/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_ikev2_common.c | 69 int initiator, const struct wpabuf *msg, 75 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar; 68 eap_ikev2_validate_icv(int integ_alg, struct ikev2_keys *keys, int initiator, const struct wpabuf *msg, const u8 *pos, const u8 *end) argument
|
H A D | ikev2_common.c | 2 * IKEv2 common routines for initiator and responder 372 struct ikev2_keys *keys, int initiator, 381 const u8 *SK_p = initiator ? keys->SK_pi : keys->SK_pr; 430 struct ikev2_keys *keys, int initiator, 441 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er; 442 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar; 532 int initiator, struct wpabuf *msg, 541 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er; 542 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar; 370 ikev2_derive_auth_data(int prf_alg, const struct wpabuf *sign_msg, const u8 *ID, size_t ID_len, u8 ID_type, struct ikev2_keys *keys, int initiator, const u8 *shared_secret, size_t shared_secret_len, const u8 *nonce, size_t nonce_len, const u8 *key_pad, size_t key_pad_len, u8 *auth_data) argument 429 ikev2_decrypt_payload(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, const struct ikev2_hdr *hdr, const u8 *encrypted, size_t encrypted_len, size_t *res_len) argument 531 ikev2_build_encrypted(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, struct wpabuf *msg, struct wpabuf *plain, u8 next_payload) argument
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_ikev2_common.c | 69 int initiator, const struct wpabuf *msg, 75 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar; 68 eap_ikev2_validate_icv(int integ_alg, struct ikev2_keys *keys, int initiator, const struct wpabuf *msg, const u8 *pos, const u8 *end) argument
|
H A D | ikev2_common.c | 2 * IKEv2 common routines for initiator and responder 372 struct ikev2_keys *keys, int initiator, 381 const u8 *SK_p = initiator ? keys->SK_pi : keys->SK_pr; 430 struct ikev2_keys *keys, int initiator, 441 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er; 442 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar; 532 int initiator, struct wpabuf *msg, 541 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er; 542 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar; 370 ikev2_derive_auth_data(int prf_alg, const struct wpabuf *sign_msg, const u8 *ID, size_t ID_len, u8 ID_type, struct ikev2_keys *keys, int initiator, const u8 *shared_secret, size_t shared_secret_len, const u8 *nonce, size_t nonce_len, const u8 *key_pad, size_t key_pad_len, u8 *auth_data) argument 429 ikev2_decrypt_payload(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, const struct ikev2_hdr *hdr, const u8 *encrypted, size_t encrypted_len, size_t *res_len) argument 531 ikev2_build_encrypted(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, struct wpabuf *msg, struct wpabuf *plain, u8 next_payload) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_ikev2_common.c | 69 int initiator, const struct wpabuf *msg, 75 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar; 68 eap_ikev2_validate_icv(int integ_alg, struct ikev2_keys *keys, int initiator, const struct wpabuf *msg, const u8 *pos, const u8 *end) argument
|
