/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
D | mschapv2.c | 45 size_t username_len; in mschapv2_derive_response() local 50 username_len = identity_len; in mschapv2_derive_response() 51 username = mschapv2_remove_domain(identity, &username_len); in mschapv2_derive_response() 53 username, username_len); in mschapv2_derive_response() 60 username, username_len); in mschapv2_derive_response() 67 username, username_len, in mschapv2_derive_response() 71 username, username_len, nt_response, in mschapv2_derive_response() 78 username, username_len, in mschapv2_derive_response() 84 username, username_len, in mschapv2_derive_response()
|
D | eap_mschapv2.c | 520 size_t username_len, password_len, new_password_len; in eap_mschapv2_change_password() 526 username = eap_get_config_identity(sm, &username_len); in eap_mschapv2_change_password() 532 username = mschapv2_remove_domain(username, &username_len); in eap_mschapv2_change_password() 593 username, username_len); in eap_mschapv2_change_password() 597 username, username_len, in eap_mschapv2_change_password() 608 username, username_len, in eap_mschapv2_change_password()
|
D | mschapv2.h | 18 int mschapv2_derive_response(const u8 *username, size_t username_len,
|
D | eap.h | 375 const u8 **username, size_t *username_len,
|
D | eap.c | 612 const u8 **username, size_t *username_len, in eap_peer_get_erp_info() argument 641 *username_len = pos - erp->keyname_nai; in eap_peer_get_erp_info() 653 if (*username_len == 0 || *realm_len == 0 || *rrk_len == 0) in eap_peer_get_erp_info()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
D | mschapv2.c | 45 size_t username_len; in mschapv2_derive_response() local 50 username_len = identity_len; in mschapv2_derive_response() 51 username = mschapv2_remove_domain(identity, &username_len); in mschapv2_derive_response() 53 username, username_len); in mschapv2_derive_response() 60 username, username_len); in mschapv2_derive_response() 67 username, username_len, in mschapv2_derive_response() 71 username, username_len, nt_response, in mschapv2_derive_response() 78 username, username_len, in mschapv2_derive_response() 84 username, username_len, in mschapv2_derive_response()
|
D | eap_mschapv2.c | 520 size_t username_len, password_len, new_password_len; in eap_mschapv2_change_password() 526 username = eap_get_config_identity(sm, &username_len); in eap_mschapv2_change_password() 532 username = mschapv2_remove_domain(username, &username_len); in eap_mschapv2_change_password() 593 username, username_len); in eap_mschapv2_change_password() 597 username, username_len, in eap_mschapv2_change_password() 608 username, username_len, in eap_mschapv2_change_password()
|
D | mschapv2.h | 18 int mschapv2_derive_response(const u8 *username, size_t username_len,
|
D | eap.h | 374 const u8 **username, size_t *username_len,
|
D | eap.c | 620 const u8 **username, size_t *username_len, in eap_peer_get_erp_info() argument 649 *username_len = pos - erp->keyname_nai; in eap_peer_get_erp_info() 661 if (*username_len == 0 || *realm_len == 0 || *rrk_len == 0) in eap_peer_get_erp_info()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
D | ms_funcs.c | 82 const u8 *username, size_t username_len, u8 *challenge) in challenge_hash() argument 93 len[2] = username_len; in challenge_hash() 172 const u8 *username, size_t username_len, in generate_nt_response() argument 180 username_len, challenge) || in generate_nt_response() 200 const u8 *username, size_t username_len, in generate_nt_response_pwhash() argument 207 username, username_len, in generate_nt_response_pwhash() 230 const u8 *username, size_t username_len, in generate_authenticator_response_pwhash() argument 264 username_len, challenge)) in generate_authenticator_response_pwhash() 286 const u8 *username, size_t username_len, in generate_authenticator_response() argument 294 username, username_len, nt_response, response); in generate_authenticator_response()
|
D | ms_funcs.h | 13 const u8 *username, size_t username_len, 18 const u8 *username, size_t username_len, 24 const u8 *username, size_t username_len, 29 const u8 *username, size_t username_len, 37 const u8 *username, size_t username_len, u8 *challenge);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
D | ms_funcs.c | 82 const u8 *username, size_t username_len, u8 *challenge) in challenge_hash() argument 93 len[2] = username_len; in challenge_hash() 172 const u8 *username, size_t username_len, in generate_nt_response() argument 180 username_len, challenge) || in generate_nt_response() 200 const u8 *username, size_t username_len, in generate_nt_response_pwhash() argument 207 username, username_len, in generate_nt_response_pwhash() 230 const u8 *username, size_t username_len, in generate_authenticator_response_pwhash() argument 264 username_len, challenge)) in generate_authenticator_response_pwhash() 286 const u8 *username, size_t username_len, in generate_authenticator_response() argument 294 username, username_len, nt_response, response); in generate_authenticator_response()
