Searched refs:response_len (Results 1 - 19 of 19) sorted by relevance

/external/ppp/pppd/
H A Dchap-md5.c65 int challenge_len, response_len; local
68 response_len = *response++;
69 if (response_len == MD5_HASH_SIZE) {
H A Dchap-new.c312 int response_len, ok, mlen; local
325 GETCHAR(response_len, pkt);
326 len -= response_len + 1; /* length of name */
327 name = (char *)pkt + response_len;
H A Dchap_ms.c200 int challenge_len, response_len; local
203 response_len = *response++;
204 if (response_len != MS_CHAP_RESPONSE_LEN)
248 int challenge_len, response_len; local
251 response_len = *response++;
252 if (response_len != MS_CHAP2_RESPONSE_LEN)
/external/kernel-headers/original/uapi/linux/
H A Dbsg.h56 __u32 response_len; /* [o] bytes of response actually written */ member in struct:sg_io_v4
/external/strace/
H A Dscsi.c191 tprintf(", response[%u]=", sg_io.response_len);
192 print_sg_io_buffer(tcp, sg_io.response, sg_io.response_len);
208 tprintf(", response_len=%u", sg_io.response_len);
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_leap.c189 u8 response_len, pw_hash[16], pw_hash_hash[16], local
217 response_len = *pos++;
218 if (response_len != LEAP_RESPONSE_LEN || response_len > len - 3) {
220 "(response_len=%d reqDataLen=%lu)",
221 response_len, (unsigned long) wpabuf_len(reqData));
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_leap.c189 u8 response_len, pw_hash[16], pw_hash_hash[16], local
217 response_len = *pos++;
218 if (response_len != LEAP_RESPONSE_LEN || response_len > len - 3) {
220 "(response_len=%d reqDataLen=%lu)",
221 response_len, (unsigned long) wpabuf_len(reqData));
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_leap.c189 u8 response_len, pw_hash[16], pw_hash_hash[16], local
217 response_len = *pos++;
218 if (response_len != LEAP_RESPONSE_LEN || response_len > len - 3) {
220 "(response_len=%d reqDataLen=%lu)",
221 response_len, (unsigned long) wpabuf_len(reqData));
/external/ppp/pppd/plugins/
H A Dwinbind.c517 int challenge_len, response_len; local
526 response_len = *response++;
556 if (response_len != MS_CHAP_RESPONSE_LEN)
607 if (response_len != MS_CHAP2_RESPONSE_LEN)
/external/ppp/pppd/plugins/radius/
H A Dradius.c343 int challenge_len, response_len; local
353 response_len = *response++;
400 if (response_len != MD5_HASH_SIZE)
417 if (response_len != MS_CHAP_RESPONSE_LEN)
436 if (response_len != MS_CHAP2_RESPONSE_LEN)
/external/lldb/source/Plugins/Process/gdb-remote/
H A DGDBRemoteCommunicationServer.cpp715 const int response_len = ::snprintf (response, sizeof(response), "pid:%" PRIu64 ";port:%u;", debugserver_pid, port);
716 assert (response_len < (int)sizeof(response));
718 success = SendPacketNoLock (response, response_len) > 0;
H A DGDBRemoteCommunicationClient.cpp316 size_t response_len = 0; local
320 response_len = WaitForPacketWithTimeoutMicroSecondsNoLock (response, GetPacketTimeoutInMicroSeconds ());
360 response_len = response.GetStringRef().size();
394 response_len = WaitForPacketWithTimeoutMicroSecondsNoLock (response, GetPacketTimeoutInMicroSeconds ());
420 if (response_len == 0)
425 return response_len;
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_ttls.c621 u8 *response, size_t response_len)
627 response_len != EAP_TTLS_MSCHAP_RESPONSE_LEN) {
631 (unsigned long) response_len);
694 u8 *response, size_t response_len)
702 response_len != EAP_TTLS_MSCHAPV2_RESPONSE_LEN) {
706 (unsigned long) response_len);
618 eap_ttls_process_phase2_mschap(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) argument
690 eap_ttls_process_phase2_mschapv2(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) argument
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_ttls.c621 u8 *response, size_t response_len)
627 response_len != EAP_TTLS_MSCHAP_RESPONSE_LEN) {
631 (unsigned long) response_len);
694 u8 *response, size_t response_len)
702 response_len != EAP_TTLS_MSCHAPV2_RESPONSE_LEN) {
706 (unsigned long) response_len);
618 eap_ttls_process_phase2_mschap(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) argument
690 eap_ttls_process_phase2_mschapv2(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) argument
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_ttls.c621 u8 *response, size_t response_len)
627 response_len != EAP_TTLS_MSCHAP_RESPONSE_LEN) {
631 (unsigned long) response_len);
694 u8 *response, size_t response_len)
702 response_len != EAP_TTLS_MSCHAPV2_RESPONSE_LEN) {
706 (unsigned long) response_len);
618 eap_ttls_process_phase2_mschap(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) argument
690 eap_ttls_process_phase2_mschapv2(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) argument
/external/libevent/
H A Devdns.c296 size_t response_len; member in struct:server_request
1425 int r = sendto(port->socket, req->response, (int)req->response_len, 0,
1960 req->response_len = j;
1962 if (!(req->response = mm_malloc(req->response_len))) {
1967 memcpy(req->response, buf, req->response_len);
1987 r = sendto(port->socket, req->response, (int)req->response_len, 0,
/external/boringssl/src/ssl/
H A Dssl_lib.c1528 size_t response_len) {
1532 ctx->ocsp_response = BUF_memdup(response, response_len);
1536 ctx->ocsp_response_length = response_len;
1527 SSL_CTX_set_ocsp_response(SSL_CTX *ctx, const uint8_t *response, size_t response_len) argument
/external/boringssl/include/openssl/
H A Dssl.h838 size_t response_len);
/external/boringssl/src/include/openssl/
H A Dssl.h838 size_t response_len);

Completed in 1313 milliseconds