/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
H A D | ikev2.h | 30 enum { SA_INIT, SA_AUTH, CHILD_SA, NOTIFY, IKEV2_DONE, IKEV2_FAILED } enumerator in enum:ikev2_responder_data::__anon13891
|
H A D | ikev2.c | 712 case SA_INIT: 716 "%u in SA_INIT state", exchange_type); 721 "in SA_INIT state", message_id); 818 if (data->state != SA_INIT) { 835 if (data->state == SA_INIT) { 1192 wpa_hexdump_buf(MSG_MSGDUMP, "IKEV2: Sending message (SA_INIT)", msg); 1275 data->state = SA_INIT; 1290 case SA_INIT:
|
H A D | eap_ikev2.c | 81 data->ikev2.state = SA_INIT; 217 /* SA_INIT was sent out, so message have to be
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
H A D | ikev2.h | 30 enum { SA_INIT, SA_AUTH, CHILD_SA, IKEV2_DONE } state; enumerator in enum:ikev2_initiator_data::__anon13930
|
H A D | ikev2.c | 501 wpa_printf(MSG_DEBUG, "IKEV2: Encrypted payload in SA_INIT - " 749 case SA_INIT: 754 "%u in SA_INIT state", exchange_type); 759 "in SA_INIT state", message_id); 852 if (data->state != SA_INIT) { 870 case SA_INIT: 1121 wpa_hexdump_buf(MSG_MSGDUMP, "IKEV2: Sending message (SA_INIT)", msg); 1195 case SA_INIT:
|
H A D | eap_ikev2.c | 97 data->ikev2.state = SA_INIT; 439 /* SA_INIT was sent out, so message have to be
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | ikev2.h | 24 enum { SA_INIT, SA_AUTH, CHILD_SA, NOTIFY, IKEV2_DONE, IKEV2_FAILED } enumerator in enum:ikev2_responder_data::__anon14101
|
H A D | ikev2.c | 707 case SA_INIT: 711 "%u in SA_INIT state", exchange_type); 716 "in SA_INIT state", message_id); 813 if (data->state != SA_INIT) { 830 if (data->state == SA_INIT) { 1187 wpa_hexdump_buf(MSG_MSGDUMP, "IKEV2: Sending message (SA_INIT)", msg); 1270 data->state = SA_INIT; 1285 case SA_INIT:
|
H A D | eap_ikev2.c | 75 data->ikev2.state = SA_INIT; 211 /* SA_INIT was sent out, so message have to be
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | ikev2.h | 24 enum { SA_INIT, SA_AUTH, CHILD_SA, IKEV2_DONE } state; enumerator in enum:ikev2_initiator_data::__anon14140
|
H A D | ikev2.c | 496 wpa_printf(MSG_DEBUG, "IKEV2: Encrypted payload in SA_INIT - " 744 case SA_INIT: 749 "%u in SA_INIT state", exchange_type); 754 "in SA_INIT state", message_id); 847 if (data->state != SA_INIT) { 865 case SA_INIT: 1116 wpa_hexdump_buf(MSG_MSGDUMP, "IKEV2: Sending message (SA_INIT)", msg); 1190 case SA_INIT:
|
H A D | eap_server_ikev2.c | 92 data->ikev2.state = SA_INIT; 434 /* SA_INIT was sent out, so message have to be
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | ikev2.h | 24 enum { SA_INIT, SA_AUTH, CHILD_SA, NOTIFY, IKEV2_DONE, IKEV2_FAILED } enumerator in enum:ikev2_responder_data::__anon14318
|
H A D | ikev2.c | 707 case SA_INIT: 711 "%u in SA_INIT state", exchange_type); 716 "in SA_INIT state", message_id); 813 if (data->state != SA_INIT) { 830 if (data->state == SA_INIT) { 1187 wpa_hexdump_buf(MSG_MSGDUMP, "IKEV2: Sending message (SA_INIT)", msg); 1270 data->state = SA_INIT; 1285 case SA_INIT:
|
H A D | eap_ikev2.c | 75 data->ikev2.state = SA_INIT; 211 /* SA_INIT was sent out, so message have to be
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | ikev2.h | 24 enum { SA_INIT, SA_AUTH, CHILD_SA, IKEV2_DONE } state; enumerator in enum:ikev2_initiator_data::__anon14357
|
H A D | ikev2.c | 496 wpa_printf(MSG_DEBUG, "IKEV2: Encrypted payload in SA_INIT - " 744 case SA_INIT: 749 "%u in SA_INIT state", exchange_type); 754 "in SA_INIT state", message_id); 847 if (data->state != SA_INIT) { 865 case SA_INIT: 1116 wpa_hexdump_buf(MSG_MSGDUMP, "IKEV2: Sending message (SA_INIT)", msg); 1190 case SA_INIT:
|
H A D | eap_server_ikev2.c | 92 data->ikev2.state = SA_INIT; 434 /* SA_INIT was sent out, so message have to be
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | ikev2.h | 24 enum { SA_INIT, SA_AUTH, CHILD_SA, NOTIFY, IKEV2_DONE, IKEV2_FAILED } enumerator in enum:ikev2_responder_data::__anon14537
|
H A D | ikev2.c | 707 case SA_INIT: 711 "%u in SA_INIT state", exchange_type); 716 "in SA_INIT state", message_id); 813 if (data->state != SA_INIT) { 830 if (data->state == SA_INIT) { 1187 wpa_hexdump_buf(MSG_MSGDUMP, "IKEV2: Sending message (SA_INIT)", msg); 1270 data->state = SA_INIT; 1285 case SA_INIT:
|
H A D | eap_ikev2.c | 75 data->ikev2.state = SA_INIT; 211 /* SA_INIT was sent out, so message have to be
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | ikev2.h | 24 enum { SA_INIT, SA_AUTH, CHILD_SA, IKEV2_DONE } state; enumerator in enum:ikev2_initiator_data::__anon14576
|
H A D | ikev2.c | 496 wpa_printf(MSG_DEBUG, "IKEV2: Encrypted payload in SA_INIT - " 744 case SA_INIT: 749 "%u in SA_INIT state", exchange_type); 754 "in SA_INIT state", message_id); 847 if (data->state != SA_INIT) { 865 case SA_INIT: 1116 wpa_hexdump_buf(MSG_MSGDUMP, "IKEV2: Sending message (SA_INIT)", msg); 1190 case SA_INIT:
|
H A D | eap_server_ikev2.c | 92 data->ikev2.state = SA_INIT; 434 /* SA_INIT was sent out, so message have to be
|