Home
last modified time | relevance | path

Searched refs:user_len (Results 1 – 6 of 6) sorted by relevance

/external/wpa_supplicant_8/src/eap_server/
Deap_server_mschapv2.c290 size_t username_len, user_len; in eap_mschapv2_process_response() local
353 user_len = name_len; in eap_mschapv2_process_response()
354 for (i = 0; i < user_len; i++) { in eap_mschapv2_process_response()
356 user_len -= i + 1; in eap_mschapv2_process_response()
375 if (username_len != user_len || in eap_mschapv2_process_response()
381 "name", user, user_len); in eap_mschapv2_process_response()
Deap_server_tls.c210 int user_len; in eap_tls_buildReq() local
212 user_len = os_snprintf(user, sizeof(user), "cert-%s", in eap_tls_buildReq()
214 if (eap_user_get(sm, (const u8 *) user, user_len, in eap_tls_buildReq()
/external/scapy/scapy/contrib/
Dtacacs.py137 ConditionalField(StrLenField('user', '', length_from=lambda x: x.user_len),
218 StrLenField('user', '', length_from=lambda x: x.user_len),
285 StrLenField('user', '', length_from=lambda x: x.user_len),
Dtacacs.uts41 …1, flags=0, session_id=2424164486, length=28)/TacacsAuthenticationStart(user_len=5, port_len=4, re…
107 …ssion_id=135252, length=47)/TacacsAuthorizationRequest(authen_method=6, user_len=5, port_len=4, re…
151 …flags=2, authen_method=6, priv_lvl=15, authen_type=1, authen_service=1, user_len=5, port_len=4, re…
/external/webrtc/webrtc/base/
Dsocketadapters.cc779 uint8_t ver, user_len, pass_len; in HandleAuth() local
782 !request->ReadUInt8(&user_len) || in HandleAuth()
783 !request->ReadString(&user, user_len) || in HandleAuth()
/external/wpa_supplicant_8/src/radius/
Dradius_server.c702 size_t user_len, id_len; in radius_server_get_new_session() local
711 &user_len, NULL) < 0) { in radius_server_get_new_session()
715 RADIUS_DUMP_ASCII("User-Name", user, user_len); in radius_server_get_new_session()
721 res = data->get_eap_user(data->conf_ctx, user, user_len, 0, tmp); in radius_server_get_new_session()
726 username = os_zalloc(user_len + 1); in radius_server_get_new_session()
728 os_memcpy(username, user, user_len); in radius_server_get_new_session()
752 sess->username = os_malloc(user_len * 4 + 1); in radius_server_get_new_session()
757 printf_encode(sess->username, user_len * 4 + 1, user, user_len); in radius_server_get_new_session()