/external/wpa_supplicant_8/src/pae/ |
ieee802_1x_secy_ops.h | 17 int secy_init_macsec(struct ieee802_1x_kay *kay); 18 int secy_deinit_macsec(struct ieee802_1x_kay *kay); 21 int secy_cp_control_validate_frames(struct ieee802_1x_kay *kay, 23 int secy_cp_control_protect_frames(struct ieee802_1x_kay *kay, Boolean flag); 24 int secy_cp_control_encrypt(struct ieee802_1x_kay *kay, Boolean enabled); 25 int secy_cp_control_replay(struct ieee802_1x_kay *kay, Boolean flag, u32 win); 26 int secy_cp_control_current_cipher_suite(struct ieee802_1x_kay *kay, u64 cs); 27 int secy_cp_control_confidentiality_offset(struct ieee802_1x_kay *kay, 29 int secy_cp_control_enable_port(struct ieee802_1x_kay *kay, Boolean flag); 31 /****** KaY -> SecY ******* [all...] |
ieee802_1x_secy_ops.c | 20 int secy_cp_control_validate_frames(struct ieee802_1x_kay *kay, 23 kay->vf = vf; 28 int secy_cp_control_protect_frames(struct ieee802_1x_kay *kay, Boolean enabled) 32 if (!kay) { 33 wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__); 37 ops = kay->ctx; 40 "KaY: secy enable_protect_frames operation not supported"); 48 int secy_cp_control_encrypt(struct ieee802_1x_kay *kay, Boolean enabled) 52 if (!kay) { 53 wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__) [all...] |
ieee802_1x_kay.c | 248 ieee802_1x_kay_get_participant(struct ieee802_1x_kay *kay, const u8 *ckn) 252 dl_list_for_each(participant, &kay->participant_list, 259 wpa_printf(MSG_DEBUG, "KaY: participant is not found"); 269 ieee802_1x_kay_get_principal_participant(struct ieee802_1x_kay *kay) 273 dl_list_for_each(participant, &kay->participant_list, 279 wpa_printf(MSG_DEBUG, "KaY: principal participant is not found"); 457 "KaY: Create receive SA(AN: %hhu lowest_pn: %u of SC", 474 "KaY: Delete receive SA(an: %hhu) of SC", 504 wpa_printf(MSG_DEBUG, "KaY: Create receive SC"); 511 static void ieee802_1x_delete_receive_sa(struct ieee802_1x_kay *kay, 693 struct ieee802_1x_kay *kay = participant->kay; local 1173 struct ieee802_1x_kay *kay = participant->kay; local 1262 struct ieee802_1x_kay *kay = participant->kay; local 1514 struct ieee802_1x_kay *kay = participant->kay; local 1929 struct ieee802_1x_kay *kay = participant->kay; local 2078 struct ieee802_1x_kay *kay = participant->kay; local 2167 struct ieee802_1x_kay *kay = participant->kay; local 2277 struct ieee802_1x_kay *kay = participant->kay; local 2327 struct ieee802_1x_kay *kay; local 3048 struct ieee802_1x_kay *kay = ctx; local 3095 struct ieee802_1x_kay *kay; local [all...] |
ieee802_1x_cp.c | 43 /* KaY -> CP */ 57 /* CP -> KaY */ 88 struct ieee802_1x_kay *kay; member in struct:ieee802_1x_cp_sm 115 secy_cp_control_enable_port(sm->kay, sm->controlled_port_enabled); 140 secy_cp_control_enable_port(sm->kay, sm->controlled_port_enabled); 143 ieee802_1x_kay_delete_sas(sm->kay, sm->lki); 145 ieee802_1x_kay_delete_sas(sm->kay, sm->oki); 160 secy_cp_control_enable_port(sm->kay, sm->controlled_port_enabled); 161 secy_cp_control_protect_frames(sm->kay, sm->protect_frames); 162 secy_cp_control_encrypt(sm->kay, sm->kay->macsec_encrypt) [all...] |
ieee802_1x_kay.h | 240 void ieee802_1x_kay_deinit(struct ieee802_1x_kay *kay); 243 ieee802_1x_kay_create_mka(struct ieee802_1x_kay *kay, 247 void ieee802_1x_kay_delete_mka(struct ieee802_1x_kay *kay, 249 void ieee802_1x_kay_mka_participate(struct ieee802_1x_kay *kay, 252 int ieee802_1x_kay_new_sak(struct ieee802_1x_kay *kay); 253 int ieee802_1x_kay_change_cipher_suite(struct ieee802_1x_kay *kay, 256 int ieee802_1x_kay_set_latest_sa_attr(struct ieee802_1x_kay *kay, 259 int ieee802_1x_kay_set_old_sa_attr(struct ieee802_1x_kay *kay, 262 int ieee802_1x_kay_create_sas(struct ieee802_1x_kay *kay, 264 int ieee802_1x_kay_delete_sas(struct ieee802_1x_kay *kay, [all...] |
ieee802_1x_cp.h | 19 struct ieee802_1x_cp_sm * ieee802_1x_cp_sm_init(struct ieee802_1x_kay *kay);
|
ieee802_1x_kay_i.h | 148 struct ieee802_1x_kay *kay; member in struct:ieee802_1x_mka_participant
|
/external/wpa_supplicant_8/wpa_supplicant/ |
wpas_kay.c | 2 * IEEE 802.1X-2010 KaY Interface 243 wpa_s->kay = res; 251 if (!wpa_s->kay) 254 ieee802_1x_kay_deinit(wpa_s->kay); 255 wpa_s->kay = NULL; 324 if (!wpa_s->kay || wpa_s->kay->policy == DO_NOT_SECURE) 372 res = ieee802_1x_kay_create_mka(wpa_s->kay, ckn, cak, 0, 404 if (!wpa_s->kay || wpa_s->kay->policy == DO_NOT_SECURE [all...] |
wpa_supplicant_i.h | 996 struct ieee802_1x_kay *kay; member in struct:wpa_supplicant [all...] |
ctrl_iface.c | [all...] |
/external/clang/test/SemaCXX/ |
init-priority-attr.cpp | 12 int kay( void ) { return k; }; function in class:Two
|
/external/linux-kselftest/ |
.mailmap | 87 Kay Sievers <kay.sievers@vrfy.org>
|