/external/iptables/include/libipq/ |
H A D | libipq.h | 58 struct sockaddr_nl peer; member in struct:ipq_handle
|
/external/iproute2/include/ |
H A D | libnetlink.h | 15 struct sockaddr_nl peer; member in struct:rtnl_handle 46 extern int rtnl_talk(struct rtnl_handle *rtnl, struct nlmsghdr *n, pid_t peer,
|
/external/quake/quake/src/QW/qwfwd/ |
H A D | qwfwd.c | 67 typedef struct peer {
struct 72 struct peer *next;
223 if (p == NULL) { // new peer
224 printf("peer %s:%d added", inet_ntoa(fsin.sin_addr), (int)ntohs(fsin.sin_port));
253 printf("peer %s:%d removed (timeout)", inet_ntoa(p->sin.sin_addr), (int)ntohs(p->sin.sin_port));
259 printf ("peer %s:%d removed (timeout)", inet_ntoa(p->sin.sin_addr), (int)ntohs(p->sin.sin_port));
|
/external/wpa_supplicant/ |
H A D | wpa_supplicant.h | 132 * STAKey negotiation. The caller will need to set peer address for the 244 u8 peer[ETH_ALEN]; member in struct:wpa_event_data::stkstart
|
H A D | eap_sake_common.c | 2 * EAP server/peer: EAP-SAKE shared routines 315 * @peer: MIC calculation for 0 = Server, 1 = Peer message 325 int peer, const u8 *eap, size_t eap_len, 337 if (peer) { 373 peer ? "Peer MIC" : "Server MIC", 321 eap_sake_compute_mic(const u8 *tek_auth, const u8 *rand_s, const u8 *rand_p, const u8 *serverid, size_t serverid_len, const u8 *peerid, size_t peerid_len, int peer, const u8 *eap, size_t eap_len, const u8 *mic_pos, u8 *mic) argument
|
H A D | ctrl_iface.c | 102 /* MLME-STKSTART.request(peer) */ 106 u8 peer[ETH_ALEN]; local 108 if (hwaddr_aton(addr, peer)) { 110 "address '%s'", peer); 115 MAC2STR(peer)); 117 return wpa_sm_stkstart(wpa_s->wpa, peer);
|
H A D | wpa.h | 141 int wpa_sm_stkstart(struct wpa_sm *sm, const u8 *peer); 259 static inline int wpa_sm_stkstart(struct wpa_sm *sm, const u8 *peer) argument
|
/external/ipsec-tools/ |
H A D | setup.c | 352 const vchar_t *peer, int remoteid) 351 getsainfo(const vchar_t *src, const vchar_t *dst, const vchar_t *peer, int remoteid) argument
|
/external/openssl/apps/ |
H A D | s_cb.c | 662 struct sockaddr_in peer; local 675 /* Read peer information */ 676 (void)BIO_dgram_get_peer(SSL_get_rbio(ssl), &peer); local 678 /* Create buffer with peer's address and port */ 679 length = sizeof(peer.sin_addr); 680 length += sizeof(peer.sin_port); 689 memcpy(buffer, &peer.sin_addr, sizeof(peer.sin_addr)); 690 memcpy(buffer + sizeof(peer.sin_addr), &peer 707 struct sockaddr_in peer; local 714 (void)BIO_dgram_get_peer(SSL_get_rbio(ssl), &peer); local [all...] |
/external/openssl/crypto/bio/ |
H A D | bss_bio.c | 57 * of this kind, handled by the same thread (i.e. the "peer" is actually 127 BIO *peer; /* NULL if buf == NULL. member in struct:bio_bio_st 128 * If peer != NULL, then peer->ptr is also a bio_bio_st, 129 * and its "peer" member points back to us. 130 * peer != NULL iff init != 0 in the BIO. */ 132 /* This is for what we write (i.e. reading uses peer's struct): */ 133 int closed; /* valid iff peer != NULL */ 134 size_t len; /* valid iff buf != NULL; 0 if peer == NULL */ 139 size_t request; /* valid iff peer ! [all...] |
H A D | bss_dgram.c | 111 struct sockaddr peer; member in struct:bio_dgram_data_st 277 struct sockaddr peer; local 278 int peerlen = sizeof(peer); 283 memset(&peer, 0x00, peerlen); 290 ret=recvfrom(b->num,out,outl,0,&peer,(void *)&peerlen); 294 BIO_ctrl(b, BIO_CTRL_DGRAM_SET_PEER, 0, &peer); 319 ret=sendto(b->num, (char *)in, inl, 0, &data->peer, sizeof(data->peer)); 321 ret=sendto(b->num, in, inl, 0, &data->peer, sizeof(data->peer)); [all...] |
/external/qemu/ |
