/external/dropbear/ |
H A D | cli-authinteract.c | 112 unsigned int response_len = 0; local 126 response_len = strlen(response); 127 buf_putstring(ses.writepayload, response, response_len); 128 m_burn(response, response_len);
|
/external/ppp/pppd/ |
H A D | chap-md5.c | 65 int challenge_len, response_len; local 68 response_len = *response++; 69 if (response_len == MD5_HASH_SIZE) {
|
H A D | chap-new.c | 313 int response_len, ok, mlen; local 329 GETCHAR(response_len, pkt); 330 len -= response_len + 1; /* length of name */ 331 name = (char *)pkt + response_len;
|
H A D | chap_ms.c | 201 int challenge_len, response_len; local 204 response_len = *response++; 205 if (response_len != MS_CHAP_RESPONSE_LEN) 251 int challenge_len, response_len; local 254 response_len = *response++; 255 if (response_len != MS_CHAP2_RESPONSE_LEN)
|
/external/chromium_org/net/spdy/ |
H A D | spdy_stream_unittest.cc | 1046 int64 response_len = reply_frame_len + data_frame_len; local 1054 EXPECT_EQ(response_len, stream->raw_received_bytes());
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_leap.c | 189 u8 response_len, pw_hash[16], pw_hash_hash[16], local 217 response_len = *pos++; 218 if (response_len != LEAP_RESPONSE_LEN || response_len > len - 3) { 220 "(response_len=%d reqDataLen=%lu)", 221 response_len, (unsigned long) wpabuf_len(reqData));
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_leap.c | 189 u8 response_len, pw_hash[16], pw_hash_hash[16], local 217 response_len = *pos++; 218 if (response_len != LEAP_RESPONSE_LEN || response_len > len - 3) { 220 "(response_len=%d reqDataLen=%lu)", 221 response_len, (unsigned long) wpabuf_len(reqData));
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_leap.c | 189 u8 response_len, pw_hash[16], pw_hash_hash[16], local 217 response_len = *pos++; 218 if (response_len != LEAP_RESPONSE_LEN || response_len > len - 3) { 220 "(response_len=%d reqDataLen=%lu)", 221 response_len, (unsigned long) wpabuf_len(reqData));
|
/external/ppp/pppd/plugins/radius/ |
H A D | radius.c | 341 int challenge_len, response_len; local 351 response_len = *response++; 398 if (response_len != MD5_HASH_SIZE) 416 if (response_len != MS_CHAP_RESPONSE_LEN) 439 if (response_len != MS_CHAP2_RESPONSE_LEN)
|
/external/ppp/pppd/plugins/ |
H A D | winbind.c | 523 int challenge_len, response_len; local 532 response_len = *response++; 563 if (response_len != MS_CHAP_RESPONSE_LEN) 618 if (response_len != MS_CHAP2_RESPONSE_LEN)
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_ttls.c | 587 u8 *response, size_t response_len) 593 response_len != EAP_TTLS_MSCHAP_RESPONSE_LEN) { 597 (unsigned long) response_len); 652 u8 *response, size_t response_len) 660 response_len != EAP_TTLS_MSCHAPV2_RESPONSE_LEN) { 664 (unsigned long) response_len); 584 eap_ttls_process_phase2_mschap(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) argument 648 eap_ttls_process_phase2_mschapv2(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) argument
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_ttls.c | 587 u8 *response, size_t response_len) 593 response_len != EAP_TTLS_MSCHAP_RESPONSE_LEN) { 597 (unsigned long) response_len); 652 u8 *response, size_t response_len) 660 response_len != EAP_TTLS_MSCHAPV2_RESPONSE_LEN) { 664 (unsigned long) response_len); 584 eap_ttls_process_phase2_mschap(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) argument 648 eap_ttls_process_phase2_mschapv2(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_ttls.c | 587 u8 *response, size_t response_len) 593 response_len != EAP_TTLS_MSCHAP_RESPONSE_LEN) { 597 (unsigned long) response_len); 652 u8 *response, size_t response_len) 660 response_len != EAP_TTLS_MSCHAPV2_RESPONSE_LEN) { 664 (unsigned long) response_len); 584 eap_ttls_process_phase2_mschap(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) argument 648 eap_ttls_process_phase2_mschapv2(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) argument
|
/external/chromium/third_party/libevent/ |
H A D | evdns.c | 282 size_t response_len; member in struct:server_request 1223 int r = sendto(port->socket, req->response, req->response_len, 0, 1711 req->response_len = j; 1713 if (!(req->response = malloc(req->response_len))) { 1718 memcpy(req->response, buf, req->response_len); 1736 r = sendto(port->socket, req->response, req->response_len, 0,
|
/external/chromium_org/third_party/libevent/ |
H A D | evdns.c | 282 size_t response_len; member in struct:server_request 1223 int r = sendto(port->socket, req->response, req->response_len, 0, 1711 req->response_len = j; 1713 if (!(req->response = malloc(req->response_len))) { 1718 memcpy(req->response, buf, req->response_len); 1736 r = sendto(port->socket, req->response, req->response_len, 0,
|