/external/ipsec-tools/src/racoon/ |
H A D | isakmp_quick.c | 161 struct ipsecdoi_id_b *id, *id_p; 213 plogdump(LLV_DEBUG, iph2->id_p->v, iph2->id_p->l); 223 id_p = (struct ipsecdoi_id_b *)iph2->id_p->v; 225 && id_p->proto_id == 0 240 tlen += sizeof(*gen) + iph2->id_p->l; 275 p = set_isakmp_payload(p, iph2->id_p, ISAKMP_NPTYPE_NONE); 436 vp = iph2->id_p; 542 VPTRINIT(iph2->id_p); 160 struct ipsecdoi_id_b *id, *id_p; local [all...] |
H A D | isakmp_ident.c | 555 VPTRINIT(iph1->id_p); 711 if (isakmp_p2ph(&iph1->id_p, pa->ptr) < 0) 782 plogdump(LLV_DEBUG, iph1->id_p->v, iph1->id_p->l); 810 VPTRINIT(iph1->id_p); 1242 VPTRINIT(iph1->id_p); 1382 if (isakmp_p2ph(&iph1->id_p, pa->ptr) < 0) 1435 if (iph1->id_p == NULL || iph1->pl_hash == NULL) 1444 if (iph1->id_p == NULL || iph1->sig_p == NULL) 1512 plogdump(LLV_DEBUG, iph1->id_p [all...] |
H A D | handler.h | 171 vchar_t *id_p; /* partner's ID minus general header */ member in struct:ph1handle 299 vchar_t *id_p; /* peer's ID minus general header */ member in struct:ph2handle
|
H A D | isakmp_base.c | 341 if (isakmp_p2ph(&iph1->id_p, pa->ptr) < 0) 357 if (iph1->nonce_p == NULL || iph1->id_p == NULL) { 398 VPTRINIT(iph1->id_p); 835 if (isakmp_p2ph(&iph1->id_p, pa->ptr) < 0) 856 if (iph1->nonce_p == NULL || iph1->id_p == NULL) { 895 VPTRINIT(iph1->id_p);
|
H A D | isakmp_agg.c | 409 if (isakmp_p2ph(&iph1->id_p, pa->ptr) < 0) 591 VPTRINIT(iph1->id_p); 832 if (isakmp_p2ph(&iph1->id_p, pa->ptr) < 0) 915 VPTRINIT(iph1->id_p);
|
H A D | oakley.c | 861 + (sw == GENERATE ? iph1->id->l : iph1->id_p->l); 920 bp = (sw == GENERATE ? iph1->id : iph1->id_p); 1058 + (sw == GENERATE ? iph1->id->l : iph1->id_p->l); 1079 bp = (sw == GENERATE ? iph1->id : iph1->id_p); 1179 + (sw == GENERATE ? iph1->id_p->l : iph1->id->l); 1205 bp = (sw == GENERATE ? iph1->id_p : iph1->id); 1265 if (iph1->id_p == NULL || iph1->pl_hash == NULL) { 1332 if (iph1->id_p == NULL) { 1400 iph1->cert_p = dnssec_getcert(iph1->id_p); 1608 if (iph1->id_p [all...] |
H A D | ipsec_doi.c | 3593 * both of "id" and "id_p" should be ID payload without general header, 3603 if (iph1->id_p == NULL) { 3605 "invalid iph1 passed id_p == NULL\n"); 3608 if (iph1->id_p->l < sizeof(*id_b)) { 3611 (u_long)iph1->id_p->l); 3615 id_b = (struct ipsecdoi_id_b *)iph1->id_p->v; 3694 ident.v = iph1->id_p->v + sizeof(*id_b); 3695 ident.l = iph1->id_p->l - sizeof(*id_b); 3704 if (iph1->id_p->l - sizeof(*id_b) != sizeof(struct in_addr)) 3712 if (iph1->id_p [all...] |
H A D | isakmp.c | 3448 if (iph2->id_p != NULL 3449 && (_XIDT(iph2->id_p) == IPSECDOI_ID_IPV4_ADDR 3450 || _XIDT(iph2->id_p) == IPSECDOI_ID_IPV6_ADDR 3451 || _XIDT(iph2->id_p) == IPSECDOI_ID_IPV4_ADDR_SUBNET 3452 || _XIDT(iph2->id_p) == IPSECDOI_ID_IPV6_ADDR_SUBNET)) { 3454 error = ipsecdoi_id2sockaddr(iph2->id_p, 3465 if (_XIDT(iph2->id_p) == IPSECDOI_ID_IPV6_ADDR) { 3475 if (_XIDT(iph2->id_p) == idi2type
|
H A D | handler.c | 358 VPTRINIT(iph1->id_p); 635 VPTRINIT(iph2->id_p);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
H A D | eap_psk.c | 30 u8 *id_s, *id_p; member in struct:eap_psk_data 63 data->id_p = os_malloc(identity_len); 64 if (data->id_p) 65 os_memcpy(data->id_p, identity, identity_len); 68 if (data->id_p == NULL) { 82 os_free(data->id_p); 148 wpabuf_put_data(resp, data->id_p, data->id_p_len); 156 os_memcpy(buf, data->id_p, data->id_p_len); 173 data->id_p, data->id_p_len);
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_psk.c | 25 u8 *id_s, *id_p; member in struct:eap_psk_data 58 data->id_p = os_malloc(identity_len); 59 if (data->id_p) 60 os_memcpy(data->id_p, identity, identity_len); 63 if (data->id_p == NULL) { 77 os_free(data->id_p); 143 wpabuf_put_data(resp, data->id_p, data->id_p_len); 151 os_memcpy(buf, data->id_p, data->id_p_len); 168 data->id_p, data->id_p_len);
