/freebsd-13-stable/contrib/wpa/src/eap_common/ |
H A D | eap_ikev2_common.h | 26 int initiator, const struct wpabuf *msg,
|
H A D | eap_ikev2_common.c | 69 int initiator, const struct wpabuf *msg, 75 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar; 68 eap_ikev2_validate_icv(int integ_alg, struct ikev2_keys *keys, int initiator, const struct wpabuf *msg, const u8 *pos, const u8 *end) argument
|
H A D | ikev2_common.c | 2 * IKEv2 common routines for initiator and responder 371 struct ikev2_keys *keys, int initiator, 380 const u8 *SK_p = initiator ? keys->SK_pi : keys->SK_pr; 429 struct ikev2_keys *keys, int initiator, 440 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er; 441 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar; 531 int initiator, struct wpabuf *msg, 540 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er; 541 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar; 369 ikev2_derive_auth_data(int prf_alg, const struct wpabuf *sign_msg, const u8 *ID, size_t ID_len, u8 ID_type, struct ikev2_keys *keys, int initiator, const u8 *shared_secret, size_t shared_secret_len, const u8 *nonce, size_t nonce_len, const u8 *key_pad, size_t key_pad_len, u8 *auth_data) argument 428 ikev2_decrypt_payload(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, const struct ikev2_hdr *hdr, const u8 *encrypted, size_t encrypted_len, size_t *res_len) argument 530 ikev2_build_encrypted(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, struct wpabuf *msg, struct wpabuf *plain, u8 next_payload) argument
|
H A D | ikev2_common.h | 288 struct ikev2_keys *keys, int initiator, 321 int initiator, const struct ikev2_hdr *hdr, 326 int initiator, struct wpabuf *msg,
|
/freebsd-13-stable/contrib/wpa/src/fst/ |
H A D | fst_ctrl_aux.h | 77 enum fst_initiator initiator; member in struct:fst_event_extra::fst_event_extra_session_state::fst_session_state_switch_extra::__anon6515
|
H A D | fst_ctrl_iface.c | 40 const char *initiator = FST_CTRL_PVAL_NONE; local 55 switch (ss->extra.to_initial.initiator) { 57 initiator = FST_CS_PVAL_INITIATOR_LOCAL; 60 initiator = FST_CS_PVAL_INITIATOR_REMOTE; 75 reject_str, initiator);
|
H A D | fst_session.c | 427 * a pending FST Setup Request frame addressed to the initiator 429 * the initiator���s MAC address, in which case, the responder 564 * The initiator shall set the STT to the value of the 572 evext.to_initial.initiator = FST_INITIATOR_REMOTE; 614 .initiator = FST_INITIATOR_REMOTE, 650 .initiator = FST_INITIATOR_REMOTE, 713 .initiator = FST_INITIATOR_LOCAL, 1018 .initiator = FST_INITIATOR_LOCAL, 1107 .initiator = FST_INITIATOR_LOCAL,
|
/freebsd-13-stable/usr.sbin/ctld/ |
H A D | token.l | 68 initiator-name { return INITIATOR_NAME; } 69 initiator-portal { return INITIATOR_PORTAL; }
|
/freebsd-13-stable/contrib/tcpdump/ |
H A D | print-esp.c | 110 int initiator; member in struct:sa_list 186 int initiator, 197 /* initiator arg is any non-zero value */ 198 if(initiator) initiator=1; 203 && initiator == sa->initiator 488 sa1.initiator = (init[0] == 'I'); 185 esp_print_decrypt_buffer_by_ikev2(netdissect_options *ndo, int initiator, u_char spii[8], u_char spir[8], const u_char *buf, const u_char *end) argument
