| /src/external/bsd/iscsi/dist/include/ |
| target.h | 84 char initiator[MAX_INITIATOR_ADDRESS_SIZE]; member in struct:target_session_t
|
| /src/external/bsd/wpa/dist/src/fst/ |
| fst_ctrl_aux.h | 77 enum fst_initiator initiator; member in struct:fst_event_extra::fst_event_extra_session_state::fst_session_state_switch_extra::__anon8461
|
| fst_ctrl_iface.c | 40 const char *initiator = FST_CTRL_PVAL_NONE; local 55 switch (ss->extra.to_initial.initiator) { 57 initiator = FST_CS_PVAL_INITIATOR_LOCAL; 60 initiator = FST_CS_PVAL_INITIATOR_REMOTE; 75 reject_str, initiator);
|
| /src/external/bsd/tcpdump/dist/ |
| print-esp.c | 109 int initiator; member in struct:sa_list 280 int initiator, 291 /* initiator arg is any non-zero value */ 292 if(initiator) initiator=1; 297 && initiator == sa->initiator 562 sa1.initiator = (init[0] == 'I');
|
| print-isakmp.c | 64 ! Initiator ! 78 cookie_t i_ck; /* Initiator Cookie */ 640 cookie_t initiator; member in struct:__anon8063 751 /* find cookie from initiator cache */ 758 if (memcmp(in, &cookiecache[i].initiator, sizeof(*in)) == 0) 765 /* record initiator */ 799 UNALIGNED_MEMCPY(&cookiecache[ninitiator].initiator, in, sizeof(*in)); 806 cookie_sidecheck(netdissect_options *ndo, int i, const u_char *bp2, int initiator) 816 if (initiator) { 828 if (initiator) { [all...] |
| /src/external/bsd/wpa/dist/src/rsn_supp/ |
| tdls.c | 58 u8 Snonce[WPA_NONCE_LEN]; /* Initiator Nonce in TDLS */ 99 int initiator; /* whether this end was initiator for TDLS setup */ member in struct:wpa_tdls_peer 101 u8 inonce[WPA_NONCE_LEN]; /* Initiator Nonce */ 103 u8 rsnie_i[TDLS_MAX_IE_LEN]; /* Initiator RSN IE */ 262 int initiator, const u8 *buf, size_t len, 266 status_code, peer_capab, initiator, buf, 273 int initiator, const u8 *msg, size_t msg_len, 279 "dialog_token=%u status_code=%u peer_capab=%u initiator=%d " 282 peer_capab, initiator, (unsigned int) msg_len) [all...] |
| /src/sys/dev/ic/ |
| aic79xx.c | 1841 * after our "initiator detected error" message is 2715 * until an initiator talks to us. 2783 * user. In the case of an initiator initiated 3443 * When an initiator transaction with the MK_MESSAGE flag either reconnects 3970 * If we interrupted a mesgout session, the initiator 4025 * The initiator signals that this is 4051 * XXX Read spec about initiator dropping ATN too soon 4457 printf("(%s:%c:%d:%d): Initiator " 6034 * Default to allowing initiator operations. 6046 * the card's sequencer must be able to access. For initiator 7582 u_int initiator; local 9628 int initiator; local [all...] |
| aic7xxx.c | 1582 * until an initiator talks to us. 1660 * user. In the case of an initiator initiated 2265 * When an initiator transaction with the MK_MESSAGE flag either reconnects 2817 * If we interrupted a mesgout session, the initiator 2867 * The initiator signals that this is 2893 * XXX Read spec about initiator dropping ATN too soon 3290 printf("(%s:%c:%d:%d): Initiator " 4480 * Default to allowing initiator operations. 4492 * the card's sequencer must be able to access. For initiator 4544 * initiator presence on the bus as well as the use 5912 u_int initiator, target, max_scsiid; local 7269 int initiator; local [all...] |
| /src/sys/dev/pci/ |
| ips.c | 330 u_int8_t initiator; member in struct:ips_conf::ips_dev
|
| /src/external/bsd/wpa/dist/src/common/ |
| dpp.h | 204 unsigned int initiator:1; member in struct:dpp_pkex 331 int initiator; member in struct:dpp_authentication 823 void dpp_notify_auth_success(struct dpp_authentication *auth, int initiator);
|
| /src/external/bsd/wpa/dist/src/drivers/ |
| driver.h | 74 * enum reg_change_initiator - Regulatory change initiator 4207 * @initiator: Is the current end the TDLS link initiator 4219 int initiator, const u8 *buf, size_t len, 6650 * @initiator: Initiator of the regulatory change 6654 * event if initiator == REGDOM_BEACON_HINT 6656 * event if initiator == REGDOM_BEACON_HINT 6659 enum reg_change_initiator initiator; member in struct:wpa_event_data::channel_list_changed
|