HomeSort by relevance Sort by last modified time
    Searched refs:kay (Results 1 - 10 of 10) sorted by null

  /external/wpa_supplicant_8/src/pae/
ieee802_1x_secy_ops.h 21 int secy_init_macsec(struct ieee802_1x_kay *kay);
22 int secy_deinit_macsec(struct ieee802_1x_kay *kay);
25 int secy_cp_control_validate_frames(struct ieee802_1x_kay *kay,
27 int secy_cp_control_protect_frames(struct ieee802_1x_kay *kay, Boolean flag);
28 int secy_cp_control_replay(struct ieee802_1x_kay *kay, Boolean flag, u32 win);
29 int secy_cp_control_current_cipher_suite(struct ieee802_1x_kay *kay,
31 int secy_cp_control_confidentiality_offset(struct ieee802_1x_kay *kay,
33 int secy_cp_control_enable_port(struct ieee802_1x_kay *kay, Boolean flag);
35 /****** KaY -> SecY *******/
36 int secy_get_receive_lowest_pn(struct ieee802_1x_kay *kay,
    [all...]
ieee802_1x_secy_ops.c 20 int secy_cp_control_validate_frames(struct ieee802_1x_kay *kay,
23 kay->vf = vf;
28 int secy_cp_control_protect_frames(struct ieee802_1x_kay *kay, Boolean enabled)
32 if (!kay) {
33 wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__);
37 ops = kay->ctx;
40 "KaY: secy enable_protect_frames operation not supported");
48 int secy_cp_control_replay(struct ieee802_1x_kay *kay, Boolean enabled, u32 win)
52 if (!kay) {
53 wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__)
    [all...]
ieee802_1x_kay.c 252 ieee802_1x_kay_get_participant(struct ieee802_1x_kay *kay, const u8 *ckn)
256 dl_list_for_each(participant, &kay->participant_list,
263 wpa_printf(MSG_DEBUG, "KaY: participant is not found");
273 ieee802_1x_kay_get_principal_participant(struct ieee802_1x_kay *kay)
277 dl_list_for_each(participant, &kay->participant_list,
283 wpa_printf(MSG_DEBUG, "KaY: principal participant is not founded");
438 "KaY: Create receive SA(AN: %d lowest_pn: %u of SC(channel: %d)",
452 "KaY: Delete receive SA(an: %d) of SC(channel: %d)",
484 wpa_printf(MSG_DEBUG, "KaY: Create receive SC(channel: %d)", channel);
500 wpa_printf(MSG_DEBUG, "KaY: Delete receive SC(channel: %d)"
667 struct ieee802_1x_kay *kay = participant->kay; local
1950 struct ieee802_1x_kay *kay = participant->kay; local
2093 struct ieee802_1x_kay *kay = participant->kay; local
2203 struct ieee802_1x_kay *kay = participant->kay; local
2313 struct ieee802_1x_kay *kay = participant->kay; local
2353 struct ieee802_1x_kay *kay; local
3083 struct ieee802_1x_kay *kay = ctx; local
3130 struct ieee802_1x_kay *kay; local
    [all...]
ieee802_1x_cp.c 43 /* KaY -> CP */
57 /* CP -> KaY */
88 struct ieee802_1x_kay *kay; member in struct:ieee802_1x_cp_sm
116 secy_cp_control_enable_port(sm->kay, sm->controlled_port_enabled);
141 secy_cp_control_enable_port(sm->kay, sm->controlled_port_enabled);
144 ieee802_1x_kay_delete_sas(sm->kay, sm->lki);
146 ieee802_1x_kay_delete_sas(sm->kay, sm->oki);
161 secy_cp_control_enable_port(sm->kay, sm->controlled_port_enabled);
162 secy_cp_control_protect_frames(sm->kay, sm->protect_frames);
163 secy_cp_control_validate_frames(sm->kay, sm->validate_frames)
    [all...]
ieee802_1x_kay.h 160 void ieee802_1x_kay_deinit(struct ieee802_1x_kay *kay);
163 ieee802_1x_kay_create_mka(struct ieee802_1x_kay *kay,
167 void ieee802_1x_kay_delete_mka(struct ieee802_1x_kay *kay,
169 void ieee802_1x_kay_mka_participate(struct ieee802_1x_kay *kay,
172 int ieee802_1x_kay_new_sak(struct ieee802_1x_kay *kay);
173 int ieee802_1x_kay_change_cipher_suite(struct ieee802_1x_kay *kay,
176 int ieee802_1x_kay_set_latest_sa_attr(struct ieee802_1x_kay *kay,
179 int ieee802_1x_kay_set_old_sa_attr(struct ieee802_1x_kay *kay,
182 int ieee802_1x_kay_create_sas(struct ieee802_1x_kay *kay,
184 int ieee802_1x_kay_delete_sas(struct ieee802_1x_kay *kay,
    [all...]
ieee802_1x_cp.h 28 ieee802_1x_cp_sm_init(struct ieee802_1x_kay *kay,
ieee802_1x_kay_i.h 239 struct ieee802_1x_kay *kay; member in struct:ieee802_1x_mka_participant
  /external/clang/test/SemaCXX/
init-priority-attr.cpp 12 int kay( void ) { return k; }; function in class:Two
  /external/wpa_supplicant_8/wpa_supplicant/
wpas_kay.c 2 * IEEE 802.1X-2010 KaY Interface
233 wpa_s->kay = res;
241 if (!wpa_s->kay)
244 ieee802_1x_kay_deinit(wpa_s->kay);
245 wpa_s->kay = NULL;
314 if (!wpa_s->kay || wpa_s->kay->policy == DO_NOT_SECURE)
362 res = ieee802_1x_kay_create_mka(wpa_s->kay, ckn, cak, 0,
wpa_supplicant_i.h 963 struct ieee802_1x_kay *kay; member in struct:wpa_supplicant
    [all...]

Completed in 95 milliseconds