/hostap-latest/hs20/server/www/ |
D | users.php | 108 if (strlen($osu_user) == 0) 140 if (strlen($row['devinfo']) > 0) { 143 if (strlen($row['devdetail']) > 0) { 146 if (strlen($row['pps']) > 0) { 149 if (strlen($row['cert_pem']) > 0) { 166 if (strlen($cert) > 0) { 254 if (strlen($row['t_c_timestamp']) > 0) { 292 else if (strlen($osu_user) > 0) 307 if (strlen($d) > 0) {
|
D | est.php | 35 if (strlen($user) < 1) { 60 if (strlen($pw) < 1) { 121 if (!$reenroll && (!isset($user) || strlen($user) == 0)) { 184 if (!isset($matches['snhex']) || strlen($matches['snhex']) < 1) {
|
D | spp.php | 47 if (strlen($user) < 1) { 70 if (strlen($pw) < 1) { 132 if (isset($user) && strlen($user) > 0)
|
D | signup.php | 25 if (strlen($test) > 0) { 36 if ($row && strlen($row['value']) > 0) {
|
D | add-free.php | 14 if (strlen($id) < 32) 27 if (!$row || strlen($row['value']) == 0) {
|
D | add-mo.php | 17 if (strlen($id) < 32 || !isset($user) || !isset($pw)) { 21 if (strlen($user) < 1 || strncasecmp($user, "cert-", 5) == 0) {
|
D | terms.php | 63 if (strlen($row[0]) > 0) 65 if (strlen($row[1]) > 0)
|
D | cert-enroll.php | 14 if (strlen($id) < 32)
|
D | remediation-pw.php | 16 if (strlen($id) < 32 || !isset($pw)) {
|
/hostap-latest/src/common/ |
D | wpa_helpers.c | 46 if (wpa_ctrl_request(ctrl, cmd, strlen(cmd), buf, &len, NULL) < 0) { in wpa_command() 72 if (wpa_ctrl_request(ctrl, cmd, strlen(cmd), resp, &len, NULL) < 0) { in wpa_command_resp() 142 (strncmp(pos + 1, event, strlen(event)) == 0 || in get_wpa_cli_event2() 144 strncmp(pos + 1, event2, strlen(event2)) == 0))) in get_wpa_cli_event2() 183 flen = strlen(field); in get_wpa_status() 223 && strlen(ip) > 0) { in wait_ip_addr()
|
/hostap-latest/tests/ |
D | test-md4.c | 68 len[0] = strlen(tests[i].data); in main() 78 len[0] = strlen(tests[i].data); in main() 80 len[1] = strlen(tests[i].data) - 1; in main()
|
/hostap-latest/src/crypto/ |
D | crypto_module_tests.c | 951 len[0] = strlen(tests[i].data); in test_md5() 961 len[0] = strlen(tests[i].data); in test_md5() 963 len[1] = strlen(tests[i].data) - 1; in test_md5() 1392 (const u8 *) test->ssid, strlen(test->ssid), in test_sha1() 1407 if (pbkdf2_sha1(test->p, (const u8 *) test->s, strlen(test->s), in test_sha1() 1849 len[0] = strlen(tests[i].data); in test_sha256() 1861 len[1] = strlen(tests[i].data) - 1; in test_sha256()
|
/hostap-latest/hostapd/ |
D | nt_password_hash.c | 40 if (nt_password_hash((u8 *) password, strlen(password), password_hash)) in main()
|
D | hostapd_cli.c | 120 flen = strlen(ctrl_iface_dir) + strlen(ifname) + 2; in hostapd_cli_open_connection() 204 ret = wpa_ctrl_request(ctrl, cmd, strlen(cmd), buf, &len, in _wpa_ctrl_command() 749 ret = wpa_ctrl_request(ctrl, cmd, strlen(cmd), buf, &len, in wpa_ctrl_command_sta() 1930 if (strncasecmp(cmd->cmd, argv[0], strlen(argv[0])) == 0) { in wpa_request() 1946 if (strncasecmp(cmd->cmd, argv[0], strlen(argv[0])) == in wpa_request()
|
D | hostapd_cli_cmds.c | 637 ret = wpa_ctrl_request(ctrl, cmd, strlen(cmd), buf, &len, in wpa_ctrl_command_sta() 1364 if (strncasecmp(cmd->cmd, argv[0], strlen(argv[0])) == 0) { in hostapd_request() 1380 if (strncasecmp(cmd->cmd, argv[0], strlen(argv[0])) == in hostapd_request()
|
D | hostapd_cli_zephyr.c | 37 return str == NULL ? 0U : (uint16_t)strlen(str); in supp_strlen()
|
/hostap-latest/src/eap_common/ |
D | eap_gpsk_common.c | 371 data_len = strlen(SID_LABEL) + 1 + 6 + seed_len; in eap_gpsk_derive_mid_helper() 376 os_memcpy(pos, SID_LABEL, strlen(SID_LABEL)); in eap_gpsk_derive_mid_helper() 377 pos += strlen(SID_LABEL); in eap_gpsk_derive_mid_helper()
|
/hostap-latest/wpa_supplicant/ |
D | wpa_cli_zephyr.c | 243 return str == NULL ? 0U : (uint16_t)strlen(str); in supp_strlen() 495 resp->ssid_len = strlen(resp->ssid); in z_wpa_ctrl_status()
|
/hostap-latest/src/utils/ |
D | os.h | 609 #define os_strlen(s) strlen(s) 741 #define strlen OS_DO_NOT_USE_strlen macro
|
D | xml_libxml2.c | 184 doc = xmlParseMemory(buf, strlen(buf)); in xml_node_from_buf() 412 ret = hostap_base64_decode(txt, strlen(txt), &len); in xml_node_get_base64_text()
|
/hostap-latest/wpa_supplicant/wpa_gui-qt4/ |
D | wpagui.cpp | 361 flen = strlen(ctrl_iface_dir) + strlen(ctrl_iface) + 2; in openCtrlConnection() 367 flen = strlen(ctrl_iface) + 1; in openCtrlConnection() 459 ret = wpa_ctrl_request(ctrl_conn, cmd, strlen(cmd), buf, buflen, NULL); in ctrlRequest() 930 return strncmp(a, b, strlen(b)) == 0; in str_match() 976 processCtrlReq(pos + strlen(WPA_CTRL_REQ)); in processMsg()
|
D | addinterface.cpp | 210 ret = wpa_ctrl_request(ctrl, cmd, strlen(cmd), buf, &len, NULL); in interfaceSelected()
|
/hostap-latest/wpaspy/ |
D | wpaspy.c | 62 ret = wpa_ctrl_request(self->ctrl, cmd, strlen(cmd), buf, &buflen, in wpaspy_request()
|
/hostap-latest/hs20/server/ |
D | hs20_spp_server.c | 80 if (user && strlen(user) == 0) in process()
|
D | spp_server.c | 636 b64 = hostap_base64_encode(pw, strlen(pw), NULL); in build_username_password() 1112 if (identity == NULL || strlen(identity) == 0) { in hs20_subscription_remediation() 1201 if (policy_id == NULL || strlen(policy_id) == 0) { in build_policy() 1245 if (identity == NULL || strlen(identity) == 0) { in hs20_policy_update() 1608 b64 = hostap_base64_encode(password, strlen(password), NULL); in spp_exec_get_certificate() 1671 if (!cert && strlen(pw) == 0) { in hs20_user_input_registration() 2627 if (new_pw == NULL || strlen(new_pw) == 0) { in hs20_spp_update_response()
|