/external/elfutils/libdwfl/ |
D | dwfl_build_id_find_elf.c | 43 const size_t id_len, const uint8_t *id) in __libdwfl_open_by_build_id() argument 49 if (id_len < MIN_BUILD_ID_BYTES || id_len > MAX_BUILD_ID_BYTES) in __libdwfl_open_by_build_id() 65 for (size_t i = 1; i < id_len; ++i) in __libdwfl_open_by_build_id() 73 strcpy (&id_name[sizeof "/.build-id/" - 1 + 3 + (id_len - 1) * 2], in __libdwfl_open_by_build_id() 137 const size_t id_len = mod->build_id_len; in __libdwfl_open_mod_by_build_id() local 140 return __libdwfl_open_by_build_id (mod, debug, file_name, id_len, id); in __libdwfl_open_mod_by_build_id()
|
/external/elfutils/libdw/ |
D | dwarf_getalt.c | 112 size_t id_len = build_id_len; in find_debug_altlink() local 122 if (id_len >= MIN_BUILD_ID_BYTES && id_len <= MAX_BUILD_ID_BYTES) in find_debug_altlink() 130 for (size_t i = 1; i < id_len; ++i) in find_debug_altlink() 134 + 3 + (id_len - 1) * 2], ".debug"); in find_debug_altlink()
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_tls.c | 25 size_t id_len; member 228 &data->id_len); in eap_tls_success() 231 data->session_id, data->id_len); in eap_tls_success() 414 id = os_memdup(data->session_id, data->id_len); in eap_tls_get_session_id() 418 *len = data->id_len; in eap_tls_get_session_id()
|
D | eap_gpsk.c | 27 size_t id_len; member 384 data->session_id, &data->id_len) < 0) { in eap_gpsk_send_gpsk_2() 391 data->session_id, data->id_len); in eap_gpsk_send_gpsk_2() 756 sid = os_memdup(data->session_id, data->id_len); in eap_gpsk_get_session_id() 759 *len = data->id_len; in eap_gpsk_get_session_id()
|
D | eap_fast.c | 57 size_t id_len; member 831 sm, &data->ssl, EAP_TYPE_FAST, &data->id_len); in eap_fast_process_crypto_binding() 834 data->session_id, data->id_len); in eap_fast_process_crypto_binding() 1364 static const u8 * eap_fast_get_a_id(const u8 *buf, size_t len, size_t *id_len) in eap_fast_get_a_id() argument 1374 *id_len = len; in eap_fast_get_a_id() 1384 *id_len = tlen; in eap_fast_get_a_id() 1387 wpa_hexdump_ascii(MSG_DEBUG, "EAP-FAST: A-ID", a_id, *id_len); in eap_fast_get_a_id() 1790 id = os_memdup(data->session_id, data->id_len); in eap_fast_get_session_id() 1794 *len = data->id_len; in eap_fast_get_session_id()
|
D | eap_peap.c | 59 size_t id_len; member 1142 &data->id_len); in eap_peap_process() 1146 data->session_id, data->id_len); in eap_peap_process() 1342 id = os_memdup(data->session_id, data->id_len); in eap_peap_get_session_id() 1346 *len = data->id_len; in eap_peap_get_session_id()
|
D | eap_ttls.c | 59 size_t id_len; member 303 &data->id_len); in eap_ttls_v0_derive_key() 306 data->session_id, data->id_len); in eap_ttls_v0_derive_key() 1827 id = os_memdup(data->session_id, data->id_len); in eap_ttls_get_session_id() 1831 *len = data->id_len; in eap_ttls_get_session_id()
|
D | eap_teap.c | 57 size_t id_len; member 805 data->id_len = 1 + res; in eap_teap_session_id() 807 data->session_id, data->id_len); in eap_teap_session_id() 2094 id = os_memdup(data->session_id, data->id_len); in eap_teap_get_session_id() 2098 *len = data->id_len; in eap_teap_get_session_id()
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_ttls.c | 92 u8 id_len; in eap_ttls_valid_session() local 95 id_len = sm->identity_len; in eap_ttls_valid_session() 97 id_len = 255; in eap_ttls_valid_session() 98 wpabuf_put_u8(buf, id_len); in eap_ttls_valid_session() 99 wpabuf_put_data(buf, sm->identity, id_len); in eap_ttls_valid_session() 1204 u8 id_len; in eap_ttls_process() local 1235 id_len = *pos++; in eap_ttls_process() 1237 pos, id_len); in eap_ttls_process() 1239 sm->identity = os_malloc(id_len ? id_len : 1); in eap_ttls_process() 1246 os_memcpy(sm->identity, pos, id_len); in eap_ttls_process() [all …]
|
D | eap_server_peap.c | 117 u8 id_len; in eap_peap_valid_session() local 120 id_len = sm->identity_len; in eap_peap_valid_session() 122 id_len = 255; in eap_peap_valid_session() 123 wpabuf_put_u8(buf, id_len); in eap_peap_valid_session() 124 wpabuf_put_data(buf, sm->identity, id_len); in eap_peap_valid_session() 1261 u8 id_len; in eap_peap_process() local 1293 id_len = *pos++; in eap_peap_process() 1295 pos, id_len); in eap_peap_process() 1297 sm->identity = os_malloc(id_len ? id_len : 1); in eap_peap_process() 1304 os_memcpy(sm->identity, pos, id_len); in eap_peap_process() [all …]
|
