Searched defs:peer (Results 1 - 25 of 37) sorted by relevance

12

/external/iptables/include/libipq/
H A Dlibipq.h58 struct sockaddr_nl peer; member in struct:ipq_handle
/external/iproute2/include/
H A Dlibnetlink.h15 struct sockaddr_nl peer; member in struct:rtnl_handle
46 extern int rtnl_talk(struct rtnl_handle *rtnl, struct nlmsghdr *n, pid_t peer,
/external/quake/quake/src/QW/qwfwd/
H A Dqwfwd.c67 typedef struct peer { struct
72 struct peer *next;
223 if (p == NULL) { // new peer
224 printf("peer %s:%d added", inet_ntoa(fsin.sin_addr), (int)ntohs(fsin.sin_port));
253 printf("peer %s:%d removed (timeout)", inet_ntoa(p->sin.sin_addr), (int)ntohs(p->sin.sin_port));
259 printf ("peer %s:%d removed (timeout)", inet_ntoa(p->sin.sin_addr), (int)ntohs(p->sin.sin_port));
/external/wpa_supplicant/
H A Dwpa_supplicant.h132 * STAKey negotiation. The caller will need to set peer address for the
244 u8 peer[ETH_ALEN]; member in struct:wpa_event_data::stkstart
H A Deap_sake_common.c2 * EAP server/peer: EAP-SAKE shared routines
315 * @peer: MIC calculation for 0 = Server, 1 = Peer message
325 int peer, const u8 *eap, size_t eap_len,
337 if (peer) {
373 peer ? "Peer MIC" : "Server MIC",
321 eap_sake_compute_mic(const u8 *tek_auth, const u8 *rand_s, const u8 *rand_p, const u8 *serverid, size_t serverid_len, const u8 *peerid, size_t peerid_len, int peer, const u8 *eap, size_t eap_len, const u8 *mic_pos, u8 *mic) argument
H A Dctrl_iface.c102 /* MLME-STKSTART.request(peer) */
106 u8 peer[ETH_ALEN]; local
108 if (hwaddr_aton(addr, peer)) {
110 "address '%s'", peer);
115 MAC2STR(peer));
117 return wpa_sm_stkstart(wpa_s->wpa, peer);
H A Dwpa.h141 int wpa_sm_stkstart(struct wpa_sm *sm, const u8 *peer);
259 static inline int wpa_sm_stkstart(struct wpa_sm *sm, const u8 *peer) argument
/external/ipsec-tools/
H A Dsetup.c352 const vchar_t *peer, int remoteid)
351 getsainfo(const vchar_t *src, const vchar_t *dst, const vchar_t *peer, int remoteid) argument
/external/openssl/apps/
H A Ds_cb.c662 struct sockaddr_in peer; local
675 /* Read peer information */
676 (void)BIO_dgram_get_peer(SSL_get_rbio(ssl), &peer); local
678 /* Create buffer with peer's address and port */
679 length = sizeof(peer.sin_addr);
680 length += sizeof(peer.sin_port);
689 memcpy(buffer, &peer.sin_addr, sizeof(peer.sin_addr));
690 memcpy(buffer + sizeof(peer.sin_addr), &peer
707 struct sockaddr_in peer; local
714 (void)BIO_dgram_get_peer(SSL_get_rbio(ssl), &peer); local
[all...]
/external/openssl/crypto/bio/
H A Dbss_bio.c57 * of this kind, handled by the same thread (i.e. the "peer" is actually
127 BIO *peer; /* NULL if buf == NULL. member in struct:bio_bio_st
128 * If peer != NULL, then peer->ptr is also a bio_bio_st,
129 * and its "peer" member points back to us.
130 * peer != NULL iff init != 0 in the BIO. */
132 /* This is for what we write (i.e. reading uses peer's struct): */
133 int closed; /* valid iff peer != NULL */
134 size_t len; /* valid iff buf != NULL; 0 if peer == NULL */
139 size_t request; /* valid iff peer !
[all...]
H A Dbss_dgram.c111 struct sockaddr peer; member in struct:bio_dgram_data_st
277 struct sockaddr peer; local
278 int peerlen = sizeof(peer);
283 memset(&peer, 0x00, peerlen);
290 ret=recvfrom(b->num,out,outl,0,&peer,(void *)&peerlen);
294 BIO_ctrl(b, BIO_CTRL_DGRAM_SET_PEER, 0, &peer);
319 ret=sendto(b->num, (char *)in, inl, 0, &data->peer, sizeof(data->peer));
321 ret=sendto(b->num, in, inl, 0, &data->peer, sizeof(data->peer));
[all...]
