| /src/external/bsd/ppp/dist/pppd/ |
| chap-md5.c | 67 int challenge_len, response_len; local 70 challenge_len = *challenge++; 84 if (PPP_DigestUpdate(ctx, challenge, challenge_len)) { 111 int challenge_len = *challenge++; local 124 if (PPP_DigestUpdate(ctx, challenge, challenge_len)) {
|
| chap_ms.c | 198 int challenge_len, response_len; local 200 challenge_len = *challenge++; /* skip length, is 8 */ 234 challenge_len, challenge); 246 int challenge_len, response_len; local 248 challenge_len = *challenge++; /* skip length, is 16 */ 311 challenge_len, challenge, "Access denied");
|
| /src/external/bsd/wpa/dist/src/eap_peer/ |
| eap_md5.c | 36 size_t len, challenge_len, password_len; local 58 challenge_len = *pos++; 59 if (challenge_len == 0 || challenge_len > len - 1) { 61 "(challenge_len=%lu len=%lu)", 62 (unsigned long) challenge_len, (unsigned long) len); 69 challenge, challenge_len); 89 if (chap_md5(id, password, password_len, challenge, challenge_len,
|
| eap_leap.c | 66 u8 challenge_len, *rpos; local 94 challenge_len = *pos++; 95 if (challenge_len != LEAP_CHALLENGE_LEN || challenge_len > len - 3) { 97 "(challenge_len=%d reqDataLen=%lu)", 98 challenge_len, (unsigned long) wpabuf_len(reqData));
|
| eap_mschapv2.c | 248 size_t len, challenge_len; local 263 challenge_len = *pos++; 265 if (challenge_len != MSCHAPV2_CHAL_LEN) { 267 "%lu", (unsigned long) challenge_len); 272 if (len < challenge_len) { 274 " packet: len=%lu challenge_len=%lu", 275 (unsigned long) len, (unsigned long) challenge_len); 286 pos += challenge_len; 287 len -= challenge_len;
|
| /src/crypto/external/bsd/openssh/dist/ |
| ssh-sk.c | 56 size_t challenge_len, const char *application, uint8_t flags, 74 size_t challenge_len, const char *application, uint8_t flags, 472 size_t challenge_len; local 519 challenge_len = sizeof(randchall); 526 challenge_len = sshbuf_len(challenge_buf); 527 debug3_f("using explicit challenge len=%zd", challenge_len); 535 if ((r = skp->sk_enroll(alg, challenge, challenge_len, application,
|
| /src/crypto/external/apache2/openssl/dist/ssl/statem/ |
| statem_srvr.c | 1589 unsigned int ciphersuite_len, session_id_len, challenge_len; local 1594 || !PACKET_get_net_2(pkt, &challenge_len)) { 1607 || !PACKET_get_sub_packet(pkt, &challenge, challenge_len) 1620 challenge_len = challenge_len > SSL3_RANDOM_SIZE 1622 : challenge_len; 1625 clienthello->random + SSL3_RANDOM_SIZE - challenge_len, challenge_len)
|
| /src/crypto/external/bsd/openssl/dist/ssl/statem/ |
| statem_srvr.c | 1459 unsigned int ciphersuite_len, session_id_len, challenge_len; local 1464 || !PACKET_get_net_2(pkt, &challenge_len)) { 1477 || !PACKET_get_sub_packet(pkt, &challenge, challenge_len) 1490 challenge_len = challenge_len > SSL3_RANDOM_SIZE 1491 ? SSL3_RANDOM_SIZE : challenge_len; 1495 challenge_len, challenge_len)
|
| /src/crypto/external/bsd/openssl.old/dist/ssl/statem/ |
| statem_srvr.c | 1472 unsigned int ciphersuite_len, session_id_len, challenge_len; local 1477 || !PACKET_get_net_2(pkt, &challenge_len)) { 1492 || !PACKET_get_sub_packet(pkt, &challenge, challenge_len) 1506 challenge_len = challenge_len > SSL3_RANDOM_SIZE 1507 ? SSL3_RANDOM_SIZE : challenge_len; 1511 challenge_len, challenge_len)
|
| /src/external/bsd/wpa/dist/src/common/ |
| ieee802_11_common.h | 122 u8 challenge_len; member in struct:ieee802_11_elems
|