Home
last modified time | relevance | path

Searched refs:username_len (Results 1 – 25 of 410) sorted by relevance

12345678910>>...17

/dports/www/uwsgi/uwsgi-2.0.20/plugins/router_radius/
H A Dradius.c28 uint16_t username_len = password - auth; in uwsgi_radius_auth() local
30 uint16_t password_len = auth_len - (username_len+1); in uwsgi_radius_auth()
49 uint16_t access_request_len = 4 + 16 + 2 + username_len + 2 + pwd16_len + 6 + 6; in uwsgi_radius_auth()
83 access_request[4 + 16 + 1] = username_len + 2; in uwsgi_radius_auth()
84 memcpy(access_request + (4 + 16 + 2), username, username_len); in uwsgi_radius_auth()
85 access_request[4 + 16 + 2 + username_len] = 2; in uwsgi_radius_auth()
86 access_request[4 + 16 + 2 + username_len + 1] = pwd16_len + 2; in uwsgi_radius_auth()
88 access_request[4 + 16 + 2 + username_len + 2 + pwd16_len] = 5; in uwsgi_radius_auth()
89 access_request[4 + 16 + 2 + username_len + 2 + pwd16_len + 1] = 6; in uwsgi_radius_auth()
95 access_request[4 + 16 + 2 + username_len + 2 + pwd16_len + 6] = 4; in uwsgi_radius_auth()
[all …]
/dports/net/hostapd/hostapd-2.9/src/eap_peer/
H A Dmschapv2.c45 size_t username_len; in mschapv2_derive_response() local
50 username_len = identity_len; in mschapv2_derive_response()
51 username = mschapv2_remove_domain(identity, &username_len); in mschapv2_derive_response()
53 username, username_len); in mschapv2_derive_response()
60 username, username_len); in mschapv2_derive_response()
67 username, username_len, in mschapv2_derive_response()
71 username, username_len, nt_response, in mschapv2_derive_response()
78 username, username_len, in mschapv2_derive_response()
84 username, username_len, in mschapv2_derive_response()
/dports/net/hostapd-devel/hostap-14ab4a816/src/eap_peer/
H A Dmschapv2.c45 size_t username_len; in mschapv2_derive_response() local
50 username_len = identity_len; in mschapv2_derive_response()
51 username = mschapv2_remove_domain(identity, &username_len); in mschapv2_derive_response()
53 username, username_len); in mschapv2_derive_response()
60 username, username_len); in mschapv2_derive_response()
67 username, username_len, in mschapv2_derive_response()
71 username, username_len, nt_response, in mschapv2_derive_response()
78 username, username_len, in mschapv2_derive_response()
84 username, username_len, in mschapv2_derive_response()
/dports/net/wpa_supplicant_gui/wpa_supplicant-2.9/src/eap_peer/
H A Dmschapv2.c45 size_t username_len; in mschapv2_derive_response() local
50 username_len = identity_len; in mschapv2_derive_response()
51 username = mschapv2_remove_domain(identity, &username_len); in mschapv2_derive_response()
53 username, username_len); in mschapv2_derive_response()
60 username, username_len); in mschapv2_derive_response()
67 username, username_len, in mschapv2_derive_response()
71 username, username_len, nt_response, in mschapv2_derive_response()
78 username, username_len, in mschapv2_derive_response()
84 username, username_len, in mschapv2_derive_response()
/dports/security/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/
H A Dmschapv2.c45 size_t username_len; in mschapv2_derive_response() local
50 username_len = identity_len; in mschapv2_derive_response()
51 username = mschapv2_remove_domain(identity, &username_len); in mschapv2_derive_response()
53 username, username_len); in mschapv2_derive_response()
60 username, username_len); in mschapv2_derive_response()
67 username, username_len, in mschapv2_derive_response()
71 username, username_len, nt_response, in mschapv2_derive_response()
78 username, username_len, in mschapv2_derive_response()
84 username, username_len, in mschapv2_derive_response()
/dports/security/wpa_supplicant-devel/hostap-14ab4a816/src/eap_peer/
H A Dmschapv2.c45 size_t username_len; in mschapv2_derive_response() local
50 username_len = identity_len; in mschapv2_derive_response()
51 username = mschapv2_remove_domain(identity, &username_len); in mschapv2_derive_response()
53 username, username_len); in mschapv2_derive_response()
60 username, username_len); in mschapv2_derive_response()
67 username, username_len, in mschapv2_derive_response()
71 username, username_len, nt_response, in mschapv2_derive_response()
78 username, username_len, in mschapv2_derive_response()
