Searched refs:id_p (Results 1 - 23 of 23) sorted by relevance

/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_eke_common.h87 const u8 *id_s, size_t id_s_len, const u8 *id_p,
95 const u8 *id_p, size_t id_p_len);
98 const u8 *id_p, size_t id_p_len,
102 const u8 *id_p, size_t id_p_len,
H A Deap_eke_common.c333 const u8 *id_s, size_t id_s_len, const u8 *id_p,
354 os_memcpy(id + id_s_len, id_p, id_p_len);
454 const u8 *id_p, size_t id_p_len)
489 os_memcpy(data + label_len + id_s_len, id_p, id_p_len);
508 const u8 *id_p, size_t id_p_len,
533 os_memcpy(pos, id_p, id_p_len);
553 const u8 *id_p, size_t id_p_len,
578 os_memcpy(pos, id_p, id_p_len);
331 eap_eke_derive_key(struct eap_eke_session *sess, const u8 *password, size_t password_len, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, u8 *key) argument
452 eap_eke_derive_ke_ki(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len) argument
506 eap_eke_derive_ka(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s) argument
551 eap_eke_derive_msk(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
/external/wpa_supplicant_8/src/eap_common/
H A Deap_eke_common.h87 const u8 *id_s, size_t id_s_len, const u8 *id_p,
95 const u8 *id_p, size_t id_p_len);
98 const u8 *id_p, size_t id_p_len,
102 const u8 *id_p, size_t id_p_len,
H A Deap_eke_common.c333 const u8 *id_s, size_t id_s_len, const u8 *id_p,
354 os_memcpy(id + id_s_len, id_p, id_p_len);
454 const u8 *id_p, size_t id_p_len)
489 os_memcpy(data + label_len + id_s_len, id_p, id_p_len);
508 const u8 *id_p, size_t id_p_len,
533 os_memcpy(pos, id_p, id_p_len);
553 const u8 *id_p, size_t id_p_len,
578 os_memcpy(pos, id_p, id_p_len);
331 eap_eke_derive_key(struct eap_eke_session *sess, const u8 *password, size_t password_len, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, u8 *key) argument
452 eap_eke_derive_ke_ki(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len) argument
506 eap_eke_derive_ka(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s) argument
551 eap_eke_derive_msk(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_eke_common.h87 const u8 *id_s, size_t id_s_len, const u8 *id_p,
95 const u8 *id_p, size_t id_p_len);
98 const u8 *id_p, size_t id_p_len,
102 const u8 *id_p, size_t id_p_len,
H A Deap_eke_common.c333 const u8 *id_s, size_t id_s_len, const u8 *id_p,
354 os_memcpy(id + id_s_len, id_p, id_p_len);
454 const u8 *id_p, size_t id_p_len)
489 os_memcpy(data + label_len + id_s_len, id_p, id_p_len);
508 const u8 *id_p, size_t id_p_len,
533 os_memcpy(pos, id_p, id_p_len);
553 const u8 *id_p, size_t id_p_len,
578 os_memcpy(pos, id_p, id_p_len);
331 eap_eke_derive_key(struct eap_eke_session *sess, const u8 *password, size_t password_len, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, u8 *key) argument
452 eap_eke_derive_ke_ki(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len) argument
506 eap_eke_derive_ka(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s) argument
551 eap_eke_derive_msk(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
/external/ipsec-tools/src/racoon/
H A Disakmp_quick.c161 struct ipsecdoi_id_b *id, *id_p;
213 plogdump(LLV_DEBUG, iph2->id_p->v, iph2->id_p->l);
223 id_p = (struct ipsecdoi_id_b *)iph2->id_p->v;
225 && id_p->proto_id == 0
240 tlen += sizeof(*gen) + iph2->id_p->l;
275 p = set_isakmp_payload(p, iph2->id_p, ISAKMP_NPTYPE_NONE);
436 vp = iph2->id_p;
542 VPTRINIT(iph2->id_p);
160 struct ipsecdoi_id_b *id, *id_p; local
[all...]
