/external/ipsec-tools/src/racoon/ |
admin.h | 122 size_t id_len; member in struct:admin_com_psk
|
admin.c | 391 if ((id = vmalloc(acp->id_len)) == NULL) { 408 data = (char *)(data + acp->id_len);
|
racoonctl.c | 629 acp->id_len = strlen(id) + 1; 635 data = (char *)(data + acp->id_len);
|
/external/qemu/hw/ |
scsi-disk.c | 517 int id_len = strlen(bdrv_get_device_name(s->bdrv)); local 518 if (id_len > max_len) 519 id_len = max_len; 532 outbuf[r->iov.iov_len++] = 3 + id_len; 537 outbuf[r->iov.iov_len++] = id_len; // length of data following 540 bdrv_get_device_name(s->bdrv), id_len); 541 r->iov.iov_len += id_len;
|
/external/openssl/apps/ |
s_server.c | 211 unsigned int *id_len); [all...] |
/external/wpa_supplicant_8/src/ap/ |
wpa_auth.h | 118 size_t id_len; member in struct:ft_remote_r0kh
|
wpa_auth_ft.c | 321 if (r0kh->id_len == r0kh_id_len && [all...] |
/external/openssl/ssl/ |
ssl_sess.c | 242 unsigned int *id_len) 246 if (RAND_pseudo_bytes(id, *id_len) <= 0) 248 while(SSL_has_matching_session_id(ssl, id, *id_len) && [all...] |
ssl_lib.c | 440 unsigned int id_len) 445 * any new session built out of this id/id_len and the ssl_version in 449 if(id_len > sizeof r.session_id) 453 r.session_id_length = id_len; 454 memcpy(r.session_id, id, id_len); 460 (id_len < SSL2_SSL_SESSION_ID_LENGTH)) 462 memset(r.session_id + id_len, 0, 463 SSL2_SSL_SESSION_ID_LENGTH - id_len); [all...] |
ssl.h | 668 * SSL_has_matching_session_id(ssl, id, *id_len) 676 unsigned int *id_len); [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_fast.c | [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_fast.c | [all...] |
/external/tcpdump/ |
print-isoclns.c | [all...] |
/external/openssl/include/openssl/ |
ssl.h | 668 * SSL_has_matching_session_id(ssl, id, *id_len) 676 unsigned int *id_len); [all...] |
/external/wpa_supplicant_8/hostapd/ |
config_file.c | 922 r0kh->id_len = next - pos - 1; 923 os_memcpy(r0kh->id, pos, r0kh->id_len); [all...] |