Searched refs:initiator (Results 1 - 25 of 33) sorted by relevance

12

/freebsd-13-stable/contrib/wpa/src/eap_common/
H A Deap_ikev2_common.h26 int initiator, const struct wpabuf *msg,
H A Deap_ikev2_common.c69 int initiator, const struct wpabuf *msg,
75 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar;
68 eap_ikev2_validate_icv(int integ_alg, struct ikev2_keys *keys, int initiator, const struct wpabuf *msg, const u8 *pos, const u8 *end) argument
H A Dikev2_common.c2 * IKEv2 common routines for initiator and responder
371 struct ikev2_keys *keys, int initiator,
380 const u8 *SK_p = initiator ? keys->SK_pi : keys->SK_pr;
429 struct ikev2_keys *keys, int initiator,
440 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er;
441 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar;
531 int initiator, struct wpabuf *msg,
540 const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er;
541 const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar;
369 ikev2_derive_auth_data(int prf_alg, const struct wpabuf *sign_msg, const u8 *ID, size_t ID_len, u8 ID_type, struct ikev2_keys *keys, int initiator, const u8 *shared_secret, size_t shared_secret_len, const u8 *nonce, size_t nonce_len, const u8 *key_pad, size_t key_pad_len, u8 *auth_data) argument
428 ikev2_decrypt_payload(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, const struct ikev2_hdr *hdr, const u8 *encrypted, size_t encrypted_len, size_t *res_len) argument
530 ikev2_build_encrypted(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, struct wpabuf *msg, struct wpabuf *plain, u8 next_payload) argument
H A Dikev2_common.h288 struct ikev2_keys *keys, int initiator,
321 int initiator, const struct ikev2_hdr *hdr,
326 int initiator, struct wpabuf *msg,
/freebsd-13-stable/contrib/wpa/src/fst/
H A Dfst_ctrl_aux.h77 enum fst_initiator initiator; member in struct:fst_event_extra::fst_event_extra_session_state::fst_session_state_switch_extra::__anon6515
H A Dfst_ctrl_iface.c40 const char *initiator = FST_CTRL_PVAL_NONE; local
55 switch (ss->extra.to_initial.initiator) {
57 initiator = FST_CS_PVAL_INITIATOR_LOCAL;
60 initiator = FST_CS_PVAL_INITIATOR_REMOTE;
75 reject_str, initiator);
H A Dfst_session.c427 * a pending FST Setup Request frame addressed to the initiator
429 * the initiator���s MAC address, in which case, the responder
564 * The initiator shall set the STT to the value of the
572 evext.to_initial.initiator = FST_INITIATOR_REMOTE;
614 .initiator = FST_INITIATOR_REMOTE,
650 .initiator = FST_INITIATOR_REMOTE,
713 .initiator = FST_INITIATOR_LOCAL,
1018 .initiator = FST_INITIATOR_LOCAL,
1107 .initiator = FST_INITIATOR_LOCAL,
/freebsd-13-stable/usr.sbin/ctld/
H A Dtoken.l68 initiator-name { return INITIATOR_NAME; }
69 initiator-portal { return INITIATOR_PORTAL; }
/freebsd-13-stable/contrib/tcpdump/
H A Dprint-esp.c110 int initiator; member in struct:sa_list
186 int initiator,
197 /* initiator arg is any non-zero value */
198 if(initiator) initiator=1;
203 && initiator == sa->initiator
488 sa1.initiator = (init[0] == 'I');
185 esp_print_decrypt_buffer_by_ikev2(netdissect_options *ndo, int initiator, u_char spii[8], u_char spir[8], const u_char *buf, const u_char *end) argument
H A Dprint-isakmp.c654 cookie_t initiator; member in struct:__anon6185
763 /* find cookie from initiator cache */
770 if (memcmp(in, &cookiecache[i].initiator, sizeof(*in)) == 0)
777 /* record initiator */
807 UNALIGNED_MEMCPY(&cookiecache[ninitiator].initiator, in, sizeof(*in));
814 cookie_sidecheck(int i, const u_char *bp2, int initiator) argument
824 if (initiator) {
836 if (initiator) {
/freebsd-13-stable/contrib/wpa/src/rsn_supp/
H A Dtdls.c99 int initiator; /* whether this end was initiator for TDLS setup */ member in struct:wpa_tdls_peer
244 int initiator, const u8 *buf, size_t len)
247 status_code, peer_capab, initiator, buf,
254 int initiator, const u8 *msg, size_t msg_len)
259 "dialog_token=%u status_code=%u peer_capab=%u initiator=%d "
262 peer_capab, initiator, (unsigned int) msg_len);
265 status_code, peer_capab, initiator, msg,
361 peer->initiator,
489 /* 1) TDLS initiator ST
241 wpa_tdls_send_tpk_msg(struct wpa_sm *sm, const u8 *dst, u8 action_code, u8 dialog_token, u16 status_code, u32 peer_capab, int initiator, const u8 *buf, size_t len) argument
252 wpa_tdls_tpk_send(struct wpa_sm *sm, const u8 *dest, u8 action_code, u8 dialog_token, u16 status_code, u32 peer_capab, int initiator, const u8 *msg, size_t msg_len) argument
1020 wpa_tdls_send_error(struct wpa_sm *sm, const u8 *dst, u8 tdls_action, u8 dialog_token, int initiator, u16 status) argument
[all...]
H A Dwpa_i.h324 int initiator, const u8 *buf,
330 peer_capab, initiator, buf,
