/freebsd-10.3-release/contrib/wpa/src/eap_common/ |
H A D | eap_ikev2_common.h | 33 int initiator, const struct wpabuf *msg,
|
H A D | eap_ikev2_common.c | 79 int initiator, const struct wpabuf *msg, 85 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar; 78 eap_ikev2_validate_icv(int integ_alg, struct ikev2_keys *keys, int initiator, const struct wpabuf *msg, const u8 *pos, const u8 *end) argument
|
H A D | ikev2_common.h | 292 struct ikev2_keys *keys, int initiator, 325 int initiator, const struct ikev2_hdr *hdr, 330 int initiator, struct wpabuf *msg,
|
H A D | ikev2_common.c | 2 * IKEv2 common routines for initiator and responder 433 struct ikev2_keys *keys, int initiator, 442 const u8 *SK_p = initiator ? keys->SK_pi : keys->SK_pr; 491 struct ikev2_keys *keys, int initiator, 502 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er; 503 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar; 593 int initiator, struct wpabuf *msg, 602 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er; 603 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar; 431 ikev2_derive_auth_data(int prf_alg, const struct wpabuf *sign_msg, const u8 *ID, size_t ID_len, u8 ID_type, struct ikev2_keys *keys, int initiator, const u8 *shared_secret, size_t shared_secret_len, const u8 *nonce, size_t nonce_len, const u8 *key_pad, size_t key_pad_len, u8 *auth_data) argument 490 ikev2_decrypt_payload(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, const struct ikev2_hdr *hdr, const u8 *encrypted, size_t encrypted_len, size_t *res_len) argument 592 ikev2_build_encrypted(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, struct wpabuf *msg, struct wpabuf *plain, u8 next_payload) argument
|
/freebsd-10.3-release/usr.sbin/ctld/ |
H A D | token.l | 64 initiator-name { return INITIATOR_NAME; } 65 initiator-portal { return INITIATOR_PORTAL; }
|
/freebsd-10.3-release/contrib/wpa/src/rsn_supp/ |
H A D | peerkey.h | 15 int initiator; /* whether this end was initator for SMK handshake */ member in struct:wpa_peerkey
|
H A D | peerkey.c | 206 wpa_printf(MSG_DEBUG, "RSN: SMK M2 - SMK initiator " MACSTR, 555 os_memcmp(peerkey->initiator ? peerkey->inonce : 567 if (peerkey->initiator) { 589 if (peerkey->initiator) { 941 if (peerkey->initiator && !peerkey->stk_set) { 1038 peerkey->initiator = 1;
|
H A D | tdls.c | 89 int initiator; /* whether this end was initiator for TDLS setup */ member in struct:wpa_tdls_peer 454 /* 1) TDLS initiator STA MAC address */ 610 if (peer->initiator) { 629 peer->initiator = 0; 647 if (peer->initiator) { 927 * FTIE: ANonce=0, SNonce=initiator nonce MIC=0, DataKDs=(RSNIE_I, 1018 "TDLS: Failed to get random data for initiator Nonce"); 1154 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime %u seconds from initiator", 1422 wpa_printf(MSG_DEBUG, "TDLS: TPK M1 - TPK initiator " MACST [all...] |
H A D | wpa.c | 1754 if (!peerkey->initiator && peerkey->replay_counter_set && 1761 } else if (peerkey->initiator) { 1777 if (peerkey && peerkey->initiator && (key_info & WPA_KEY_INFO_ACK)) { 1795 && (peerkey == NULL || !peerkey->initiator)
|
/freebsd-10.3-release/contrib/tcpdump/ |
H A D | print-esp.c | 75 int initiator; member in struct:sa_list 91 int initiator, 100 /* initiator arg is any non-zero value */ 101 if(initiator) initiator=1; 106 && initiator == sa->initiator 349 sa1.initiator = (init[0] == 'I'); 90 esp_print_decrypt_buffer_by_ikev2(netdissect_options *ndo, int initiator, u_char spii[8], u_char spir[8], u_char *buf, u_char *end) argument
|
H A D | netdissect.h | 510 int initiator,
|