/external/qemu/
H A Dcharpipe.c75 struct CharPipeHalf* peer; /* NULL if closed */ member in struct:CharPipeHalf
91 ph->peer = NULL;
99 CharPipeHalf* peer = ph->peer; local
106 if (bip == NULL && peer != NULL && peer->cs->chr_read != NULL) {
107 /* no buffered data, try to write directly to the peer */
111 if (peer->cs->chr_can_read) {
112 size = qemu_chr_can_read( peer->cs );
121 qemu_chr_read( peer
158 CharPipeHalf* peer = ph->peer; local
297 CharDriverState* peer = cbuf->endpoint; local
348 CharDriverState* peer = cbuf->endpoint; local
[all...]
/external/webkit/WebCore/websockets/
H A DWorkerThreadableWebSocketChannel.cpp206 void WorkerThreadableWebSocketChannel::Bridge::setWebSocketChannel(ScriptExecutionContext* context, Bridge* thisPtr, Peer* peer, RefPtr<ThreadableWebSocketChannelClientWrapper> workerClientWrapper) argument
209 thisPtr->m_peer = peer;
218 Peer* peer = Peer::create(clientWrapper, thisPtr->m_loaderProxy, context, taskMode, url, protocol); local
219 thisPtr->m_loaderProxy.postTaskForModeToWorkerContext(createCallbackTask(&Bridge::setWebSocketChannel, thisPtr, peer, clientWrapper), taskMode);
241 void WorkerThreadableWebSocketChannel::mainThreadConnect(ScriptExecutionContext* context, Peer* peer) argument
245 ASSERT(peer);
247 peer->connect();
257 void WorkerThreadableWebSocketChannel::mainThreadSend(ScriptExecutionContext* context, Peer* peer, const String& message) argument
261 ASSERT(peer);
263 peer
278 mainThreadBufferedAmount(ScriptExecutionContext* context, Peer* peer) argument
301 mainThreadClose(ScriptExecutionContext* context, Peer* peer) argument
316 mainThreadDestroy(ScriptExecutionContext* context, Peer* peer) argument
329 Peer* peer = m_peer; local
[all...]
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
H A Deap_sake_common.c2 * EAP server/peer: EAP-SAKE shared routines
316 * @peer: MIC calculation for 0 = Server, 1 = Peer message
326 int peer, const u8 *eap, size_t eap_len,
338 if (peer) {
374 peer ? "Peer MIC" : "Server MIC",
322 eap_sake_compute_mic(const u8 *tek_auth, const u8 *rand_s, const u8 *rand_p, const u8 *serverid, size_t serverid_len, const u8 *peerid, size_t peerid_len, int peer, const u8 *eap, size_t eap_len, const u8 *mic_pos, u8 *mic) argument
/external/dnsmasq/src/
H A Dtftp.c46 struct sockaddr_in addr, peer; local
72 msg.msg_name = &peer;
73 msg.msg_namelen = sizeof(peer);
153 transfer->peer = peer;
194 len = tftp_err(ERR_ILL, packet, _("unsupported request from %s"), inet_ntoa(peer.sin_addr));
244 strncat(daemon->namebuff, inet_ntoa(peer.sin_addr), (MAXDNAME-1) - strlen(daemon->namebuff));
276 (struct sockaddr *)&peer, sizeof(peer)) == -1 && errno == EINTR);
282 my_syslog(MS_TFTP | LOG_INFO, _("TFTP sent %s to %s"), daemon->namebuff, inet_ntoa(peer
[all...]
/external/iproute2/lib/
H A Dlibnetlink.c273 int rtnl_talk(struct rtnl_handle *rtnl, struct nlmsghdr *n, pid_t peer, argument
296 nladdr.nl_pid = peer;
348 if (nladdr.nl_pid != peer ||
/external/mtpd/
H A Dpptp.c118 uint16_t peer; member in struct:packet::__anon2570::__anon2571::__anon2573::__anon2576
312 if (state == OCRQ && incoming.ocrp.peer == local) {
370 outgoing.icrp.peer = incoming.icrq.call;
379 outgoing.ocrp.peer = incoming.ocrq.call;
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/
H A Dpeerkey.c68 const u8 *peer,
79 if (peer)
101 if (peer) {
103 pos = wpa_add_kde(pos, RSN_KEY_DATA_MAC_ADDR, peer, ETH_ALEN);
111 if (peer) {
112 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK Error (peer "
114 MAC2STR(peer), mui, error_type);
564 "for SMK M4/M5: peer " MACSTR,
613 u8 peer[ETH_ALEN]; local
636 os_memcpy(peer, kd
67 wpa_supplicant_send_smk_error(struct wpa_sm *sm, const u8 *dst, const u8 *peer, u16 mui, u16 error_type, int ver) argument
1001 wpa_sm_stkstart(struct wpa_sm *sm, const u8 *peer) argument
[all...]