D | eap_server_gpsk.c | 28 size_t id_len; member 429 data->session_id, &data->id_len) < 0) { in eap_gpsk_process_gpsk_2() 435 data->session_id, data->id_len); in eap_gpsk_process_gpsk_2() 619 sid = os_memdup(data->session_id, data->id_len); in eap_gpsk_get_session_id() 622 *len = data->id_len; in eap_gpsk_get_session_id()
|
/external/elfutils/src/ |
D | stack.c | 159 int id_len = dwfl_module_build_id (mod, &id, &id_vaddr); in module_callback() local 160 if (id_len > 0) in module_callback() 165 while (--id_len > 0); in module_callback() 261 int id_len = dwfl_module_build_id (mod, &id, &id_vaddr); in print_frame() local 262 if (id_len > 0) in print_frame() 267 while (--id_len > 0); in print_frame()
|
/external/arm-trusted-firmware/drivers/brcm/ |
D | spi_flash.c | 29 .id_len = (!(jedec_id) ? 0 : (3 + ((ext_id) ? 2 : 0))), \ 67 if (info->id_len) { in spi_flash_read_id() 68 if (!memcmp(info->id, id, info->id_len)) in spi_flash_read_id()
|
/external/wpa_supplicant_8/src/radius/ |
D | radius_server.c | 564 size_t user_len, id_len; in radius_server_get_new_session() local 628 &id_len, NULL) == 0) { in radius_server_get_new_session() 632 if (id_len >= sizeof(buf)) in radius_server_get_new_session() 633 id_len = sizeof(buf) - 1; in radius_server_get_new_session() 634 os_memcpy(buf, id, id_len); in radius_server_get_new_session() 671 size_t id_len; in radius_srv_hs20_t_c_pending() local 679 id = eap_get_identity(sess->eap, &id_len); in radius_srv_hs20_t_c_pending() 682 id_str = os_malloc(id_len + 1); in radius_srv_hs20_t_c_pending() 685 os_memcpy(id_str, id, id_len); in radius_srv_hs20_t_c_pending() 686 id_str[id_len] = '\0'; in radius_srv_hs20_t_c_pending() [all …]
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | wpas_kay.c | 270 size_t id_len, need_len; in ieee802_1x_auth_get_session_id() local 272 session_id = eapol_sm_get_session_id(wpa_s->eapol, &id_len); in ieee802_1x_auth_get_session_id() 280 if (need_len > id_len) { in ieee802_1x_auth_get_session_id()
|
/external/ipsec-tools/src/racoon/ |
D | admin.h | 107 size_t id_len; member
|
D | admin.c | 373 if ((id = vmalloc(acp->id_len)) == NULL) { 390 data = (char *)(data + acp->id_len);
|
/external/arm-trusted-firmware/include/drivers/brcm/ |
D | sf.h | 56 uint8_t id_len; member
|
/external/wpa_supplicant_8/src/ap/ |
D | wpa_auth_kay.c | 359 size_t id_len, need_len; in ieee802_1x_auth_get_session_id() local 361 session_id = ieee802_1x_get_session_id(sta->eapol_sm, &id_len); in ieee802_1x_auth_get_session_id() 369 if (need_len > id_len) { in ieee802_1x_auth_get_session_id()
|
/external/wpa_supplicant_8/src/eap_common/ |
D | eap_sim_common.c | 1225 int eap_sim_anonymous_username(const u8 *id, size_t id_len) in eap_sim_anonymous_username() argument 1231 if (id_len > anonymous_id_len && in eap_sim_anonymous_username() 1235 if (id_len > anonymous_id_len + 1 && in eap_sim_anonymous_username() 1239 if (id_len > 1 && id[0] == '@') in eap_sim_anonymous_username() 1244 decorated = get_last_char(id, id_len, '!'); in eap_sim_anonymous_username() 1248 id + id_len - decorated); in eap_sim_anonymous_username()
|
D | eap_sim_common.h | 229 int eap_sim_anonymous_username(const u8 *id, size_t id_len);
|
/external/rust/crates/quiche/src/h3/ |
D | ffi.rs | 296 Ok((len, id, id_len)) => { in quiche_h3_recv_dgram() 298 unsafe { *flow_id_len = id_len }; in quiche_h3_recv_dgram()
|
/external/curl/lib/ |
D | imap.c | 252 size_t id_len = strlen(id); in imap_endofresp() local 255 if(len >= id_len + 1 && !memcmp(id, line, id_len) && line[id_len] == ' ') { in imap_endofresp() 256 line += id_len + 1; in imap_endofresp() 257 len -= id_len + 1; in imap_endofresp()
|
/external/tcpdump/ |
D | print-isakmp.c | 2205 int id_len, idtype_len, i; in ikev2_ID_print() local 2214 id_len = ntohs(id.h.len); in ikev2_ID_print() 2216 ND_PRINT((ndo," len=%d", id_len - 4)); in ikev2_ID_print() 2217 if (2 < ndo->ndo_vflag && 4 < id_len) { in ikev2_ID_print() 2220 if (!rawprint(ndo, (const uint8_t *)(ext + 1), id_len - 4)) in ikev2_ID_print() 2224 idtype_len =id_len - sizeof(struct ikev2_id); in ikev2_ID_print() 2275 return (const u_char *)ext + id_len; in ikev2_ID_print()
|
/external/rust/crates/criterion/src/ |
D | report.rs | 565 let id_len = id.len(); in measurement_complete() localVariable 570 " ".repeat(24 - id_len), in measurement_complete()
|