/external/ppp/pppd/ |
D | chap-md5.c | 65 int challenge_len, response_len; in chap_md5_verify_response() local 68 response_len = *response++; in chap_md5_verify_response() 69 if (response_len == MD5_HASH_SIZE) { in chap_md5_verify_response()
|
D | chap_ms.c | 200 int challenge_len, response_len; in chapms_verify_response() local 203 response_len = *response++; in chapms_verify_response() 204 if (response_len != MS_CHAP_RESPONSE_LEN) in chapms_verify_response() 248 int challenge_len, response_len; in chapms2_verify_response() local 251 response_len = *response++; in chapms2_verify_response() 252 if (response_len != MS_CHAP2_RESPONSE_LEN) in chapms2_verify_response()
|
D | chap-new.c | 312 int response_len, ok, mlen; in chap_handle_response() local 325 GETCHAR(response_len, pkt); in chap_handle_response() 326 len -= response_len + 1; /* length of name */ in chap_handle_response() 327 name = (char *)pkt + response_len; in chap_handle_response()
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_leap.c | 189 u8 response_len, pw_hash[16], pw_hash_hash[16], in eap_leap_process_response() local 217 response_len = *pos++; in eap_leap_process_response() 218 if (response_len != LEAP_RESPONSE_LEN || response_len > len - 3) { in eap_leap_process_response() 221 response_len, (unsigned long) wpabuf_len(reqData)); in eap_leap_process_response()
|
/external/strace/ |
D | scsi.c | 191 tprintf(", response[%u]=", sg_io.response_len); in print_sg_io_v4_res() 192 print_sg_io_buffer(tcp, sg_io.response, sg_io.response_len); in print_sg_io_v4_res() 208 tprintf(", response_len=%u", sg_io.response_len); in print_sg_io_v4_res()
|
/external/ppp/pppd/plugins/ |
D | winbind.c | 517 int challenge_len, response_len; in winbind_chap_verify() local 526 response_len = *response++; in winbind_chap_verify() 556 if (response_len != MS_CHAP_RESPONSE_LEN) in winbind_chap_verify() 607 if (response_len != MS_CHAP2_RESPONSE_LEN) in winbind_chap_verify()
|
/external/kernel-headers/original/uapi/linux/ |
D | bsg.h | 56 __u32 response_len; /* [o] bytes of response actually written */ member
|
/external/ppp/pppd/plugins/radius/ |
D | radius.c | 343 int challenge_len, response_len; in radius_chap_verify() local 353 response_len = *response++; in radius_chap_verify() 400 if (response_len != MD5_HASH_SIZE) in radius_chap_verify() 417 if (response_len != MS_CHAP_RESPONSE_LEN) in radius_chap_verify() 436 if (response_len != MS_CHAP2_RESPONSE_LEN) in radius_chap_verify()
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_ttls.c | 589 u8 *response, size_t response_len) in eap_ttls_process_phase2_mschap() argument 595 response_len != EAP_TTLS_MSCHAP_RESPONSE_LEN) { in eap_ttls_process_phase2_mschap() 599 (unsigned long) response_len); in eap_ttls_process_phase2_mschap() 661 u8 *response, size_t response_len) in eap_ttls_process_phase2_mschapv2() argument 669 response_len != EAP_TTLS_MSCHAPV2_RESPONSE_LEN) { in eap_ttls_process_phase2_mschapv2() 673 (unsigned long) response_len); in eap_ttls_process_phase2_mschapv2()
|
/external/lldb/source/Plugins/Process/gdb-remote/ |
D | GDBRemoteCommunicationServer.cpp | 715 …const int response_len = ::snprintf (response, sizeof(response), "pid:%" PRIu64 ";port:%u;", debug… in Handle_qLaunchGDBServer() local 716 assert (response_len < (int)sizeof(response)); in Handle_qLaunchGDBServer() 718 success = SendPacketNoLock (response, response_len) > 0; in Handle_qLaunchGDBServer()
|
D | GDBRemoteCommunicationClient.cpp | 316 size_t response_len = 0; in SendPacketAndWaitForResponse() local 320 …response_len = WaitForPacketWithTimeoutMicroSecondsNoLock (response, GetPacketTimeoutInMicroSecond… in SendPacketAndWaitForResponse() 360 response_len = response.GetStringRef().size(); in SendPacketAndWaitForResponse() 394 …response_len = WaitForPacketWithTimeoutMicroSecondsNoLock (response, GetPacketTimeoutInMicroSecond… in SendPacketAndWaitForResponse() 420 if (response_len == 0) in SendPacketAndWaitForResponse() 425 return response_len; in SendPacketAndWaitForResponse()
|