Home
last modified time | relevance | path

Searched refs:username_len (Results 1 – 25 of 31) sorted by relevance

12

/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/
Dmschapv2.c45 size_t username_len; in mschapv2_derive_response() local
50 username_len = identity_len; in mschapv2_derive_response()
51 username = mschapv2_remove_domain(identity, &username_len); in mschapv2_derive_response()
53 username, username_len); in mschapv2_derive_response()
60 username, username_len); in mschapv2_derive_response()
67 username, username_len, in mschapv2_derive_response()
71 username, username_len, nt_response, in mschapv2_derive_response()
78 username, username_len, in mschapv2_derive_response()
84 username, username_len, in mschapv2_derive_response()
Deap_mschapv2.c520 size_t username_len, password_len, new_password_len; in eap_mschapv2_change_password()
526 username = eap_get_config_identity(sm, &username_len); in eap_mschapv2_change_password()
532 username = mschapv2_remove_domain(username, &username_len); in eap_mschapv2_change_password()
593 username, username_len); in eap_mschapv2_change_password()
597 username, username_len, in eap_mschapv2_change_password()
608 username, username_len, in eap_mschapv2_change_password()
Dmschapv2.h18 int mschapv2_derive_response(const u8 *username, size_t username_len,
Deap.h375 const u8 **username, size_t *username_len,
Deap.c612 const u8 **username, size_t *username_len, in eap_peer_get_erp_info() argument
641 *username_len = pos - erp->keyname_nai; in eap_peer_get_erp_info()
653 if (*username_len == 0 || *realm_len == 0 || *rrk_len == 0) in eap_peer_get_erp_info()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/
Dmschapv2.c45 size_t username_len; in mschapv2_derive_response() local
50 username_len = identity_len; in mschapv2_derive_response()
51 username = mschapv2_remove_domain(identity, &username_len); in mschapv2_derive_response()
53 username, username_len); in mschapv2_derive_response()
60 username, username_len); in mschapv2_derive_response()
67 username, username_len, in mschapv2_derive_response()
71 username, username_len, nt_response, in mschapv2_derive_response()
78 username, username_len, in mschapv2_derive_response()
84 username, username_len, in mschapv2_derive_response()
Deap_mschapv2.c520 size_t username_len, password_len, new_password_len; in eap_mschapv2_change_password()
526 username = eap_get_config_identity(sm, &username_len); in eap_mschapv2_change_password()
532 username = mschapv2_remove_domain(username, &username_len); in eap_mschapv2_change_password()
593 username, username_len); in eap_mschapv2_change_password()
597 username, username_len, in eap_mschapv2_change_password()
608 username, username_len, in eap_mschapv2_change_password()
Dmschapv2.h18 int mschapv2_derive_response(const u8 *username, size_t username_len,
Deap.h374 const u8 **username, size_t *username_len,
Deap.c620 const u8 **username, size_t *username_len, in eap_peer_get_erp_info() argument
649 *username_len = pos - erp->keyname_nai; in eap_peer_get_erp_info()
661 if (*username_len == 0 || *realm_len == 0 || *rrk_len == 0) in eap_peer_get_erp_info()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
Dms_funcs.c82 const u8 *username, size_t username_len, u8 *challenge) in challenge_hash() argument
93 len[2] = username_len; in challenge_hash()
172 const u8 *username, size_t username_len, in generate_nt_response() argument
180 username_len, challenge) || in generate_nt_response()
200 const u8 *username, size_t username_len, in generate_nt_response_pwhash() argument
207 username, username_len, in generate_nt_response_pwhash()
230 const u8 *username, size_t username_len, in generate_authenticator_response_pwhash() argument
264 username_len, challenge)) in generate_authenticator_response_pwhash()
286 const u8 *username, size_t username_len, in generate_authenticator_response() argument
294 username, username_len, nt_response, response); in generate_authenticator_response()
Dms_funcs.h13 const u8 *username, size_t username_len,
18 const u8 *username, size_t username_len,
24 const u8 *username, size_t username_len,
29 const u8 *username, size_t username_len,
37 const u8 *username, size_t username_len, u8 *challenge);
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
Dms_funcs.c82 const u8 *username, size_t username_len, u8 *challenge) in challenge_hash() argument
93 len[2] = username_len; in challenge_hash()
172 const u8 *username, size_t username_len, in generate_nt_response() argument
180 username_len, challenge) || in generate_nt_response()
200 const u8 *username, size_t username_len, in generate_nt_response_pwhash() argument
207 username, username_len, in generate_nt_response_pwhash()
