/external/ppp/pppd/ |
chap-md5.c | 65 int challenge_len, response_len; local 68 response_len = *response++; 69 if (response_len == MD5_HASH_SIZE) {
|
chap-new.c | 312 int response_len, ok, mlen; local 325 GETCHAR(response_len, pkt); 326 len -= response_len + 1; /* length of name */ 327 name = (char *)pkt + response_len;
|
chap_ms.c | 200 int challenge_len, response_len; local 203 response_len = *response++; 204 if (response_len != MS_CHAP_RESPONSE_LEN) 248 int challenge_len, response_len; local 251 response_len = *response++; 252 if (response_len != MS_CHAP2_RESPONSE_LEN)
|
/external/strace/tests/ |
ioctl_sg_io_v4.c | 91 ", response_len=%u" 100 ", response_len=%u" 118 sg_io->response_len, 126 sg_io->response_len, 153 sg_io->response_len = 2; 154 sg_io->response = (unsigned long) efault - sg_io->response_len; 178 ", response_len=%u" 187 ", response_len=%u" 213 sg_io->response_len, 225 sg_io->response_len, [all...] |
/external/strace/tests-m32/ |
ioctl_sg_io_v4.c | 91 ", response_len=%u" 100 ", response_len=%u" 118 sg_io->response_len, 126 sg_io->response_len, 153 sg_io->response_len = 2; 154 sg_io->response = (unsigned long) efault - sg_io->response_len; 178 ", response_len=%u" 187 ", response_len=%u" 213 sg_io->response_len, 225 sg_io->response_len, [all...] |
/external/strace/tests-mx32/ |
ioctl_sg_io_v4.c | 91 ", response_len=%u" 100 ", response_len=%u" 118 sg_io->response_len, 126 sg_io->response_len, 153 sg_io->response_len = 2; 154 sg_io->response = (unsigned long) efault - sg_io->response_len; 178 ", response_len=%u" 187 ", response_len=%u" 213 sg_io->response_len, 225 sg_io->response_len, [all...] |
/external/syslinux/gpxe/src/include/gpxe/ |
chap.h | 26 size_t response_len; member in struct:chap_response
|
/system/netd/tests/dns_responder/ |
dns_responder.h | 94 char* response, size_t* response_len) const; 100 char* response, size_t* response_len) const; 102 size_t* response_len) const;
|
dns_responder.cpp | 708 size_t response_len = sizeof(response); local 709 if (handleDNSRequest(buffer, len, response, &response_len) && 710 response_len > 0) { 711 len = sendto(socket_, response, response_len, 0, 733 char* response, size_t* response_len) 751 response_len); 756 response_len); 761 response_len); 767 response_len); 782 response_len); [all...] |
/bionic/libc/kernel/uapi/linux/ |
bsg.h | 56 __u32 response_len; member in struct:sg_io_v4
|
/external/kernel-headers/original/uapi/linux/ |
bsg.h | 57 __u32 response_len; /* [o] bytes of response actually written */ member in struct:sg_io_v4
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/linux/ |
bsg.h | 55 __u32 response_len; /* [o] bytes of response actually written */ member in struct:sg_io_v4
|
/hardware/ril/libril/ |
RilSapSocket.cpp | 234 size_t response_len) { 249 rsp.payload = (pb_bytes_array_t *)calloc(1, sizeof(pb_bytes_array_t) + response_len); 253 if (response && response_len > 0) { 254 memcpy(rsp.payload->bytes, response, response_len); 255 rsp.payload->size = response_len;
|
RilSapSocket.h | 120 void *response, size_t response_len);
|
/external/strace/ |
sg_io_v4.c | 122 PRINT_FIELD_U(", ", sg_io, response_len); 123 PRINT_FIELD_SG_IO_BUFFER(", ", sg_io, response, sg_io.response_len, 136 PRINT_FIELD_U(", ", sg_io, response_len);
|
/external/f2fs-tools/tools/sg_write_buffer/include/ |
sg_pt_linux.h | 78 __u32 response_len; /* [o] bytes of response actually written */ member in struct:sg_io_v4
|
/external/syslinux/gpxe/src/crypto/ |
chap.c | 68 chap->response_len = digest->digestsize; 97 * chap->response, with a length of @c chap->response_len.
|
/external/boringssl/src/tool/ |
server.cc | 198 size_t response_len; local 199 if (BIO_mem_contents(bio.get(), &response, &response_len)) { 200 SSL_write(ssl, response, response_len);
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_leap.c | 193 u8 response_len, pw_hash[16], pw_hash_hash[16], local 221 response_len = *pos++; 222 if (response_len != LEAP_RESPONSE_LEN || response_len > len - 3) { 224 "(response_len=%d reqDataLen=%lu)", 225 response_len, (unsigned long) wpabuf_len(reqData));
|
/external/nos/host/generic/nugget/include/ |
application.h | 212 uint16_t request_len, response_len; /* current buffer count */ member in struct:app_transport
|
/external/ppp/pppd/plugins/ |
winbind.c | 517 int challenge_len, response_len; local 526 response_len = *response++; 556 if (response_len != MS_CHAP_RESPONSE_LEN) 607 if (response_len != MS_CHAP2_RESPONSE_LEN)
|
/external/ppp/pppd/plugins/radius/ |
radius.c | 343 int challenge_len, response_len; local 353 response_len = *response++; 400 if (response_len != MD5_HASH_SIZE) 417 if (response_len != MS_CHAP_RESPONSE_LEN) 436 if (response_len != MS_CHAP2_RESPONSE_LEN) [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_ttls.c | 620 u8 *response, size_t response_len) 626 response_len != EAP_TTLS_MSCHAP_RESPONSE_LEN) { 630 (unsigned long) response_len); 696 u8 *response, size_t response_len) 704 response_len != EAP_TTLS_MSCHAPV2_RESPONSE_LEN) { 708 (unsigned long) response_len); [all...] |
/external/boringssl/src/ssl/ |
ssl_cert.cc | 890 size_t response_len) { 892 ctx->cert->ocsp_response = CRYPTO_BUFFER_new(response, response_len, NULL); 897 size_t response_len) { 899 ssl->cert->ocsp_response = CRYPTO_BUFFER_new(response, response_len, NULL);
|
/external/f2fs-tools/tools/sg_write_buffer/ |
sg_pt_linux_nvme.c | 208 ptp->io_hdr.response_len = dsense ? 8 : ((n < 18) ? n : 18); 239 ptp->io_hdr.response_len = (dsense ? 8 : ((n < 18) ? n : 18)); 266 ptp->io_hdr.response_len = dsense ? 8 : ((n < 18) ? n : 18); 350 ptp->io_hdr.response_len = n; 690 ptp->io_hdr.response_len = 0; [all...] |