H A Disakmp_ident.c555 VPTRINIT(iph1->id_p);
711 if (isakmp_p2ph(&iph1->id_p, pa->ptr) < 0)
782 plogdump(LLV_DEBUG, iph1->id_p->v, iph1->id_p->l);
810 VPTRINIT(iph1->id_p);
1242 VPTRINIT(iph1->id_p);
1382 if (isakmp_p2ph(&iph1->id_p, pa->ptr) < 0)
1435 if (iph1->id_p == NULL || iph1->pl_hash == NULL)
1444 if (iph1->id_p == NULL || iph1->sig_p == NULL)
1512 plogdump(LLV_DEBUG, iph1->id_p
[all...]
H A Dhandler.h171 vchar_t *id_p; /* partner's ID minus general header */ member in struct:ph1handle
299 vchar_t *id_p; /* peer's ID minus general header */ member in struct:ph2handle
H A Disakmp_base.c341 if (isakmp_p2ph(&iph1->id_p, pa->ptr) < 0)
357 if (iph1->nonce_p == NULL || iph1->id_p == NULL) {
398 VPTRINIT(iph1->id_p);
835 if (isakmp_p2ph(&iph1->id_p, pa->ptr) < 0)
856 if (iph1->nonce_p == NULL || iph1->id_p == NULL) {
895 VPTRINIT(iph1->id_p);
H A Disakmp_agg.c409 if (isakmp_p2ph(&iph1->id_p, pa->ptr) < 0)
591 VPTRINIT(iph1->id_p);
832 if (isakmp_p2ph(&iph1->id_p, pa->ptr) < 0)
915 VPTRINIT(iph1->id_p);
H A Doakley.c861 + (sw == GENERATE ? iph1->id->l : iph1->id_p->l);
920 bp = (sw == GENERATE ? iph1->id : iph1->id_p);
1058 + (sw == GENERATE ? iph1->id->l : iph1->id_p->l);
1079 bp = (sw == GENERATE ? iph1->id : iph1->id_p);
1179 + (sw == GENERATE ? iph1->id_p->l : iph1->id->l);
1205 bp = (sw == GENERATE ? iph1->id_p : iph1->id);
1265 if (iph1->id_p == NULL || iph1->pl_hash == NULL) {
1332 if (iph1->id_p == NULL) {
1400 iph1->cert_p = dnssec_getcert(iph1->id_p);
1608 if (iph1->id_p
[all...]
H A Dipsec_doi.c3593 * both of "id" and "id_p" should be ID payload without general header,
3603 if (iph1->id_p == NULL) {
3605 "invalid iph1 passed id_p == NULL\n");
3608 if (iph1->id_p->l < sizeof(*id_b)) {
3611 (u_long)iph1->id_p->l);
3615 id_b = (struct ipsecdoi_id_b *)iph1->id_p->v;
3694 ident.v = iph1->id_p->v + sizeof(*id_b);
3695 ident.l = iph1->id_p->l - sizeof(*id_b);
3704 if (iph1->id_p->l - sizeof(*id_b) != sizeof(struct in_addr))
3712 if (iph1->id_p
[all...]
H A Disakmp.c3448 if (iph2->id_p != NULL
3449 && (_XIDT(iph2->id_p) == IPSECDOI_ID_IPV4_ADDR
3450 || _XIDT(iph2->id_p) == IPSECDOI_ID_IPV6_ADDR
3451 || _XIDT(iph2->id_p) == IPSECDOI_ID_IPV4_ADDR_SUBNET
3452 || _XIDT(iph2->id_p) == IPSECDOI_ID_IPV6_ADDR_SUBNET)) {
3454 error = ipsecdoi_id2sockaddr(iph2->id_p,
3465 if (_XIDT(iph2->id_p) == IPSECDOI_ID_IPV6_ADDR) {
3475 if (_XIDT(iph2->id_p) == idi2type
H A Dhandler.c358 VPTRINIT(iph1->id_p);
635 VPTRINIT(iph2->id_p);
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_psk.c25 u8 *id_p; member in struct:eap_psk_data
49 os_free(data->id_p);
238 os_free(data->id_p);
239 data->id_p = os_malloc(left);
240 if (data->id_p == NULL) {
245 os_memcpy(data->id_p, cpos, left);
248 data->id_p, data->id_p_len);
250 if (eap_user_get(sm, data->id_p, data->id_p_len, 0) < 0) {
252 data->id_p, data->id_p_len);
272 data->id_p, dat
[all...]
