Searched refs:user_password_len (Results 1 - 3 of 3) sorted by relevance

/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_ttls.c164 size_t user_password_len; member in struct:eap_ttls_avp
271 parse->user_password_len = password_len;
531 size_t user_password_len)
541 if (sm->user->password_len != user_password_len ||
543 user_password_len) != 0) {
1084 parse.user_password_len);
528 eap_ttls_process_phase2_pap(struct eap_sm *sm, struct eap_ttls_data *data, const u8 *user_password, size_t user_password_len) argument
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_ttls.c164 size_t user_password_len; member in struct:eap_ttls_avp
271 parse->user_password_len = password_len;
531 size_t user_password_len)
541 if (sm->user->password_len != user_password_len ||
543 user_password_len) != 0) {
1084 parse.user_password_len);
528 eap_ttls_process_phase2_pap(struct eap_sm *sm, struct eap_ttls_data *data, const u8 *user_password, size_t user_password_len) argument
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_ttls.c164 size_t user_password_len; member in struct:eap_ttls_avp
271 parse->user_password_len = password_len;
531 size_t user_password_len)
541 if (sm->user->password_len != user_password_len ||
543 user_password_len) != 0) {
1084 parse.user_password_len);
528 eap_ttls_process_phase2_pap(struct eap_sm *sm, struct eap_ttls_data *data, const u8 *user_password, size_t user_password_len) argument

Completed in 72 milliseconds