/freebsd-11-stable/usr.sbin/bsnmpd/modules/snmp_hostres/ |
H A D | hostres_partition_tbl.c | 163 size_t id_len; local 190 id_len = strlen(chunk_name) + 1; 191 if (id_len > PART_STR_MLEN) 192 id_len = PART_STR_MLEN; 194 if ((map->id = malloc(id_len)) == NULL) { 201 strlcpy(map->id, chunk_name, id_len); 233 * reuse id_len from here till the end of this function 236 id_len = strlen(_PATH_DEV) + strlen(chunk_name) + 1; 238 if (id_len > PART_STR_MLEN) 239 id_len [all...] |
/freebsd-11-stable/contrib/wpa/src/eap_peer/ |
H A D | eap_tls.c | 25 size_t id_len; member in struct:eap_tls_data 222 &data->id_len); 225 data->session_id, data->id_len); 412 id = os_memdup(data->session_id, data->id_len); 416 *len = data->id_len;
|
H A D | eap_fast.c | 57 size_t id_len; member in struct:eap_fast_data 811 sm, &data->ssl, EAP_TYPE_FAST, &data->id_len); 814 data->session_id, data->id_len); 1344 static const u8 * eap_fast_get_a_id(const u8 *buf, size_t len, size_t *id_len) argument 1354 *id_len = len; 1364 *id_len = tlen; 1367 wpa_hexdump_ascii(MSG_DEBUG, "EAP-FAST: A-ID", a_id, *id_len); 1770 id = os_memdup(data->session_id, data->id_len); 1774 *len = data->id_len;
|
H A D | eap_gpsk.c | 27 size_t id_len; member in struct:eap_gpsk_data 384 data->session_id, &data->id_len) < 0) { 391 data->session_id, data->id_len); 756 sid = os_memdup(data->session_id, data->id_len); 759 *len = data->id_len;
|
H A D | eap_peap.c | 59 size_t id_len; member in struct:eap_peap_data 1109 &data->id_len); 1113 data->session_id, data->id_len); 1309 id = os_memdup(data->session_id, data->id_len); 1313 *len = data->id_len;
|
H A D | eap_teap.c | 56 size_t id_len; member in struct:eap_teap_data 750 data->id_len = 1 + res; 752 data->session_id, data->id_len); 1981 id = os_memdup(data->session_id, data->id_len); 1985 *len = data->id_len;
|
H A D | eap_ttls.c | 59 size_t id_len; member in struct:eap_ttls_data 291 &data->id_len); 294 data->session_id, data->id_len); 1783 id = os_memdup(data->session_id, data->id_len); 1787 *len = data->id_len;
|
/freebsd-11-stable/contrib/wpa/wpa_supplicant/ |
H A D | wpas_kay.c | 270 size_t id_len, need_len; local 272 session_id = eapol_sm_get_session_id(wpa_s->eapol, &id_len); 280 if (need_len > id_len) {
|
/freebsd-11-stable/contrib/wpa/src/eap_server/ |
H A D | eap_server_peap.c | 117 u8 id_len; local 120 id_len = sm->identity_len; 122 id_len = 255; 123 wpabuf_put_u8(buf, id_len); 124 wpabuf_put_data(buf, sm->identity, id_len); 1230 u8 id_len; local 1262 id_len = *pos++; 1264 pos, id_len); 1266 sm->identity = os_malloc(id_len ? id_len [all...] |
H A D | eap_server_ttls.c | 92 u8 id_len; local 95 id_len = sm->identity_len; 97 id_len = 255; 98 wpabuf_put_u8(buf, id_len); 99 wpabuf_put_data(buf, sm->identity, id_len); 1196 u8 id_len; local 1227 id_len = *pos++; 1229 pos, id_len); 1231 sm->identity = os_malloc(id_len ? id_len [all...] |
H A D | eap_server_gpsk.c | 28 size_t id_len; member in struct:eap_gpsk_data 428 data->session_id, &data->id_len) < 0) { 434 data->session_id, data->id_len); 618 sid = os_memdup(data->session_id, data->id_len); 621 *len = data->id_len;
|
/freebsd-11-stable/sbin/camcontrol/ |
H A D | persist.c | 443 size_t table_size = 0, id_len = 0; local 498 id_len += id->alloc_len; 726 res_len = sizeof(struct scsi_per_res_reg_move) + id_len; 737 res_len += id_len; 784 scsi_ulto4b(id_len, id_hdr->additional_length);
|
/freebsd-11-stable/contrib/wpa/src/radius/ |