/external/wpa_supplicant_6/wpa_supplicant/src/wps/
H A Dwps_upnp_i.h156 /* FIX: maintain separate structures for each UPnP peer */
157 struct upnp_wps_peer peer; member in struct:upnp_wps_device_sm
/external/bluetooth/bluez/network/
H A Dconnection.c76 struct network_peer *peer; member in struct:network_conn
93 struct network_peer *peer = l->data; local
95 if (!strcmp(peer->path, path))
96 return peer;
156 emit_property_changed(connection, nc->peer->path,
159 emit_property_changed(connection, nc->peer->path,
162 emit_property_changed(connection, nc->peer->path,
165 device_remove_disconnect_watch(nc->peer->device, nc->dc_id);
210 bnep_kill_connection(&nc->peer->dst);
220 info("Network: disconnect %s", nc->peer
391 struct network_peer *peer = data; local
453 struct network_peer *peer = data; local
471 struct network_peer *peer = data; local
529 peer_free(struct network_peer *peer) argument
540 struct network_peer *peer = data; local
564 struct network_peer *peer; local
587 struct network_peer *peer; local
615 struct network_peer *peer; local
[all...]
/external/bluetooth/bluez/src/
H A Ddbus-hci.c444 void hcid_dbus_bonding_process_complete(bdaddr_t *local, bdaddr_t *peer, argument
452 if (!get_adapter_and_device(local, peer, &adapter, &device, TRUE))
468 void hcid_dbus_simple_pairing_complete(bdaddr_t *local, bdaddr_t *peer, argument
476 if (!get_adapter_and_device(local, peer, &adapter, &device, TRUE))
501 void hcid_dbus_inquiry_result(bdaddr_t *local, bdaddr_t *peer, uint32_t class, argument
515 ba2str(peer, peer_addr);
517 if (!get_adapter_and_device(local, peer, &adapter, &device, FALSE)) {
522 write_remote_class(local, peer, class);
525 write_remote_eir(local, peer, data);
541 bacpy(&match.bdaddr, peer);
594 hcid_dbus_remote_class(bdaddr_t *local, bdaddr_t *peer, uint32_t class) argument
618 hcid_dbus_remote_name(bdaddr_t *local, bdaddr_t *peer, uint8_t status, char *name) argument
663 hcid_dbus_link_key_notify(bdaddr_t *local, bdaddr_t *peer, uint8_t *key, uint8_t key_type, int pin_length, uint8_t old_key_type) argument
725 hcid_dbus_conn_complete(bdaddr_t *local, uint8_t status, uint16_t handle, bdaddr_t *peer) argument
[all...]
/external/iproute2/ip/
H A Dipaddress.c69 fprintf(stderr, "IFADDR := PREFIX | ADDR peer PREFIX\n");
269 fprintf(fp, " peer ");
460 fprintf(fp, " peer %s/%d ",
897 inet_prefix peer; local
915 if (strcmp(*argv, "peer") == 0 ||
920 duparg("peer", *argv);
921 get_prefix(&peer, *argv, req.ifa.ifa_family);
922 peer_len = peer.bytelen;
924 req.ifa.ifa_family = peer.family;
925 addattr_l(&req.n, sizeof(req), IFA_ADDRESS, &peer
[all...]
/external/netperf/
H A Dnettest_sctp.c2649 struct sockaddr_storage peer;
3704 struct sockaddr_storage peer;
4329 struct sockaddr_storage peeraddr; /* to communicate with peer */
2640 struct sockaddr_storage peer; local
3693 struct sockaddr_storage peer; local
/external/openssl/ssl/
H A Ds3_srvr.c407 ((s->session->peer != NULL) &&
2215 if (((clnt_pub_pkey=X509_get_pubkey(s->session->peer))
2334 X509 *peer; local
2345 if (s->session->peer != NULL)
2347 peer=s->session->peer;
2348 pkey=X509_get_pubkey(peer);
2349 type=X509_certificate_type(peer,pkey);
2353 peer=NULL;
2360 if ((peer !
[all...]
/external/wpa_supplicant_6/wpa_supplicant/
H A Dctrl_iface.c107 /* MLME-STKSTART.request(peer) */
111 u8 peer[ETH_ALEN]; local
113 if (hwaddr_aton(addr, peer)) {
115 "address '%s'", peer);
120 MAC2STR(peer));
122 return wpa_sm_stkstart(wpa_s->wpa, peer);

Completed in 270 milliseconds

12