/external/elfutils/libdwfl/ |
D | dwfl_build_id_find_elf.c | 38 const size_t id_len, const uint8_t *id) in __libdwfl_open_by_build_id() argument 44 if (id_len < MIN_BUILD_ID_BYTES || id_len > MAX_BUILD_ID_BYTES) in __libdwfl_open_by_build_id() 58 for (size_t i = 1; i < id_len; ++i) in __libdwfl_open_by_build_id() 65 strcpy (&id_name[sizeof "/.build-id/" - 1 + 3 + (id_len - 1) * 2], in __libdwfl_open_by_build_id() 129 const size_t id_len = mod->build_id_len; in __libdwfl_open_mod_by_build_id() local 132 return __libdwfl_open_by_build_id (mod, debug, file_name, id_len, id); in __libdwfl_open_mod_by_build_id()
|
D | libdwflP.h | 547 char **file_name, const size_t id_len,
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_ttls.c | 92 u8 id_len; in eap_ttls_valid_session() local 95 id_len = sm->identity_len; in eap_ttls_valid_session() 97 id_len = 255; in eap_ttls_valid_session() 98 wpabuf_put_u8(buf, id_len); in eap_ttls_valid_session() 99 wpabuf_put_data(buf, sm->identity, id_len); in eap_ttls_valid_session() 1196 u8 id_len; in eap_ttls_process() local 1227 id_len = *pos++; in eap_ttls_process() 1229 pos, id_len); in eap_ttls_process() 1231 sm->identity = os_malloc(id_len ? id_len : 1); in eap_ttls_process() 1238 os_memcpy(sm->identity, pos, id_len); in eap_ttls_process() [all …]
|
D | eap_server_peap.c | 117 u8 id_len; in eap_peap_valid_session() local 120 id_len = sm->identity_len; in eap_peap_valid_session() 122 id_len = 255; in eap_peap_valid_session() 123 wpabuf_put_u8(buf, id_len); in eap_peap_valid_session() 124 wpabuf_put_data(buf, sm->identity, id_len); in eap_peap_valid_session() 1226 u8 id_len; in eap_peap_process() local 1258 id_len = *pos++; in eap_peap_process() 1260 pos, id_len); in eap_peap_process() 1262 sm->identity = os_malloc(id_len ? id_len : 1); in eap_peap_process() 1269 os_memcpy(sm->identity, pos, id_len); in eap_peap_process() [all …]
|
D | eap_server_gpsk.c | 28 size_t id_len; member 428 data->session_id, &data->id_len) < 0) { in eap_gpsk_process_gpsk_2() 434 data->session_id, data->id_len); in eap_gpsk_process_gpsk_2() 618 sid = os_memdup(data->session_id, data->id_len); in eap_gpsk_get_session_id() 621 *len = data->id_len; in eap_gpsk_get_session_id()
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_tls.c | 25 size_t id_len; member 199 &data->id_len); in eap_tls_success() 202 data->session_id, data->id_len); in eap_tls_success() 377 id = os_memdup(data->session_id, data->id_len); in eap_tls_get_session_id() 381 *len = data->id_len; in eap_tls_get_session_id()
|
D | eap_gpsk.c | 27 size_t id_len; member 384 data->session_id, &data->id_len) < 0) { in eap_gpsk_send_gpsk_2() 391 data->session_id, data->id_len); in eap_gpsk_send_gpsk_2() 756 sid = os_memdup(data->session_id, data->id_len); in eap_gpsk_get_session_id() 759 *len = data->id_len; in eap_gpsk_get_session_id()
|
D | eap_fast.c | 57 size_t id_len; member 811 sm, &data->ssl, EAP_TYPE_FAST, &data->id_len); in eap_fast_process_crypto_binding() 814 data->session_id, data->id_len); in eap_fast_process_crypto_binding() 1344 static const u8 * eap_fast_get_a_id(const u8 *buf, size_t len, size_t *id_len) in eap_fast_get_a_id() argument 1354 *id_len = len; in eap_fast_get_a_id() 1364 *id_len = tlen; in eap_fast_get_a_id() 1367 wpa_hexdump_ascii(MSG_DEBUG, "EAP-FAST: A-ID", a_id, *id_len); in eap_fast_get_a_id() 1770 id = os_memdup(data->session_id, data->id_len); in eap_fast_get_session_id() 1774 *len = data->id_len; in eap_fast_get_session_id()
|
D | eap_peap.c | 59 size_t id_len; member 1099 &data->id_len); in eap_peap_process() 1103 data->session_id, data->id_len); in eap_peap_process() 1275 id = os_memdup(data->session_id, data->id_len); in eap_peap_get_session_id() 1279 *len = data->id_len; in eap_peap_get_session_id()
|
D | eap_ttls.c | 59 size_t id_len; member 290 &data->id_len); in eap_ttls_v0_derive_key() 293 data->session_id, data->id_len); in eap_ttls_v0_derive_key() 1781 id = os_memdup(data->session_id, data->id_len); in eap_ttls_get_session_id() 1785 *len = data->id_len; in eap_ttls_get_session_id()
