HomeSort by relevance Sort by last modified time
    Searched refs:id_p (Results 1 - 18 of 18) sorted by null

  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_psk.c 30 u8 *id_s, *id_p; member in struct:eap_psk_data
63 data->id_p = os_malloc(identity_len);
64 if (data->id_p)
65 os_memcpy(data->id_p, identity, identity_len);
68 if (data->id_p == NULL) {
82 os_free(data->id_p);
148 wpabuf_put_data(resp, data->id_p, data->id_p_len);
149 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */
156 os_memcpy(buf, data->id_p, data->id_p_len);
172 wpa_hexdump_ascii(MSG_DEBUG, "EAP-PSK: ID_P",
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_psk.c 31 u8 *id_s, *id_p; member in struct:eap_psk_data
64 data->id_p = os_malloc(identity_len);
65 if (data->id_p)
66 os_memcpy(data->id_p, identity, identity_len);
69 if (data->id_p == NULL) {
83 os_free(data->id_p);
149 wpabuf_put_data(resp, data->id_p, data->id_p_len);
150 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */
157 os_memcpy(buf, data->id_p, data->id_p_len);
173 wpa_hexdump_ascii(MSG_DEBUG, "EAP-PSK: ID_P",
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_psk.c 30 u8 *id_p, *id_s; member in struct:eap_psk_data
56 os_free(data->id_p);
243 os_free(data->id_p);
244 data->id_p = os_malloc(left);
245 if (data->id_p == NULL) {
247 "ID_P");
250 os_memcpy(data->id_p, cpos, left);
252 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-PSK: ID_P",
253 data->id_p, data->id_p_len);
255 if (eap_user_get(sm, data->id_p, data->id_p_len, 0) < 0)
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_psk.c 31 u8 *id_p, *id_s; member in struct:eap_psk_data
57 os_free(data->id_p);
244 os_free(data->id_p);
245 data->id_p = os_malloc(left);
246 if (data->id_p == NULL) {
248 "ID_P");
251 os_memcpy(data->id_p, cpos, left);
253 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-PSK: ID_P",
254 data->id_p, data->id_p_len);
256 if (eap_user_get(sm, data->id_p, data->id_p_len, 0) < 0)
    [all...]
  /external/wpa_supplicant/
eap_psk.c 32 u8 *id_s, *id_p; member in struct:eap_psk_data
58 data->id_p = os_malloc(config->nai_len);
59 if (data->id_p)
60 os_memcpy(data->id_p, config->nai, config->nai_len);
63 if (data->id_p == NULL) {
77 os_free(data->id_p);
147 os_memcpy((u8 *) (hdr2 + 1), data->id_p, data->id_p_len);
148 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */
155 os_memcpy(buf, data->id_p, data->id_p_len);
167 wpa_hexdump_ascii(MSG_DEBUG, "EAP-PSK: ID_P",
    [all...]
  /external/ipsec-tools/src/racoon/
isakmp_quick.c 196 struct ipsecdoi_id_b *id, *id_p;
252 plogdump(LLV_DEBUG, iph2->id_p->v, iph2->id_p->l);
264 id_p = (struct ipsecdoi_id_b *)iph2->id_p->v;
266 id_p->proto_id == 0 &&
311 tlen += sizeof(*gen) + iph2->id_p->l;
350 p = set_isakmp_payload(p, iph2->id_p, natoa);
656 error = ipsecdoi_id2sockaddr(iph2->id_p,
765 VPTRINIT(iph2->id_p);
195 struct ipsecdoi_id_b *id, *id_p; local
    [all...]
remoteconf.c 95 rmconf_match_identity(rmconf, id_p)
97 vchar_t *id_p;
99 struct ipsecdoi_id_b *id_b = (struct ipsecdoi_id_b *) id_p->v;
122 ident.v = id_p->v + sizeof(*id_b);
123 ident.l = id_p->l - sizeof(*id_b);
132 if (id_p->l - sizeof(*id_b) != sizeof(struct in_addr))
140 if (id_p->l - sizeof(*id_b) != sizeof(struct in6_addr))
303 rmsel->identity = iph1->id_p;
437 if (iph1->id_p != NULL)
438 idstr = ipsecdoi_id2str(iph1->id_p);
    [all...]
isakmp_ident.c 554 VPTRINIT(iph1->id_p);
708 if (isakmp_p2ph(&iph1->id_p, pa->ptr) < 0)
778 plogdump(LLV_DEBUG, iph1->id_p->v, iph1->id_p->l);
806 VPTRINIT(iph1->id_p);
1233 VPTRINIT(iph1->id_p);
1372 if (isakmp_p2ph(&iph1->id_p, pa->ptr) < 0)
    [all...]
handler.c 219 if (ph1hint->id_p && ph1hint->id_p->l &&
220 p->id_p && p->id_p->l &&
221 (ph1hint->id_p->l != p->id_p->l ||
222 memcmp(ph1hint->id_p->v, p->id_p->v, p->id_p->l) != 0)) {
443 VPTRINIT(iph1->id_p);
    [all...]
handler.h 175 vchar_t *id_p; /* partner's ID minus general header */ member in struct:ph1handle
282 vchar_t *id_p; /* peer's ID minus general header */ member in struct:ph2handle
remoteconf.h 198 vchar_t *id_p));
isakmp_base.c 340 if (isakmp_p2ph(&iph1->id_p, pa->ptr) < 0)
356 if (iph1->nonce_p == NULL || iph1->id_p == NULL) {
397 VPTRINIT(iph1->id_p);
826 if (isakmp_p2ph(&iph1->id_p, pa->ptr) < 0)
847 if (iph1->nonce_p == NULL || iph1->id_p == NULL) {
886 VPTRINIT(iph1->id_p);
    [all...]
isakmp_agg.c 393 if (isakmp_p2ph(&iph1->id_p, pa->ptr) < 0)
576 VPTRINIT(iph1->id_p);
814 if (isakmp_p2ph(&iph1->id_p, pa->ptr) < 0)
897 VPTRINIT(iph1->id_p);
    [all...]
oakley.c 908 + (sw == GENERATE ? iph1->id->l : iph1->id_p->l);
967 bp = (sw == GENERATE ? iph1->id : iph1->id_p);
1105 + (sw == GENERATE ? iph1->id->l : iph1->id_p->l);
1126 bp = (sw == GENERATE ? iph1->id : iph1->id_p);
1226 + (sw == GENERATE ? iph1->id_p->l : iph1->id->l);
1252 bp = (sw == GENERATE ? iph1->id_p : iph1->id);
1312 if (iph1->id_p == NULL || iph1->pl_hash == NULL) {
1379 if (iph1->id_p == NULL) {
    [all...]
isakmp.c     [all...]
ipsec_doi.c     [all...]
  /external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/
CertPathValidatorUtilities.java 534 String id_p,
544 if (node.getValidPolicy().equals(id_p))
547 node.expectedPolicies = (Set)m_idp.get(id_p);
610 (Set)m_idp.get(id_p),
611 p_node, pq, id_p, ci);
624 String id_p,
631 if (node.getValidPolicy().equals(id_p))
    [all...]
RFC3280CertPathUtilities.java 895 String id_p = ((DERObjectIdentifier)mapping.getObjectAt(0)).getId(); local
916 String id_p = (String)it_idp.next(); local
    [all...]

Completed in 1168 milliseconds