230 const u8 *username, size_t username_len, in generate_authenticator_response_pwhash() argument
264 username_len, challenge)) in generate_authenticator_response_pwhash()
286 const u8 *username, size_t username_len, in generate_authenticator_response() argument
294 username, username_len, nt_response, response); in generate_authenticator_response()
Dms_funcs.h13 const u8 *username, size_t username_len,
18 const u8 *username, size_t username_len,
24 const u8 *username, size_t username_len,
29 const u8 *username, size_t username_len,
37 const u8 *username, size_t username_len, u8 *challenge);
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/
Deap_server_mschapv2.c290 size_t username_len, user_len; in eap_mschapv2_process_response() local
343 username_len = sm->identity_len; in eap_mschapv2_process_response()
344 for (i = 0; i < username_len; i++) { in eap_mschapv2_process_response()
346 username_len -= i + 1; in eap_mschapv2_process_response()
367 username, username_len, challenge) == 0) { in eap_mschapv2_process_response()
369 username, username_len, in eap_mschapv2_process_response()
375 if (username_len != user_len || in eap_mschapv2_process_response()
376 os_memcmp(username, user, username_len) != 0) { in eap_mschapv2_process_response()
379 "name", username, username_len); in eap_mschapv2_process_response()
387 username, username_len); in eap_mschapv2_process_response()
[all …]
Deap_server_ttls.c701 size_t username_len, i; in eap_ttls_process_phase2_mschapv2() local
733 username_len = sm->identity_len; in eap_ttls_process_phase2_mschapv2()
734 for (i = 0; i < username_len; i++) { in eap_ttls_process_phase2_mschapv2()
736 username_len -= i + 1; in eap_ttls_process_phase2_mschapv2()
765 username, username_len); in eap_ttls_process_phase2_mschapv2()
773 username, username_len, in eap_ttls_process_phase2_mschapv2()
778 username, username_len, in eap_ttls_process_phase2_mschapv2()
790 username, username_len, challenge2) == 0) { in eap_ttls_process_phase2_mschapv2()
792 username, username_len, in eap_ttls_process_phase2_mschapv2()
806 username, username_len, nt_response, in eap_ttls_process_phase2_mschapv2()
[all …]
Deap.h289 const u8 *username, size_t username_len,
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/
Deap_server_mschapv2.c290 size_t username_len, user_len; in eap_mschapv2_process_response() local
343 username_len = sm->identity_len; in eap_mschapv2_process_response()
344 for (i = 0; i < username_len; i++) { in eap_mschapv2_process_response()
346 username_len -= i + 1; in eap_mschapv2_process_response()
367 username, username_len, challenge) == 0) { in eap_mschapv2_process_response()
369 username, username_len, in eap_mschapv2_process_response()
375 if (username_len != user_len || in eap_mschapv2_process_response()
376 os_memcmp(username, user, username_len) != 0) { in eap_mschapv2_process_response()
379 "name", username, username_len); in eap_mschapv2_process_response()
387 username, username_len); in eap_mschapv2_process_response()
[all …]
Deap_server_ttls.c700 size_t username_len, i; in eap_ttls_process_phase2_mschapv2() local
732 username_len = sm->identity_len; in eap_ttls_process_phase2_mschapv2()
733 for (i = 0; i < username_len; i++) { in eap_ttls_process_phase2_mschapv2()
735 username_len -= i + 1; in eap_ttls_process_phase2_mschapv2()
764 username, username_len); in eap_ttls_process_phase2_mschapv2()
772 username, username_len, in eap_ttls_process_phase2_mschapv2()
777 username, username_len, in eap_ttls_process_phase2_mschapv2()
789 username, username_len, challenge2) == 0) { in eap_ttls_process_phase2_mschapv2()
791 username, username_len, in eap_ttls_process_phase2_mschapv2()
805 username, username_len, nt_response, in eap_ttls_process_phase2_mschapv2()
[all …]
Deap.h164 const u8 *username, size_t username_len,
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eapol_supp/
Deapol_supp_sm.h350 const u8 **username, size_t *username_len,
480 const u8 **username, size_t *username_len, in eapol_sm_get_erp_info() argument
Deapol_supp_sm.c2243 const u8 **username, size_t *username_len, in eapol_sm_get_erp_info() argument
2251 return eap_peer_get_erp_info(sm->eap, config, username, username_len, in eapol_sm_get_erp_info()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eapol_supp/
Deapol_supp_sm.h359 const u8 **username, size_t *username_len,
489 const u8 **username, size_t *username_len, in eapol_sm_get_erp_info() argument
Deapol_supp_sm.c2259 const u8 **username, size_t *username_len, in eapol_sm_get_erp_info() argument
2267 return eap_peer_get_erp_info(sm->eap, config, username, username_len, in eapol_sm_get_erp_info()
/third_party/ffmpeg/libavformat/
Dlibsmbclient.c41 char *username, int username_len, in libsmbc_get_auth_data() argument

12