/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | ikev2.h | 24 enum { SA_INIT, SA_AUTH, CHILD_SA, NOTIFY, IKEV2_DONE, IKEV2_FAILED } enumerator in enum:ikev2_responder_data::__anon26805
|
H A D | ikev2.c | 673 case SA_INIT: 677 "%u in SA_INIT state", exchange_type); 682 "in SA_INIT state", message_id); 779 if (data->state != SA_INIT) { 796 if (data->state == SA_INIT) { 1129 wpa_hexdump_buf(MSG_MSGDUMP, "IKEV2: Sending message (SA_INIT)", msg); 1213 data->state = SA_INIT; 1228 case SA_INIT:
|
H A D | eap_ikev2.c | 80 data->ikev2.state = SA_INIT; 210 /* SA_INIT was sent out, so message have to be
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | ikev2.h | 24 enum { SA_INIT, SA_AUTH, CHILD_SA, IKEV2_DONE } state; enumerator in enum:ikev2_initiator_data::__anon26845
|
H A D | ikev2.c | 496 wpa_printf(MSG_DEBUG, "IKEV2: Encrypted payload in SA_INIT - " 744 case SA_INIT: 749 "%u in SA_INIT state", exchange_type); 754 "in SA_INIT state", message_id); 847 if (data->state != SA_INIT) { 865 case SA_INIT: 1116 wpa_hexdump_buf(MSG_MSGDUMP, "IKEV2: Sending message (SA_INIT)", msg); 1190 case SA_INIT:
|
H A D | eap_server_ikev2.c | 92 data->ikev2.state = SA_INIT; 446 /* SA_INIT was sent out, so message have to be
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | ikev2.h | 24 enum { SA_INIT, SA_AUTH, CHILD_SA, NOTIFY, IKEV2_DONE, IKEV2_FAILED } enumerator in enum:ikev2_responder_data::__anon27068
|
H A D | ikev2.c | 673 case SA_INIT: 677 "%u in SA_INIT state", exchange_type); 682 "in SA_INIT state", message_id); 779 if (data->state != SA_INIT) { 796 if (data->state == SA_INIT) { 1129 wpa_hexdump_buf(MSG_MSGDUMP, "IKEV2: Sending message (SA_INIT)", msg); 1213 data->state = SA_INIT; 1228 case SA_INIT:
|
H A D | eap_ikev2.c | 80 data->ikev2.state = SA_INIT; 210 /* SA_INIT was sent out, so message have to be
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | ikev2.h | 24 enum { SA_INIT, SA_AUTH, CHILD_SA, IKEV2_DONE } state; enumerator in enum:ikev2_initiator_data::__anon27108
|
H A D | ikev2.c | 496 wpa_printf(MSG_DEBUG, "IKEV2: Encrypted payload in SA_INIT - " 744 case SA_INIT: 749 "%u in SA_INIT state", exchange_type); 754 "in SA_INIT state", message_id); 847 if (data->state != SA_INIT) { 865 case SA_INIT: 1116 wpa_hexdump_buf(MSG_MSGDUMP, "IKEV2: Sending message (SA_INIT)", msg); 1190 case SA_INIT:
|
H A D | eap_server_ikev2.c | 92 data->ikev2.state = SA_INIT; 446 /* SA_INIT was sent out, so message have to be
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | ikev2.h | 24 enum { SA_INIT, SA_AUTH, CHILD_SA, NOTIFY, IKEV2_DONE, IKEV2_FAILED } enumerator in enum:ikev2_responder_data::__anon27335
|
H A D | ikev2.c | 673 case SA_INIT: 677 "%u in SA_INIT state", exchange_type); 682 "in SA_INIT state", message_id); 779 if (data->state != SA_INIT) { 796 if (data->state == SA_INIT) { 1129 wpa_hexdump_buf(MSG_MSGDUMP, "IKEV2: Sending message (SA_INIT)", msg); 1213 data->state = SA_INIT; 1228 case SA_INIT:
|
H A D | eap_ikev2.c | 80 data->ikev2.state = SA_INIT; 210 /* SA_INIT was sent out, so message have to be
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | ikev2.h | 24 enum { SA_INIT, SA_AUTH, CHILD_SA, IKEV2_DONE } state; enumerator in enum:ikev2_initiator_data::__anon27375
|
H A D | ikev2.c | 496 wpa_printf(MSG_DEBUG, "IKEV2: Encrypted payload in SA_INIT - " 744 case SA_INIT: 749 "%u in SA_INIT state", exchange_type); 754 "in SA_INIT state", message_id); 847 if (data->state != SA_INIT) { 865 case SA_INIT: 1116 wpa_hexdump_buf(MSG_MSGDUMP, "IKEV2: Sending message (SA_INIT)", msg); 1190 case SA_INIT:
|
H A D | eap_server_ikev2.c | 92 data->ikev2.state = SA_INIT; 446 /* SA_INIT was sent out, so message have to be
|