/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
H A D | mschapv2.c | 51 size_t username_len; local 56 username_len = identity_len; 57 username = mschapv2_remove_domain(identity, &username_len); 59 username, username_len); 66 username, username_len); 73 username, username_len, 77 username, username_len, nt_response, auth_response); 82 username, username_len, 86 username, username_len,
|
H A D | eap_mschapv2.c | 503 size_t username_len, password_len, new_password_len; local 509 username = eap_get_config_identity(sm, &username_len); 515 username = mschapv2_remove_domain(username, &username_len); 574 username, username_len); 578 username, username_len, 589 username, username_len,
|
/external/wpa_supplicant/ |
H A D | ms_funcs.c | 29 * @username_len: Length of username 33 const u8 *username, size_t username_len, 45 len[2] = username_len; 115 * @username_len: Length of username 121 const u8 *username, size_t username_len, 128 challenge_hash(peer_challenge, auth_challenge, username, username_len, 140 * @username_len: Length of username 146 const u8 *username, size_t username_len, 152 challenge_hash(peer_challenge, auth_challenge, username, username_len, 165 * @username_len 32 challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, u8 *challenge) argument 120 generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password, size_t password_len, u8 *response) argument 144 generate_nt_response_pwhash(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password_hash, u8 *response) argument 169 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument 224 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument [all...] |
H A D | eap_mschapv2.c | 182 const u8 *username, size_t username_len, 194 username, username_len); 198 username, username_len, 206 username, username_len, nt_response, 230 size_t username_len, identity_len, password_len; local 240 username_len = identity_len; 241 username = eap_mschapv2_remove_domain(identity, &username_len); 283 eap_mschapv2_derive_response(data, username, username_len, 573 size_t username_len, password_len, new_password_len; local 577 username = eap_get_config_identity(sm, &username_len); 180 eap_mschapv2_derive_response( struct eap_mschapv2_data *data, const u8 *username, size_t username_len, const u8 *password, size_t password_len, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response) argument [all...] |
H A D | eap_ttls.c | 645 size_t username_len, i; local 653 username_len = config->identity_len; 655 for (i = 0; i < username_len; i++) { 657 username_len -= i + 1; 705 username, username_len); 709 username, username_len, 715 username, username_len,
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
H A D | ms_funcs.c | 29 * @username_len: Length of username 33 const u8 *username, size_t username_len, 45 len[2] = username_len; 115 * @username_len: Length of username 121 const u8 *username, size_t username_len, 128 challenge_hash(peer_challenge, auth_challenge, username, username_len, 140 * @username_len: Length of username 146 const u8 *username, size_t username_len, 152 challenge_hash(peer_challenge, auth_challenge, username, username_len, 165 * @username_len 32 challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, u8 *challenge) argument 120 generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password, size_t password_len, u8 *response) argument 144 generate_nt_response_pwhash(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password_hash, u8 *response) argument 169 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument 224 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
H A D | eap_mschapv2.c | 297 size_t username_len, user_len; local 341 username_len = sm->identity_len; 342 for (i = 0; i < username_len; i++) { 344 username_len -= i + 1; 360 if (username_len != user_len || 361 os_memcmp(username, user, username_len) != 0) { 364 "name", username, username_len); 372 username, username_len); 377 username, username_len, 382 username, username_len, [all...] |
H A D | eap_ttls.c | 808 size_t username_len, i; local 833 username_len = sm->identity_len; 834 for (i = 0; i < username_len; i++) { 836 username_len -= i + 1; 864 username, username_len); 872 username, username_len, 877 username, username_len, 917 username, username_len, nt_response, 923 username, username_len, nt_response,
|