/external/ppp/pppd/ |
H A D | chap-md5.c | 65 int challenge_len, response_len; local 68 response_len = *response++; 69 if (response_len == MD5_HASH_SIZE) {
|
H A D | chap-new.c | 312 int response_len, ok, mlen; local 325 GETCHAR(response_len, pkt); 326 len -= response_len + 1; /* length of name */ 327 name = (char *)pkt + response_len;
|
H A D | chap_ms.c | 200 int challenge_len, response_len; local 203 response_len = *response++; 204 if (response_len != MS_CHAP_RESPONSE_LEN) 248 int challenge_len, response_len; local 251 response_len = *response++; 252 if (response_len != MS_CHAP2_RESPONSE_LEN)
|
/external/kernel-headers/original/uapi/linux/ |
H A D | bsg.h | 56 __u32 response_len; /* [o] bytes of response actually written */ member in struct:sg_io_v4
|
/external/strace/ |
H A D | scsi.c | 191 tprintf(", response[%u]=", sg_io.response_len); 192 print_sg_io_buffer(tcp, sg_io.response, sg_io.response_len); 208 tprintf(", response_len=%u", sg_io.response_len);
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_leap.c | 189 u8 response_len, pw_hash[16], pw_hash_hash[16], local 217 response_len = *pos++; 218 if (response_len != LEAP_RESPONSE_LEN || response_len > len - 3) { 220 "(response_len=%d reqDataLen=%lu)", 221 response_len, (unsigned long) wpabuf_len(reqData));
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_leap.c | 189 u8 response_len, pw_hash[16], pw_hash_hash[16], local 217 response_len = *pos++; 218 if (response_len != LEAP_RESPONSE_LEN || response_len > len - 3) { 220 "(response_len=%d reqDataLen=%lu)", 221 response_len, (unsigned long) wpabuf_len(reqData));
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_leap.c | 189 u8 response_len, pw_hash[16], pw_hash_hash[16], local 217 response_len = *pos++; 218 if (response_len != LEAP_RESPONSE_LEN || response_len > len - 3) { 220 "(response_len=%d reqDataLen=%lu)", 221 response_len, (unsigned long) wpabuf_len(reqData));
|
/external/ppp/pppd/plugins/ |
H A D | winbind.c | 517 int challenge_len, response_len; local 526 response_len = *response++; 556 if (response_len != MS_CHAP_RESPONSE_LEN) 607 if (response_len != MS_CHAP2_RESPONSE_LEN)
|
/external/ppp/pppd/plugins/radius/ |
H A D | radius.c | 343 int challenge_len, response_len; local 353 response_len = *response++; 400 if (response_len != MD5_HASH_SIZE) 417 if (response_len != MS_CHAP_RESPONSE_LEN) 436 if (response_len != MS_CHAP2_RESPONSE_LEN)
|
/external/lldb/source/Plugins/Process/gdb-remote/ |
H A D | GDBRemoteCommunicationServer.cpp | 715 const int response_len = ::snprintf (response, sizeof(response), "pid:%" PRIu64 ";port:%u;", debugserver_pid, port); 716 assert (response_len < (int)sizeof(response)); 718 success = SendPacketNoLock (response, response_len) > 0;
|
H A D | GDBRemoteCommunicationClient.cpp | 316 size_t response_len = 0; local 320 response_len = WaitForPacketWithTimeoutMicroSecondsNoLock (response, GetPacketTimeoutInMicroSeconds ()); 360 response_len = response.GetStringRef().size(); 394 response_len = WaitForPacketWithTimeoutMicroSecondsNoLock (response, GetPacketTimeoutInMicroSeconds ()); 420 if (response_len == 0) 425 return response_len;
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_ttls.c | 621 u8 *response, size_t response_len) 627 response_len != EAP_TTLS_MSCHAP_RESPONSE_LEN) { 631 (unsigned long) response_len); 694 u8 *response, size_t response_len) 702 response_len != EAP_TTLS_MSCHAPV2_RESPONSE_LEN) { 706 (unsigned long) response_len); 618 eap_ttls_process_phase2_mschap(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) argument 690 eap_ttls_process_phase2_mschapv2(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) argument
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_ttls.c | 621 u8 *response, size_t response_len) 627 response_len != EAP_TTLS_MSCHAP_RESPONSE_LEN) { 631 (unsigned long) response_len); 694 u8 *response, size_t response_len) 702 response_len != EAP_TTLS_MSCHAPV2_RESPONSE_LEN) { 706 (unsigned long) response_len); 618 eap_ttls_process_phase2_mschap(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) argument 690 eap_ttls_process_phase2_mschapv2(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_ttls.c | 621 u8 *response, size_t response_len) 627 response_len != EAP_TTLS_MSCHAP_RESPONSE_LEN) { 631 (unsigned long) response_len); 694 u8 *response, size_t response_len) 702 response_len != EAP_TTLS_MSCHAPV2_RESPONSE_LEN) { 706 (unsigned long) response_len); 618 eap_ttls_process_phase2_mschap(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) argument 690 eap_ttls_process_phase2_mschapv2(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) argument
|
/external/libevent/ |
H A D | evdns.c | 296 size_t response_len; member in struct:server_request 1425 int r = sendto(port->socket, req->response, (int)req->response_len, 0, 1960 req->response_len = j; 1962 if (!(req->response = mm_malloc(req->response_len))) { 1967 memcpy(req->response, buf, req->response_len); 1987 r = sendto(port->socket, req->response, (int)req->response_len, 0,
|
/external/boringssl/src/ssl/ |
H A D | ssl_lib.c | 1528 size_t response_len) { 1532 ctx->ocsp_response = BUF_memdup(response, response_len); 1536 ctx->ocsp_response_length = response_len; 1527 SSL_CTX_set_ocsp_response(SSL_CTX *ctx, const uint8_t *response, size_t response_len) argument
|
/external/boringssl/include/openssl/ |
H A D | ssl.h | 838 size_t response_len);
|
/external/boringssl/src/include/openssl/ |
H A D | ssl.h | 838 size_t response_len);
|