/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_psk.c | 30 u8 *id_s, *id_p; member in struct:eap_psk_data 63 data->id_p = os_malloc(identity_len); 64 if (data->id_p) 65 os_memcpy(data->id_p, identity, identity_len); 68 if (data->id_p == NULL) { 82 os_free(data->id_p); 148 wpabuf_put_data(resp, data->id_p, data->id_p_len); 149 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */ 156 os_memcpy(buf, data->id_p, data->id_p_len); 172 wpa_hexdump_ascii(MSG_DEBUG, "EAP-PSK: ID_P", [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_psk.c | 31 u8 *id_s, *id_p; member in struct:eap_psk_data 64 data->id_p = os_malloc(identity_len); 65 if (data->id_p) 66 os_memcpy(data->id_p, identity, identity_len); 69 if (data->id_p == NULL) { 83 os_free(data->id_p); 149 wpabuf_put_data(resp, data->id_p, data->id_p_len); 150 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */ 157 os_memcpy(buf, data->id_p, data->id_p_len); 173 wpa_hexdump_ascii(MSG_DEBUG, "EAP-PSK: ID_P", [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_psk.c | 30 u8 *id_p, *id_s; member in struct:eap_psk_data 56 os_free(data->id_p); 243 os_free(data->id_p); 244 data->id_p = os_malloc(left); 245 if (data->id_p == NULL) { 247 "ID_P"); 250 os_memcpy(data->id_p, cpos, left); 252 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-PSK: ID_P", 253 data->id_p, data->id_p_len); 255 if (eap_user_get(sm, data->id_p, data->id_p_len, 0) < 0) [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_psk.c | 31 u8 *id_p, *id_s; member in struct:eap_psk_data 57 os_free(data->id_p); 244 os_free(data->id_p); 245 data->id_p = os_malloc(left); 246 if (data->id_p == NULL) { 248 "ID_P"); 251 os_memcpy(data->id_p, cpos, left); 253 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-PSK: ID_P", 254 data->id_p, data->id_p_len); 256 if (eap_user_get(sm, data->id_p, data->id_p_len, 0) < 0) [all...] |
/external/wpa_supplicant/ |
eap_psk.c | 32 u8 *id_s, *id_p; member in struct:eap_psk_data 58 data->id_p = os_malloc(config->nai_len); 59 if (data->id_p) 60 os_memcpy(data->id_p, config->nai, config->nai_len); 63 if (data->id_p == NULL) { 77 os_free(data->id_p); 147 os_memcpy((u8 *) (hdr2 + 1), data->id_p, data->id_p_len); 148 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */ 155 os_memcpy(buf, data->id_p, data->id_p_len); 167 wpa_hexdump_ascii(MSG_DEBUG, "EAP-PSK: ID_P", [all...] |
/external/ipsec-tools/src/racoon/ |
isakmp_quick.c | 196 struct ipsecdoi_id_b *id, *id_p; 252 plogdump(LLV_DEBUG, iph2->id_p->v, iph2->id_p->l); 264 id_p = (struct ipsecdoi_id_b *)iph2->id_p->v; 266 id_p->proto_id == 0 && 311 tlen += sizeof(*gen) + iph2->id_p->l; 350 p = set_isakmp_payload(p, iph2->id_p, natoa); 656 error = ipsecdoi_id2sockaddr(iph2->id_p, 765 VPTRINIT(iph2->id_p); 195 struct ipsecdoi_id_b *id, *id_p; local [all...] |
remoteconf.c | 95 rmconf_match_identity(rmconf, id_p) 97 vchar_t *id_p; 99 struct ipsecdoi_id_b *id_b = (struct ipsecdoi_id_b *) id_p->v; 122 ident.v = id_p->v + sizeof(*id_b); 123 ident.l = id_p->l - sizeof(*id_b); 132 if (id_p->l - sizeof(*id_b) != sizeof(struct in_addr)) 140 if (id_p->l - sizeof(*id_b) != sizeof(struct in6_addr)) 303 rmsel->identity = iph1->id_p; 437 if (iph1->id_p != NULL) 438 idstr = ipsecdoi_id2str(iph1->id_p); [all...] |
isakmp_ident.c | 554 VPTRINIT(iph1->id_p); 708 if (isakmp_p2ph(&iph1->id_p, pa->ptr) < 0) 778 plogdump(LLV_DEBUG, iph1->id_p->v, iph1->id_p->l); 806 VPTRINIT(iph1->id_p); 1233 VPTRINIT(iph1->id_p); 1372 if (isakmp_p2ph(&iph1->id_p, pa->ptr) < 0) [all...] |
handler.c | 219 if (ph1hint->id_p && ph1hint->id_p->l && 220 p->id_p && p->id_p->l && 221 (ph1hint->id_p->l != p->id_p->l || 222 memcmp(ph1hint->id_p->v, p->id_p->v, p->id_p->l) != 0)) { 443 VPTRINIT(iph1->id_p); [all...] |
handler.h | 175 vchar_t *id_p; /* partner's ID minus general header */ member in struct:ph1handle 282 vchar_t *id_p; /* peer's ID minus general header */ member in struct:ph2handle
|
remoteconf.h | 198 vchar_t *id_p));
|
isakmp_base.c | 340 if (isakmp_p2ph(&iph1->id_p, pa->ptr) < 0) 356 if (iph1->nonce_p == NULL || iph1->id_p == NULL) { 397 VPTRINIT(iph1->id_p); 826 if (isakmp_p2ph(&iph1->id_p, pa->ptr) < 0) 847 if (iph1->nonce_p == NULL || iph1->id_p == NULL) { 886 VPTRINIT(iph1->id_p); [all...] |
isakmp_agg.c | 393 if (isakmp_p2ph(&iph1->id_p, pa->ptr) < 0) 576 VPTRINIT(iph1->id_p); 814 if (isakmp_p2ph(&iph1->id_p, pa->ptr) < 0) 897 VPTRINIT(iph1->id_p); [all...] |
oakley.c | 908 + (sw == GENERATE ? iph1->id->l : iph1->id_p->l); 967 bp = (sw == GENERATE ? iph1->id : iph1->id_p); 1105 + (sw == GENERATE ? iph1->id->l : iph1->id_p->l); 1126 bp = (sw == GENERATE ? iph1->id : iph1->id_p); 1226 + (sw == GENERATE ? iph1->id_p->l : iph1->id->l); 1252 bp = (sw == GENERATE ? iph1->id_p : iph1->id); 1312 if (iph1->id_p == NULL || iph1->pl_hash == NULL) { 1379 if (iph1->id_p == NULL) { [all...] |
isakmp.c | [all...] |
ipsec_doi.c | [all...] |
/external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/ |
CertPathValidatorUtilities.java | 534 String id_p, 544 if (node.getValidPolicy().equals(id_p)) 547 node.expectedPolicies = (Set)m_idp.get(id_p); 610 (Set)m_idp.get(id_p), 611 p_node, pq, id_p, ci); 624 String id_p, 631 if (node.getValidPolicy().equals(id_p)) [all...] |
RFC3280CertPathUtilities.java | 895 String id_p = ((DERObjectIdentifier)mapping.getObjectAt(0)).getId(); local 916 String id_p = (String)it_idp.next(); local [all...] |