Searched defs:id_p (Results 1 - 12 of 12) sorted by relevance

/external/wpa_supplicant/
H A Deap_psk.c32 u8 *id_s, *id_p; member in struct:eap_psk_data
58 data->id_p = os_malloc(config->nai_len);
59 if (data->id_p)
60 os_memcpy(data->id_p, config->nai, config->nai_len);
63 if (data->id_p == NULL) {
77 os_free(data->id_p);
147 os_memcpy((u8 *) (hdr2 + 1), data->id_p, data->id_p_len);
155 os_memcpy(buf, data->id_p, data->id_p_len);
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
H A Deap_psk.c30 u8 *id_s, *id_p; member in struct:eap_psk_data
63 data->id_p = os_malloc(identity_len);
64 if (data->id_p)
65 os_memcpy(data->id_p, identity, identity_len);
68 if (data->id_p == NULL) {
82 os_free(data->id_p);
148 wpabuf_put_data(resp, data->id_p, data->id_p_len);
156 os_memcpy(buf, data->id_p, data->id_p_len);
173 data->id_p, data->id_p_len);
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
H A Deap_psk.c30 u8 *id_p, *id_s; member in struct:eap_psk_data
56 os_free(data->id_p);
243 os_free(data->id_p);
244 data->id_p = os_malloc(left);
245 if (data->id_p == NULL) {
250 os_memcpy(data->id_p, cpos, left);
253 data->id_p, data->id_p_len);
255 if (eap_user_get(sm, data->id_p, data->id_p_len, 0) < 0) {
257 data->id_p, data->id_p_len);
277 data->id_p, dat
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_psk.c31 u8 *id_s, *id_p; member in struct:eap_psk_data
64 data->id_p = os_malloc(identity_len);
65 if (data->id_p)
66 os_memcpy(data->id_p, identity, identity_len);
69 if (data->id_p == NULL) {
83 os_free(data->id_p);
149 wpabuf_put_data(resp, data->id_p, data->id_p_len);
157 os_memcpy(buf, data->id_p, data->id_p_len);
174 data->id_p, data->id_p_len);
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_psk.c31 u8 *id_p, *id_s; member in struct:eap_psk_data
57 os_free(data->id_p);
244 os_free(data->id_p);
245 data->id_p = os_malloc(left);
246 if (data->id_p == NULL) {
251 os_memcpy(data->id_p, cpos, left);
254 data->id_p, data->id_p_len);
256 if (eap_user_get(sm, data->id_p, data->id_p_len, 0) < 0) {
258 data->id_p, data->id_p_len);
278 data->id_p, dat
[all...]
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_psk.c31 u8 *id_s, *id_p; member in struct:eap_psk_data
64 data->id_p = os_malloc(identity_len);
65 if (data->id_p)
66 os_memcpy(data->id_p, identity, identity_len);
69 if (data->id_p == NULL) {
83 os_free(data->id_p);
149 wpabuf_put_data(resp, data->id_p, data->id_p_len);
157 os_memcpy(buf, data->id_p, data->id_p_len);
174 data->id_p, data->id_p_len);
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_psk.c31 u8 *id_p, *id_s; member in struct:eap_psk_data
57 os_free(data->id_p);
244 os_free(data->id_p);
245 data->id_p = os_malloc(left);
246 if (data->id_p == NULL) {
251 os_memcpy(data->id_p, cpos, left);
254 data->id_p, data->id_p_len);
256 if (eap_user_get(sm, data->id_p, data->id_p_len, 0) < 0) {
258 data->id_p, data->id_p_len);
278 data->id_p, dat
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_psk.c31 u8 *id_s, *id_p; member in struct:eap_psk_data
64 data->id_p = os_malloc(identity_len);
65 if (data->id_p)
66 os_memcpy(data->id_p, identity, identity_len);
69 if (data->id_p == NULL) {
83 os_free(data->id_p);
149 wpabuf_put_data(resp, data->id_p, data->id_p_len);
157 os_memcpy(buf, data->id_p, data->id_p_len);
174 data->id_p, data->id_p_len);
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_psk.c31 u8 *id_p, *id_s; member in struct:eap_psk_data
57 os_free(data->id_p);
244 os_free(data->id_p);
245 data->id_p = os_malloc(left);
246 if (data->id_p == NULL) {
251 os_memcpy(data->id_p, cpos, left);
254 data->id_p, data->id_p_len);
256 if (eap_user_get(sm, data->id_p, data->id_p_len, 0) < 0) {
258 data->id_p, data->id_p_len);
278 data->id_p, dat
[all...]
/external/ipsec-tools/src/racoon/
H A Disakmp_quick.c196 struct ipsecdoi_id_b *id, *id_p;
252 plogdump(LLV_DEBUG, iph2->id_p->v, iph2->id_p->l);
264 id_p = (struct ipsecdoi_id_b *)iph2->id_p->v;
266 id_p->proto_id == 0 &&
311 tlen += sizeof(*gen) + iph2->id_p->l;
350 p = set_isakmp_payload(p, iph2->id_p, natoa);
656 error = ipsecdoi_id2sockaddr(iph2->id_p,
765 VPTRINIT(iph2->id_p);
195 struct ipsecdoi_id_b *id, *id_p; local
[all...]
H A Dhandler.h175 vchar_t *id_p; /* partner's ID minus general header */ member in struct:ph1handle
282 vchar_t *id_p; /* peer's ID minus general header */ member in struct:ph2handle
/external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/
H A DCertPathValidatorUtilities.java534 String id_p,
544 if (node.getValidPolicy().equals(id_p))
547 node.expectedPolicies = (Set)m_idp.get(id_p);
610 (Set)m_idp.get(id_p),
611 p_node, pq, id_p, ci);
624 String id_p,
631 if (node.getValidPolicy().equals(id_p))
531 prepareNextCertB1( int i, List[] policyNodes, String id_p, Map m_idp, X509Certificate cert ) argument
621 prepareNextCertB2( int i, List[] policyNodes, String id_p, PKIXPolicyNode validPolicyTree) argument

Completed in 1679 milliseconds