/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
H A D | eap_ikev2_common.h | 39 int initiator, const struct wpabuf *msg,
|
H A D | eap_ikev2_common.c | 85 int initiator, const struct wpabuf *msg, 91 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar; 84 eap_ikev2_validate_icv(int integ_alg, struct ikev2_keys *keys, int initiator, const struct wpabuf *msg, const u8 *pos, const u8 *end) argument
|
H A D | ikev2_common.h | 298 struct ikev2_keys *keys, int initiator, 331 int initiator, const struct ikev2_hdr *hdr, 336 int initiator, struct wpabuf *msg,
|
H A D | ikev2_common.c | 2 * IKEv2 common routines for initiator and responder 438 struct ikev2_keys *keys, int initiator, 447 const u8 *SK_p = initiator ? keys->SK_pi : keys->SK_pr; 496 struct ikev2_keys *keys, int initiator, 507 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er; 508 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar; 598 int initiator, struct wpabuf *msg, 607 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er; 608 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar; 436 ikev2_derive_auth_data(int prf_alg, const struct wpabuf *sign_msg, const u8 *ID, size_t ID_len, u8 ID_type, struct ikev2_keys *keys, int initiator, const u8 *shared_secret, size_t shared_secret_len, const u8 *nonce, size_t nonce_len, const u8 *key_pad, size_t key_pad_len, u8 *auth_data) argument 495 ikev2_decrypt_payload(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, const struct ikev2_hdr *hdr, const u8 *encrypted, size_t encrypted_len, size_t *res_len) argument 597 ikev2_build_encrypted(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, struct wpabuf *msg, struct wpabuf *plain, u8 next_payload) argument
|
/external/webkit/WebCore/page/ |
H A D | DragController.h | 70 void setDragInitiator(Document* initiator) { m_dragInitiator = initiator; m_didInitiateDrag = true; } argument
|
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
H A D | peerkey.h | 21 int initiator; /* whether this end was initator for SMK handshake */ member in struct:wpa_peerkey
|
H A D | peerkey.c | 211 wpa_printf(MSG_DEBUG, "RSN: SMK M2 - SMK initiator " MACSTR, 557 os_memcmp(peerkey->initiator ? peerkey->inonce : 569 if (peerkey->initiator) { 591 if (peerkey->initiator) { 941 if (peerkey->initiator && !peerkey->stk_set) { 1038 peerkey->initiator = 1;
|
H A D | wpa.c | 1552 if (!peerkey->initiator && peerkey->replay_counter_set && 1559 } else if (peerkey->initiator) { 1574 if (peerkey && peerkey->initiator && (key_info & WPA_KEY_INFO_ACK)) { 1590 && (peerkey == NULL || !peerkey->initiator)
|
/external/wpa_supplicant/ |
H A D | wpa_i.h | 50 int initiator; /* whether this end was initator for SMK handshake */ member in struct:wpa_peerkey
|
H A D | wpa.c | 1080 peerkey->initiator = 1; 2282 wpa_printf(MSG_DEBUG, "RSN: SMK M2 - SMK initiator " MACSTR, 2539 os_memcmp(peerkey->initiator ? peerkey->inonce : 2551 if (peerkey->initiator) { 2630 if (peerkey->initiator) { 3220 if (peerkey->initiator && !peerkey->stk_set) { 3482 if (!peerkey->initiator && peerkey->replay_counter_set && 3489 } else if (peerkey->initiator) { 3504 if (peerkey && peerkey->initiator && (key_info & WPA_KEY_INFO_ACK)) { 3520 && (peerkey == NULL || !peerkey->initiator) [all...] |
/external/tcpdump/ |
H A D | print-isakmp.c | 98 cookie_t initiator; member in struct:__anon6304 162 /* find cookie from initiator cache */ 169 if (memcmp(in, &cookiecache[i].initiator, sizeof(*in)) == 0) 176 /* record initiator */ 240 memcpy(&cookiecache[ninitiator].initiator, in, sizeof(*in)); 247 cookie_sidecheck(int i, const u_char *bp2, int initiator) argument 286 if (initiator) {
|