/external/wpa_supplicant_8/src/eap_peer/ |
D | mschapv2.c | 45 size_t username_len; in mschapv2_derive_response() local 50 username_len = identity_len; in mschapv2_derive_response() 51 username = mschapv2_remove_domain(identity, &username_len); in mschapv2_derive_response() 53 username, username_len); in mschapv2_derive_response() 60 username, username_len); in mschapv2_derive_response() 67 username, username_len, in mschapv2_derive_response() 71 username, username_len, nt_response, in mschapv2_derive_response() 78 username, username_len, in mschapv2_derive_response() 84 username, username_len, in mschapv2_derive_response()
|
D | eap_mschapv2.c | 520 size_t username_len, password_len, new_password_len; in eap_mschapv2_change_password() 526 username = eap_get_config_identity(sm, &username_len); in eap_mschapv2_change_password() 532 username = mschapv2_remove_domain(username, &username_len); in eap_mschapv2_change_password() 593 username, username_len); in eap_mschapv2_change_password() 597 username, username_len, in eap_mschapv2_change_password() 608 username, username_len, in eap_mschapv2_change_password()
|
D | mschapv2.h | 18 int mschapv2_derive_response(const u8 *username, size_t username_len,
|
D | eap.h | 374 const u8 **username, size_t *username_len,
|
D | eap.c | 620 const u8 **username, size_t *username_len, in eap_peer_get_erp_info() argument 649 *username_len = pos - erp->keyname_nai; in eap_peer_get_erp_info() 661 if (*username_len == 0 || *realm_len == 0 || *rrk_len == 0) in eap_peer_get_erp_info()
|
/external/wpa_supplicant_8/src/crypto/ |
D | ms_funcs.c | 82 const u8 *username, size_t username_len, u8 *challenge) in challenge_hash() argument 93 len[2] = username_len; in challenge_hash() 172 const u8 *username, size_t username_len, in generate_nt_response() argument 180 username_len, challenge) || in generate_nt_response() 200 const u8 *username, size_t username_len, in generate_nt_response_pwhash() argument 207 username, username_len, in generate_nt_response_pwhash() 230 const u8 *username, size_t username_len, in generate_authenticator_response_pwhash() argument 264 username_len, challenge)) in generate_authenticator_response_pwhash() 286 const u8 *username, size_t username_len, in generate_authenticator_response() argument 294 username, username_len, nt_response, response); in generate_authenticator_response()
|
D | ms_funcs.h | 13 const u8 *username, size_t username_len, 18 const u8 *username, size_t username_len, 24 const u8 *username, size_t username_len, 29 const u8 *username, size_t username_len, 37 const u8 *username, size_t username_len, u8 *challenge);
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_mschapv2.c | 290 size_t username_len, user_len; in eap_mschapv2_process_response() local 343 username_len = sm->identity_len; in eap_mschapv2_process_response() 344 for (i = 0; i < username_len; i++) { in eap_mschapv2_process_response() 346 username_len -= i + 1; in eap_mschapv2_process_response() 367 username, username_len, challenge) == 0) { in eap_mschapv2_process_response() 369 username, username_len, in eap_mschapv2_process_response() 375 if (username_len != user_len || in eap_mschapv2_process_response() 376 os_memcmp(username, user, username_len) != 0) { in eap_mschapv2_process_response() 379 "name", username, username_len); in eap_mschapv2_process_response() 387 username, username_len); in eap_mschapv2_process_response() [all …]
|
D | eap_server_ttls.c | 701 size_t username_len, i; in eap_ttls_process_phase2_mschapv2() local 733 username_len = sm->identity_len; in eap_ttls_process_phase2_mschapv2() 734 for (i = 0; i < username_len; i++) { in eap_ttls_process_phase2_mschapv2() 736 username_len -= i + 1; in eap_ttls_process_phase2_mschapv2() 765 username, username_len); in eap_ttls_process_phase2_mschapv2() 773 username, username_len, in eap_ttls_process_phase2_mschapv2() 778 username, username_len, in eap_ttls_process_phase2_mschapv2() 790 username, username_len, challenge2) == 0) { in eap_ttls_process_phase2_mschapv2() 792 username, username_len, in eap_ttls_process_phase2_mschapv2() 806 username, username_len, nt_response, in eap_ttls_process_phase2_mschapv2() [all …]
|
D | eap.h | 289 const u8 *username, size_t username_len,
|
D | eap_server.c | 2075 const u8 *username, size_t username_len, in eap_server_mschap_rx_callback() argument 2082 printf_encode(user, sizeof(user), username, username_len); in eap_server_mschap_rx_callback()
|
/external/wpa_supplicant_8/src/eapol_supp/ |
D | eapol_supp_sm.h | 359 const u8 **username, size_t *username_len, 489 const u8 **username, size_t *username_len, in eapol_sm_get_erp_info() argument
|
D | eapol_supp_sm.c | 2259 const u8 **username, size_t *username_len, in eapol_sm_get_erp_info() argument 2267 return eap_peer_get_erp_info(sm->eap, config, username, username_len, in eapol_sm_get_erp_info()
|
/external/scapy/scapy/layers/ |
D | ppp.py | 603 StrLenField("username", None, length_from=lambda p: p.username_len),
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | wpa_supplicant.c | 2815 size_t realm_len, username_len, rrk_len; in wpas_populate_assoc_ies() local 2937 &username_len, &realm, &realm_len, in wpas_populate_assoc_ies() 2944 params->fils_erp_username_len = username_len; in wpas_populate_assoc_ies() 7553 size_t realm_len, username_len, rrk_len; in fils_connection_failure() local 7558 &username, &username_len, in fils_connection_failure()
|
D | sme.c | 792 size_t realm_len, username_len, rrk_len; in sme_send_authentication() local 825 &username, &username_len, in sme_send_authentication()
|