| /src/external/bsd/wpa/dist/src/eap_peer/ |
| eap_psk.c | 26 u8 *id_s, *id_p; member in struct:eap_psk_data 59 data->id_p = os_malloc(identity_len); 60 if (data->id_p) 61 os_memcpy(data->id_p, identity, identity_len); 64 if (data->id_p == NULL) { 78 os_free(data->id_p); 144 wpabuf_put_data(resp, data->id_p, data->id_p_len); 145 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */ 152 os_memcpy(buf, data->id_p, data->id_p_len); 168 wpa_hexdump_ascii(MSG_DEBUG, "EAP-PSK: ID_P", [all...] |
| /src/external/bsd/wpa/dist/src/eap_server/ |
| eap_server_psk.c | 25 u8 *id_p; member in struct:eap_psk_data 49 os_free(data->id_p); 238 os_free(data->id_p); 239 data->id_p = os_memdup(cpos, left); 240 if (data->id_p == NULL) { 242 "ID_P"); 246 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-PSK: ID_P", 247 data->id_p, data->id_p_len); 249 if (eap_user_get(sm, data->id_p, data->id_p_len, 0) < 0) { 250 wpa_hexdump_ascii(MSG_DEBUG, "EAP-PSK: unknown ID_P", [all...] |
| /src/crypto/dist/ipsec-tools/src/racoon/ |
| isakmp_quick.c | 191 struct ipsecdoi_id_b *id, *id_p; 247 plogdump(LLV_DEBUG, iph2->id_p->v, iph2->id_p->l); 259 id_p = (struct ipsecdoi_id_b *)iph2->id_p->v; 261 id_p->proto_id == 0 && 306 tlen += sizeof(*gen) + iph2->id_p->l; 345 p = set_isakmp_payload(p, iph2->id_p, natoa); 648 error = ipsecdoi_id2sockaddr(iph2->id_p, 756 VPTRINIT(iph2->id_p); 190 struct ipsecdoi_id_b *id, *id_p; local [all...] |
| handler.h | 176 vchar_t *id_p; /* partner's ID minus general header */ member in struct:ph1handle 283 vchar_t *id_p; /* peer's ID minus general header */ member in struct:ph2handle
|