H A D | print-isakmp.c | 135 cookie_t initiator; member in struct:__anon4694 243 /* find cookie from initiator cache */ 250 if (memcmp(in, &cookiecache[i].initiator, sizeof(*in)) == 0) 257 /* record initiator */ 321 memcpy(&cookiecache[ninitiator].initiator, in, sizeof(*in)); 328 cookie_sidecheck(int i, const u_char *bp2, int initiator) argument 367 if (initiator) {
|
/freebsd-10.3-release/sys/dev/aic/ |
H A D | aicvar.h | 86 u_int8_t initiator; member in struct:aic_softc
|
H A D | aic.c | 281 cpi->initiator_id = aic->initiator; 371 aic_outb(aic, SCSIID, aic->initiator << OID_S | scb->target); 440 selid = aic_inb(aic, SELID) & ~(1 << aic->initiator); 1355 aic_outb(aic, SCSIID, aic->initiator << OID_S); 1456 aic->initiator = PORTA_ID(porta); 1489 if (i == aic->initiator)
|
/freebsd-10.3-release/contrib/wpa/src/ap/ |
H A D | wpa_auth_i.h | 19 u8 initiator[ETH_ALEN]; member in struct:wpa_stsl_negotiation
|
/freebsd-10.3-release/sys/dev/cxgb/ulp/iw_cxgb/ |
H A D | iw_cxgb_provider.h | 119 u8 initiator; member in struct:iwch_mpa_attributes
|
H A D | iw_cxgb_cm.c | 694 ep->mpa_attr.initiator = 1; 851 ep->mpa_attr.initiator = 0;
|
/freebsd-10.3-release/sys/dev/ppbus/ |
H A D | immio.c | 473 imm_select(struct vpoio_data *vpo, int initiator, int target) argument 481 SELECT_TARGET, 1 << initiator | 1 << target);
|
H A D | vpoio.c | 471 vpoio_select(struct vpoio_data *vpo, int initiator, int target) argument 501 SELECT_INITIATOR, 1 << initiator);
|
/freebsd-10.3-release/sys/dev/ips/ |
H A D | ipsreg.h | 337 u_int8_t initiator; member in struct:__anon9060
|
/freebsd-10.3-release/usr.sbin/ctladm/ |
H A D | ctladm.c | 233 int initiator, int argc, char **argv, 236 int initiator, int argc, char **argv, 239 static int cctl_inquiry_vpd_devid(int fd, int lun, int initiator); 240 static int cctl_report_target_port_group(int fd, int lun, int initiator); 2790 char *initiator; member in struct:cctl_islist_conn 2886 if (strcmp(name, "initiator") == 0) { 2887 cur_conn->initiator = str; 3022 printf("Initiator name: %s\n", conn->initiator); 3039 conn->connection_id, conn->initiator_addr, conn->initiator, 3605 if (strcmp(name, "initiator") [all...] |
/freebsd-10.3-release/sys/dev/aic7xxx/ |
H A D | aic7xxx.c | 1598 * until an initiator talks to us. 1676 * user. In the case of an initiator initiated 2283 * When an initiator transaction with the MK_MESSAGE flag either reconnects 2842 * If we interrupted a mesgout session, the initiator 2926 * The initiator signals that this is 2959 * XXX Read spec about initiator dropping ATN too soon 2984 * the initiator time to release the data 4885 * Default to allowing initiator operations. 4917 * the card's sequencer must be able to access. For initiator 4979 * initiator presenc 6058 u_int initiator, target, max_scsiid; local 7789 int initiator; local [all...] |
H A D | aic79xx.c | 1910 * after our "initiator detected error" message is 2839 * until an initiator talks to us. 2907 * user. In the case of an initiator initiated 3575 * When an initiator transaction with the MK_MESSAGE flag either reconnects 4106 * If we interrupted a mesgout session, the initiator 4161 * The initiator signals that this is 4187 * XXX Read spec about initiator dropping ATN too soon 6341 * Default to allowing initiator operations. 6373 * the card's sequencer must be able to access. For initiator 6877 * initiator presenc 7952 u_int initiator; local 10292 int initiator; local [all...] |
/freebsd-10.3-release/sys/dev/cxgbe/iw_cxgbe/ |
H A D | iw_cxgbe.h | 390 u8 initiator; member in struct:c4iw_mpa_attributes
|
H A D | cm.c | 1043 ep->mpa_attr.initiator = 1; 1638 * If responder's RTR does not match with that of initiator, assign 1673 * If responder's RTR requirement did not match with what initiator 1690 * Generate TERM if initiator IRD is not sufficient for responder 1693 * initiator ORD. 1806 ep->mpa_attr.initiator = 0;
|