Searched refs:initiator (Results 1 - 25 of 43) sorted by relevance

12

/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
H A Deap_ikev2_common.h39 int initiator, const struct wpabuf *msg,
H A Deap_ikev2_common.c85 int initiator, const struct wpabuf *msg,
91 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar;
84 eap_ikev2_validate_icv(int integ_alg, struct ikev2_keys *keys, int initiator, const struct wpabuf *msg, const u8 *pos, const u8 *end) argument
H A Dikev2_common.h298 struct ikev2_keys *keys, int initiator,
331 int initiator, const struct ikev2_hdr *hdr,
336 int initiator, struct wpabuf *msg,
H A Dikev2_common.c2 * IKEv2 common routines for initiator and responder
438 struct ikev2_keys *keys, int initiator,
447 const u8 *SK_p = initiator ? keys->SK_pi : keys->SK_pr;
496 struct ikev2_keys *keys, int initiator,
507 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er;
508 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar;
598 int initiator, struct wpabuf *msg,
607 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er;
608 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar;
436 ikev2_derive_auth_data(int prf_alg, const struct wpabuf *sign_msg, const u8 *ID, size_t ID_len, u8 ID_type, struct ikev2_keys *keys, int initiator, const u8 *shared_secret, size_t shared_secret_len, const u8 *nonce, size_t nonce_len, const u8 *key_pad, size_t key_pad_len, u8 *auth_data) argument
495 ikev2_decrypt_payload(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, const struct ikev2_hdr *hdr, const u8 *encrypted, size_t encrypted_len, size_t *res_len) argument
597 ikev2_build_encrypted(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, struct wpabuf *msg, struct wpabuf *plain, u8 next_payload) argument
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_ikev2_common.h33 int initiator, const struct wpabuf *msg,
H A Deap_ikev2_common.c79 int initiator, const struct wpabuf *msg,
85 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar;
78 eap_ikev2_validate_icv(int integ_alg, struct ikev2_keys *keys, int initiator, const struct wpabuf *msg, const u8 *pos, const u8 *end) argument
H A Dikev2_common.h292 struct ikev2_keys *keys, int initiator,
325 int initiator, const struct ikev2_hdr *hdr,
330 int initiator, struct wpabuf *msg,
H A Dikev2_common.c2 * IKEv2 common routines for initiator and responder
433 struct ikev2_keys *keys, int initiator,
442 const u8 *SK_p = initiator ? keys->SK_pi : keys->SK_pr;
491 struct ikev2_keys *keys, int initiator,
502 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er;
503 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar;
593 int initiator, struct wpabuf *msg,
602 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er;
603 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar;
431 ikev2_derive_auth_data(int prf_alg, const struct wpabuf *sign_msg, const u8 *ID, size_t ID_len, u8 ID_type, struct ikev2_keys *keys, int initiator, const u8 *shared_secret, size_t shared_secret_len, const u8 *nonce, size_t nonce_len, const u8 *key_pad, size_t key_pad_len, u8 *auth_data) argument
490 ikev2_decrypt_payload(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, const struct ikev2_hdr *hdr, const u8 *encrypted, size_t encrypted_len, size_t *res_len) argument
592 ikev2_build_encrypted(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, struct wpabuf *msg, struct wpabuf *plain, u8 next_payload) argument
/external/wpa_supplicant_8/src/eap_common/
H A Deap_ikev2_common.h33 int initiator, const struct wpabuf *msg,
H A Deap_ikev2_common.c79 int initiator, const struct wpabuf *msg,
85 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar;
78 eap_ikev2_validate_icv(int integ_alg, struct ikev2_keys *keys, int initiator, const struct wpabuf *msg, const u8 *pos, const u8 *end) argument
H A Dikev2_common.h292 struct ikev2_keys *keys, int initiator,
325 int initiator, const struct ikev2_hdr *hdr,
330 int initiator, struct wpabuf *msg,
H A Dikev2_common.c2 * IKEv2 common routines for initiator and responder
433 struct ikev2_keys *keys, int initiator,
442 const u8 *SK_p = initiator ? keys->SK_pi : keys->SK_pr;
491 struct ikev2_keys *keys, int initiator,
502 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er;
503 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar;
593 int initiator, struct wpabuf *msg,
602 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er;
603 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar;
431 ikev2_derive_auth_data(int prf_alg, const struct wpabuf *sign_msg, const u8 *ID, size_t ID_len, u8 ID_type, struct ikev2_keys *keys, int initiator, const u8 *shared_secret, size_t shared_secret_len, const u8 *nonce, size_t nonce_len, const u8 *key_pad, size_t key_pad_len, u8 *auth_data) argument
