Searched refs:response_len (Results 1 – 9 of 9) sorted by relevance
/external/dropbear/ |
D | cli-authinteract.c | 112 unsigned int response_len = 0; in recv_msg_userauth_info_request() local 126 response_len = strlen(response); in recv_msg_userauth_info_request() 127 buf_putstring(ses.writepayload, response, response_len); in recv_msg_userauth_info_request() 128 m_burn(response, response_len); in recv_msg_userauth_info_request()
|
/external/ppp/pppd/ |
D | chap-md5.c | 65 int challenge_len, response_len; in chap_md5_verify_response() local 68 response_len = *response++; in chap_md5_verify_response() 69 if (response_len == MD5_HASH_SIZE) { in chap_md5_verify_response()
|
D | chap_ms.c | 201 int challenge_len, response_len; in chapms_verify_response() local 204 response_len = *response++; in chapms_verify_response() 205 if (response_len != MS_CHAP_RESPONSE_LEN) in chapms_verify_response() 251 int challenge_len, response_len; in chapms2_verify_response() local 254 response_len = *response++; in chapms2_verify_response() 255 if (response_len != MS_CHAP2_RESPONSE_LEN) in chapms2_verify_response()
|
D | chap-new.c | 313 int response_len, ok, mlen; in chap_handle_response() local 329 GETCHAR(response_len, pkt); in chap_handle_response() 330 len -= response_len + 1; /* length of name */ in chap_handle_response() 331 name = (char *)pkt + response_len; in chap_handle_response()
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_leap.c | 189 u8 response_len, pw_hash[16], pw_hash_hash[16], in eap_leap_process_response() local 217 response_len = *pos++; in eap_leap_process_response() 218 if (response_len != LEAP_RESPONSE_LEN || response_len > len - 3) { in eap_leap_process_response() 221 response_len, (unsigned long) wpabuf_len(reqData)); in eap_leap_process_response()
|
/external/ppp/pppd/plugins/ |
D | winbind.c | 523 int challenge_len, response_len; in winbind_chap_verify() local 532 response_len = *response++; in winbind_chap_verify() 563 if (response_len != MS_CHAP_RESPONSE_LEN) in winbind_chap_verify() 618 if (response_len != MS_CHAP2_RESPONSE_LEN) in winbind_chap_verify()
|
/external/ppp/pppd/plugins/radius/ |
D | radius.c | 341 int challenge_len, response_len; in radius_chap_verify() local 351 response_len = *response++; in radius_chap_verify() 398 if (response_len != MD5_HASH_SIZE) in radius_chap_verify() 416 if (response_len != MS_CHAP_RESPONSE_LEN) in radius_chap_verify() 439 if (response_len != MS_CHAP2_RESPONSE_LEN) in radius_chap_verify()
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_ttls.c | 587 u8 *response, size_t response_len) in eap_ttls_process_phase2_mschap() argument 593 response_len != EAP_TTLS_MSCHAP_RESPONSE_LEN) { in eap_ttls_process_phase2_mschap() 597 (unsigned long) response_len); in eap_ttls_process_phase2_mschap() 652 u8 *response, size_t response_len) in eap_ttls_process_phase2_mschapv2() argument 660 response_len != EAP_TTLS_MSCHAPV2_RESPONSE_LEN) { in eap_ttls_process_phase2_mschapv2() 664 (unsigned long) response_len); in eap_ttls_process_phase2_mschapv2()
|
/external/chromium/third_party/libevent/ |
D | evdns.c | 282 size_t response_len; member 1223 int r = sendto(port->socket, req->response, req->response_len, 0, in server_port_flush() 1711 req->response_len = j; in evdns_server_request_format_response() 1713 if (!(req->response = malloc(req->response_len))) { in evdns_server_request_format_response() 1718 memcpy(req->response, buf, req->response_len); in evdns_server_request_format_response() 1736 r = sendto(port->socket, req->response, req->response_len, 0, in evdns_server_request_respond()
|