/external/wpa_supplicant_8/src/eap_peer/ |
mschapv2.c | 45 size_t username_len; local 50 username_len = identity_len; 51 username = mschapv2_remove_domain(identity, &username_len); 53 username, username_len); 60 username, username_len); 67 username, username_len, 71 username, username_len, nt_response, 78 username, username_len, 84 username, username_len,
|
mschapv2.h | 18 int mschapv2_derive_response(const u8 *username, size_t username_len,
|
eap_mschapv2.c | 520 size_t username_len, password_len, new_password_len; 526 username = eap_get_config_identity(sm, &username_len); 532 username = mschapv2_remove_domain(username, &username_len); 593 username, username_len); 597 username, username_len, 608 username, username_len,
|
eap.h | 379 const u8 **username, size_t *username_len,
|
eap.c | 610 const u8 **username, size_t *username_len, 639 *username_len = pos - erp->keyname_nai; 651 if (*username_len == 0 || *realm_len == 0 || *rrk_len == 0) [all...] |
/external/wpa_supplicant_8/src/crypto/ |
ms_funcs.h | 13 const u8 *username, size_t username_len, 18 const u8 *username, size_t username_len, 24 const u8 *username, size_t username_len, 29 const u8 *username, size_t username_len, 37 const u8 *username, size_t username_len, u8 *challenge);
|
ms_funcs.c | 77 * @username_len: Length of username 82 const u8 *username, size_t username_len, u8 *challenge) 93 len[2] = username_len; 165 * @username_len: Length of username 172 const u8 *username, size_t username_len, 180 username_len, challenge) || 193 * @username_len: Length of username 200 const u8 *username, size_t username_len, 207 username, username_len, 222 * @username_len: Length of usernam [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_mschapv2.c | 290 size_t username_len, user_len; local 343 username_len = sm->identity_len; 344 for (i = 0; i < username_len; i++) { 346 username_len -= i + 1; 367 username, username_len, challenge) == 0) { 369 username, username_len, 375 if (username_len != user_len || 376 os_memcmp(username, user, username_len) != 0) { 379 "name", username, username_len); 387 username, username_len); [all...] |
eap_server_ttls.c | 700 size_t username_len, i; local 732 username_len = sm->identity_len; 733 for (i = 0; i < username_len; i++) { 735 username_len -= i + 1; 764 username, username_len); 772 username, username_len, 777 username, username_len, 789 username, username_len, challenge2) == 0) { 791 username, username_len, 805 username, username_len, nt_response [all...] |
eap.h | 155 const u8 *username, size_t username_len,
|
eap_server.c | [all...] |
/external/wpa_supplicant_8/src/eapol_supp/ |
eapol_supp_sm.h | 353 const u8 **username, size_t *username_len, 483 const u8 **username, size_t *username_len,
|
eapol_supp_sm.c | [all...] |
/external/scapy/scapy/layers/ |
ppp.py | 602 FieldLenField("username_len", None, fmt="B", length_of="username"), 603 StrLenField("username", None, length_from=lambda p: p.username_len),
|
/external/wpa_supplicant_8/wpa_supplicant/ |
wpa_supplicant.c | 2346 size_t realm_len, username_len, rrk_len; local [all...] |