/external/ipsec-tools/src/racoon/ |
isakmp_quick.c | 161 struct ipsecdoi_id_b *id, *id_p; 213 plogdump(LLV_DEBUG, iph2->id_p->v, iph2->id_p->l); 223 id_p = (struct ipsecdoi_id_b *)iph2->id_p->v; 225 && id_p->proto_id == 0 240 tlen += sizeof(*gen) + iph2->id_p->l; 275 p = set_isakmp_payload(p, iph2->id_p, ISAKMP_NPTYPE_NONE); 436 vp = iph2->id_p; 542 VPTRINIT(iph2->id_p); 160 struct ipsecdoi_id_b *id, *id_p; local [all...] |
handler.h | 171 vchar_t *id_p; /* partner's ID minus general header */ member in struct:ph1handle 299 vchar_t *id_p; /* peer's ID minus general header */ member in struct:ph2handle
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_psk.c | 30 u8 *id_s, *id_p; member in struct:eap_psk_data 63 data->id_p = os_malloc(identity_len); 64 if (data->id_p) 65 os_memcpy(data->id_p, identity, identity_len); 68 if (data->id_p == NULL) { 82 os_free(data->id_p); 148 wpabuf_put_data(resp, data->id_p, data->id_p_len); 149 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */ 156 os_memcpy(buf, data->id_p, data->id_p_len); 172 wpa_hexdump_ascii(MSG_DEBUG, "EAP-PSK: ID_P", [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_psk.c | 30 u8 *id_p, *id_s; member in struct:eap_psk_data 56 os_free(data->id_p); 243 os_free(data->id_p); 244 data->id_p = os_malloc(left); 245 if (data->id_p == NULL) { 247 "ID_P"); 250 os_memcpy(data->id_p, cpos, left); 252 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-PSK: ID_P", 253 data->id_p, data->id_p_len); 255 if (eap_user_get(sm, data->id_p, data->id_p_len, 0) < 0) [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_psk.c | 25 u8 *id_s, *id_p; member in struct:eap_psk_data 58 data->id_p = os_malloc(identity_len); 59 if (data->id_p) 60 os_memcpy(data->id_p, identity, identity_len); 63 if (data->id_p == NULL) { 77 os_free(data->id_p); 143 wpabuf_put_data(resp, data->id_p, data->id_p_len); 144 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */ 151 os_memcpy(buf, data->id_p, data->id_p_len); 167 wpa_hexdump_ascii(MSG_DEBUG, "EAP-PSK: ID_P", [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_psk.c | 25 u8 *id_p, *id_s; member in struct:eap_psk_data 51 os_free(data->id_p); 240 os_free(data->id_p); 241 data->id_p = os_malloc(left); 242 if (data->id_p == NULL) { 244 "ID_P"); 247 os_memcpy(data->id_p, cpos, left); 249 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-PSK: ID_P", 250 data->id_p, data->id_p_len); 252 if (eap_user_get(sm, data->id_p, data->id_p_len, 0) < 0) [all...] |
/external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/ |
RFC3280CertPathUtilities.java | 895 String id_p = ((DERObjectIdentifier)mapping.getObjectAt(0)).getId(); local 916 String id_p = (String)it_idp.next(); local [all...] |