84 username, username_len, in mschapv2_derive_response()
/dports/databases/pecl-couchbase/couchbase-2.6.2/src/couchbase/
H A Dpassword_authenticator.c39 obj->username_len = 0; in PHP_METHOD()
45 void pcbc_password_authenticator_init(zval *return_value, char *username, int username_len, char *p… in pcbc_password_authenticator_init() argument
52 obj->username = estrndup(username, username_len); in pcbc_password_authenticator_init()
53 obj->username_len = username_len; in pcbc_password_authenticator_init()
64 pcbc_str_arg_size username_len; in PHP_METHOD() local
67 rv = zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "s", &username, &username_len); in PHP_METHOD()
77 obj->username_len = username_len; in PHP_METHOD()
78 obj->username = estrndup(username, username_len); in PHP_METHOD()
126 PHP_MD5Update(&md5, auth->username, auth->username_len); in pcbc_generate_password_lcb_auth()
H A Dclassic_authenticator.c39 obj->cluster.username_len = 0; in PHP_METHOD()
54 pcbc_str_arg_size username_len, password_len; in PHP_METHOD() local
57 …rv = zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "ss", &username, &username_len, &password, &… in PHP_METHOD()
67 obj->cluster.username_len = username_len; in PHP_METHOD()
68 obj->cluster.username = estrndup(username, username_len); in PHP_METHOD()
98 if (ptr->username_len == name_len && strncmp(ptr->username, name, name_len) == 0) { in PHP_METHOD()
106 cred->username_len = name_len; in PHP_METHOD()
159 PHP_MD5Update(&md5, auth->cluster.username, auth->cluster.username_len); in pcbc_generate_classic_lcb_auth()
175 PHP_MD5Update(&md5, ptr->username, ptr->username_len); in pcbc_generate_classic_lcb_auth()
177 if (name && strncmp(ptr->username, name, ptr->username_len) == 0) { in pcbc_generate_classic_lcb_auth()
/dports/net/aprsc/aprsc-2.1.10.gd72a17c/src/
H A Dclientlist.c48 int username_len; member
112 && cl->username_len == len && cl->validated) { in check_if_validated_client()
113 …DLOG("check_if_validated_client '%.*s' found validated, fd %d", cl->username_len, cl->username, cl… in check_if_validated_client()
151 hash = keyhash(c->username, c->username_len, 0); in clientlist_add()
164 cl->username_len = c->username_len; in clientlist_add()
172 old_fd = check_if_validated_client(c->username, c->username_len); in clientlist_add()
198 cl = clientlist_find_id(c->username, c->username_len, (void *)c); in clientlist_remove()
/dports/net/reaver/reaver-wps-fork-t6x-1.6.6/src/crypto/
H A Dms_funcs.c33 const u8 *username, size_t username_len, in challenge_hash() argument
45 len[2] = username_len; in challenge_hash()
126 const u8 *username, size_t username_len, in generate_nt_response() argument
133 challenge_hash(peer_challenge, auth_challenge, username, username_len, in generate_nt_response()
154 const u8 *username, size_t username_len, in generate_nt_response_pwhash() argument
161 username, username_len, in generate_nt_response_pwhash()
184 const u8 *username, size_t username_len, in generate_authenticator_response_pwhash() argument
220 challenge_hash(peer_challenge, auth_challenge, username, username_len, in generate_authenticator_response_pwhash()
242 const u8 *username, size_t username_len, in generate_authenticator_response() argument
250 username, username_len, nt_response, response); in generate_authenticator_response()
/dports/security/lastpass-cli/lastpass-cli-1.3.3/
H A Dkdf.c47 static void pbkdf2_hash(const char *username, size_t username_len, const char *password, size_t pas… in pbkdf2_hash() argument
49 …onPBKDF(kCCPBKDF2, password, password_len, (const uint8_t *)username, username_len, kCCPRFHmacAlgS… in pbkdf2_hash()
55 static void pbkdf2_hash(const char *username, size_t username_len, const char *password, size_t pas… in pbkdf2_hash() argument
57 …if (!PKCS5_PBKDF2_HMAC(password, password_len, (const unsigned char *)username, username_len, iter… in pbkdf2_hash()
62 static void sha256_hash(const char *username, size_t username_len, const char *password, size_t pas… in sha256_hash() argument
68 if (!SHA256_Update(&sha256, username, username_len)) in sha256_hash()
/dports/net/hostapd-devel/hostap-14ab4a816/src/crypto/
H A Dms_funcs.c82 const u8 *username, size_t username_len, u8 *challenge) in challenge_hash() argument