|
D | ms_funcs.h | 13 const u8 *username, size_t username_len, 18 const u8 *username, size_t username_len, 24 const u8 *username, size_t username_len, 29 const u8 *username, size_t username_len, 37 const u8 *username, size_t username_len, u8 *challenge);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
D | eap_server_mschapv2.c | 290 size_t username_len, user_len; in eap_mschapv2_process_response() local 343 username_len = sm->identity_len; in eap_mschapv2_process_response() 344 for (i = 0; i < username_len; i++) { in eap_mschapv2_process_response() 346 username_len -= i + 1; in eap_mschapv2_process_response() 367 username, username_len, challenge) == 0) { in eap_mschapv2_process_response() 369 username, username_len, in eap_mschapv2_process_response() 375 if (username_len != user_len || in eap_mschapv2_process_response() 376 os_memcmp(username, user, username_len) != 0) { in eap_mschapv2_process_response() 379 "name", username, username_len); in eap_mschapv2_process_response() 387 username, username_len); in eap_mschapv2_process_response() [all …]
|
D | eap_server_ttls.c | 701 size_t username_len, i; in eap_ttls_process_phase2_mschapv2() local 733 username_len = sm->identity_len; in eap_ttls_process_phase2_mschapv2() 734 for (i = 0; i < username_len; i++) { in eap_ttls_process_phase2_mschapv2() 736 username_len -= i + 1; in eap_ttls_process_phase2_mschapv2() 765 username, username_len); in eap_ttls_process_phase2_mschapv2() 773 username, username_len, in eap_ttls_process_phase2_mschapv2() 778 username, username_len, in eap_ttls_process_phase2_mschapv2() 790 username, username_len, challenge2) == 0) { in eap_ttls_process_phase2_mschapv2() 792 username, username_len, in eap_ttls_process_phase2_mschapv2() 806 username, username_len, nt_response, in eap_ttls_process_phase2_mschapv2() [all …]
|
D | eap.h | 289 const u8 *username, size_t username_len,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
D | eap_server_mschapv2.c | 290 size_t username_len, user_len; in eap_mschapv2_process_response() local 343 username_len = sm->identity_len; in eap_mschapv2_process_response() 344 for (i = 0; i < username_len; i++) { in eap_mschapv2_process_response() 346 username_len -= i + 1; in eap_mschapv2_process_response() 367 username, username_len, challenge) == 0) { in eap_mschapv2_process_response() 369 username, username_len, in eap_mschapv2_process_response() 375 if (username_len != user_len || in eap_mschapv2_process_response() 376 os_memcmp(username, user, username_len) != 0) { in eap_mschapv2_process_response() 379 "name", username, username_len); in eap_mschapv2_process_response() 387 username, username_len); in eap_mschapv2_process_response() [all …]
|
D | eap_server_ttls.c | 700 size_t username_len, i; in eap_ttls_process_phase2_mschapv2() local 732 username_len = sm->identity_len; in eap_ttls_process_phase2_mschapv2() 733 for (i = 0; i < username_len; i++) { in eap_ttls_process_phase2_mschapv2() 735 username_len -= i + 1; in eap_ttls_process_phase2_mschapv2() 764 username, username_len); in eap_ttls_process_phase2_mschapv2() 772 username, username_len, in eap_ttls_process_phase2_mschapv2() 777 username, username_len, in eap_ttls_process_phase2_mschapv2() 789 username, username_len, challenge2) == 0) { in eap_ttls_process_phase2_mschapv2() 791 username, username_len, in eap_ttls_process_phase2_mschapv2() 805 username, username_len, nt_response, in eap_ttls_process_phase2_mschapv2() [all …]
|
D | eap.h | 164 const u8 *username, size_t username_len,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eapol_supp/ |
D | eapol_supp_sm.h | 350 const u8 **username, size_t *username_len, 480 const u8 **username, size_t *username_len, in eapol_sm_get_erp_info() argument
|
D | eapol_supp_sm.c | 2243 const u8 **username, size_t *username_len, in eapol_sm_get_erp_info() argument 2251 return eap_peer_get_erp_info(sm->eap, config, username, username_len, in eapol_sm_get_erp_info()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eapol_supp/ |
D | eapol_supp_sm.h | 359 const u8 **username, size_t *username_len, 489 const u8 **username, size_t *username_len, in eapol_sm_get_erp_info() argument
|
D | eapol_supp_sm.c | 2259 const u8 **username, size_t *username_len, in eapol_sm_get_erp_info() argument 2267 return eap_peer_get_erp_info(sm->eap, config, username, username_len, in eapol_sm_get_erp_info()
|
/third_party/ffmpeg/libavformat/ |
D | libsmbclient.c | 41 char *username, int username_len, in libsmbc_get_auth_data() argument
|