| /src/cddl/contrib/opensolaris/tools/ctf/cvt/ |
| H A D | alist.c | 150 alist_iter_data_t *aid = arg2; in alist_iter_cb() local 151 return (aid->aid_func(el->ale_name, el->ale_value, aid->aid_priv)); in alist_iter_cb() 157 alist_iter_data_t aid; in alist_iter() local 159 aid.aid_func = func; in alist_iter() 160 aid.aid_priv = private; in alist_iter() 162 return (hash_iter(alist->al_elements, alist_iter_cb, &aid)); in alist_iter()
|
| /src/contrib/lib9p/ |
| H A D | genacl.c | 573 uid_t uid, *aid; in l9p_frombsdnfs4() local 587 aid = NULL; in l9p_frombsdnfs4() 604 aid = acl_get_qualifier(sysace); /* ugh, this malloc()s */ in l9p_frombsdnfs4() 605 if (aid == NULL) in l9p_frombsdnfs4() 607 uid = *(uid_t *)aid; in l9p_frombsdnfs4() 608 free(aid); in l9p_frombsdnfs4() 609 aid = &uid; in l9p_frombsdnfs4() 697 if (aid == NULL) in l9p_frombsdnfs4() 701 memcpy(&ace->ace_idbytes[0], aid, sizeof(uid)); in l9p_frombsdnfs4()
|
| /src/crypto/openssl/crypto/x509/ |
| H A D | v3_authattid.c | 55 OSSL_ISSUER_SERIAL *aid; in i2r_auth_attr_id() local 60 aid = sk_OSSL_ISSUER_SERIAL_value(aids, i); in i2r_auth_attr_id() 61 if (i2r_ISSUER_SERIAL(method, aid, out, indent + 4) <= 0) in i2r_auth_attr_id()
|
| /src/contrib/wpa/src/utils/ |
| H A D | pcsc_funcs.c | 254 sim_types sim_type, unsigned char *aid, 401 static int scard_get_aid(struct scard_data *scard, unsigned char *aid, in scard_get_aid() argument 496 os_memcpy(aid, aid_pos, aid_len); in scard_get_aid() 657 unsigned char aid[32]; in scard_init() local 660 aid_len = scard_get_aid(scard, aid, sizeof(aid)); in scard_init() 664 os_memcpy(aid, "\xa0\x00\x00\x00\x87", 5); in scard_init() 667 wpa_hexdump(MSG_DEBUG, "SCARD: 3G USIM AID", aid, aid_len); in scard_init() 673 aid, aid_len)) { in scard_init() 677 aid, aid_len); in scard_init() 808 sim_types sim_type, unsigned char *aid, in _scard_select_file() argument [all …]
|
| /src/crypto/openssl/crypto/asn1/ |
| H A D | a_sign.c | 168 unsigned char aid[128]; in ASN1_item_sign_ctx() local 178 aid, sizeof(aid)); in ASN1_item_sign_ctx() 190 const unsigned char *pp = aid; in ASN1_item_sign_ctx() 199 const unsigned char *pp = aid; in ASN1_item_sign_ctx()
|
| /src/sys/net80211/ |
| H A D | ieee80211_power.c | 290 uint16_t aid; in ieee80211_set_tim() local 297 aid = IEEE80211_AID(ni->ni_associd); in ieee80211_set_tim() 298 KASSERT(aid < vap->iv_max_aid, in ieee80211_set_tim() 299 ("bogus aid %u, max %u", aid, vap->iv_max_aid)); in ieee80211_set_tim() 302 changed = (set != (isset(vap->iv_tim_bitmap, aid) != 0)); in ieee80211_set_tim() 305 setbit(vap->iv_tim_bitmap, aid); in ieee80211_set_tim() 308 clrbit(vap->iv_tim_bitmap, aid); in ieee80211_set_tim()
|
| /src/cddl/contrib/opensolaris/lib/libdtrace/common/ |