321 wpa_sm_send_tdls_mgmt(struct wpa_sm *sm, const u8 *dst, u8 action_code, u8 dialog_token, u16 status_code, u32 peer_capab, int initiator, const u8 *buf, size_t len) argument
H A Dwpa.h63 int initiator, const u8 *buf, size_t len);
/freebsd-13-stable/contrib/wpa/src/ap/
H A Ddpp_hostapd.c25 static void hostapd_dpp_auth_success(struct hostapd_data *hapd, int initiator);
101 "DPP: No confirm received from initiator - stopping exchange");
802 static void hostapd_dpp_auth_success(struct hostapd_data *hapd, int initiator) argument
806 initiator);
1213 if (!hapd->dpp_pkex || !hapd->dpp_pkex->initiator ||
1249 if (!pkex || pkex->initiator || !pkex->exchange_done) {
1298 if (!pkex || !pkex->initiator || !pkex->exchange_done) {
H A Dhostapd.h599 void hostapd_channel_list_updated(struct hostapd_iface *iface, int initiator);
/freebsd-13-stable/contrib/wpa/src/common/
H A Ddpp.h128 unsigned int initiator:1; member in struct:dpp_pkex
215 int initiator; member in struct:dpp_authentication
H A Ddpp.c2241 auth->initiator = 1;
2545 if (auth->initiator) {
2624 if (auth->initiator) {
3666 if (!auth->initiator || !auth->peer_bi) {
4060 if (auth->initiator || !auth->own_bi) {
7057 pkex->initiator = 1;
7615 if (pkex->failed || pkex->t >= PKEX_COUNTER_T_LIMIT || !pkex->initiator)
7925 pkex->t >= PKEX_COUNTER_T_LIMIT || pkex->initiator)
8088 pkex->t >= PKEX_COUNTER_T_LIMIT || !pkex->initiator)
8834 int initiator);
9001 dpp_controller_auth_success(struct dpp_connection *conn, int initiator) argument
[all...]
/freebsd-13-stable/sys/dev/ips/
H A Dipsreg.h339 u_int8_t initiator; member in struct:__anon12344
/freebsd-13-stable/contrib/wpa/wpa_supplicant/
H A Ddpp_supplicant.c34 static void wpas_dpp_auth_success(struct wpa_supplicant *wpa_s, int initiator);
127 wpa_printf(MSG_INFO, "DPP: No confirm received from initiator - stopping exchange");
1145 static void wpas_dpp_auth_success(struct wpa_supplicant *wpa_s, int initiator) argument
1148 wpa_msg(wpa_s, MSG_INFO, DPP_EVENT_AUTH_SUCCESS "init=%d", initiator);
1644 if (!wpa_s->dpp_pkex || !wpa_s->dpp_pkex->initiator ||
1701 if (!pkex || pkex->initiator || !pkex->exchange_done) {
1750 if (!pkex || !pkex->initiator || !pkex->exchange_done) {
H A Ddriver_i.h561 u32 peer_capab, int initiator,
568 initiator, buf, len);
558 wpa_drv_send_tdls_mgmt(struct wpa_supplicant *wpa_s, const u8 *dst, u8 action_code, u8 dialog_token, u16 status_code, u32 peer_capab, int initiator, const u8 *buf, size_t len) argument
H A Dwpas_glue.c710 int initiator, const u8 *buf,
715 status_code, peer_capab, initiator, buf,
707 wpa_supplicant_send_tdls_mgmt(void *ctx, const u8 *dst, u8 action_code, u8 dialog_token, u16 status_code, u32 peer_capab, int initiator, const u8 *buf, size_t len) argument
/freebsd-13-stable/usr.sbin/ctladm/
H A Dctladm.c237 int initiator, int argc, char **argv,
240 int initiator, int argc, char **argv,
243 static int cctl_inquiry_vpd_devid(int fd, int lun, int initiator);
244 static int cctl_report_target_port_group(int fd, int lun, int initiator);
2776 char *initiator; member in struct:cctl_islist_conn
2876 if (strcmp(name, "initiator") == 0) {
2877 cur_conn->initiator = str;
3024 printf("%-25s %s\n", "Initiator name:", conn->initiator);
3045 conn->connection_id, conn->initiator_addr, conn->initiator,
3611 if (strcmp(name, "initiator")
[all...]
/freebsd-13-stable/contrib/wpa/src/drivers/
H A Ddriver_nl80211_event.c2180 wpa_printf(MSG_DEBUG, " * initiator=%d", init);
2183 data.channel_list_changed.initiator = REGDOM_SET_BY_CORE;
2186 data.channel_list_changed.initiator = REGDOM_SET_BY_USER;
2189 data.channel_list_changed.initiator = REGDOM_SET_BY_DRIVER;
2192 data.channel_list_changed.initiator = REGDOM_SET_BY_COUNTRY_IE;
2267 data.channel_list_changed.initiator = REGDOM_BEACON_HINT;
H A Ddriver.h83 * enum reg_change_initiator - Regulatory change initiator
3388 * @initiator: Is the current end the TDLS link initiator
3398 int initiator, const u8 *buf, size_t len);
5533 * @initiator: Initiator of the regulatory change
5538 enum reg_change_initiator initiator; member in struct:wpa_event_data::channel_list_changed
/freebsd-13-stable/sys/dev/aic7xxx/
H A Daic7xxx.c1596 * until an initiator talks to us.
1674 * user. In the case of an initiator initiated
2276 * When an initiator transaction with the MK_MESSAGE flag either reconnects
2833 * If we interrupted a mesgout session, the initiator
2916 * The initiator signals that this is
2949 * XXX Read spec about initiator dropping ATN too soon
2974 * the initiator time to release the data
4860 * Default to allowing initiator operations.
4892 * the card's sequencer must be able to access. For initiator
4954 * initiator presenc
6029 u_int initiator, target, max_scsiid; local
7748 int initiator; local
[all...]

Completed in 402 milliseconds

12