Searched defs:user_password_len (Results 1 - 3 of 3) sorted by relevance

/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_ttls.c134 size_t user_password_len; member in struct:eap_ttls_avp
241 parse->user_password_len = password_len;
501 size_t user_password_len)
511 if (sm->user->password_len != user_password_len ||
513 user_password_len) != 0) {
1032 parse.user_password_len);
498 eap_ttls_process_phase2_pap(struct eap_sm *sm, struct eap_ttls_data *data, const u8 *user_password, size_t user_password_len) argument
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_ttls.c134 size_t user_password_len; member in struct:eap_ttls_avp
241 parse->user_password_len = password_len;
501 size_t user_password_len)
511 if (sm->user->password_len != user_password_len ||
513 user_password_len) != 0) {
1032 parse.user_password_len);
498 eap_ttls_process_phase2_pap(struct eap_sm *sm, struct eap_ttls_data *data, const u8 *user_password, size_t user_password_len) argument
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_ttls.c134 size_t user_password_len; member in struct:eap_ttls_avp
241 parse->user_password_len = password_len;
501 size_t user_password_len)
511 if (sm->user->password_len != user_password_len ||
513 user_password_len) != 0) {
1032 parse.user_password_len);
498 eap_ttls_process_phase2_pap(struct eap_sm *sm, struct eap_ttls_data *data, const u8 *user_password, size_t user_password_len) argument

Completed in 505 milliseconds