|
H A D | print-isakmp.c | 654 cookie_t initiator; member in struct:__anon6185 763 /* find cookie from initiator cache */ 770 if (memcmp(in, &cookiecache[i].initiator, sizeof(*in)) == 0) 777 /* record initiator */ 807 UNALIGNED_MEMCPY(&cookiecache[ninitiator].initiator, in, sizeof(*in)); 814 cookie_sidecheck(int i, const u_char *bp2, int initiator) argument 824 if (initiator) { 836 if (initiator) {
|
/freebsd-13-stable/contrib/wpa/src/rsn_supp/ |
H A D | tdls.c | 99 int initiator; /* whether this end was initiator for TDLS setup */ member in struct:wpa_tdls_peer 244 int initiator, const u8 *buf, size_t len) 247 status_code, peer_capab, initiator, buf, 254 int initiator, const u8 *msg, size_t msg_len) 259 "dialog_token=%u status_code=%u peer_capab=%u initiator=%d " 262 peer_capab, initiator, (unsigned int) msg_len); 265 status_code, peer_capab, initiator, msg, 361 peer->initiator, 489 /* 1) TDLS initiator ST 241 wpa_tdls_send_tpk_msg(struct wpa_sm *sm, const u8 *dst, u8 action_code, u8 dialog_token, u16 status_code, u32 peer_capab, int initiator, const u8 *buf, size_t len) argument 252 wpa_tdls_tpk_send(struct wpa_sm *sm, const u8 *dest, u8 action_code, u8 dialog_token, u16 status_code, u32 peer_capab, int initiator, const u8 *msg, size_t msg_len) argument 1020 wpa_tdls_send_error(struct wpa_sm *sm, const u8 *dst, u8 tdls_action, u8 dialog_token, int initiator, u16 status) argument [all...] |
H A D | wpa_i.h | 324 int initiator, const u8 *buf, 330 peer_capab, initiator, buf, 321 wpa_sm_send_tdls_mgmt(struct wpa_sm *sm, const u8 *dst, u8 action_code, u8 dialog_token, u16 status_code, u32 peer_capab, int initiator, const u8 *buf, size_t len) argument
|
H A D | wpa.h | 63 int initiator, const u8 *buf, size_t len);
|
/freebsd-13-stable/contrib/wpa/src/ap/ |
H A D | dpp_hostapd.c | 25 static void hostapd_dpp_auth_success(struct hostapd_data *hapd, int initiator); 101 "DPP: No confirm received from initiator - stopping exchange"); 802 static void hostapd_dpp_auth_success(struct hostapd_data *hapd, int initiator) argument 806 initiator); 1213 if (!hapd->dpp_pkex || !hapd->dpp_pkex->initiator || 1249 if (!pkex || pkex->initiator || !pkex->exchange_done) { 1298 if (!pkex || !pkex->initiator || !pkex->exchange_done) {
|
H A D | hostapd.h | 599 void hostapd_channel_list_updated(struct hostapd_iface *iface, int initiator);
|
/freebsd-13-stable/contrib/wpa/src/common/ |
H A D | dpp.h | 128 unsigned int initiator:1; member in struct:dpp_pkex 215 int initiator; member in struct:dpp_authentication
|
H A D | dpp.c | 2241 auth->initiator = 1; 2545 if (auth->initiator) { 2624 if (auth->initiator) { 3666 if (!auth->initiator || !auth->peer_bi) { 4060 if (auth->initiator || !auth->own_bi) { 7057 pkex->initiator = 1; 7615 if (pkex->failed || pkex->t >= PKEX_COUNTER_T_LIMIT || !pkex->initiator) 7925 pkex->t >= PKEX_COUNTER_T_LIMIT || pkex->initiator) 8088 pkex->t >= PKEX_COUNTER_T_LIMIT || !pkex->initiator) 8834 int initiator); 9001 dpp_controller_auth_success(struct dpp_connection *conn, int initiator) argument [all...] |
/freebsd-13-stable/sys/dev/ips/ |
H A D | ipsreg.h | 339 u_int8_t initiator; member in struct:__anon12344
|