H A D | ikev2_common.c | 2 * IKEv2 common routines for initiator and responder 372 struct ikev2_keys *keys, int initiator, 381 const u8 *SK_p = initiator ? keys->SK_pi : keys->SK_pr; 430 struct ikev2_keys *keys, int initiator, 441 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er; 442 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar; 532 int initiator, struct wpabuf *msg, 541 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er; 542 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar; 370 ikev2_derive_auth_data(int prf_alg, const struct wpabuf *sign_msg, const u8 *ID, size_t ID_len, u8 ID_type, struct ikev2_keys *keys, int initiator, const u8 *shared_secret, size_t shared_secret_len, const u8 *nonce, size_t nonce_len, const u8 *key_pad, size_t key_pad_len, u8 *auth_data) argument 429 ikev2_decrypt_payload(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, const struct ikev2_hdr *hdr, const u8 *encrypted, size_t encrypted_len, size_t *res_len) argument 531 ikev2_build_encrypted(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, struct wpabuf *msg, struct wpabuf *plain, u8 next_payload) argument
|
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | peerkey.h | 15 int initiator; /* whether this end was initator for SMK handshake */ member in struct:wpa_peerkey
|
H A D | wpa_i.h | 278 int initiator, const u8 *buf, 284 peer_capab, initiator, buf, 275 wpa_sm_send_tdls_mgmt(struct wpa_sm *sm, const u8 *dst, u8 action_code, u8 dialog_token, u16 status_code, u32 peer_capab, int initiator, const u8 *buf, size_t len) argument
|
H A D | tdls.c | 97 int initiator; /* whether this end was initiator for TDLS setup */ member in struct:wpa_tdls_peer 224 int initiator, const u8 *buf, size_t len) 227 status_code, peer_capab, initiator, buf, 234 int initiator, const u8 *msg, size_t msg_len) 239 "dialog_token=%u status_code=%u peer_capab=%u initiator=%d " 242 peer_capab, initiator, (unsigned int) msg_len); 245 status_code, peer_capab, initiator, msg, 342 peer->initiator, 472 /* 1) TDLS initiator ST 221 wpa_tdls_send_tpk_msg(struct wpa_sm *sm, const u8 *dst, u8 action_code, u8 dialog_token, u16 status_code, u32 peer_capab, int initiator, const u8 *buf, size_t len) argument 232 wpa_tdls_tpk_send(struct wpa_sm *sm, const u8 *dest, u8 action_code, u8 dialog_token, u16 status_code, u32 peer_capab, int initiator, const u8 *msg, size_t msg_len) argument 997 wpa_tdls_send_error(struct wpa_sm *sm, const u8 *dst, u8 tdls_action, u8 dialog_token, int initiator, u16 status) argument [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | peerkey.h | 15 int initiator; /* whether this end was initator for SMK handshake */ member in struct:wpa_peerkey
|
H A D | wpa_i.h | 278 int initiator, const u8 *buf, 284 peer_capab, initiator, buf, 275 wpa_sm_send_tdls_mgmt(struct wpa_sm *sm, const u8 *dst, u8 action_code, u8 dialog_token, u16 status_code, u32 peer_capab, int initiator, const u8 *buf, size_t len) argument
|
H A D | tdls.c | 97 int initiator; /* whether this end was initiator for TDLS setup */ member in struct:wpa_tdls_peer 224 int initiator, const u8 *buf, size_t len) 227 status_code, peer_capab, initiator, buf, 234 int initiator, const u8 *msg, size_t msg_len) 239 "dialog_token=%u status_code=%u peer_capab=%u initiator=%d " 242 peer_capab, initiator, (unsigned int) msg_len); 245 status_code, peer_capab, initiator, msg, 342 peer->initiator, 472 /* 1) TDLS initiator ST 221 wpa_tdls_send_tpk_msg(struct wpa_sm *sm, const u8 *dst, u8 action_code, u8 dialog_token, u16 status_code, u32 peer_capab, int initiator, const u8 *buf, size_t len) argument 232 wpa_tdls_tpk_send(struct wpa_sm *sm, const u8 *dest, u8 action_code, u8 dialog_token, u16 status_code, u32 peer_capab, int initiator, const u8 *msg, size_t msg_len) argument 997 wpa_tdls_send_error(struct wpa_sm *sm, const u8 *dst, u8 tdls_action, u8 dialog_token, int initiator, u16 status) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | peerkey.h | 15 int initiator; /* whether this end was initator for SMK handshake */ member in struct:wpa_peerkey