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_psk.c | 25 u8 *id_s, *id_p; member in struct:eap_psk_data 58 data->id_p = os_malloc(identity_len); 59 if (data->id_p) 60 os_memcpy(data->id_p, identity, identity_len); 63 if (data->id_p == NULL) { 77 os_free(data->id_p); 143 wpabuf_put_data(resp, data->id_p, data->id_p_len); 151 os_memcpy(buf, data->id_p, data->id_p_len); 168 data->id_p, data->id_p_len);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_psk.c | 25 u8 *id_s, *id_p; member in struct:eap_psk_data 58 data->id_p = os_malloc(identity_len); 59 if (data->id_p) 60 os_memcpy(data->id_p, identity, identity_len); 63 if (data->id_p == NULL) { 77 os_free(data->id_p); 143 wpabuf_put_data(resp, data->id_p, data->id_p_len); 151 os_memcpy(buf, data->id_p, data->id_p_len); 168 data->id_p, data->id_p_len);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
H A D | eap_psk.c | 30 u8 *id_p, *id_s; member in struct:eap_psk_data 56 os_free(data->id_p); 243 os_free(data->id_p); 244 data->id_p = os_malloc(left); 245 if (data->id_p == NULL) { 250 os_memcpy(data->id_p, cpos, left); 253 data->id_p, data->id_p_len); 255 if (eap_user_get(sm, data->id_p, data->id_p_len, 0) < 0) { 257 data->id_p, data->id_p_len); 277 data->id_p, dat [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_psk.c | 25 u8 *id_p, *id_s; member in struct:eap_psk_data 51 os_free(data->id_p); 240 os_free(data->id_p); 241 data->id_p = os_malloc(left); 242 if (data->id_p == NULL) { 247 os_memcpy(data->id_p, cpos, left); 250 data->id_p, data->id_p_len); 252 if (eap_user_get(sm, data->id_p, data->id_p_len, 0) < 0) { 254 data->id_p, data->id_p_len); 274 data->id_p, dat [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_psk.c | 25 u8 *id_p, *id_s; member in struct:eap_psk_data 51 os_free(data->id_p); 240 os_free(data->id_p); 241 data->id_p = os_malloc(left); 242 if (data->id_p == NULL) { 247 os_memcpy(data->id_p, cpos, left); 250 data->id_p, data->id_p_len); 252 if (eap_user_get(sm, data->id_p, data->id_p_len, 0) < 0) { 254 data->id_p, data->id_p_len); 274 data->id_p, dat [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_psk.c | 25 u8 *id_p, *id_s; member in struct:eap_psk_data 51 os_free(data->id_p); 240 os_free(data->id_p); 241 data->id_p = os_malloc(left); 242 if (data->id_p == NULL) { 247 os_memcpy(data->id_p, cpos, left); 250 data->id_p, data->id_p_len); 252 if (eap_user_get(sm, data->id_p, data->id_p_len, 0) < 0) { 254 data->id_p, data->id_p_len); 274 data->id_p, dat [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
H A D | CertPathValidatorUtilities.java | 529 String id_p, 540 if (node.getValidPolicy().equals(id_p)) 543 node.expectedPolicies = (Set)m_idp.get(id_p); 604 (Set)m_idp.get(id_p), 605 p_node, pq, id_p, ci); 618 String id_p, 625 if (node.getValidPolicy().equals(id_p)) 526 prepareNextCertB1( int i, List[] policyNodes, String id_p, Map m_idp, X509Certificate cert ) argument 615 prepareNextCertB2( int i, List[] policyNodes, String id_p, PKIXPolicyNode validPolicyTree) argument
|
H A D | RFC3280CertPathUtilities.java | 894 String id_p = ((DERObjectIdentifier)mapping.getObjectAt(0)).getId(); 898 if (!m_idp.containsKey(id_p)) 902 m_idp.put(id_p, tmp); 903 s_idp.add(id_p); 907 tmp = (Set)m_idp.get(id_p); 915 String id_p = (String)it_idp.next(); 927 if (node.getValidPolicy().equals(id_p)) 930 node.expectedPolicies = (Set)m_idp.get(id_p); 996 .get(id_p), p_node, pq, id_p, c [all...] |