|
/external/elfutils/src/ |
D | stack.c | 155 int id_len = dwfl_module_build_id (mod, &id, &id_vaddr); in module_callback() local 156 if (id_len > 0) in module_callback() 161 while (--id_len > 0); in module_callback() 257 int id_len = dwfl_module_build_id (mod, &id, &id_vaddr); in print_frame() local 258 if (id_len > 0) in print_frame() 263 while (--id_len > 0); in print_frame()
|
D | unstrip.c | 2258 int id_len = dwfl_module_build_id (mod, &id, &id_vaddr); in list_module() local 2262 if (id_len > 0) in list_module() 2266 while (--id_len > 0); in list_module()
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | wpas_kay.c | 262 size_t id_len, need_len; in ieee802_1x_auth_get_session_id() local 264 session_id = eapol_sm_get_session_id(wpa_s->eapol, &id_len); in ieee802_1x_auth_get_session_id() 272 if (need_len > id_len) { in ieee802_1x_auth_get_session_id()
|
/external/ipsec-tools/src/racoon/ |
D | admin.h | 107 size_t id_len; member
|
D | admin.c | 373 if ((id = vmalloc(acp->id_len)) == NULL) { 390 data = (char *)(data + acp->id_len);
|
D | racoonctl.c | 720 acp->id_len = strlen(id) + 1; 726 data = (char *)(data + acp->id_len);
|
/external/curl/lib/ |
D | imap.c | 249 size_t id_len = strlen(id); in imap_endofresp() local 252 if(len >= id_len + 1 && !memcmp(id, line, id_len) && line[id_len] == ' ') { in imap_endofresp() 253 line += id_len + 1; in imap_endofresp() 254 len -= id_len + 1; in imap_endofresp()
|
/external/boringssl/src/ssl/ |
D | ssl_session.cc | 1187 int id_len, int *out_copy)) { in SSL_CTX_sess_set_get_cb() argument 1193 int id_len, int *out_copy)) { in SSL_CTX_sess_set_get_cb() argument 1199 int id_len, in SSL_CTX_sess_get_get_cb()
|
/external/tcpdump/ |
D | print-isakmp.c | 2205 int id_len, idtype_len, i; in ikev2_ID_print() local 2214 id_len = ntohs(id.h.len); in ikev2_ID_print() 2216 ND_PRINT((ndo," len=%d", id_len - 4)); in ikev2_ID_print() 2217 if (2 < ndo->ndo_vflag && 4 < id_len) { in ikev2_ID_print() 2220 if (!rawprint(ndo, (const uint8_t *)(ext + 1), id_len - 4)) in ikev2_ID_print() 2224 idtype_len =id_len - sizeof(struct ikev2_id); in ikev2_ID_print() 2275 return (const u_char *)ext + id_len; in ikev2_ID_print()
|
D | print-isoclns.c | 1644 isis_print_id(const uint8_t *cp, int id_len) in isis_print_id() argument 1652 if (sysid_len > id_len) in isis_print_id() 1653 sysid_len = id_len; in isis_print_id() 1660 if (id_len >= NODE_ID_LEN) { in isis_print_id() 1664 if (id_len == LSP_ID_LEN) in isis_print_id()
|
/external/wpa_supplicant_8/src/ap/ |
D | wpa_auth_ft.c | 1026 if (r0kh->id_len == 1 && r0kh->id[0] == '*') in wpa_ft_rrb_lookup_r0kh() 1028 if (f_r0kh_id && r0kh->id_len == f_r0kh_id_len && in wpa_ft_rrb_lookup_r0kh() 1161 const u8 *src_addr, const u8 *r0kh_id, size_t id_len, in wpa_ft_rrb_add_r0kh() argument 1176 if (id_len > FT_R0KH_ID_MAX_LEN) in wpa_ft_rrb_add_r0kh() 1177 id_len = FT_R0KH_ID_MAX_LEN; in wpa_ft_rrb_add_r0kh() 1178 os_memcpy(r0kh->id, r0kh_id, id_len); in wpa_ft_rrb_add_r0kh() 1179 r0kh->id_len = id_len; in wpa_ft_rrb_add_r0kh() 1473 r0kh->id, r0kh->id_len, f_r1kh_id, key, in wpa_ft_pull_pmk_r1()
|
D | wpa_auth.h | 142 size_t id_len; member
|
/external/boringssl/src/include/openssl/ |
D | ssl.h | 1979 int id_len, int *out_copy)); 1984 SSL *ssl, const uint8_t *id, int id_len, int *out_copy); 4108 int id_len, int *out_copy));
|
/external/wpa_supplicant_8/src/crypto/ |
D | tls_openssl.c | 1338 size_t payload_len, id_len; in check_server_hello() local 1363 id_len = *pos++; in check_server_hello() 1364 if ((size_t) (end - pos) < id_len) in check_server_hello() 1366 pos += id_len; in check_server_hello()
|
/external/wpa_supplicant_8/hostapd/ |
D | config_file.c | 1058 r0kh->id_len = next - pos - 1; in add_r0kh() 1059 os_memcpy(r0kh->id, pos, r0kh->id_len); in add_r0kh()
|