/external/wpa_supplicant_8/src/eap_common/ |
eap_eke_common.h | 87 const u8 *id_s, size_t id_s_len, const u8 *id_p, 95 const u8 *id_p, size_t id_p_len); 98 const u8 *id_p, size_t id_p_len, 102 const u8 *id_p, size_t id_p_len,
|
eap_eke_common.c | 328 const u8 *id_s, size_t id_s_len, const u8 *id_p, 344 /* key = prf+(temp, ID_S | ID_P) */ 349 os_memcpy(id + id_s_len, id_p, id_p_len); 350 wpa_hexdump_ascii(MSG_DEBUG, "EAP-EKE: ID_S | ID_P", 358 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: key = prf+(temp, ID_S | ID_P)", 446 const u8 *id_p, size_t id_p_len) 456 * Ke | Ki = prf+(SharedSecret, "EAP-EKE Keys" | ID_S | ID_P) 481 os_memcpy(data + label_len + id_s_len, id_p, id_p_len); 500 const u8 *id_p, size_t id_p_len, 509 * Ka = prf+(SharedSecret, "EAP-EKE Ka" | ID_S | ID_P | Nonce_P [all...] |
/ndk/tests/device/issue42891-boost-1_52/jni/boost/boost/test/utils/runtime/cla/ |
id_policy.hpp | 95 virtual bool conflict_with( identification_policy const& id_p ) const 97 return id_p.conflict_with( m_primary ) || id_p.conflict_with( m_secondary );
|
/external/ipsec-tools/src/racoon/ |
isakmp_quick.c | 161 struct ipsecdoi_id_b *id, *id_p; 213 plogdump(LLV_DEBUG, iph2->id_p->v, iph2->id_p->l); 223 id_p = (struct ipsecdoi_id_b *)iph2->id_p->v; 225 && id_p->proto_id == 0 240 tlen += sizeof(*gen) + iph2->id_p->l; 275 p = set_isakmp_payload(p, iph2->id_p, ISAKMP_NPTYPE_NONE); 436 vp = iph2->id_p; 542 VPTRINIT(iph2->id_p); 160 struct ipsecdoi_id_b *id, *id_p; local [all...] |
isakmp_ident.c | 555 VPTRINIT(iph1->id_p); 711 if (isakmp_p2ph(&iph1->id_p, pa->ptr) < 0) 782 plogdump(LLV_DEBUG, iph1->id_p->v, iph1->id_p->l); 810 VPTRINIT(iph1->id_p); 1242 VPTRINIT(iph1->id_p); 1382 if (isakmp_p2ph(&iph1->id_p, pa->ptr) < 0) [all...] |
handler.h | 171 vchar_t *id_p; /* partner's ID minus general header */ member in struct:ph1handle 299 vchar_t *id_p; /* peer's ID minus general header */ member in struct:ph2handle
|
isakmp_base.c | 341 if (isakmp_p2ph(&iph1->id_p, pa->ptr) < 0) 357 if (iph1->nonce_p == NULL || iph1->id_p == NULL) { 398 VPTRINIT(iph1->id_p); 835 if (isakmp_p2ph(&iph1->id_p, pa->ptr) < 0) 856 if (iph1->nonce_p == NULL || iph1->id_p == NULL) { 895 VPTRINIT(iph1->id_p); [all...] |
isakmp_agg.c | 409 if (isakmp_p2ph(&iph1->id_p, pa->ptr) < 0) 591 VPTRINIT(iph1->id_p); 832 if (isakmp_p2ph(&iph1->id_p, pa->ptr) < 0) 915 VPTRINIT(iph1->id_p); [all...] |
oakley.c | 865 + (sw == GENERATE ? iph1->id->l : iph1->id_p->l); 924 bp = (sw == GENERATE ? iph1->id : iph1->id_p); 1062 + (sw == GENERATE ? iph1->id->l : iph1->id_p->l); 1083 bp = (sw == GENERATE ? iph1->id : iph1->id_p); 1183 + (sw == GENERATE ? iph1->id_p->l : iph1->id->l); 1209 bp = (sw == GENERATE ? iph1->id_p : iph1->id); 1269 if (iph1->id_p == NULL || iph1->pl_hash == NULL) { 1336 if (iph1->id_p == NULL) { [all...] |
ipsec_doi.c | [all...] |
handler.c | 358 VPTRINIT(iph1->id_p); 635 VPTRINIT(iph2->id_p);
|
isakmp.c | [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_psk.c | 25 u8 *id_p; member in struct:eap_psk_data 49 os_free(data->id_p); 238 os_free(data->id_p); 239 data->id_p = os_malloc(left); 240 if (data->id_p == NULL) { 242 "ID_P"); 245 os_memcpy(data->id_p, cpos, left); 247 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-PSK: ID_P", 248 data->id_p, data->id_p_len); 250 if (eap_user_get(sm, data->id_p, data->id_p_len, 0) < 0) [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_psk.c | 26 u8 *id_s, *id_p; member in struct:eap_psk_data 59 data->id_p = os_malloc(identity_len); 60 if (data->id_p) 61 os_memcpy(data->id_p, identity, identity_len); 64 if (data->id_p == NULL) { 78 os_free(data->id_p); 145 wpabuf_put_data(resp, data->id_p, data->id_p_len); 146 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */ 153 os_memcpy(buf, data->id_p, data->id_p_len); 169 wpa_hexdump_ascii(MSG_DEBUG, "EAP-PSK: ID_P", [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
CertPathValidatorUtilities.java | 510 String id_p, 521 if (node.getValidPolicy().equals(id_p)) 524 node.expectedPolicies = (Set)m_idp.get(id_p); 585 (Set)m_idp.get(id_p), 586 p_node, pq, id_p, ci); 599 String id_p, 606 if (node.getValidPolicy().equals(id_p)) [all...] |
RFC3280CertPathUtilities.java | 924 String id_p = ((ASN1ObjectIdentifier)mapping.getObjectAt(0)).getId(); local 945 String id_p = (String)it_idp.next(); local [all...] |
/prebuilts/sdk/tools/lib/ |
signapk.jar | |