490 ikev2_decrypt_payload(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, const struct ikev2_hdr *hdr, const u8 *encrypted, size_t encrypted_len, size_t *res_len) argument
592 ikev2_build_encrypted(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, struct wpabuf *msg, struct wpabuf *plain, u8 next_payload) argument
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_ikev2_common.h33 int initiator, const struct wpabuf *msg,
H A Deap_ikev2_common.c79 int initiator, const struct wpabuf *msg,
85 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar;
78 eap_ikev2_validate_icv(int integ_alg, struct ikev2_keys *keys, int initiator, const struct wpabuf *msg, const u8 *pos, const u8 *end) argument
H A Dikev2_common.h292 struct ikev2_keys *keys, int initiator,
325 int initiator, const struct ikev2_hdr *hdr,
330 int initiator, struct wpabuf *msg,
H A Dikev2_common.c2 * IKEv2 common routines for initiator and responder
433 struct ikev2_keys *keys, int initiator,
442 const u8 *SK_p = initiator ? keys->SK_pi : keys->SK_pr;
491 struct ikev2_keys *keys, int initiator,
502 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er;
503 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar;
593 int initiator, struct wpabuf *msg,
602 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er;
603 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar;
431 ikev2_derive_auth_data(int prf_alg, const struct wpabuf *sign_msg, const u8 *ID, size_t ID_len, u8 ID_type, struct ikev2_keys *keys, int initiator, const u8 *shared_secret, size_t shared_secret_len, const u8 *nonce, size_t nonce_len, const u8 *key_pad, size_t key_pad_len, u8 *auth_data) argument
490 ikev2_decrypt_payload(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, const struct ikev2_hdr *hdr, const u8 *encrypted, size_t encrypted_len, size_t *res_len) argument
592 ikev2_build_encrypted(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, struct wpabuf *msg, struct wpabuf *plain, u8 next_payload) argument
/external/chromium/third_party/libjingle/source/talk/p2p/base/
H A Dsessionmessages.h83 const std::string& sid, const std::string& initiator) :
84 protocol(protocol), type(type), sid(sid), initiator(initiator),
93 std::string initiator; member in struct:cricket::SessionMessage
82 SessionMessage(SignalingProtocol protocol, ActionType type, const std::string& sid, const std::string& initiator) argument
H A Dsessionmanager.h95 // Given a sid, initiator, and remote_name, this finds the matching Session
141 const std::string& initiator,
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/
H A Dpeerkey.h21 int initiator; /* whether this end was initator for SMK handshake */ member in struct:wpa_peerkey
/external/wpa_supplicant_8/hostapd/src/rsn_supp/
H A Dpeerkey.h15 int initiator; /* whether this end was initator for SMK handshake */ member in struct:wpa_peerkey
H A Dtdls.c89 int initiator; /* whether this end was initiator for TDLS setup */ member in struct:wpa_tdls_peer
436 /* 1) TDLS initiator STA MAC address */
592 if (peer->initiator) {
611 peer->initiator = 0;
629 if (peer->initiator) {
909 * FTIE: ANonce=0, SNonce=initiator nonce MIC=0, DataKDs=(RSNIE_I,
1000 "TDLS: Failed to get random data for initiator Nonce");
1135 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime %u seconds from initiator",
1403 wpa_printf(MSG_DEBUG, "TDLS: TPK M1 - TPK initiator " MACST
[all...]
/external/wpa_supplicant_8/src/rsn_supp/
H A Dpeerkey.h15 int initiator; /* whether this end was initator for SMK handshake */ member in struct:wpa_peerkey
H A Dtdls.c89 int initiator; /* whether this end was initiator for TDLS setup */ member in struct:wpa_tdls_peer
436 /* 1) TDLS initiator STA MAC address */
592 if (peer->initiator) {
611 peer->initiator = 0;
629 if (peer->initiator) {
909 * FTIE: ANonce=0, SNonce=initiator nonce MIC=0, DataKDs=(RSNIE_I,
1000 "TDLS: Failed to get random data for initiator Nonce");
1135 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime %u seconds from initiator",
1403 wpa_printf(MSG_DEBUG, "TDLS: TPK M1 - TPK initiator " MACST
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/
H A Dpeerkey.h15 int initiator; /* whether this end was initator for SMK handshake */ member in struct:wpa_peerkey
H A Dtdls.c89 int initiator; /* whether this end was initiator for TDLS setup */ member in struct:wpa_tdls_peer
436 /* 1) TDLS initiator STA MAC address */
592 if (peer->initiator) {
611 peer->initiator = 0;
629 if (peer->initiator) {
909 * FTIE: ANonce=0, SNonce=initiator nonce MIC=0, DataKDs=(RSNIE_I,
1000 "TDLS: Failed to get random data for initiator Nonce");
1135 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime %u seconds from initiator",
1403 wpa_printf(MSG_DEBUG, "TDLS: TPK M1 - TPK initiator " MACST
[all...]

Completed in 978 milliseconds

12