| H A D | dt_cc.c | 324 dt_ident_t *aid; in dt_action_clear() local 351 aid = anp->dn_ident; in dt_action_clear() 353 if (aid->di_gen == dtp->dt_gen && !(aid->di_flags & DT_IDFLG_MOD)) { in dt_action_clear() 355 "undefined aggregation: @%s\n", aid->di_name); in dt_action_clear() 366 dt_ident_t *aid; in dt_action_normalize() local 400 aid = anp->dn_ident; in dt_action_normalize() 402 if (aid->di_gen == dtp->dt_gen && !(aid->di_flags & DT_IDFLG_MOD)) { in dt_action_normalize() 404 "undefined aggregation: @%s\n", aid->di_name); in dt_action_normalize() 429 dt_ident_t *aid; in dt_action_trunc() local 467 aid = anp->dn_ident; in dt_action_trunc() [all …]
|
| H A D | dt_map.c | 406 dt_ident_t *aid; local 410 aid = sdp->dtsd_aggdata; 411 agg->dtagd_name = aid->di_name; 412 agg->dtagd_varid = aid->di_id;
|
| /src/crypto/openssl/crypto/cms/ |
| H A D | cms_rsa.c | 200 unsigned char aid[128]; in rsa_cms_sign() local 201 const unsigned char *pp = aid; in rsa_cms_sign() 232 OSSL_SIGNATURE_PARAM_ALGORITHM_ID, aid, sizeof(aid)); in rsa_cms_sign()
|
| /src/usr.bin/gprof/ |
| H A D | gprof.callg | 11 listing, as an aid to locating it (see below). 34 listing, as an aid to locating it. 61 listing, as an aid in locating it. 87 as an aid to locating it.
|
| /src/contrib/libfido2/src/ |
| H A D | nfc.c | 17 static const uint8_t aid[] = { 0xa0, 0x00, 0x00, 0x06, 0x47, 0x2f, 0x00, 0x01 }; variable 105 if ((apdu = iso7816_new(0, 0xa4, 0x04, sizeof(aid))) == NULL || in fido_nfc_tx() 106 iso7816_add(apdu, aid, sizeof(aid)) < 0) { in fido_nfc_tx()
|
| /src/crypto/openssl/providers/implementations/signature/ |
| H A D | ml_dsa_sig.c | 102 uint8_t *aid = NULL; in set_alg_id_buffer() local 116 aid = WPACKET_get_curr(&pkt); in set_alg_id_buffer() 119 if (aid != NULL && ctx->aid_len != 0) in set_alg_id_buffer() 120 memmove(ctx->aid_buf, aid, ctx->aid_len); in set_alg_id_buffer()
|
| H A D | slh_dsa_sig.c | 123 uint8_t *aid = NULL; in slh_dsa_set_alg_id_buffer() local 137 aid = WPACKET_get_curr(&pkt); in slh_dsa_set_alg_id_buffer() 140 if (aid != NULL && ctx->aid_len != 0) in slh_dsa_set_alg_id_buffer() 141 memmove(ctx->aid_buf, aid, ctx->aid_len); in slh_dsa_set_alg_id_buffer()
|
| H A D | sm2_sig.c | 215 unsigned char *aid = NULL; in sm2sig_digest_signverify_init() local 241 aid = WPACKET_get_curr(&pkt); in sm2sig_digest_signverify_init() 244 if (aid != NULL && ctx->aid_len != 0) in sm2sig_digest_signverify_init() 245 memmove(ctx->aid_buf, aid, ctx->aid_len); in sm2sig_digest_signverify_init()
|
| /src/crypto/openssl/crypto/evp/ |
