/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
H A D | eap_ikev2_common.c | 85 int initiator, const struct wpabuf *msg, 91 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar; 84 eap_ikev2_validate_icv(int integ_alg, struct ikev2_keys *keys, int initiator, const struct wpabuf *msg, const u8 *pos, const u8 *end) argument
|
H A D | ikev2_common.c | 2 * IKEv2 common routines for initiator and responder 438 struct ikev2_keys *keys, int initiator, 447 const u8 *SK_p = initiator ? keys->SK_pi : keys->SK_pr; 496 struct ikev2_keys *keys, int initiator, 507 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er; 508 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar; 598 int initiator, struct wpabuf *msg, 607 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er; 608 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar; 436 ikev2_derive_auth_data(int prf_alg, const struct wpabuf *sign_msg, const u8 *ID, size_t ID_len, u8 ID_type, struct ikev2_keys *keys, int initiator, const u8 *shared_secret, size_t shared_secret_len, const u8 *nonce, size_t nonce_len, const u8 *key_pad, size_t key_pad_len, u8 *auth_data) argument 495 ikev2_decrypt_payload(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, const struct ikev2_hdr *hdr, const u8 *encrypted, size_t encrypted_len, size_t *res_len) argument 597 ikev2_build_encrypted(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, struct wpabuf *msg, struct wpabuf *plain, u8 next_payload) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_ikev2_common.c | 79 int initiator, const struct wpabuf *msg, 85 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar; 78 eap_ikev2_validate_icv(int integ_alg, struct ikev2_keys *keys, int initiator, const struct wpabuf *msg, const u8 *pos, const u8 *end) argument
|
H A D | ikev2_common.c | 2 * IKEv2 common routines for initiator and responder 433 struct ikev2_keys *keys, int initiator, 442 const u8 *SK_p = initiator ? keys->SK_pi : keys->SK_pr; 491 struct ikev2_keys *keys, int initiator, 502 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er; 503 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar; 593 int initiator, struct wpabuf *msg, 602 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er; 603 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar; 431 ikev2_derive_auth_data(int prf_alg, const struct wpabuf *sign_msg, const u8 *ID, size_t ID_len, u8 ID_type, struct ikev2_keys *keys, int initiator, const u8 *shared_secret, size_t shared_secret_len, const u8 *nonce, size_t nonce_len, const u8 *key_pad, size_t key_pad_len, u8 *auth_data) argument 490 ikev2_decrypt_payload(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, const struct ikev2_hdr *hdr, const u8 *encrypted, size_t encrypted_len, size_t *res_len) argument 592 ikev2_build_encrypted(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, struct wpabuf *msg, struct wpabuf *plain, u8 next_payload) argument
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_ikev2_common.c | 79 int initiator, const struct wpabuf *msg, 85 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar; 78 eap_ikev2_validate_icv(int integ_alg, struct ikev2_keys *keys, int initiator, const struct wpabuf *msg, const u8 *pos, const u8 *end) argument
|
H A D | ikev2_common.c | 2 * IKEv2 common routines for initiator and responder 433 struct ikev2_keys *keys, int initiator, 442 const u8 *SK_p = initiator ? keys->SK_pi : keys->SK_pr; 491 struct ikev2_keys *keys, int initiator, 502 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er; 503 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar; 593 int initiator, struct wpabuf *msg, 602 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er; 603 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar; 431 ikev2_derive_auth_data(int prf_alg, const struct wpabuf *sign_msg, const u8 *ID, size_t ID_len, u8 ID_type, struct ikev2_keys *keys, int initiator, const u8 *shared_secret, size_t shared_secret_len, const u8 *nonce, size_t nonce_len, const u8 *key_pad, size_t key_pad_len, u8 *auth_data) argument 490 ikev2_decrypt_payload(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, const struct ikev2_hdr *hdr, const u8 *encrypted, size_t encrypted_len, size_t *res_len) argument 592 ikev2_build_encrypted(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, struct wpabuf *msg, struct wpabuf *plain, u8 next_payload) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_ikev2_common.c | 79 int initiator, const struct wpabuf *msg, 85 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar; 78 eap_ikev2_validate_icv(int integ_alg, struct ikev2_keys *keys, int initiator, const struct wpabuf *msg, const u8 *pos, const u8 *end) argument
|
H A D | ikev2_common.c | 2 * IKEv2 common routines for initiator and responder 433 struct ikev2_keys *keys, int initiator, 442 const u8 *SK_p = initiator ? keys->SK_pi : keys->SK_pr; 491 struct ikev2_keys *keys, int initiator, 502 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er; 503 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar; 593 int initiator, struct wpabuf *msg, 602 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er; 603 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar; 431 ikev2_derive_auth_data(int prf_alg, const struct wpabuf *sign_msg, const u8 *ID, size_t ID_len, u8 ID_type, struct ikev2_keys *keys, int initiator, const u8 *shared_secret, size_t shared_secret_len, const u8 *nonce, size_t nonce_len, const u8 *key_pad, size_t key_pad_len, u8 *auth_data) argument 490 ikev2_decrypt_payload(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, const struct ikev2_hdr *hdr, const u8 *encrypted, size_t encrypted_len, size_t *res_len) argument 592 ikev2_build_encrypted(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, struct wpabuf *msg, struct wpabuf *plain, u8 next_payload) argument