H A D | radius_server.c | 707 size_t user_len, id_len; local 771 &id_len, NULL) == 0) { 775 if (id_len >= sizeof(buf)) 776 id_len = sizeof(buf) - 1; 777 os_memcpy(buf, id, id_len); 838 size_t id_len; local 846 id = eap_get_identity(sess->eap, &id_len); 849 id_str = os_malloc(id_len + 1); 852 os_memcpy(id_str, id, id_len); 853 id_str[id_len] 909 size_t id_len; local [all...] |
/freebsd-11-stable/contrib/wpa/src/ap/ |
H A D | wpa_auth_kay.c | 359 size_t id_len, need_len; local 361 session_id = ieee802_1x_get_session_id(sta->eapol_sm, &id_len); 369 if (need_len > id_len) {
|
H A D | wpa_auth_ft.c | 1555 if (r0kh->id_len == 1 && r0kh->id[0] == '*') 1557 if (f_r0kh_id && r0kh->id_len == f_r0kh_id_len && 1690 const u8 *src_addr, const u8 *r0kh_id, size_t id_len, 1705 if (id_len > FT_R0KH_ID_MAX_LEN) 1706 id_len = FT_R0KH_ID_MAX_LEN; 1707 os_memcpy(r0kh->id, r0kh_id, id_len); 1708 r0kh->id_len = id_len; 2007 r0kh->id, r0kh->id_len, f_r1kh_id, key, 1688 wpa_ft_rrb_add_r0kh(struct wpa_authenticator *wpa_auth, struct ft_remote_r0kh *r0kh_wildcard, const u8 *src_addr, const u8 *r0kh_id, size_t id_len, int timeout) argument
|
H A D | wpa_auth.h | 155 size_t id_len; member in struct:ft_remote_r0kh
|
/freebsd-11-stable/sys/dev/iicbus/ |
H A D | adt746x.c | 354 int i, id_len, len = 0, location_len, prev_len = 0; local 362 id_len = OF_getprop_alloc(child, "hwctrl-id", sizeof(cell_t), (void **)&id); 363 if (location_len == -1 || id_len == -1) { 370 for (i = 0; i < id_len; i++) {
|
/freebsd-11-stable/contrib/wpa/src/eap_common/ |
H A D | eap_sim_common.h | 229 int eap_sim_anonymous_username(const u8 *id, size_t id_len);
|
H A D | eap_sim_common.c | 1213 int eap_sim_anonymous_username(const u8 *id, size_t id_len) argument 1218 if (id_len > anonymous_id_len && 1222 if (id_len > 1 && id[0] == '@')
|
/freebsd-11-stable/crypto/openssl/ssl/ |
H A D | ssl_sess.c | 383 unsigned int *id_len) 387 if (RAND_bytes(id, *id_len) <= 0) 389 while (SSL_has_matching_session_id(ssl, id, *id_len) && 382 def_generate_session_id(const SSL *ssl, unsigned char *id, unsigned int *id_len) argument
|
H A D | ssl_lib.c | 482 unsigned int id_len) 488 * any new session built out of this id/id_len and the ssl_version in use 493 if (id_len > sizeof(r.session_id)) 497 r.session_id_length = id_len; 498 memcpy(r.session_id, id, id_len); 506 (id_len < SSL2_SSL_SESSION_ID_LENGTH)) { 507 memset(r.session_id + id_len, 0, SSL2_SSL_SESSION_ID_LENGTH - id_len); 481 SSL_has_matching_session_id(const SSL *ssl, const unsigned char *id, unsigned int id_len) argument
|
/freebsd-11-stable/contrib/tcpdump/ |
H A D | print-isakmp.c | 2206 int id_len, idtype_len, i; local 2215 id_len = ntohs(id.h.len); 2217 ND_PRINT((ndo," len=%d", id_len - 4)); 2218 if (2 < ndo->ndo_vflag && 4 < id_len) { 2221 if (!rawprint(ndo, (const uint8_t *)(ext + 1), id_len - 4)) 2225 idtype_len =id_len - sizeof(struct ikev2_id); 2276 return (const u_char *)ext + id_len;
|
H A D | print-isoclns.c | 1644 isis_print_id(const uint8_t *cp, int id_len) argument 1652 if (sysid_len > id_len) 1653 sysid_len = id_len; 1660 if (id_len >= NODE_ID_LEN) { 1664 if (id_len == LSP_ID_LEN)
|
/freebsd-11-stable/crypto/openssl/apps/ |
H A D | s_server.c | 220 unsigned int *id_len); 3401 unsigned int *id_len) 3405 if (RAND_bytes(id, *id_len) <= 0) 3415 (strlen(session_id_prefix) < *id_len) ? 3416 strlen(session_id_prefix) : *id_len); 3418 while (SSL_has_matching_session_id(ssl, id, *id_len) && 3400 generate_session_id(const SSL *ssl, unsigned char *id, unsigned int *id_len) argument
|
/freebsd-11-stable/sys/net80211/ |
H A D | ieee80211_mesh.h | 118 uint8_t id_len; member in struct:ieee80211_meshid_ie
|