/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
D | eap_server_mschapv2.c | 290 size_t username_len, user_len; in eap_mschapv2_process_response() local 353 user_len = name_len; in eap_mschapv2_process_response() 354 for (i = 0; i < user_len; i++) { in eap_mschapv2_process_response() 356 user_len -= i + 1; in eap_mschapv2_process_response() 375 if (username_len != user_len || in eap_mschapv2_process_response() 381 "name", user, user_len); in eap_mschapv2_process_response()
|
D | eap_server_tls.c | 210 int user_len; in eap_tls_buildReq() local 212 user_len = os_snprintf(user, sizeof(user), "cert-%s", in eap_tls_buildReq() 214 if (eap_user_get(sm, (const u8 *) user, user_len, in eap_tls_buildReq()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
D | eap_server_mschapv2.c | 290 size_t username_len, user_len; in eap_mschapv2_process_response() local 353 user_len = name_len; in eap_mschapv2_process_response() 354 for (i = 0; i < user_len; i++) { in eap_mschapv2_process_response() 356 user_len -= i + 1; in eap_mschapv2_process_response() 375 if (username_len != user_len || in eap_mschapv2_process_response() 381 "name", user, user_len); in eap_mschapv2_process_response()
|
D | eap_server_tls.c | 211 int user_len; in eap_tls_buildReq() local 213 user_len = os_snprintf(user, sizeof(user), "cert-%s", in eap_tls_buildReq() 215 if (eap_user_get(sm, (const u8 *) user, user_len, in eap_tls_buildReq()
|
/third_party/selinux/libselinux/src/ |
D | get_context_list.c | 139 size_t user_len = strlen(user); in get_context_user() local 226 if (SIZE_MAX - user_len < strlen(start) + 2) { in get_context_user() 232 usercon_len = user_len + strlen(start) + 2; in get_context_user()
|
/third_party/mbedtls/tests/suites/ |
D | test_suite_psa_crypto_pake.function | 569 size_t user_len = strlen(user_arg); 594 TEST_EQUAL(psa_pake_set_user(&operation, user, user_len), 625 SETUP_ALWAYS_CHECK_STEP(psa_pake_set_user(&operation, user, user_len), 631 SETUP_CONDITIONAL_CHECK_STEP(psa_pake_set_user(&operation, user, user_len), 1069 const size_t user_len = sizeof(user); 1094 PSA_ASSERT(psa_pake_set_user(&operation, user, user_len)); 1099 TEST_EQUAL(user_len_ret, user_len); 1113 TEST_EQUAL(buffer_len_ret, user_len);
|
/third_party/FreeBSD/sys/dev/usb/ |
D | usb_dev.h | 150 uint32_t user_len);
|
D | usb_dev.c | 2014 usb_read_symlink(uint8_t *user_ptr, uint32_t startentry, uint32_t user_len) in usb_read_symlink() argument 2043 if (temp > user_len) { in usb_read_symlink() 2090 user_len -= temp; in usb_read_symlink() 2095 if ((user_len != 0) && (error == 0)) { in usb_read_symlink()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/radius/ |
D | radius_server.c | 707 size_t user_len, id_len; in radius_server_get_new_session() local 716 &user_len, NULL) < 0) { in radius_server_get_new_session() 720 RADIUS_DUMP_ASCII("User-Name", user, user_len); in radius_server_get_new_session() 726 res = data->get_eap_user(data->conf_ctx, user, user_len, 0, tmp); in radius_server_get_new_session() 731 username = os_zalloc(user_len + 1); in radius_server_get_new_session() 733 os_memcpy(username, user, user_len); in radius_server_get_new_session() 757 sess->username = os_malloc(user_len * 4 + 1); in radius_server_get_new_session() 762 printf_encode(sess->username, user_len * 4 + 1, user, user_len); in radius_server_get_new_session()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/radius/ |
D | radius_server.c | 564 size_t user_len, id_len; in radius_server_get_new_session() local 573 &user_len, NULL) < 0) { in radius_server_get_new_session() 577 RADIUS_DUMP_ASCII("User-Name", user, user_len); in radius_server_get_new_session() 583 res = data->get_eap_user(data->conf_ctx, user, user_len, 0, tmp); in radius_server_get_new_session() 588 username = os_zalloc(user_len + 1); in radius_server_get_new_session() 590 os_memcpy(username, user, user_len); in radius_server_get_new_session() 614 sess->username = os_malloc(user_len * 4 + 1); in radius_server_get_new_session() 619 printf_encode(sess->username, user_len * 4 + 1, user, user_len); in radius_server_get_new_session()
|
/third_party/mbedtls/include/psa/ |
D | crypto_extra.h | 1359 size_t *user_len); 2040 size_t MBEDTLS_PRIVATE(user_len);
|
/third_party/mbedtls/library/ |
D | psa_crypto.c | 7206 size_t *user_len) in psa_crypto_driver_pake_get_user_len() argument 7208 if (inputs->user_len == 0) { in psa_crypto_driver_pake_get_user_len() 7212 *user_len = inputs->user_len; in psa_crypto_driver_pake_get_user_len() 7220 if (inputs->user_len == 0) { in psa_crypto_driver_pake_get_user() 7224 if (user_id_size < inputs->user_len) { in psa_crypto_driver_pake_get_user() 7228 memcpy(user_id, inputs->user, inputs->user_len); in psa_crypto_driver_pake_get_user() 7229 *user_id_len = inputs->user_len; in psa_crypto_driver_pake_get_user() 7392 if (operation->data.inputs.user_len != 0) { in psa_pake_set_user() 7413 operation->data.inputs.user_len = user_id_len; in psa_pake_set_user() 7561 if (inputs.user_len == 0 || inputs.peer_len == 0) { in psa_pake_complete_inputs() [all …]
|
D | ssl_tls.c | 1963 size_t user_len = 0; in mbedtls_ssl_set_hs_ecjpake_password_common() local 1980 user_len = sizeof(jpake_server_id); in mbedtls_ssl_set_hs_ecjpake_password_common() 1985 user_len = sizeof(jpake_client_id); in mbedtls_ssl_set_hs_ecjpake_password_common() 1990 status = psa_pake_set_user(&ssl->handshake->psa_pake_ctx, user, user_len); in mbedtls_ssl_set_hs_ecjpake_password_common()
|
/third_party/mbedtls/docs/proposed/ |
D | psa-driver-interface.md | 379 size_t *user_len);
|