/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_ikev2_common.h | 39 int initiator, const struct wpabuf *msg,
|
eap_ikev2_common.c | 85 int initiator, const struct wpabuf *msg, 91 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar;
|
ikev2_common.h | 33 u8 i_spi[IKEV2_SPI_LEN]; /* IKE_SA Initiator's SPI */ 298 struct ikev2_keys *keys, int initiator, 331 int initiator, const struct ikev2_hdr *hdr, 336 int initiator, struct wpabuf *msg,
|
ikev2_common.c | 2 * IKEv2 common routines for initiator and responder 438 struct ikev2_keys *keys, int initiator, 447 const u8 *SK_p = initiator ? keys->SK_pi : keys->SK_pr; 496 struct ikev2_keys *keys, int initiator, 507 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er; 508 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar; 598 int initiator, struct wpabuf *msg, 607 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er; 608 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar;
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_ikev2_common.h | 39 int initiator, const struct wpabuf *msg,
|
eap_ikev2_common.c | 85 int initiator, const struct wpabuf *msg, 91 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar;
|
ikev2_common.h | 33 u8 i_spi[IKEV2_SPI_LEN]; /* IKE_SA Initiator's SPI */ 298 struct ikev2_keys *keys, int initiator, 331 int initiator, const struct ikev2_hdr *hdr, 336 int initiator, struct wpabuf *msg,
|
ikev2_common.c | 2 * IKEv2 common routines for initiator and responder 439 struct ikev2_keys *keys, int initiator, 448 const u8 *SK_p = initiator ? keys->SK_pi : keys->SK_pr; 497 struct ikev2_keys *keys, int initiator, 508 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er; 509 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar; 599 int initiator, struct wpabuf *msg, 608 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er; 609 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar;
|
/external/chromium/third_party/libjingle/source/talk/p2p/base/ |
sessionmessages.h | 83 const std::string& sid, const std::string& initiator) : 84 protocol(protocol), type(type), sid(sid), initiator(initiator), 93 std::string initiator; member in struct:cricket::SessionMessage
|
sessionmanager.h | 95 // Given a sid, initiator, and remote_name, this finds the matching Session 141 const std::string& initiator,
|
sessionmessages.cc | 166 msg->initiator = session->Attr(QN_INITIATOR); 188 msg->initiator = GetXmlAttr(jingle, QN_INITIATOR, buzz::STR_EMPTY); 231 session->AddAttr(QN_INITIATOR, msg.initiator); 247 // no initiator. Fix the server, and then only set the initiator on 249 jingle->AddAttr(QN_INITIATOR, msg.initiator); [all...] |
sessionmanager.cc | 182 session = CreateSession(msg.to, msg.initiator, msg.sid,
|
session.h | 227 // If we are the initiator, this will be NULL until we receive an accept. 310 bool initiator() const { return initiator_; } function in class:cricket::Session
|
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
peerkey.h | 21 int initiator; /* whether this end was initator for SMK handshake */ member in struct:wpa_peerkey 23 u8 inonce[WPA_NONCE_LEN]; /* Initiator Nonce */ 25 u8 rsnie_i[PEERKEY_MAX_IE_LEN]; /* Initiator RSN IE */
|
peerkey.c | 138 /* KDEs: Peer RSN IE, Initiator MAC Address, Initiator Nonce */ 165 /* Initiator MAC Address KDE */ 168 /* Initiator Nonce */ 211 wpa_printf(MSG_DEBUG, "RSN: SMK M2 - SMK initiator " MACSTR, 215 wpa_printf(MSG_INFO, "RSN: Too long Initiator RSN IE in SMK " 300 * @inonce: Initiator Nonce 301 * @mac_i: Initiator MAC address 448 wpa_printf(MSG_DEBUG, "RSN: Received SMK M4 (Initiator " MACSTR ")", 557 os_memcmp(peerkey->initiator ? peerkey->inonce [all...] |
wpa.c | [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
peerkey.h | 21 int initiator; /* whether this end was initator for SMK handshake */ member in struct:wpa_peerkey 23 u8 inonce[WPA_NONCE_LEN]; /* Initiator Nonce */ 25 u8 rsnie_i[PEERKEY_MAX_IE_LEN]; /* Initiator RSN IE */
|
tdls.c | 59 u8 Snonce[WPA_NONCE_LEN]; /* Initiator Nonce in TDLS */ 93 int initiator; /* whether this end was initiator for TDLS setup */ member in struct:wpa_tdls_peer 95 u8 inonce[WPA_NONCE_LEN]; /* Initiator Nonce */ 97 u8 rsnie_i[TDLS_MAX_IE_LEN]; /* Initiator RSN IE */ 416 /* 1) TDLS initiator STA MAC address */ 572 if (peer->initiator) { 590 peer->initiator = 0; 608 if (peer->initiator) { 824 * FTIE: ANonce=0, SNonce=initiator nonce MIC=0, DataKDs=(RSNIE_I [all...] |
peerkey.c | 139 /* KDEs: Peer RSN IE, Initiator MAC Address, Initiator Nonce */ 166 /* Initiator MAC Address KDE */ 169 /* Initiator Nonce */ 212 wpa_printf(MSG_DEBUG, "RSN: SMK M2 - SMK initiator " MACSTR, 216 wpa_printf(MSG_INFO, "RSN: Too long Initiator RSN IE in SMK " 301 * @inonce: Initiator Nonce 302 * @mac_i: Initiator MAC address 449 wpa_printf(MSG_DEBUG, "RSN: Received SMK M4 (Initiator " MACSTR ")", 558 os_memcmp(peerkey->initiator ? peerkey->inonce [all...] |
wpa.c | [all...] |
/external/wpa_supplicant/ |
wpa_i.h | 50 int initiator; /* whether this end was initator for SMK handshake */ member in struct:wpa_peerkey 52 u8 inonce[WPA_NONCE_LEN]; /* Initiator Nonce */ 54 u8 rsnie_i[PEERKEY_MAX_IE_LEN]; /* Initiator RSN IE */
|
wpa.c | 1080 peerkey->initiator = 1; [all...] |
/external/wpa_supplicant_8/src/ap/ |
wpa_auth_i.h | 25 u8 initiator[ETH_ALEN]; member in struct:wpa_stsl_negotiation
|
/external/tcpdump/ |
print-isakmp.c | 98 cookie_t initiator; member in struct:__anon11694 162 /* find cookie from initiator cache */ 169 if (memcmp(in, &cookiecache[i].initiator, sizeof(*in)) == 0) 176 /* record initiator */ 240 memcpy(&cookiecache[ninitiator].initiator, in, sizeof(*in)); 247 cookie_sidecheck(int i, const u_char *bp2, int initiator) 286 if (initiator) { [all...] |
/external/chromium/third_party/libjingle/source/talk/session/tunnel/ |
pseudotcpchannel.cc | 147 if (session_->initiator()) {
|