| H A D | evp_lib.c | 1353 unsigned char *aid = NULL; in EVP_CIPHER_CTX_get_algor() local 1356 if ((aid = OPENSSL_malloc(aid_len)) != NULL) { in EVP_CIPHER_CTX_get_algor() 1357 params[0] = OSSL_PARAM_construct_octet_string(k_aid, aid, aid_len); in EVP_CIPHER_CTX_get_algor() 1358 pp = aid; in EVP_CIPHER_CTX_get_algor() 1364 OPENSSL_free(aid); in EVP_CIPHER_CTX_get_algor() 1470 unsigned char *aid = NULL; in EVP_PKEY_CTX_get_algor() local 1473 if ((aid = OPENSSL_malloc(aid_len)) != NULL) { in EVP_PKEY_CTX_get_algor() 1474 params[0] = OSSL_PARAM_construct_octet_string(k_aid, aid, aid_len); in EVP_PKEY_CTX_get_algor() 1475 pp = aid; in EVP_PKEY_CTX_get_algor() 1481 OPENSSL_free(aid); in EVP_PKEY_CTX_get_algor()
|
| /src/sys/contrib/dev/iwlwifi/mld/ |
| H A D | debugfs.c | 112 u16 aid; member 120 apply->mld->monitor.cur_aid = cpu_to_le16(apply->aid); in iwl_mld_sniffer_apply() 139 u32 aid; in iwl_dbgfs_he_sniffer_params_write() local 148 ret = sscanf(buf, "%x %2hhx:%2hhx:%2hhx:%2hhx:%2hhx:%2hhx", &aid, in iwl_dbgfs_he_sniffer_params_write() 155 he_mon_cmd.aid = cpu_to_le16(aid); in iwl_dbgfs_he_sniffer_params_write() 157 apply.aid = aid; in iwl_dbgfs_he_sniffer_params_write()
|
| /src/sys/dev/ral/ |
| H A D | rt2860var.h | 28 #define RT2860_AID2WCID(aid) ((aid) & 0xff) argument
|
| /src/sys/dev/usb/wlan/ |
| H A D | if_runvar.h | 41 #define RUN_AID2WCID(aid) ((aid) & 0xff) argument
|
| H A D | if_mtwvar.h | 37 #define MTW_AID2WCID(aid) (1 + ((aid) & 0x7)) argument
|
| /src/sys/dev/mwl/ |
| H A D | mwlhal.h | 483 int mwl_hal_setpowersave_sta(struct mwl_hal_vap *, uint16_t aid, int ena); 554 uint16_t aid, uint16_t sid, const MWL_HAL_PEERINFO *, 591 int mwl_hal_updatetim(struct mwl_hal_vap *, uint16_t aid, int set);
|
| /src/crypto/openssl/crypto/rsa/ |
| H A D | rsa_ameth.c | 661 unsigned char aid[128]; in rsa_item_sign() local 696 OSSL_SIGNATURE_PARAM_ALGORITHM_ID, aid, sizeof(aid)); in rsa_item_sign() 705 const unsigned char *pp = aid; in rsa_item_sign() 711 const unsigned char *pp = aid; in rsa_item_sign()
|
| /src/sys/contrib/dev/rtw88/ |
| H A D | bf.c | 79 bfee->aid = vif->cfg.aid; in rtw_bf_assoc() 264 param.my_aid = bfee->aid & 0xfff; in rtw_bf_enable_bfee_mu()
|
| H A D | mac80211.c | 113 .aid = {.addr = 0x06a8, .mask = 0x7ff}, 120 .aid = {.addr = 0x0710, .mask = 0x7ff}, 127 .aid = {.addr = 0x1600, .mask = 0x7ff}, 134 .aid = {.addr = 0x1604, .mask = 0x7ff}, 141 .aid = {.addr = 0x1608, .mask = 0x7ff},
|
| /src/contrib/wpa/wpa_supplicant/ |
| H A D | mesh_mpm.c | 291 wpabuf_put_le16(buf, sta->aid); in mesh_mpm_send_plink_action() 809 params.aid = sta->aid; in mesh_mpm_add_peer() 1161 u16 plid = 0, llid = 0, aid = 0; in mesh_mpm_action_rx() local 1199 aid = WPA_GET_LE16(ies); in mesh_mpm_action_rx() 1200 wpa_printf(MSG_DEBUG, "MPM: AID 0x%x", aid); in mesh_mpm_action_rx() 1385 sta->peer_aid = aid; in mesh_mpm_action_rx()
|
| /src/share/skel/ |
| H A D | dot.cshrc | 32 # Use history to aid expansion
|