/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/ipv4/netfilter/ |
H A D | nf_nat_snmp_basic.c | 589 unsigned int id_len; member in struct:snmp_object 605 unsigned int id_len; member in struct:snmp_v1_trap 837 (*obj)->id_len = idlen; 955 if (!asn1_oid_decode(ctx, end, &trap->id, &trap->id_len)) 1167 for (i = 0; i < obj->id_len; i++) {
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/ssl/ |
H A D | ssl_sess.c | 147 unsigned int *id_len) 151 if (RAND_pseudo_bytes(id, *id_len) <= 0) 153 while(SSL_has_matching_session_id(ssl, id, *id_len) && 146 def_generate_session_id(const SSL *ssl, unsigned char *id, unsigned int *id_len) argument
|
H A D | ssl_lib.c | 383 unsigned int id_len) 388 * any new session built out of this id/id_len and the ssl_version in 392 if(id_len > sizeof r.session_id) 396 r.session_id_length = id_len; 397 memcpy(r.session_id, id, id_len); 403 (id_len < SSL2_SSL_SESSION_ID_LENGTH)) 405 memset(r.session_id + id_len, 0, 406 SSL2_SSL_SESSION_ID_LENGTH - id_len); 382 SSL_has_matching_session_id(const SSL *ssl, const unsigned char *id, unsigned int id_len) argument
|
H A D | ssl.h | 599 * SSL_has_matching_session_id(ssl, id, *id_len) 607 unsigned int *id_len); 1319 unsigned int id_len);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/apps/ |
H A D | s_server.c | 188 unsigned int *id_len); 1996 unsigned int *id_len) 2000 RAND_pseudo_bytes(id, *id_len); 2007 (strlen(session_id_prefix) < *id_len) ? 2008 strlen(session_id_prefix) : *id_len); 2010 while(SSL_has_matching_session_id(ssl, id, *id_len) && 1995 generate_session_id(const SSL *ssl, unsigned char *id, unsigned int *id_len) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/modules/ |
H A D | vfs_aixacl_util.c | 292 ace_id->id_len = sizeof(struct ace_id); /* contains 1 id_data */
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/lib/ |
H A D | imap.c | 280 size_t id_len = strlen(id); local 283 if(len >= id_len + 1 && !memcmp(id, line, id_len) && line[id_len] == ' ') { 284 line += id_len + 1; 285 len -= id_len + 1;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ssl/ |
H A D | ssl_sess.c | 381 unsigned int *id_len) 385 if (RAND_pseudo_bytes(id, *id_len) <= 0) 387 while (SSL_has_matching_session_id(ssl, id, *id_len) && 380 def_generate_session_id(const SSL *ssl, unsigned char *id, unsigned int *id_len) argument
|
H A D | ssl_lib.c | 482 unsigned int id_len) 488 * any new session built out of this id/id_len and the ssl_version in use 493 if (id_len > sizeof r.session_id) 497 r.session_id_length = id_len; 498 memcpy(r.session_id, id, id_len); 506 (id_len < SSL2_SSL_SESSION_ID_LENGTH)) { 507 memset(r.session_id + id_len, 0, SSL2_SSL_SESSION_ID_LENGTH - id_len); 481 SSL_has_matching_session_id(const SSL *ssl, const unsigned char *id, unsigned int id_len) argument
|
H A D | ssl.h | 897 * SSL_has_matching_session_id(ssl, id, *id_len) The length value passed in 906 unsigned int *id_len); 2248 unsigned int id_len);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/ssl/ |
H A D | ssl_sess.c | 381 unsigned int *id_len) 385 if (RAND_pseudo_bytes(id, *id_len) <= 0) 387 while (SSL_has_matching_session_id(ssl, id, *id_len) && 380 def_generate_session_id(const SSL *ssl, unsigned char *id, unsigned int *id_len) argument
|
H A D | ssl_lib.c | 482 unsigned int id_len) 488 * any new session built out of this id/id_len and the ssl_version in use 493 if (id_len > sizeof r.session_id) 497 r.session_id_length = id_len; 498 memcpy(r.session_id, id, id_len); 506 (id_len < SSL2_SSL_SESSION_ID_LENGTH)) { 507 memset(r.session_id + id_len, 0, SSL2_SSL_SESSION_ID_LENGTH - id_len); 481 SSL_has_matching_session_id(const SSL *ssl, const unsigned char *id, unsigned int id_len) argument
|
H A D | ssl.h | 897 * SSL_has_matching_session_id(ssl, id, *id_len) The length value passed in 906 unsigned int *id_len); 2248 unsigned int id_len);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/tcpdump-4.4.0/ |
H A D | print-isakmp.c | 1602 int id_len, idtype_len, i; local 1610 id_len = ntohs(id.h.len); 1612 ND_PRINT((ndo," len=%d", id_len - 4)); 1613 if (2 < ndo->ndo_vflag && 4 < id_len) { 1615 if (!rawprint(ndo, (caddr_t)(ext + 1), id_len - 4)) 1619 idtype_len =id_len - sizeof(struct ikev2_id); 1670 return (u_char *)ext + id_len;
|
H A D | print-isoclns.c | 1558 isis_print_id(const u_int8_t *cp, int id_len) argument 1570 if (id_len >= NODE_ID_LEN) { 1574 if (id_len == LSP_ID_LEN)
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/apps/ |
H A D | s_server.c | 220 unsigned int *id_len); 3370 unsigned int *id_len) 3374 if (RAND_pseudo_bytes(id, *id_len) < 0) 3384 (strlen(session_id_prefix) < *id_len) ? 3385 strlen(session_id_prefix) : *id_len); 3387 while (SSL_has_matching_session_id(ssl, id, *id_len) && 3369 generate_session_id(const SSL *ssl, unsigned char *id, unsigned int *id_len) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/apps/ |
H A D | s_server.c | 220 unsigned int *id_len); 3370 unsigned int *id_len) 3374 if (RAND_pseudo_bytes(id, *id_len) < 0) 3384 (strlen(session_id_prefix) < *id_len) ? 3385 strlen(session_id_prefix) : *id_len); 3387 while (SSL_has_matching_session_id(ssl, id, *id_len) && 3369 generate_session_id(const SSL *ssl, unsigned char *id, unsigned int *id_len) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/gettext-0.17/gettext-tools/src/ |
H A D | msgl-cat.c | 653 size_t id_len = strlen (tmp->alternative[i].id); local 660 len += id_len + 2;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/minidlna/ffmpeg-2.3.4/libavformat/ |
H A D | matroskadec.c | 2496 int id_len, settings_len, text_len; local 2507 id_len = -1; 2510 id_len = p - id; 2560 if (id_len > 0) { 2563 id_len); 2568 memcpy(buf, id, id_len);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/ |
H A D | ssl.h | 599 * SSL_has_matching_session_id(ssl, id, *id_len) 607 unsigned int *id_len); 1319 unsigned int id_len);
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/linux/ |
H A D | nfs_xdr.h | 924 unsigned int id_len; member in struct:nfs41_exchange_id_args
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/scsi/bfa/include/protocol/ |
H A D | scsi.h | 615 u8 id_len; member in struct:scsi_inq_dip_desc_s
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/net/cxgb4/ |
H A D | t4_hw.c | 340 u8 id_len[2]; member in struct:t4_vpd_hdr
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/net/cxgb3/ |
H A D | t3_hw.c | 573 u8 id_len[2]; member in struct:t3_vpd
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/nfs/ |
H A D | nfs4proc.c | 4582 args.id_len = scnprintf(args.id, sizeof(args.id),
|