|
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
H A D | peerkey.h | 21 int initiator; /* whether this end was initator for SMK handshake */ member in struct:wpa_peerkey
|
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | peerkey.h | 15 int initiator; /* whether this end was initator for SMK handshake */ member in struct:wpa_peerkey
|
H A D | tdls.c | 89 int initiator; /* whether this end was initiator for TDLS setup */ member in struct:wpa_tdls_peer 436 /* 1) TDLS initiator STA MAC address */ 592 if (peer->initiator) { 611 peer->initiator = 0; 629 if (peer->initiator) { 909 * FTIE: ANonce=0, SNonce=initiator nonce MIC=0, DataKDs=(RSNIE_I, 1000 "TDLS: Failed to get random data for initiator Nonce"); 1135 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime %u seconds from initiator", 1403 wpa_printf(MSG_DEBUG, "TDLS: TPK M1 - TPK initiator " MACST [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | peerkey.h | 15 int initiator; /* whether this end was initator for SMK handshake */ member in struct:wpa_peerkey
|
H A D | tdls.c | 89 int initiator; /* whether this end was initiator for TDLS setup */ member in struct:wpa_tdls_peer 436 /* 1) TDLS initiator STA MAC address */ 592 if (peer->initiator) { 611 peer->initiator = 0; 629 if (peer->initiator) { 909 * FTIE: ANonce=0, SNonce=initiator nonce MIC=0, DataKDs=(RSNIE_I, 1000 "TDLS: Failed to get random data for initiator Nonce"); 1135 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime %u seconds from initiator", 1403 wpa_printf(MSG_DEBUG, "TDLS: TPK M1 - TPK initiator " MACST [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | peerkey.h | 15 int initiator; /* whether this end was initator for SMK handshake */ member in struct:wpa_peerkey
|
H A D | tdls.c | 89 int initiator; /* whether this end was initiator for TDLS setup */ member in struct:wpa_tdls_peer 436 /* 1) TDLS initiator STA MAC address */ 592 if (peer->initiator) { 611 peer->initiator = 0; 629 if (peer->initiator) { 909 * FTIE: ANonce=0, SNonce=initiator nonce MIC=0, DataKDs=(RSNIE_I, 1000 "TDLS: Failed to get random data for initiator Nonce"); 1135 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime %u seconds from initiator", 1403 wpa_printf(MSG_DEBUG, "TDLS: TPK M1 - TPK initiator " MACST [all...] |
/external/chromium/third_party/libjingle/source/talk/p2p/base/ |
H A D | sessionmessages.h | 83 const std::string& sid, const std::string& initiator) : 84 protocol(protocol), type(type), sid(sid), initiator(initiator), 93 std::string initiator; member in struct:cricket::SessionMessage 82 SessionMessage(SignalingProtocol protocol, ActionType type, const std::string& sid, const std::string& initiator) argument
|
H A D | session.h | 227 // If we are the initiator, this will be NULL until we receive an accept. 310 bool initiator() const { return initiator_; } function in class:cricket::Session
|
/external/bluetooth/bluedroid/bta/av/ |
H A D | bta_av_aact.c | 460 p_msg->initiator = FALSE; 462 p_msg->initiator = TRUE; 705 BOOLEAN initiator = FALSE; local 711 initiator = TRUE; 726 start.initiator = initiator; 1804 suspend_rsp.initiator = TRUE; 1811 suspend_rsp.initiator = TRUE; 2006 BOOLEAN initiator = FALSE; local 2021 initiator [all...] |
H A D | bta_av_int.h | 332 BOOLEAN initiator; /* TRUE, if local device initiates the SUSPEND */ member in struct:__anon394 384 /* initiator/acceptor role for adaption */ 385 #define BTA_AV_ROLE_AD_INT 0x00 /* initiator */ 388 /* initiator/acceptor signaling roles */
|
/external/tcpdump/ |
H A D | print-isakmp.c | 98 cookie_t initiator; member in struct:__anon13390 162 /* find cookie from initiator cache */ 169 if (memcmp(in, &cookiecache[i].initiator, sizeof(*in)) == 0) 176 /* record initiator */ 240 memcpy(&cookiecache[ninitiator].initiator, in, sizeof(*in)); 247 cookie_sidecheck(int i, const u_char *bp2, int initiator) argument 286 if (initiator) {
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | wpa_auth_i.h | 19 u8 initiator[ETH_ALEN]; member in struct:wpa_stsl_negotiation
|
/external/wpa_supplicant_8/src/ap/ |
H A D | wpa_auth_i.h | 19 u8 initiator[ETH_ALEN]; member in struct:wpa_stsl_negotiation
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | wpa_auth_i.h | 19 u8 initiator[ETH_ALEN]; member in struct:wpa_stsl_negotiation
|
/external/bluetooth/bluedroid/bta/include/ |
H A D | bta_av_api.h | 299 BOOLEAN initiator; /* TRUE, if local device initiates the START */ member in struct:__anon611 308 BOOLEAN initiator; /* TRUE, if local device initiates the SUSPEND */ member in struct:__anon612
|
/external/kernel-headers/original/asm-mips/sn/sn0/ |
H A D | hubmd.h | 584 initiator:11, /* 60-50: id of request initiator*/ member in struct:proto_error_reg 587 access: 2, /* 39-38: access rights of initiator*/ 590 pointer_me:1, /* 32: initiator same as dir ptr */
|