Home
last modified time | relevance | path

Searched refs:id_p (Results 1 – 18 of 18) sorted by relevance

/external/ipsec-tools/src/racoon/
Disakmp_quick.c160 struct ipsecdoi_id_b *id, *id_p; local
212 plogdump(LLV_DEBUG, iph2->id_p->v, iph2->id_p->l);
222 id_p = (struct ipsecdoi_id_b *)iph2->id_p->v;
224 && id_p->proto_id == 0
239 tlen += sizeof(*gen) + iph2->id_p->l;
274 p = set_isakmp_payload(p, iph2->id_p, ISAKMP_NPTYPE_NONE);
435 vp = iph2->id_p;
541 VPTRINIT(iph2->id_p);
923 iph2->id_p = NULL;
965 if (iph2->id_p == NULL) {
[all …]
Disakmp_ident.c555 VPTRINIT(iph1->id_p);
711 if (isakmp_p2ph(&iph1->id_p, pa->ptr) < 0)
782 plogdump(LLV_DEBUG, iph1->id_p->v, iph1->id_p->l);
810 VPTRINIT(iph1->id_p);
1242 VPTRINIT(iph1->id_p);
1382 if (isakmp_p2ph(&iph1->id_p, pa->ptr) < 0)
1435 if (iph1->id_p == NULL || iph1->pl_hash == NULL)
1444 if (iph1->id_p == NULL || iph1->sig_p == NULL)
1512 plogdump(LLV_DEBUG, iph1->id_p->v, iph1->id_p->l);
1537 VPTRINIT(iph1->id_p);
Disakmp_base.c341 if (isakmp_p2ph(&iph1->id_p, pa->ptr) < 0)
357 if (iph1->nonce_p == NULL || iph1->id_p == NULL) {
398 VPTRINIT(iph1->id_p);
835 if (isakmp_p2ph(&iph1->id_p, pa->ptr) < 0)
856 if (iph1->nonce_p == NULL || iph1->id_p == NULL) {
895 VPTRINIT(iph1->id_p);
Dhandler.h171 vchar_t *id_p; /* partner's ID minus general header */ member
299 vchar_t *id_p; /* peer's ID minus general header */ member
Doakley.c865 + (sw == GENERATE ? iph1->id->l : iph1->id_p->l);
924 bp = (sw == GENERATE ? iph1->id : iph1->id_p);
1062 + (sw == GENERATE ? iph1->id->l : iph1->id_p->l);
1083 bp = (sw == GENERATE ? iph1->id : iph1->id_p);
1183 + (sw == GENERATE ? iph1->id_p->l : iph1->id->l);
1209 bp = (sw == GENERATE ? iph1->id_p : iph1->id);
1269 if (iph1->id_p == NULL || iph1->pl_hash == NULL) {
1336 if (iph1->id_p == NULL) {
1404 iph1->cert_p = dnssec_getcert(iph1->id_p);
1612 if (iph1->id_p == NULL || iph1->pl_hash == NULL) {
[all …]
Disakmp_agg.c409 if (isakmp_p2ph(&iph1->id_p, pa->ptr) < 0)
591 VPTRINIT(iph1->id_p);
832 if (isakmp_p2ph(&iph1->id_p, pa->ptr) < 0)
915 VPTRINIT(iph1->id_p);
Dipsec_doi.c3607 if (iph1->id_p == NULL) {
3612 if (iph1->id_p->l < sizeof(*id_b)) {
3615 (u_long)iph1->id_p->l);
3619 id_b = (struct ipsecdoi_id_b *)iph1->id_p->v;
3698 ident.v = iph1->id_p->v + sizeof(*id_b);
3699 ident.l = iph1->id_p->l - sizeof(*id_b);
3708 if (iph1->id_p->l - sizeof(*id_b) != sizeof(struct in_addr))
3716 if (iph1->id_p->l - sizeof(*id_b) != sizeof(struct in6_addr))
4081 iph2->id_p = ipsecdoi_sockaddr2id((struct sockaddr *)&sp->spidx.dst,
4083 if (iph2->id_p == NULL) {
[all …]
Disakmp.c3453 if (iph2->id_p != NULL
3454 && (_XIDT(iph2->id_p) == IPSECDOI_ID_IPV4_ADDR
3455 || _XIDT(iph2->id_p) == IPSECDOI_ID_IPV6_ADDR
3456 || _XIDT(iph2->id_p) == IPSECDOI_ID_IPV4_ADDR_SUBNET
3457 || _XIDT(iph2->id_p) == IPSECDOI_ID_IPV6_ADDR_SUBNET)) {
3459 error = ipsecdoi_id2sockaddr(iph2->id_p,
3470 if (_XIDT(iph2->id_p) == IPSECDOI_ID_IPV6_ADDR) {
3480 if (_XIDT(iph2->id_p) == idi2type
Dhandler.c358 VPTRINIT(iph1->id_p);
635 VPTRINIT(iph2->id_p);
/external/wpa_supplicant_8/src/eap_server/
Deap_server_psk.c25 u8 *id_p; member
49 os_free(data->id_p); in eap_psk_reset()
238 os_free(data->id_p); in eap_psk_process_2()
239 data->id_p = os_memdup(cpos, left); in eap_psk_process_2()
240 if (data->id_p == NULL) { in eap_psk_process_2()
247 data->id_p, data->id_p_len); in eap_psk_process_2()
249 if (eap_user_get(sm, data->id_p, data->id_p_len, 0) < 0) { in eap_psk_process_2()
251 data->id_p, data->id_p_len); in eap_psk_process_2()
271 data->id_p, data->id_p_len); in eap_psk_process_2()
280 data->id_p, data->id_p_len); in eap_psk_process_2()
[all …]
/external/wpa_supplicant_8/src/eap_common/
Deap_eke_common.h87 const u8 *id_s, size_t id_s_len, const u8 *id_p,
