Home
last modified time | relevance | path

Searched refs:initiator (Results 1 – 25 of 28) sorted by relevance

12

/external/tcpdump/
Dprint-esp.c81 int initiator; member
98 int initiator, in esp_print_decrypt_buffer_by_ikev2() argument
108 if(initiator) initiator=1; in esp_print_decrypt_buffer_by_ikev2()
113 && initiator == sa->initiator in esp_print_decrypt_buffer_by_ikev2()
357 sa1.initiator = (init[0] == 'I'); in esp_print_decode_ikeline()
Dprint-isakmp.c141 cookie_t initiator; member
256 if (memcmp(in, &cookiecache[i].initiator, sizeof(*in)) == 0) in cookie_find()
327 UNALIGNED_MEMCPY(&cookiecache[ninitiator].initiator, in, sizeof(*in)); in cookie_record()
334 cookie_sidecheck(int i, const u_char *bp2, int initiator) in cookie_sidecheck() argument
373 if (initiator) { in cookie_sidecheck()
Dnetdissect.h558 int initiator,
/external/wpa_supplicant_8/src/eap_common/
Dikev2_common.c372 struct ikev2_keys *keys, int initiator, in ikev2_derive_auth_data() argument
381 const u8 *SK_p = initiator ? keys->SK_pi : keys->SK_pr; in ikev2_derive_auth_data()
430 struct ikev2_keys *keys, int initiator, in ikev2_decrypt_payload() argument
441 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er; in ikev2_decrypt_payload()
442 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar; in ikev2_decrypt_payload()
532 int initiator, struct wpabuf *msg, in ikev2_build_encrypted() argument
541 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er; in ikev2_build_encrypted()
542 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar; in ikev2_build_encrypted()
Deap_ikev2_common.c69 int initiator, const struct wpabuf *msg, in eap_ikev2_validate_icv() argument
75 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar; in eap_ikev2_validate_icv()
Dikev2_common.h288 struct ikev2_keys *keys, int initiator,
321 int initiator, const struct ikev2_hdr *hdr,
326 int initiator, struct wpabuf *msg,
Deap_ikev2_common.h26 int initiator, const struct wpabuf *msg,
/external/wpa_supplicant_8/src/rsn_supp/
Dtdls.c97 int initiator; /* whether this end was initiator for TDLS setup */ member
224 int initiator, const u8 *buf, size_t len) in wpa_tdls_send_tpk_msg() argument
227 status_code, peer_capab, initiator, buf, in wpa_tdls_send_tpk_msg()
234 int initiator, const u8 *msg, size_t msg_len) in wpa_tdls_tpk_send() argument
242 peer_capab, initiator, (unsigned int) msg_len); in wpa_tdls_tpk_send()
245 status_code, peer_capab, initiator, msg, in wpa_tdls_tpk_send()
342 peer->initiator, in wpa_tdls_tpk_retry_timeout()
628 if (peer->initiator) { in wpa_tdls_tpk_timeout()
674 peer->initiator = 0; in wpa_tdls_peer_clear()
714 if (peer->initiator) { in wpa_tdls_linkid()
[all …]
Dpeerkey.h15 int initiator; /* whether this end was initator for SMK handshake */ member
Dwpa_i.h278 int initiator, const u8 *buf, in wpa_sm_send_tdls_mgmt() argument
284 peer_capab, initiator, buf, in wpa_sm_send_tdls_mgmt()
Dpeerkey.c544 os_memcmp(peerkey->initiator ? peerkey->inonce : in wpa_supplicant_process_smk_m45()
556 if (peerkey->initiator) { in wpa_supplicant_process_smk_m45()
576 if (peerkey->initiator) { in wpa_supplicant_process_smk_m45()
921 if (peerkey->initiator && !peerkey->stk_set) { in peerkey_verify_eapol_key_mic()
1018 peerkey->initiator = 1; in wpa_sm_stkstart()
Dwpa.h59 int initiator, const u8 *buf, size_t len);
Dwpa.c1875 if (!peerkey->initiator && peerkey->replay_counter_set && in wpa_sm_rx_eapol()
1882 } else if (peerkey->initiator) { in wpa_sm_rx_eapol()
1898 if (peerkey && peerkey->initiator && (key_info & WPA_KEY_INFO_ACK)) { in wpa_sm_rx_eapol()
1916 && (peerkey == NULL || !peerkey->initiator) in wpa_sm_rx_eapol()
/external/ipsec-tools/src/racoon/doc/
DREADME.gssapi38 However, if the initiator does specify a GSS endpoint attribute,
63 the initiator in a verbatim fashion, leaving no room to
67 initiator sent the name attribute. This scheme should
/external/ipsec-tools/src/racoon/samples/
Dracoon.conf.sample43 # to obey the initiator's lifetime and PFS group proposal,
/external/wpa_supplicant_8/src/ap/
Dwpa_auth_i.h19 u8 initiator[ETH_ALEN]; member
Dhostapd.h434 void hostapd_channel_list_updated(struct hostapd_iface *iface, int initiator);
Dhostapd.c1242 void hostapd_channel_list_updated(struct hostapd_iface *iface, int initiator) in hostapd_channel_list_updated() argument
1244 if (!iface->wait_channel_update || initiator != REGDOM_SET_BY_USER) in hostapd_channel_list_updated()
Ddrv_callbacks.c1264 hapd->iface, data->channel_list_changed.initiator); in wpa_supplicant_event()
/external/wpa_supplicant_8/src/drivers/
Ddriver_nl80211_event.c1782 data.channel_list_changed.initiator = REGDOM_SET_BY_CORE; in nl80211_reg_change_event()
1785 data.channel_list_changed.initiator = REGDOM_SET_BY_USER; in nl80211_reg_change_event()
1788 data.channel_list_changed.initiator = REGDOM_SET_BY_DRIVER; in nl80211_reg_change_event()
1791 data.channel_list_changed.initiator = REGDOM_SET_BY_COUNTRY_IE; in nl80211_reg_change_event()
1967 data.channel_list_changed.initiator = REGDOM_BEACON_HINT; in do_process_drv_event()
Ddriver.h2752 int initiator, const u8 *buf, size_t len);
4534 enum reg_change_initiator initiator; member
/external/wpa_supplicant_8/wpa_supplicant/
Dwpas_glue.c640 int initiator, const u8 *buf, in wpa_supplicant_send_tdls_mgmt() argument
645 status_code, peer_capab, initiator, buf, in wpa_supplicant_send_tdls_mgmt()
Ddriver_i.h536 u32 peer_capab, int initiator, in wpa_drv_send_tdls_mgmt() argument
543 initiator, buf, len); in wpa_drv_send_tdls_mgmt()
/external/ipsec-tools/src/racoon/
DTODO79 o responder policy and initiator policy should be separated.
/external/ipsec-tools/
DChangeLog99 we received an invalid first exchange from initiator.
339 IPSec SAs negociated as initiator
726 the first packet. That should not normally happen, as the initiator

12