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_psk.c25 u8 *id_p; member in struct:eap_psk_data
49 os_free(data->id_p);
238 os_free(data->id_p);
239 data->id_p = os_malloc(left);
240 if (data->id_p == NULL) {
245 os_memcpy(data->id_p, cpos, left);
248 data->id_p, data->id_p_len);
250 if (eap_user_get(sm, data->id_p, data->id_p_len, 0) < 0) {
252 data->id_p, data->id_p_len);
272 data->id_p, dat
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_psk.c25 u8 *id_p; member in struct:eap_psk_data
49 os_free(data->id_p);
238 os_free(data->id_p);
239 data->id_p = os_malloc(left);
240 if (data->id_p == NULL) {
245 os_memcpy(data->id_p, cpos, left);
248 data->id_p, data->id_p_len);
250 if (eap_user_get(sm, data->id_p, data->id_p_len, 0) < 0) {
252 data->id_p, data->id_p_len);
272 data->id_p, dat
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_psk.c26 u8 *id_s, *id_p; member in struct:eap_psk_data
59 data->id_p = os_malloc(identity_len);
60 if (data->id_p)
61 os_memcpy(data->id_p, identity, identity_len);
64 if (data->id_p == NULL) {
78 os_free(data->id_p);
145 wpabuf_put_data(resp, data->id_p, data->id_p_len);
153 os_memcpy(buf, data->id_p, data->id_p_len);
170 data->id_p, data->id_p_len);
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_psk.c26 u8 *id_s, *id_p; member in struct:eap_psk_data
59 data->id_p = os_malloc(identity_len);
60 if (data->id_p)
61 os_memcpy(data->id_p, identity, identity_len);
64 if (data->id_p == NULL) {
78 os_free(data->id_p);
145 wpabuf_put_data(resp, data->id_p, data->id_p_len);
153 os_memcpy(buf, data->id_p, data->id_p_len);
170 data->id_p, data->id_p_len);
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_psk.c26 u8 *id_s, *id_p; member in struct:eap_psk_data
59 data->id_p = os_malloc(identity_len);
60 if (data->id_p)
61 os_memcpy(data->id_p, identity, identity_len);
64 if (data->id_p == NULL) {
78 os_free(data->id_p);
145 wpabuf_put_data(resp, data->id_p, data->id_p_len);
153 os_memcpy(buf, data->id_p, data->id_p_len);
170 data->id_p, data->id_p_len);
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/
H A DCertPathValidatorUtilities.java528 String id_p,
539 if (node.getValidPolicy().equals(id_p))
542 node.expectedPolicies = (Set)m_idp.get(id_p);
603 (Set)m_idp.get(id_p),
604 p_node, pq, id_p, ci);
617 String id_p,
624 if (node.getValidPolicy().equals(id_p))
525 prepareNextCertB1( int i, List[] policyNodes, String id_p, Map m_idp, X509Certificate cert ) argument
614 prepareNextCertB2( int i, List[] policyNodes, String id_p, PKIXPolicyNode validPolicyTree) argument
H A DRFC3280CertPathUtilities.java894 String id_p = ((DERObjectIdentifier)mapping.getObjectAt(0)).getId();
898 if (!m_idp.containsKey(id_p))
902 m_idp.put(id_p, tmp);
903 s_idp.add(id_p);
907 tmp = (Set)m_idp.get(id_p);
915 String id_p = (String)it_idp.next();
927 if (node.getValidPolicy().equals(id_p))
930 node.expectedPolicies = (Set)m_idp.get(id_p);
996 .get(id_p), p_node, pq, id_p, c
[all...]

Completed in 256 milliseconds