93 len[2] = username_len; in challenge_hash()
172 const u8 *username, size_t username_len, in generate_nt_response() argument
180 username_len, challenge) || in generate_nt_response()
200 const u8 *username, size_t username_len, in generate_nt_response_pwhash() argument
207 username, username_len, in generate_nt_response_pwhash()
230 const u8 *username, size_t username_len, in generate_authenticator_response_pwhash() argument
264 username_len, challenge)) in generate_authenticator_response_pwhash()
286 const u8 *username, size_t username_len, in generate_authenticator_response() argument
294 username, username_len, nt_response, response); in generate_authenticator_response()
H A Dms_funcs.h13 const u8 *username, size_t username_len,
18 const u8 *username, size_t username_len,
24 const u8 *username, size_t username_len,
29 const u8 *username, size_t username_len,
37 const u8 *username, size_t username_len, u8 *challenge);
/dports/net/hostapd/hostapd-2.9/src/crypto/
H A Dms_funcs.c82 const u8 *username, size_t username_len, u8 *challenge) in challenge_hash() argument
93 len[2] = username_len; in challenge_hash()
172 const u8 *username, size_t username_len, in generate_nt_response() argument
180 username_len, challenge) || in generate_nt_response()
200 const u8 *username, size_t username_len, in generate_nt_response_pwhash() argument
207 username, username_len, in generate_nt_response_pwhash()
230 const u8 *username, size_t username_len, in generate_authenticator_response_pwhash() argument
264 username_len, challenge)) in generate_authenticator_response_pwhash()
286 const u8 *username, size_t username_len, in generate_authenticator_response() argument
294 username, username_len, nt_response, response); in generate_authenticator_response()
H A Dms_funcs.h13 const u8 *username, size_t username_len,
18 const u8 *username, size_t username_len,
24 const u8 *username, size_t username_len,
29 const u8 *username, size_t username_len,
37 const u8 *username, size_t username_len, u8 *challenge);
/dports/net/wpa_supplicant_gui/wpa_supplicant-2.9/src/crypto/
H A Dms_funcs.c82 const u8 *username, size_t username_len, u8 *challenge) in challenge_hash() argument
93 len[2] = username_len; in challenge_hash()
172 const u8 *username, size_t username_len, in generate_nt_response() argument
180 username_len, challenge) || in generate_nt_response()
200 const u8 *username, size_t username_len, in generate_nt_response_pwhash() argument
207 username, username_len, in generate_nt_response_pwhash()
230 const u8 *username, size_t username_len, in generate_authenticator_response_pwhash() argument
264 username_len, challenge)) in generate_authenticator_response_pwhash()
286 const u8 *username, size_t username_len, in generate_authenticator_response() argument
294 username, username_len, nt_response, response); in generate_authenticator_response()
H A Dms_funcs.h13 const u8 *username, size_t username_len,
18 const u8 *username, size_t username_len,
24 const u8 *username, size_t username_len,
29 const u8 *username, size_t username_len,
37 const u8 *username, size_t username_len, u8 *challenge);
/dports/security/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
H A Dms_funcs.c82 const u8 *username, size_t username_len, u8 *challenge) in challenge_hash() argument
93 len[2] = username_len; in challenge_hash()
172 const u8 *username, size_t username_len, in generate_nt_response() argument
180 username_len, challenge) || in generate_nt_response()
200 const u8 *username, size_t username_len, in generate_nt_response_pwhash() argument
207 username, username_len, in generate_nt_response_pwhash()
230 const u8 *username, size_t username_len, in generate_authenticator_response_pwhash() argument
264 username_len, challenge)) in generate_authenticator_response_pwhash()
286 const u8 *username, size_t username_len, in generate_authenticator_response() argument
294 username, username_len, nt_response, response); in generate_authenticator_response()
H A Dms_funcs.h13 const u8 *username, size_t username_len,
18 const u8 *username, size_t username_len,
24 const u8 *username, size_t username_len,
29 const u8 *username, size_t username_len,
37 const u8 *username, size_t username_len, u8 *challenge);
