| /components/net/lwip/lwip-2.1.2/src/netif/ppp/ |
| A D | upap.c | 366 int msglen; in upap_rauthreq() local 431 if (msglen > 255) in upap_rauthreq() 432 msglen = 255; in upap_rauthreq() 459 u_char msglen; in upap_rauthack() local 472 GETCHAR(msglen, inp); in upap_rauthack() 473 if (msglen > 0) { in upap_rauthack() 475 if (len < msglen) { in upap_rauthack() 494 u_char msglen; in upap_rauthnak() local 507 GETCHAR(msglen, inp); in upap_rauthnak() 508 if (msglen > 0) { in upap_rauthnak() [all …]
|
| A D | eap.c | 1018 int msglen; in eap_send_response() local 1036 PUTSHORT(msglen, outp); in eap_send_response() 1051 int msglen; in eap_chap_response() local 1070 PUTSHORT(msglen, outp); in eap_chap_response() 1097 int msglen; local 1115 PUTSHORT(msglen, outp); 1138 int msglen; local 1157 PUTSHORT(msglen, outp); 1170 int msglen; in eap_send_nak() local 1172 msglen = EAP_HEADERLEN + 2 * sizeof (u_char); in eap_send_nak() [all …]
|
| A D | auth.c | 1006 …_pcb *pcb, char *auser, int userlen, char *apasswd, int passwdlen, const char **msg, int *msglen) { in auth_check_passwd() argument 1018 *msglen = sizeof("Login ok")-1; in auth_check_passwd() 1024 *msglen = sizeof("Login incorrect")-1; in auth_check_passwd()
|
| /components/net/lwip/lwip-2.0.3/src/netif/ppp/ |
| A D | upap.c | 366 int msglen; in upap_rauthreq() local 431 if (msglen > 255) in upap_rauthreq() 432 msglen = 255; in upap_rauthreq() 459 u_char msglen; in upap_rauthack() local 472 GETCHAR(msglen, inp); in upap_rauthack() 473 if (msglen > 0) { in upap_rauthack() 475 if (len < msglen) { in upap_rauthack() 494 u_char msglen; in upap_rauthnak() local 507 GETCHAR(msglen, inp); in upap_rauthnak() 508 if (msglen > 0) { in upap_rauthnak() [all …]
|
| A D | eap.c | 1018 int msglen; in eap_send_response() local 1036 PUTSHORT(msglen, outp); in eap_send_response() 1051 int msglen; in eap_chap_response() local 1070 PUTSHORT(msglen, outp); in eap_chap_response() 1097 int msglen; local 1115 PUTSHORT(msglen, outp); 1138 int msglen; local 1157 PUTSHORT(msglen, outp); 1170 int msglen; in eap_send_nak() local 1172 msglen = EAP_HEADERLEN + 2 * sizeof (u_char); in eap_send_nak() [all …]
|
| A D | auth.c | 1006 …_pcb *pcb, char *auser, int userlen, char *apasswd, int passwdlen, const char **msg, int *msglen) { in auth_check_passwd() argument 1018 *msglen = sizeof("Login ok")-1; in auth_check_passwd() 1024 *msglen = sizeof("Login incorrect")-1; in auth_check_passwd()
|
| /components/net/lwip/lwip-1.4.1/src/netif/ppp/ |
| A D | pap.c | 396 int msglen; in upap_rauthreq() local 468 u_char msglen; in upap_rauthack() local 486 GETCHAR(msglen, inp); in upap_rauthack() 487 if (msglen > 0) { in upap_rauthack() 489 if (len < msglen) { in upap_rauthack() 510 u_char msglen; in upap_rauthnak() local 527 GETCHAR(msglen, inp); in upap_rauthnak() 528 if(msglen > 0) { in upap_rauthnak() 530 if (len < msglen) { in upap_rauthnak() 596 PUTCHAR(msglen, outp); in upap_sresp() [all …]
|
| A D | auth.c | 862 …_passwd( int unit, char *auser, int userlen, char *apasswd, int passwdlen, char **msg, int *msglen) in check_passwd() argument 870 LWIP_UNUSED_ARG(msglen); in check_passwd() 896 *msglen = strlen(*msg); in check_passwd() 920 *msglen = strlen(*msg); in check_passwd() 957 plogin(char *user, char *passwd, char **msg, int *msglen) 963 LWIP_UNUSED_ARG(msglen);
|
| A D | chap.c | 749 int outlen, msglen; in ChapSendStatus() local 757 msglen = (int)strlen(msg); in ChapSendStatus() 759 outlen = CHAP_HEADERLEN + msglen; in ChapSendStatus() 767 BCOPY(msg, outp, msglen); in ChapSendStatus()
|
| /components/net/lwip/lwip-2.1.2/src/netif/ppp/polarssl/ |
| A D | md4.c | 248 unsigned char msglen[8]; in md4_finish() local 254 PUT_ULONG_LE( low, msglen, 0 ); in md4_finish() 255 PUT_ULONG_LE( high, msglen, 4 ); in md4_finish() 261 md4_update( ctx, msglen, 8 ); in md4_finish()
|
| A D | md5.c | 267 unsigned char msglen[8]; in md5_finish() local 273 PUT_ULONG_LE( low, msglen, 0 ); in md5_finish() 274 PUT_ULONG_LE( high, msglen, 4 ); in md5_finish() 280 md5_update( ctx, msglen, 8 ); in md5_finish()
|
| A D | sha1.c | 301 unsigned char msglen[8]; in sha1_finish() local 307 PUT_ULONG_BE( high, msglen, 0 ); in sha1_finish() 308 PUT_ULONG_BE( low, msglen, 4 ); in sha1_finish() 314 sha1_update( ctx, msglen, 8 ); in sha1_finish()
|
| /components/net/lwip/lwip-2.0.3/src/netif/ppp/polarssl/ |
| A D | md4.c | 248 unsigned char msglen[8]; in md4_finish() local 254 PUT_ULONG_LE( low, msglen, 0 ); in md4_finish() 255 PUT_ULONG_LE( high, msglen, 4 ); in md4_finish() 261 md4_update( ctx, msglen, 8 ); in md4_finish()
|
| A D | md5.c | 267 unsigned char msglen[8]; in md5_finish() local 273 PUT_ULONG_LE( low, msglen, 0 ); in md5_finish() 274 PUT_ULONG_LE( high, msglen, 4 ); in md5_finish() 280 md5_update( ctx, msglen, 8 ); in md5_finish()
|
| A D | sha1.c | 301 unsigned char msglen[8]; in sha1_finish() local 307 PUT_ULONG_BE( high, msglen, 0 ); in sha1_finish() 308 PUT_ULONG_BE( low, msglen, 4 ); in sha1_finish() 314 sha1_update( ctx, msglen, 8 ); in sha1_finish()
|
| /components/net/lwip/lwip-2.1.2/src/include/netif/ppp/ |
| A D | ppp_impl.h | 562 …p_pcb *pcb, char *auser, int userlen, char *apasswd, int passwdlen, const char **msg, int *msglen);
|
| /components/net/lwip/lwip-2.0.3/src/include/netif/ppp/ |
| A D | ppp_impl.h | 561 …p_pcb *pcb, char *auser, int userlen, char *apasswd, int passwdlen, const char **msg, int *msglen);
|