HomeSort by relevance Sort by last modified time
    Searched refs:id_p (Results 1 - 17 of 17) sorted by null

  /external/wpa_supplicant_8/src/eap_common/
eap_eke_common.h 87 const u8 *id_s, size_t id_s_len, const u8 *id_p,
95 const u8 *id_p, size_t id_p_len);
98 const u8 *id_p, size_t id_p_len,
102 const u8 *id_p, size_t id_p_len,
eap_eke_common.c 328 const u8 *id_s, size_t id_s_len, const u8 *id_p,
344 /* key = prf+(temp, ID_S | ID_P) */
349 os_memcpy(id + id_s_len, id_p, id_p_len);
350 wpa_hexdump_ascii(MSG_DEBUG, "EAP-EKE: ID_S | ID_P",
358 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: key = prf+(temp, ID_S | ID_P)",
446 const u8 *id_p, size_t id_p_len)
456 * Ke | Ki = prf+(SharedSecret, "EAP-EKE Keys" | ID_S | ID_P)
481 os_memcpy(data + label_len + id_s_len, id_p, id_p_len);
500 const u8 *id_p, size_t id_p_len,
509 * Ka = prf+(SharedSecret, "EAP-EKE Ka" | ID_S | ID_P | Nonce_P
    [all...]
  /ndk/tests/device/issue42891-boost-1_52/jni/boost/boost/test/utils/runtime/cla/
id_policy.hpp 95 virtual bool conflict_with( identification_policy const& id_p ) const
97 return id_p.conflict_with( m_primary ) || id_p.conflict_with( m_secondary );
  /external/ipsec-tools/src/racoon/
isakmp_quick.c 161 struct ipsecdoi_id_b *id, *id_p;
213 plogdump(LLV_DEBUG, iph2->id_p->v, iph2->id_p->l);
223 id_p = (struct ipsecdoi_id_b *)iph2->id_p->v;
225 && id_p->proto_id == 0
240 tlen += sizeof(*gen) + iph2->id_p->l;
275 p = set_isakmp_payload(p, iph2->id_p, ISAKMP_NPTYPE_NONE);
436 vp = iph2->id_p;
542 VPTRINIT(iph2->id_p);
160 struct ipsecdoi_id_b *id, *id_p; local
    [all...]
isakmp_ident.c 555 VPTRINIT(iph1->id_p);
711 if (isakmp_p2ph(&iph1->id_p, pa->ptr) < 0)
782 plogdump(LLV_DEBUG, iph1->id_p->v, iph1->id_p->l);
810 VPTRINIT(iph1->id_p);
1242 VPTRINIT(iph1->id_p);
1382 if (isakmp_p2ph(&iph1->id_p, pa->ptr) < 0)
    [all...]
handler.h 171 vchar_t *id_p; /* partner's ID minus general header */ member in struct:ph1handle
299 vchar_t *id_p; /* peer's ID minus general header */ member in struct:ph2handle
isakmp_base.c 341 if (isakmp_p2ph(&iph1->id_p, pa->ptr) < 0)
357 if (iph1->nonce_p == NULL || iph1->id_p == NULL) {
398 VPTRINIT(iph1->id_p);
835 if (isakmp_p2ph(&iph1->id_p, pa->ptr) < 0)
856 if (iph1->nonce_p == NULL || iph1->id_p == NULL) {
895 VPTRINIT(iph1->id_p);
    [all...]
isakmp_agg.c 409 if (isakmp_p2ph(&iph1->id_p, pa->ptr) < 0)
591 VPTRINIT(iph1->id_p);
832 if (isakmp_p2ph(&iph1->id_p, pa->ptr) < 0)
915 VPTRINIT(iph1->id_p);
    [all...]
oakley.c 865 + (sw == GENERATE ? iph1->id->l : iph1->id_p->l);
924 bp = (sw == GENERATE ? iph1->id : iph1->id_p);
1062 + (sw == GENERATE ? iph1->id->l : iph1->id_p->l);
1083 bp = (sw == GENERATE ? iph1->id : iph1->id_p);
1183 + (sw == GENERATE ? iph1->id_p->l : iph1->id->l);
1209 bp = (sw == GENERATE ? iph1->id_p : iph1->id);
1269 if (iph1->id_p == NULL || iph1->pl_hash == NULL) {
1336 if (iph1->id_p == NULL) {
    [all...]
ipsec_doi.c     [all...]
handler.c 358 VPTRINIT(iph1->id_p);
635 VPTRINIT(iph2->id_p);
isakmp.c     [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_psk.c 25 u8 *id_p; member in struct:eap_psk_data
49 os_free(data->id_p);
238 os_free(data->id_p);
239 data->id_p = os_malloc(left);
240 if (data->id_p == NULL) {
242 "ID_P");
245 os_memcpy(data->id_p, cpos, left);
247 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-PSK: ID_P",
248 data->id_p, data->id_p_len);
250 if (eap_user_get(sm, data->id_p, data->id_p_len, 0) < 0)
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_psk.c 26 u8 *id_s, *id_p; member in struct:eap_psk_data
59 data->id_p = os_malloc(identity_len);
60 if (data->id_p)
61 os_memcpy(data->id_p, identity, identity_len);
64 if (data->id_p == NULL) {
78 os_free(data->id_p);
145 wpabuf_put_data(resp, data->id_p, data->id_p_len);
146 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */
153 os_memcpy(buf, data->id_p, data->id_p_len);
169 wpa_hexdump_ascii(MSG_DEBUG, "EAP-PSK: ID_P",
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/
CertPathValidatorUtilities.java 510 String id_p,
521 if (node.getValidPolicy().equals(id_p))
524 node.expectedPolicies = (Set)m_idp.get(id_p);
585 (Set)m_idp.get(id_p),
586 p_node, pq, id_p, ci);
599 String id_p,
606 if (node.getValidPolicy().equals(id_p))
    [all...]
RFC3280CertPathUtilities.java 924 String id_p = ((ASN1ObjectIdentifier)mapping.getObjectAt(0)).getId(); local
945 String id_p = (String)it_idp.next(); local
    [all...]
  /prebuilts/sdk/tools/lib/
signapk.jar 

Completed in 1165 milliseconds