/external/tcpdump/ |
D | print-esp.c | 81 int initiator; member 98 int initiator, in esp_print_decrypt_buffer_by_ikev2() argument 108 if(initiator) initiator=1; in esp_print_decrypt_buffer_by_ikev2() 113 && initiator == sa->initiator in esp_print_decrypt_buffer_by_ikev2() 357 sa1.initiator = (init[0] == 'I'); in esp_print_decode_ikeline()
|
D | print-isakmp.c | 141 cookie_t initiator; member 256 if (memcmp(in, &cookiecache[i].initiator, sizeof(*in)) == 0) in cookie_find() 327 UNALIGNED_MEMCPY(&cookiecache[ninitiator].initiator, in, sizeof(*in)); in cookie_record() 334 cookie_sidecheck(int i, const u_char *bp2, int initiator) in cookie_sidecheck() argument 373 if (initiator) { in cookie_sidecheck()
|
D | netdissect.h | 558 int initiator,
|
/external/wpa_supplicant_8/src/eap_common/ |
D | ikev2_common.c | 372 struct ikev2_keys *keys, int initiator, in ikev2_derive_auth_data() argument 381 const u8 *SK_p = initiator ? keys->SK_pi : keys->SK_pr; in ikev2_derive_auth_data() 430 struct ikev2_keys *keys, int initiator, in ikev2_decrypt_payload() argument 441 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er; in ikev2_decrypt_payload() 442 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar; in ikev2_decrypt_payload() 532 int initiator, struct wpabuf *msg, in ikev2_build_encrypted() argument 541 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er; in ikev2_build_encrypted() 542 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar; in ikev2_build_encrypted()
|
D | eap_ikev2_common.c | 69 int initiator, const struct wpabuf *msg, in eap_ikev2_validate_icv() argument 75 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar; in eap_ikev2_validate_icv()
|
D | ikev2_common.h | 288 struct ikev2_keys *keys, int initiator, 321 int initiator, const struct ikev2_hdr *hdr, 326 int initiator, struct wpabuf *msg,
|
D | eap_ikev2_common.h | 26 int initiator, const struct wpabuf *msg,
|
/external/wpa_supplicant_8/src/rsn_supp/ |
D | tdls.c | 97 int initiator; /* whether this end was initiator for TDLS setup */ member 224 int initiator, const u8 *buf, size_t len) in wpa_tdls_send_tpk_msg() argument 227 status_code, peer_capab, initiator, buf, in wpa_tdls_send_tpk_msg() 234 int initiator, const u8 *msg, size_t msg_len) in wpa_tdls_tpk_send() argument 242 peer_capab, initiator, (unsigned int) msg_len); in wpa_tdls_tpk_send() 245 status_code, peer_capab, initiator, msg, in wpa_tdls_tpk_send() 342 peer->initiator, in wpa_tdls_tpk_retry_timeout() 628 if (peer->initiator) { in wpa_tdls_tpk_timeout() 674 peer->initiator = 0; in wpa_tdls_peer_clear() 714 if (peer->initiator) { in wpa_tdls_linkid() [all …]
|
D | peerkey.h | 15 int initiator; /* whether this end was initator for SMK handshake */ member
|
D | wpa_i.h | 278 int initiator, const u8 *buf, in wpa_sm_send_tdls_mgmt() argument 284 peer_capab, initiator, buf, in wpa_sm_send_tdls_mgmt()
|
D | peerkey.c | 544 os_memcmp(peerkey->initiator ? peerkey->inonce : in wpa_supplicant_process_smk_m45() 556 if (peerkey->initiator) { in wpa_supplicant_process_smk_m45() 576 if (peerkey->initiator) { in wpa_supplicant_process_smk_m45() 921 if (peerkey->initiator && !peerkey->stk_set) { in peerkey_verify_eapol_key_mic() 1018 peerkey->initiator = 1; in wpa_sm_stkstart()
|
D | wpa.h | 59 int initiator, const u8 *buf, size_t len);
|
D | wpa.c | 1875 if (!peerkey->initiator && peerkey->replay_counter_set && in wpa_sm_rx_eapol() 1882 } else if (peerkey->initiator) { in wpa_sm_rx_eapol() 1898 if (peerkey && peerkey->initiator && (key_info & WPA_KEY_INFO_ACK)) { in wpa_sm_rx_eapol() 1916 && (peerkey == NULL || !peerkey->initiator) in wpa_sm_rx_eapol()
|
/external/ipsec-tools/src/racoon/doc/ |
D | README.gssapi | 38 However, if the initiator does specify a GSS endpoint attribute, 63 the initiator in a verbatim fashion, leaving no room to 67 initiator sent the name attribute. This scheme should
|
/external/ipsec-tools/src/racoon/samples/ |
D | racoon.conf.sample | 43 # to obey the initiator's lifetime and PFS group proposal,
|
/external/wpa_supplicant_8/src/ap/ |
D | wpa_auth_i.h | 19 u8 initiator[ETH_ALEN]; member
|
D | hostapd.h | 434 void hostapd_channel_list_updated(struct hostapd_iface *iface, int initiator);
|
D | hostapd.c | 1242 void hostapd_channel_list_updated(struct hostapd_iface *iface, int initiator) in hostapd_channel_list_updated() argument 1244 if (!iface->wait_channel_update || initiator != REGDOM_SET_BY_USER) in hostapd_channel_list_updated()
|
D | drv_callbacks.c | 1264 hapd->iface, data->channel_list_changed.initiator); in wpa_supplicant_event()
|
/external/wpa_supplicant_8/src/drivers/ |
D | driver_nl80211_event.c | 1782 data.channel_list_changed.initiator = REGDOM_SET_BY_CORE; in nl80211_reg_change_event() 1785 data.channel_list_changed.initiator = REGDOM_SET_BY_USER; in nl80211_reg_change_event() 1788 data.channel_list_changed.initiator = REGDOM_SET_BY_DRIVER; in nl80211_reg_change_event() 1791 data.channel_list_changed.initiator = REGDOM_SET_BY_COUNTRY_IE; in nl80211_reg_change_event() 1967 data.channel_list_changed.initiator = REGDOM_BEACON_HINT; in do_process_drv_event()
|
D | driver.h | 2752 int initiator, const u8 *buf, size_t len); 4534 enum reg_change_initiator initiator; member
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | wpas_glue.c | 640 int initiator, const u8 *buf, in wpa_supplicant_send_tdls_mgmt() argument 645 status_code, peer_capab, initiator, buf, in wpa_supplicant_send_tdls_mgmt()
|
D | driver_i.h | 536 u32 peer_capab, int initiator, in wpa_drv_send_tdls_mgmt() argument 543 initiator, buf, len); in wpa_drv_send_tdls_mgmt()
|
/external/ipsec-tools/src/racoon/ |
D | TODO | 79 o responder policy and initiator policy should be separated.
|
/external/ipsec-tools/ |
D | ChangeLog | 99 we received an invalid first exchange from initiator. 339 IPSec SAs negociated as initiator 726 the first packet. That should not normally happen, as the initiator
|