|
H A D | wpa_i.h | 278 int initiator, const u8 *buf, 284 peer_capab, initiator, buf, 275 wpa_sm_send_tdls_mgmt(struct wpa_sm *sm, const u8 *dst, u8 action_code, u8 dialog_token, u16 status_code, u32 peer_capab, int initiator, const u8 *buf, size_t len) argument
|
H A D | tdls.c | 97 int initiator; /* whether this end was initiator for TDLS setup */ member in struct:wpa_tdls_peer 224 int initiator, const u8 *buf, size_t len) 227 status_code, peer_capab, initiator, buf, 234 int initiator, const u8 *msg, size_t msg_len) 239 "dialog_token=%u status_code=%u peer_capab=%u initiator=%d " 242 peer_capab, initiator, (unsigned int) msg_len); 245 status_code, peer_capab, initiator, msg, 342 peer->initiator, 472 /* 1) TDLS initiator ST 221 wpa_tdls_send_tpk_msg(struct wpa_sm *sm, const u8 *dst, u8 action_code, u8 dialog_token, u16 status_code, u32 peer_capab, int initiator, const u8 *buf, size_t len) argument 232 wpa_tdls_tpk_send(struct wpa_sm *sm, const u8 *dest, u8 action_code, u8 dialog_token, u16 status_code, u32 peer_capab, int initiator, const u8 *msg, size_t msg_len) argument 997 wpa_tdls_send_error(struct wpa_sm *sm, const u8 *dst, u8 tdls_action, u8 dialog_token, int initiator, u16 status) argument [all...] |
/external/tcpdump/ |
H A D | print-esp.c | 81 int initiator; member in struct:sa_list 98 int initiator, 107 /* initiator arg is any non-zero value */ 108 if(initiator) initiator=1; 113 && initiator == sa->initiator 357 sa1.initiator = (init[0] == 'I'); 97 esp_print_decrypt_buffer_by_ikev2(netdissect_options *ndo, int initiator, u_char spii[8], u_char spir[8], u_char *buf, u_char *end) argument
|
H A D | print-isakmp.c | 141 cookie_t initiator; member in struct:__anon14663 249 /* find cookie from initiator cache */ 256 if (memcmp(in, &cookiecache[i].initiator, sizeof(*in)) == 0) 263 /* record initiator */ 327 UNALIGNED_MEMCPY(&cookiecache[ninitiator].initiator, in, sizeof(*in)); 334 cookie_sidecheck(int i, const u_char *bp2, int initiator) argument 373 if (initiator) {
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | hostapd.c | 1242 void hostapd_channel_list_updated(struct hostapd_iface *iface, int initiator) argument 1244 if (!iface->wait_channel_update || initiator != REGDOM_SET_BY_USER)
|
H A D | wpa_auth_i.h | 19 u8 initiator[ETH_ALEN]; member in struct:wpa_stsl_negotiation
|
/external/wpa_supplicant_8/src/ap/ |
H A D | hostapd.c | 1242 void hostapd_channel_list_updated(struct hostapd_iface *iface, int initiator) argument 1244 if (!iface->wait_channel_update || initiator != REGDOM_SET_BY_USER)
|
H A D | wpa_auth_i.h | 19 u8 initiator[ETH_ALEN]; member in struct:wpa_stsl_negotiation
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | hostapd.c | 1242 void hostapd_channel_list_updated(struct hostapd_iface *iface, int initiator) argument 1244 if (!iface->wait_channel_update || initiator != REGDOM_SET_BY_USER)
|
H A D | wpa_auth_i.h | 19 u8 initiator[ETH_ALEN]; member in struct:wpa_stsl_negotiation
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | wpas_glue.c | 640 int initiator, const u8 *buf, 645 status_code, peer_capab, initiator, buf, 637 wpa_supplicant_send_tdls_mgmt(void *ctx, const u8 *dst, u8 action_code, u8 dialog_token, u16 status_code, u32 peer_capab, int initiator, const u8 *buf, size_t len) argument
|
H A D | driver_i.h | 536 u32 peer_capab, int initiator, 543 initiator, buf, len); 533 wpa_drv_send_tdls_mgmt(struct wpa_supplicant *wpa_s, const u8 *dst, u8 action_code, u8 dialog_token, u16 status_code, u32 peer_capab, int initiator, const u8 *buf, size_t len) argument
|