/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/x509v3/ |
H A D | v3_sxnet.c | 153 int SXNET_add_id_asc(SXNET **psx, char *zone, char *user, int userlen) 160 return SXNET_add_id_INTEGER(psx, izone, user, userlen); 166 int userlen) 174 return SXNET_add_id_INTEGER(psx, izone, user, userlen); 184 int userlen) 193 if (userlen == -1) 194 userlen = strlen(user); 195 if (userlen > 64) { 214 if (userlen == -1) 215 userlen [all...] |
H A D | x509v3.h | 511 int SXNET_add_id_asc(SXNET **psx, char *zone, char *user, int userlen); 513 int userlen); 515 int userlen);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/x509v3/ |
H A D | v3_sxnet.c | 153 int userlen) 160 return SXNET_add_id_INTEGER(psx, izone, user, userlen); 166 int userlen) 174 return SXNET_add_id_INTEGER(psx, izone, user, userlen); 184 int userlen) 192 if(userlen == -1) userlen = strlen(user); 193 if(userlen > 64) { 208 if(userlen == -1) userlen [all...] |
H A D | x509v3.h | 459 int SXNET_add_id_asc(SXNET **psx, char *zone, char *user, int userlen); 460 int SXNET_add_id_ulong(SXNET **psx, unsigned long lzone, char *user, int userlen); 461 int SXNET_add_id_INTEGER(SXNET **psx, ASN1_INTEGER *izone, char *user, int userlen);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/x509v3/ |
H A D | v3_sxnet.c | 153 int SXNET_add_id_asc(SXNET **psx, char *zone, char *user, int userlen) 160 return SXNET_add_id_INTEGER(psx, izone, user, userlen); 166 int userlen) 174 return SXNET_add_id_INTEGER(psx, izone, user, userlen); 184 int userlen) 193 if (userlen == -1) 194 userlen = strlen(user); 195 if (userlen > 64) { 214 if (userlen == -1) 215 userlen [all...] |
H A D | x509v3.h | 511 int SXNET_add_id_asc(SXNET **psx, char *zone, char *user, int userlen); 513 int userlen); 515 int userlen);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/lib/ |
H A D | curl_ntlm_core.h | 69 CURLcode Curl_ntlm_core_mk_ntlmv2_hash(const char *user, size_t userlen,
|
H A D | curl_ntlm_msgs.c | 731 size_t userlen = 0; local 748 userlen = strlen(user); 778 res = Curl_ntlm_core_mk_ntlmv2_hash(user, userlen, domain, domlen, 859 userlen = userlen * 2; 871 hostoff = useroff + userlen; 940 SHORTPAIR(userlen), 941 SHORTPAIR(userlen), 996 if(size + userlen + domlen + hostlen >= NTLM_BUFSIZE) { 1011 unicodecpy(&ntlmbuf[size], user, userlen / [all...] |
H A D | http_digest.c | 316 size_t userlen; local 570 userlen = strlen(*allocuserpwd); 571 tmp = realloc(*allocuserpwd, userlen + 3); 574 strcpy(&tmp[userlen], "\r\n"); /* append the data */
|
H A D | curl_ntlm_core.c | 488 CURLcode Curl_ntlm_core_mk_ntlmv2_hash(const char *user, size_t userlen, argument 494 size_t identity_len = (userlen + domlen) * 2; 501 ascii_uppercase_to_unicode_le(identity, user, userlen); 502 ascii_to_unicode_le(identity + (userlen << 1), domain, domlen);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/wget-1.12/src/ |
H A D | http-ntlm.c | 418 int userlen; 433 userlen = strlen(usr); 443 hostoff = useroff + userlen; 512 SHORTPAIR(userlen), 513 SHORTPAIR(userlen), 532 if(((size_t) size + userlen + domlen) >= sizeof(ntlmbuf)) 538 memcpy(&ntlmbuf[size], usr, userlen); 539 size += userlen; 416 int userlen; local
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/src/ |
H A D | tool_paramhlp.c | 391 size_t userlen = strlen(*userpwd); local 418 userlen + 1); /* an extra for the zero */ 423 passptr[userlen] = ':'; 424 memcpy(&passptr[userlen+1], passwd, passwdlen+1);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/examples/libsmbclient/ |
H A D | testbrowse2.c | 78 char *user, int userlen, 87 strncpy(user, username, userlen - 1); user[userlen - 1] = 0; 74 smbc_auth_fn( const char *server, const char *share, char *wrkgrp, int wrkgrplen, char *user, int userlen, char *passwd, int passwdlen) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/netatalk-2.2.5/etc/uams/ |
H A D | uams_gss.c | 488 size_t userlen; local 529 if (uam_afpserver_option(obj, UAM_OPTION_USERNAME, (void *) &username, &userlen) < 0) 569 if (!do_gss_auth(obj, ibuf, ticket_len, rbuf, &rblen, username, userlen, sinfo)) { 574 if((pwd = uam_getname( obj, username, userlen )) == NULL) {
|
/netgear-R7000-V1.0.7.12_1.2.5/src/router/busybox-1.x/libbb/ |
H A D | lineedit.c | 307 int userlen; local 310 userlen = strlen(ud); 330 if ((userlen + strlen(home) + 1) < MAX_LINELEN) { 348 if (/*!userlen || */ strncmp(ud, pwd.pw_name, userlen) == 0) {
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/ |
H A D | x509v3.h | 459 int SXNET_add_id_asc(SXNET **psx, char *zone, char *user, int userlen); 460 int SXNET_add_id_ulong(SXNET **psx, unsigned long lzone, char *user, int userlen); 461 int SXNET_add_id_INTEGER(SXNET **psx, ASN1_INTEGER *izone, char *user, int userlen);
|
/netgear-R7000-V1.0.7.12_1.2.5/src/router/ppp/pppd/ |
H A D | auth.c | 900 check_passwd(unit, auser, userlen, apasswd, passwdlen, msg) 903 int userlen; 922 slprintf(user, sizeof(user), "%.*v", userlen, auser);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/ppp-2.4.4/pppd/ |
H A D | auth.c | 1366 check_passwd(unit, auser, userlen, apasswd, passwdlen, msg) 1369 int userlen; 1388 slprintf(user, sizeof(user), "%.*v", userlen, auser);
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/bridge/netfilter/ |
H A D | ebtables.c | 1565 unsigned int userlen) 1574 return XT_ALIGN(userlen) - COMPAT_XT_ALIGN(userlen); 1564 ebt_compat_match_offset(const struct xt_match *match, unsigned int userlen) argument
|