H A D | charpipe.c | 75 struct CharPipeHalf* peer; /* NULL if closed */ member in struct:CharPipeHalf 91 ph->peer = NULL; 99 CharPipeHalf* peer = ph->peer; local 106 if (bip == NULL && peer != NULL && peer->cs->chr_read != NULL) { 107 /* no buffered data, try to write directly to the peer */ 111 if (peer->cs->chr_can_read) { 112 size = qemu_chr_can_read( peer->cs ); 121 qemu_chr_read( peer 158 CharPipeHalf* peer = ph->peer; local 297 CharDriverState* peer = cbuf->endpoint; local 348 CharDriverState* peer = cbuf->endpoint; local [all...] |
/external/webkit/WebCore/websockets/ |
H A D | WorkerThreadableWebSocketChannel.cpp | 206 void WorkerThreadableWebSocketChannel::Bridge::setWebSocketChannel(ScriptExecutionContext* context, Bridge* thisPtr, Peer* peer, RefPtr<ThreadableWebSocketChannelClientWrapper> workerClientWrapper) argument 209 thisPtr->m_peer = peer; 218 Peer* peer = Peer::create(clientWrapper, thisPtr->m_loaderProxy, context, taskMode, url, protocol); local 219 thisPtr->m_loaderProxy.postTaskForModeToWorkerContext(createCallbackTask(&Bridge::setWebSocketChannel, thisPtr, peer, clientWrapper), taskMode); 241 void WorkerThreadableWebSocketChannel::mainThreadConnect(ScriptExecutionContext* context, Peer* peer) argument 245 ASSERT(peer); 247 peer->connect(); 257 void WorkerThreadableWebSocketChannel::mainThreadSend(ScriptExecutionContext* context, Peer* peer, const String& message) argument 261 ASSERT(peer); 263 peer 278 mainThreadBufferedAmount(ScriptExecutionContext* context, Peer* peer) argument 301 mainThreadClose(ScriptExecutionContext* context, Peer* peer) argument 316 mainThreadDestroy(ScriptExecutionContext* context, Peer* peer) argument 329 Peer* peer = m_peer; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
H A D | eap_sake_common.c | 2 * EAP server/peer: EAP-SAKE shared routines 316 * @peer: MIC calculation for 0 = Server, 1 = Peer message 326 int peer, const u8 *eap, size_t eap_len, 338 if (peer) { 374 peer ? "Peer MIC" : "Server MIC", 322 eap_sake_compute_mic(const u8 *tek_auth, const u8 *rand_s, const u8 *rand_p, const u8 *serverid, size_t serverid_len, const u8 *peerid, size_t peerid_len, int peer, const u8 *eap, size_t eap_len, const u8 *mic_pos, u8 *mic) argument
|
/external/dnsmasq/src/ |
H A D | tftp.c | 46 struct sockaddr_in addr, peer; local 72 msg.msg_name = &peer; 73 msg.msg_namelen = sizeof(peer); 153 transfer->peer = peer; 194 len = tftp_err(ERR_ILL, packet, _("unsupported request from %s"), inet_ntoa(peer.sin_addr)); 244 strncat(daemon->namebuff, inet_ntoa(peer.sin_addr), (MAXDNAME-1) - strlen(daemon->namebuff)); 276 (struct sockaddr *)&peer, sizeof(peer)) == -1 && errno == EINTR); 282 my_syslog(MS_TFTP | LOG_INFO, _("TFTP sent %s to %s"), daemon->namebuff, inet_ntoa(peer [all...] |
/external/iproute2/lib/ |
H A D | libnetlink.c | 273 int rtnl_talk(struct rtnl_handle *rtnl, struct nlmsghdr *n, pid_t peer, argument 296 nladdr.nl_pid = peer; 348 if (nladdr.nl_pid != peer ||
|
/external/mtpd/ |
H A D | pptp.c | 118 uint16_t peer; member in struct:packet::__anon2570::__anon2571::__anon2573::__anon2576 312 if (state == OCRQ && incoming.ocrp.peer == local) { 370 outgoing.icrp.peer = incoming.icrq.call; 379 outgoing.ocrp.peer = incoming.ocrq.call;
|
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
H A D | peerkey.c | 68 const u8 *peer, 79 if (peer) 101 if (peer) { 103 pos = wpa_add_kde(pos, RSN_KEY_DATA_MAC_ADDR, peer, ETH_ALEN); 111 if (peer) { 112 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK Error (peer " 114 MAC2STR(peer), mui, error_type); 564 "for SMK M4/M5: peer " MACSTR, 613 u8 peer[ETH_ALEN]; local 636 os_memcpy(peer, kd 67 wpa_supplicant_send_smk_error(struct wpa_sm *sm, const u8 *dst, const u8 *peer, u16 mui, u16 error_type, int ver) argument 1001 wpa_sm_stkstart(struct wpa_sm *sm, const u8 *peer) argument [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/wps/ |