/freebsd-13-stable/contrib/wpa/wpa_supplicant/ |
H A D | dpp_supplicant.c | 34 static void wpas_dpp_auth_success(struct wpa_supplicant *wpa_s, int initiator); 127 wpa_printf(MSG_INFO, "DPP: No confirm received from initiator - stopping exchange"); 1145 static void wpas_dpp_auth_success(struct wpa_supplicant *wpa_s, int initiator) argument 1148 wpa_msg(wpa_s, MSG_INFO, DPP_EVENT_AUTH_SUCCESS "init=%d", initiator); 1644 if (!wpa_s->dpp_pkex || !wpa_s->dpp_pkex->initiator || 1701 if (!pkex || pkex->initiator || !pkex->exchange_done) { 1750 if (!pkex || !pkex->initiator || !pkex->exchange_done) {
|
H A D | driver_i.h | 561 u32 peer_capab, int initiator, 568 initiator, buf, len); 558 wpa_drv_send_tdls_mgmt(struct wpa_supplicant *wpa_s, const u8 *dst, u8 action_code, u8 dialog_token, u16 status_code, u32 peer_capab, int initiator, const u8 *buf, size_t len) argument
|
H A D | wpas_glue.c | 710 int initiator, const u8 *buf, 715 status_code, peer_capab, initiator, buf, 707 wpa_supplicant_send_tdls_mgmt(void *ctx, const u8 *dst, u8 action_code, u8 dialog_token, u16 status_code, u32 peer_capab, int initiator, const u8 *buf, size_t len) argument
|
/freebsd-13-stable/usr.sbin/ctladm/ |
H A D | ctladm.c | 237 int initiator, int argc, char **argv, 240 int initiator, int argc, char **argv, 243 static int cctl_inquiry_vpd_devid(int fd, int lun, int initiator); 244 static int cctl_report_target_port_group(int fd, int lun, int initiator); 2776 char *initiator; member in struct:cctl_islist_conn 2876 if (strcmp(name, "initiator") == 0) { 2877 cur_conn->initiator = str; 3024 printf("%-25s %s\n", "Initiator name:", conn->initiator); 3045 conn->connection_id, conn->initiator_addr, conn->initiator, 3611 if (strcmp(name, "initiator") [all...] |
/freebsd-13-stable/contrib/wpa/src/drivers/ |
H A D | driver_nl80211_event.c | 2180 wpa_printf(MSG_DEBUG, " * initiator=%d", init); 2183 data.channel_list_changed.initiator = REGDOM_SET_BY_CORE; 2186 data.channel_list_changed.initiator = REGDOM_SET_BY_USER; 2189 data.channel_list_changed.initiator = REGDOM_SET_BY_DRIVER; 2192 data.channel_list_changed.initiator = REGDOM_SET_BY_COUNTRY_IE; 2267 data.channel_list_changed.initiator = REGDOM_BEACON_HINT;
|
H A D | driver.h | 83 * enum reg_change_initiator - Regulatory change initiator 3388 * @initiator: Is the current end the TDLS link initiator 3398 int initiator, const u8 *buf, size_t len); 5533 * @initiator: Initiator of the regulatory change 5538 enum reg_change_initiator initiator; member in struct:wpa_event_data::channel_list_changed
|
/freebsd-13-stable/sys/dev/aic7xxx/ |
H A D | aic7xxx.c | 1596 * until an initiator talks to us. 1674 * user. In the case of an initiator initiated 2276 * When an initiator transaction with the MK_MESSAGE flag either reconnects 2833 * If we interrupted a mesgout session, the initiator 2916 * The initiator signals that this is 2949 * XXX Read spec about initiator dropping ATN too soon 2974 * the initiator time to release the data 4860 * Default to allowing initiator operations. 4892 * the card's sequencer must be able to access. For initiator 4954 * initiator presenc 6029 u_int initiator, target, max_scsiid; local 7748 int initiator; local [all...] |