/external/netperf/ |
nettest_sdp.c | [all...] |
nettest_bsd.c | [all...] |
/external/wpa_supplicant/ |
wpa.c | 1080 peerkey->initiator = 1; [all...] |
/external/ipsec-tools/src/racoon/ |
strnames.c | 94 case INITIATOR: 114 case INITIATOR: 136 case INITIATOR: 162 case INITIATOR:
|
isakmp_base.c | 93 * begin Identity Protection Mode as initiator. 808 * receive from initiator 956 * send to initiator 1120 * receive from initiator 1272 * send to initiator [all...] |
isakmp_quick.c | 100 * begin Quick Mode as initiator. send pfkey getspi message to kernel. 641 if (oakley_compute_keymat(iph2, INITIATOR) < 0) 659 /* Do UPDATE for initiator */ 802 /* Do UPDATE for initiator */ 831 * receive from initiator 1115 * save the packet from the initiator in order to resend the 1179 * send to initiator 1380 * receive from initiator [all...] |
isakmp.c | 410 /* the initiator's cookie must not be zero */ 463 iph1->side == INITIATOR) { 466 "the initiator's cookies collide.\n"); 554 * the packet must be the 1st message from a initiator 561 /*it must be the 1st message from a initiator.*/ 581 if (iph1->side != INITIATOR) { 584 "it has to be as the initiator. %s\n", 630 * as the packet from responder againt initiator's 1st 1020 /* new negotiation of phase 1 for initiator */ 1038 iph1->side = INITIATOR; [all...] |
oakley.c | 514 bp = (side == INITIATOR ? iph2->nonce : iph2->nonce_p); 518 bp = (side == INITIATOR ? iph2->nonce_p : iph2->nonce); 893 if (iph1->side == INITIATOR) 903 if (iph1->side == INITIATOR) 944 iph1->side == INITIATOR ? "init" : "resp"); 1290 if (iph1->side == INITIATOR) [all...] |
TODO | 79 o responder policy and initiator policy should be separated.
|
isakmp_agg.c | 99 * begin Aggressive Mode as initiator. 795 * receive from initiator 981 * send to initiator [all...] |
pfkey.c | 819 /* If initiator side, send error to kernel by SADB_ACQUIRE. */ 820 if (iph2->side == INITIATOR) 848 if (iph2->side == INITIATOR) { 981 pp = iph2->side == INITIATOR ? iph2->proposal : iph2->approval; 1039 if (iph2->side == INITIATOR) 1326 if (iph2->side == INITIATOR) [all...] |
isakmp_inf.c | 267 if ((iph1->side == INITIATOR && iph1->status < PHASE1ST_MSG3SENT) 724 iph1->side = INITIATOR; 793 * Initiator/Responder cookie and SPI has no meaning, SPI size = 0. 925 iph2->side = INITIATOR; [all...] |
main.c | 357 * pk_sendadd() on initiator side is always failed
|
algorithm.c | 231 * initiator half (unless a server initiates a connection, which is
|
/packages/apps/Phone/src/com/android/phone/ |
BluetoothHeadsetService.java | 455 private synchronized void setState(int state, int result, int initiator) { 468 if (initiator == -1) { 469 log("Headset Disconnected Intent without Disconnect Initiator extra"); 472 initiator); [all...] |
/external/tcpdump/ |
print-isakmp.c | 98 cookie_t initiator; member in struct:__anon6175 162 /* find cookie from initiator cache */ 169 if (memcmp(in, &cookiecache[i].initiator, sizeof(*in)) == 0) 176 /* record initiator */ 240 memcpy(&cookiecache[ninitiator].initiator, in, sizeof(*in)); 247 cookie_sidecheck(int i, const u_char *bp2, int initiator) 286 if (initiator) { [all...] |
print-wb.c | 88 u_int32_t p_sid; /* session id of initiator */
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
ikev2.c | 2 * IKEv2 initiator (RFC 4306) for EAP-IKEV2 819 wpa_hexdump(MSG_DEBUG, "IKEV2: IKE_SA Initiator's SPI", 821 wpa_hexdump(MSG_DEBUG, "IKEV2: IKE_SA Initiator's SPI", 855 "Initiator's SPI"); 1099 wpa_hexdump(MSG_DEBUG, "IKEV2: IKE_SA Initiator's SPI",
|
/hardware/ti/wlan/wl1271/stad/src/Sta_Management/ |
ScanCncn.h | 131 * \param SPSStatus - Mac address of: SA as receiver / RA as initiator
|
/system/wlan/ti/wilink_6_1/stad/src/Sta_Management/ |
ScanCncn.h | 129 * \param SPSStatus - Mac address of: SA as receiver / RA as initiator
|
/hardware/broadcom/wlan/bcm4329/src/shared/ |
sbutils.c | 789 /* don't forget to clear the initiator reject bit */ 883 * Set the initiator timeout for the "master core". 895 * This routine exists so callers can disable initiator
|
/external/ipsec-tools/ |
ChangeLog | 99 we received an invalid first exchange from initiator. 339 IPSec SAs negociated as initiator 726 the first packet. That should not normally happen, as the initiator
|
/system/wlan/ti/wilink_6_1/TWD/Ctrl/ |
CmdBld.c | [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
wpa.c | [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
ikev2.c | 785 wpa_hexdump(MSG_DEBUG, "IKEV2: IKE_SA Initiator's SPI", 821 "Initiator's SPI"); [all...] |