95 const u8 *id_p, size_t id_p_len);
98 const u8 *id_p, size_t id_p_len,
102 const u8 *id_p, size_t id_p_len,
Deap_eke_common.c305 const u8 *id_s, size_t id_s_len, const u8 *id_p, in eap_eke_derive_key() argument
326 os_memcpy(id + id_s_len, id_p, id_p_len); in eap_eke_derive_key()
424 const u8 *id_p, size_t id_p_len) in eap_eke_derive_ke_ki() argument
459 os_memcpy(data + label_len + id_s_len, id_p, id_p_len); in eap_eke_derive_ke_ki()
478 const u8 *id_p, size_t id_p_len, in eap_eke_derive_ka() argument
503 os_memcpy(pos, id_p, id_p_len); in eap_eke_derive_ka()
523 const u8 *id_p, size_t id_p_len, in eap_eke_derive_msk() argument
548 os_memcpy(pos, id_p, id_p_len); in eap_eke_derive_msk()
/external/wpa_supplicant_8/src/eap_peer/
Deap_psk.c26 u8 *id_s, *id_p; member
59 data->id_p = os_malloc(identity_len); in eap_psk_init()
60 if (data->id_p) in eap_psk_init()
61 os_memcpy(data->id_p, identity, identity_len); in eap_psk_init()
64 if (data->id_p == NULL) { in eap_psk_init()
78 os_free(data->id_p); in eap_psk_deinit()
144 wpabuf_put_data(resp, data->id_p, data->id_p_len); in eap_psk_process_1()
152 os_memcpy(buf, data->id_p, data->id_p_len); in eap_psk_process_1()
169 data->id_p, data->id_p_len); in eap_psk_process_1()
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/
DCertPathValidatorUtilities.java524 String id_p, in prepareNextCertB1() argument
535 if (node.getValidPolicy().equals(id_p)) in prepareNextCertB1()
538 node.expectedPolicies = (Set)m_idp.get(id_p); in prepareNextCertB1()
599 (Set)m_idp.get(id_p), in prepareNextCertB1()
600 p_node, pq, id_p, ci); in prepareNextCertB1()
613 String id_p, in prepareNextCertB2() argument
620 if (node.getValidPolicy().equals(id_p)) in prepareNextCertB2()
DRFC3280CertPathUtilities.java923 String id_p = ((ASN1ObjectIdentifier)mapping.getObjectAt(0)).getId(); in prepareCertB() local
927 if (!m_idp.containsKey(id_p)) in prepareCertB()
931 m_idp.put(id_p, tmp); in prepareCertB()
932 s_idp.add(id_p); in prepareCertB()
936 tmp = (Set)m_idp.get(id_p); in prepareCertB()
944 String id_p = (String)it_idp.next(); in prepareCertB() local
956 if (node.getValidPolicy().equals(id_p)) in prepareCertB()
959 node.expectedPolicies = (Set)m_idp.get(id_p); in prepareCertB()
1025 .get(id_p), p_node, pq, id_p, ci); in prepareCertB()
1044 if (node.getValidPolicy().equals(id_p)) in prepareCertB()
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/jce/provider/
DCertPathValidatorUtilities.java525 String id_p, in prepareNextCertB1() argument
536 if (node.getValidPolicy().equals(id_p)) in prepareNextCertB1()
539 node.expectedPolicies = (Set)m_idp.get(id_p); in prepareNextCertB1()
600 (Set)m_idp.get(id_p), in prepareNextCertB1()
601 p_node, pq, id_p, ci); in prepareNextCertB1()
614 String id_p, in prepareNextCertB2() argument
621 if (node.getValidPolicy().equals(id_p)) in prepareNextCertB2()
DRFC3280CertPathUtilities.java924 String id_p = ((ASN1ObjectIdentifier)mapping.getObjectAt(0)).getId(); in prepareCertB() local
928 if (!m_idp.containsKey(id_p)) in prepareCertB()
932 m_idp.put(id_p, tmp); in prepareCertB()
933 s_idp.add(id_p); in prepareCertB()
937 tmp = (Set)m_idp.get(id_p); in prepareCertB()
945 String id_p = (String)it_idp.next(); in prepareCertB() local
957 if (node.getValidPolicy().equals(id_p)) in prepareCertB()
960 node.expectedPolicies = (Set)m_idp.get(id_p); in prepareCertB()
1026 .get(id_p), p_node, pq, id_p, ci); in prepareCertB()
1045 if (node.getValidPolicy().equals(id_p)) in prepareCertB()
/external/ltp/testcases/network/stress/ns-tools/
Dns-udpsender.c326 int ifindex, *id_p = &ifindex; in create_udp_datagram() local
345 (udp_p->sd, IPPROTO_IPV6, IPV6_MULTICAST_IF, id_p, in create_udp_datagram()