv2_process_response()
387 username, username_len); in eap_mschapv2_process_response()
[all...]
H A Deap_server_ttls.c701 size_t username_len, i; in eap_ttls_process_phase2_mschapv2() local
733 username_len = sm->identity_len; in eap_ttls_process_phase2_mschapv2()
734 for (i = 0; i < username_len; i++) { in eap_ttls_process_phase2_mschapv2()
736 username_len -= i + 1; in eap_ttls_process_phase2_mschapv2()
765 username, username_len); in eap_ttls_process_phase2_mschapv2()
773 username, username_len, in eap_ttls_process_phase2_mschapv2()
778 username, username_len, in eap_ttls_process_phase2_mschapv2()
790 username, username_len, challenge2) == 0) { in eap_ttls_process_phase2_mschapv2()
792 username, username_len, in eap_ttls_process_phase2_mschapv2()
806 username, username_len, nt_respons in eap_ttls_process_phase2_mschapv2()
[all...]
H A Deap.h289 const u8 *username, size_t username_len,
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eapol_supp/
H A Deapol_supp_sm.h350 const u8 **username, size_t *username_len,
480 const u8 **username, size_t *username_len, in eapol_sm_get_erp_info()
479 eapol_sm_get_erp_info(struct eapol_sm *sm, struct eap_peer_config *config, const u8 **username, size_t *username_len, const u8 **realm, size_t *realm_len, u16 *erp_next_seq_num, const u8 **rrk, size_t *rrk_len) eapol_sm_get_erp_info() argument
H A Deapol_supp_sm.c2243 const u8 **username, size_t *username_len, in eapol_sm_get_erp_info()
2251 return eap_peer_get_erp_info(sm->eap, config, username, username_len, in eapol_sm_get_erp_info()
2242 eapol_sm_get_erp_info(struct eapol_sm *sm, struct eap_peer_config *config, const u8 **username, size_t *username_len, const u8 **realm, size_t *realm_len, u16 *erp_next_seq_num, const u8 **rrk, size_t *rrk_len) eapol_sm_get_erp_info() argument
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eapol_supp/
H A Deapol_supp_sm.h365 const u8 **username, size_t *username_len,
495 const u8 **username, size_t *username_len, in eapol_sm_get_erp_info()
494 eapol_sm_get_erp_info(struct eapol_sm *sm, struct eap_peer_config *config, const u8 **username, size_t *username_len, const u8 **realm, size_t *realm_len, u16 *erp_next_seq_num, const u8 **rrk, size_t *rrk_len) eapol_sm_get_erp_info() argument
/third_party/ffmpeg/libavformat/
H A Dlibsmbclient.c41 char *username, int username_len, in libsmbc_get_auth_data()
39 libsmbc_get_auth_data(SMBCCTX *c, const char *server, const char *share, char *workgroup, int workgroup_len, char *username, int username_len, char *password, int password_len) libsmbc_get_auth_data() argument

Completed in 24 milliseconds

12