/dports/security/wpa_supplicant-devel/hostap-14ab4a816/src/crypto/
H A Dms_funcs.c82 const u8 *username, size_t username_len, u8 *challenge) in challenge_hash() argument
93 len[2] = username_len; in challenge_hash()
172 const u8 *username, size_t username_len, in generate_nt_response() argument
180 username_len, challenge) || in generate_nt_response()
200 const u8 *username, size_t username_len, in generate_nt_response_pwhash() argument
207 username, username_len, in generate_nt_response_pwhash()
230 const u8 *username, size_t username_len, in generate_authenticator_response_pwhash() argument
264 username_len, challenge)) in generate_authenticator_response_pwhash()
286 const u8 *username, size_t username_len, in generate_authenticator_response() argument
294 username, username_len, nt_response, response); in generate_authenticator_response()
H A Dms_funcs.h13 const u8 *username, size_t username_len,
18 const u8 *username, size_t username_len,
24 const u8 *username, size_t username_len,
29 const u8 *username, size_t username_len,
37 const u8 *username, size_t username_len, u8 *challenge);
/dports/net-im/libnice/libnice-0.1.18/stun/
H A Dstunagent.c84 username_len, val[i].username_len, in stun_agent_default_validater()
89 val[i].username_len); in stun_agent_default_validater()
90 if (username_len == val[i].username_len && in stun_agent_default_validater()
147 uint16_t username_len; in stun_agent_validate() local
253 username_len = 0; in stun_agent_validate()
255 &username_len); in stun_agent_validate()
257 validater (agent, msg, username, username_len, in stun_agent_validate()
285 username, username_len, in stun_agent_validate()
591 uint16_t username_len; in stun_agent_finish_message() local
596 STUN_ATTRIBUTE_USERNAME, &username_len); in stun_agent_finish_message()
[all …]
/dports/net-im/libnice-gst1/libnice-0.1.18/stun/
H A Dstunagent.c84 username_len, val[i].username_len, in stun_agent_default_validater()
89 val[i].username_len); in stun_agent_default_validater()
90 if (username_len == val[i].username_len && in stun_agent_default_validater()
147 uint16_t username_len; in stun_agent_validate() local
253 username_len = 0; in stun_agent_validate()
255 &username_len); in stun_agent_validate()
257 validater (agent, msg, username, username_len, in stun_agent_validate()
285 username, username_len, in stun_agent_validate()
591 uint16_t username_len; in stun_agent_finish_message() local
596 STUN_ATTRIBUTE_USERNAME, &username_len); in stun_agent_finish_message()
[all …]
/dports/net-im/libnice-gst1/libnice-0.1.18/stun/usages/
H A Dturn.c76 uint8_t *username, size_t username_len, in stun_usage_turn_create() argument
157 if (username != NULL && username_len > 0 && in stun_usage_turn_create()
161 username, username_len) != STUN_MESSAGE_RETURN_SUCCESS) in stun_usage_turn_create()
171 uint8_t *username, size_t username_len, in stun_usage_turn_create_refresh() argument
180 username, username_len, password, password_len, compatibility); in stun_usage_turn_create_refresh()
212 if (username != NULL && username_len > 0 && in stun_usage_turn_create_refresh()
216 username, username_len) != STUN_MESSAGE_RETURN_SUCCESS) in stun_usage_turn_create_refresh()
226 uint8_t *username, size_t username_len, in stun_usage_turn_create_permission() argument
264 username, username_len) != STUN_MESSAGE_RETURN_SUCCESS) in stun_usage_turn_create_permission()
/dports/net-im/libnice/libnice-0.1.18/stun/usages/
H A Dturn.c76 uint8_t *username, size_t username_len, in stun_usage_turn_create() argument
157 if (username != NULL && username_len > 0 && in stun_usage_turn_create()
161 username, username_len) != STUN_MESSAGE_RETURN_SUCCESS) in stun_usage_turn_create()
171 uint8_t *username, size_t username_len, in stun_usage_turn_create_refresh() argument
180 username, username_len, password, password_len, compatibility); in stun_usage_turn_create_refresh()
212 if (username != NULL && username_len > 0 && in stun_usage_turn_create_refresh()
216 username, username_len) != STUN_MESSAGE_RETURN_SUCCESS) in stun_usage_turn_create_refresh()
226 uint8_t *username, size_t username_len, in stun_usage_turn_create_permission() argument
264 username, username_len) != STUN_MESSAGE_RETURN_SUCCESS) in stun_usage_turn_create_permission()

12345678910>>...17