Searched refs:passbuf (Results 1 - 3 of 3) sorted by relevance
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/ppp-2.4.4/pppd/plugins/radius/ |
H A D | sendserver.c | 38 unsigned char passbuf[MAX(AUTH_PASS_LEN, CHAP_VALUE_LENGTH)]; local 103 memset ((char *) passbuf, '\0', AUTH_PASS_LEN); 104 memcpy ((char *) passbuf, vp->strvalue, (size_t) length); 120 *buf++ ^= passbuf[pc]; 137 memset ((char *) passbuf, '\0', CHAP_VALUE_LENGTH); 138 memcpy ((char *) passbuf, vp->strvalue, (size_t) length); 149 *buf++ ^= passbuf[i];
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openvpn-2.3.1/src/openvpn/ |
H A D | ssl_polarssl.c | 286 char passbuf[512] = {0}; local 287 pem_password_callback(passbuf, 512, 0, NULL); 290 passbuf, strlen(passbuf)); 298 char passbuf[512] = {0}; local 299 pem_password_callback(passbuf, 512, 0, NULL); 300 status = x509parse_keyfile(ctx->priv_key, priv_key_file, passbuf);
|
H A D | ssl.c | 324 static struct user_pass passbuf; /* GLOBAL */ variable in typeref:struct:user_pass 329 if (!strlen (passbuf.password)) 330 get_user_pass (&passbuf, auth_file, UP_TYPE_PRIVATE_KEY, GET_USER_PASS_MANAGEMENT|GET_USER_PASS_SENSITIVE|GET_USER_PASS_PASSWORD_ONLY); 340 strncpynt (buf, passbuf.password, size); 341 purge_user_pass (&passbuf, false); 399 passbuf.nocache = true; 423 purge_user_pass (&passbuf, true);
|
Completed in 43 milliseconds