H A D | wps_upnp_i.h | 156 /* FIX: maintain separate structures for each UPnP peer */ 157 struct upnp_wps_peer peer; member in struct:upnp_wps_device_sm
|
/external/bluetooth/bluez/network/ |
H A D | connection.c | 76 struct network_peer *peer; member in struct:network_conn 93 struct network_peer *peer = l->data; local 95 if (!strcmp(peer->path, path)) 96 return peer; 156 emit_property_changed(connection, nc->peer->path, 159 emit_property_changed(connection, nc->peer->path, 162 emit_property_changed(connection, nc->peer->path, 165 device_remove_disconnect_watch(nc->peer->device, nc->dc_id); 210 bnep_kill_connection(&nc->peer->dst); 220 info("Network: disconnect %s", nc->peer 391 struct network_peer *peer = data; local 453 struct network_peer *peer = data; local 471 struct network_peer *peer = data; local 529 peer_free(struct network_peer *peer) argument 540 struct network_peer *peer = data; local 564 struct network_peer *peer; local 587 struct network_peer *peer; local 615 struct network_peer *peer; local [all...] |
/external/bluetooth/bluez/src/ |
H A D | dbus-hci.c | 444 void hcid_dbus_bonding_process_complete(bdaddr_t *local, bdaddr_t *peer, argument 452 if (!get_adapter_and_device(local, peer, &adapter, &device, TRUE)) 468 void hcid_dbus_simple_pairing_complete(bdaddr_t *local, bdaddr_t *peer, argument 476 if (!get_adapter_and_device(local, peer, &adapter, &device, TRUE)) 501 void hcid_dbus_inquiry_result(bdaddr_t *local, bdaddr_t *peer, uint32_t class, argument 515 ba2str(peer, peer_addr); 517 if (!get_adapter_and_device(local, peer, &adapter, &device, FALSE)) { 522 write_remote_class(local, peer, class); 525 write_remote_eir(local, peer, data); 541 bacpy(&match.bdaddr, peer); 594 hcid_dbus_remote_class(bdaddr_t *local, bdaddr_t *peer, uint32_t class) argument 618 hcid_dbus_remote_name(bdaddr_t *local, bdaddr_t *peer, uint8_t status, char *name) argument 663 hcid_dbus_link_key_notify(bdaddr_t *local, bdaddr_t *peer, uint8_t *key, uint8_t key_type, int pin_length, uint8_t old_key_type) argument 725 hcid_dbus_conn_complete(bdaddr_t *local, uint8_t status, uint16_t handle, bdaddr_t *peer) argument [all...] |
/external/iproute2/ip/ |
H A D | ipaddress.c | 69 fprintf(stderr, "IFADDR := PREFIX | ADDR peer PREFIX\n"); 269 fprintf(fp, " peer "); 460 fprintf(fp, " peer %s/%d ", 897 inet_prefix peer; local 915 if (strcmp(*argv, "peer") == 0 || 920 duparg("peer", *argv); 921 get_prefix(&peer, *argv, req.ifa.ifa_family); 922 peer_len = peer.bytelen; 924 req.ifa.ifa_family = peer.family; 925 addattr_l(&req.n, sizeof(req), IFA_ADDRESS, &peer [all...] |
/external/netperf/ |
H A D | nettest_sctp.c | 2649 struct sockaddr_storage peer; 3704 struct sockaddr_storage peer; 4329 struct sockaddr_storage peeraddr; /* to communicate with peer */ 2640 struct sockaddr_storage peer; local 3693 struct sockaddr_storage peer; local
|
/external/openssl/ssl/ |
H A D | s3_srvr.c | 407 ((s->session->peer != NULL) && 2215 if (((clnt_pub_pkey=X509_get_pubkey(s->session->peer)) 2334 X509 *peer; local 2345 if (s->session->peer != NULL) 2347 peer=s->session->peer; 2348 pkey=X509_get_pubkey(peer); 2349 type=X509_certificate_type(peer,pkey); 2353 peer=NULL; 2360 if ((peer ! [all...] |
/external/wpa_supplicant_6/wpa_supplicant/ |
H A D | ctrl_iface.c | 107 /* MLME-STKSTART.request(peer) */ 111 u8 peer[ETH_ALEN]; local 113 if (hwaddr_aton(addr, peer)) { 115 "address '%s'", peer); 120 MAC2STR(peer)); 122 return wpa_sm_stkstart(wpa_s->wpa, peer);
|