/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | tdls.c | 81 static void wpa_tdls_peer_free(struct wpa_sm *sm, struct wpa_tdls_peer *peer); 144 static int wpa_tdls_del_key(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument 146 if (wpa_sm_set_key(sm, WPA_ALG_NONE, peer->addr, 157 static int wpa_tdls_set_key(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument 165 switch (peer->cipher) { 180 if (wpa_sm_set_key(sm, alg, peer->addr, -1, 1, 181 rsc, sizeof(rsc), peer->tpk.tk, key_len) < 0) { 203 struct wpa_tdls_peer *peer; local 223 for (peer = sm->tdls; peer; pee 259 wpa_tdls_do_teardown(struct wpa_sm *sm, struct wpa_tdls_peer *peer, u16 reason_code, int free_peer) argument 284 struct wpa_tdls_peer *peer = timeout_ctx; local 327 wpa_tdls_tpk_retry_timeout_cancel(struct wpa_sm *sm, struct wpa_tdls_peer *peer, u8 action_code) argument 353 wpa_tdls_generate_tpk(struct wpa_tdls_peer *peer, const u8 *own_addr, const u8 *bssid) argument 527 wpa_supplicant_verify_tdls_mic(u8 trans_seq, struct wpa_tdls_peer *peer, const u8 *lnkid, const u8 *timeoutie, const struct wpa_tdls_ftie *ftie) argument 556 wpa_supplicant_verify_tdls_mic_teardown( u8 trans_seq, u16 rcode, u8 dtoken, struct wpa_tdls_peer *peer, const u8 *lnkid, const struct wpa_tdls_ftie *ftie) argument 582 struct wpa_tdls_peer *peer = timeout_ctx; local 605 wpa_tdls_peer_free(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument 623 wpa_tdls_linkid(struct wpa_sm *sm, struct wpa_tdls_peer *peer, struct wpa_tdls_lnkid *lnkid) argument 641 struct wpa_tdls_peer *peer; local 731 struct wpa_tdls_peer *peer; local 759 struct wpa_tdls_peer *peer; local 776 struct wpa_tdls_peer *peer = NULL; local 873 struct wpa_tdls_peer *peer; local 890 wpa_tdls_send_tpk_m1(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument 1068 wpa_tdls_send_tpk_m2(struct wpa_sm *sm, const unsigned char *src_addr, u8 dtoken, struct wpa_tdls_lnkid *lnkid, const struct wpa_tdls_peer *peer) argument 1151 wpa_tdls_send_tpk_m3(struct wpa_sm *sm, const unsigned char *src_addr, u8 dtoken, struct wpa_tdls_lnkid *lnkid, const struct wpa_tdls_peer *peer) argument 1232 wpa_tdls_send_discovery_response(struct wpa_sm *sm, struct wpa_tdls_peer *peer, u8 dialog_token) argument 1250 struct wpa_tdls_peer *peer; local 1305 copy_supp_rates(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1334 struct wpa_tdls_peer *peer; local 1655 wpa_tdls_enable_link(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument 1689 struct wpa_tdls_peer *peer; local 1897 struct wpa_tdls_peer *peer; local 2051 struct wpa_tdls_peer *peer; local 2101 struct wpa_tdls_peer *peer; local 2237 struct wpa_tdls_peer *peer, *tmp; local [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | tdls.c | 81 static void wpa_tdls_peer_free(struct wpa_sm *sm, struct wpa_tdls_peer *peer); 144 static int wpa_tdls_del_key(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument 146 if (wpa_sm_set_key(sm, WPA_ALG_NONE, peer->addr, 157 static int wpa_tdls_set_key(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument 165 switch (peer->cipher) { 180 if (wpa_sm_set_key(sm, alg, peer->addr, -1, 1, 181 rsc, sizeof(rsc), peer->tpk.tk, key_len) < 0) { 203 struct wpa_tdls_peer *peer; local 223 for (peer = sm->tdls; peer; pee 259 wpa_tdls_do_teardown(struct wpa_sm *sm, struct wpa_tdls_peer *peer, u16 reason_code, int free_peer) argument 284 struct wpa_tdls_peer *peer = timeout_ctx; local 327 wpa_tdls_tpk_retry_timeout_cancel(struct wpa_sm *sm, struct wpa_tdls_peer *peer, u8 action_code) argument 353 wpa_tdls_generate_tpk(struct wpa_tdls_peer *peer, const u8 *own_addr, const u8 *bssid) argument 527 wpa_supplicant_verify_tdls_mic(u8 trans_seq, struct wpa_tdls_peer *peer, const u8 *lnkid, const u8 *timeoutie, const struct wpa_tdls_ftie *ftie) argument 556 wpa_supplicant_verify_tdls_mic_teardown( u8 trans_seq, u16 rcode, u8 dtoken, struct wpa_tdls_peer *peer, const u8 *lnkid, const struct wpa_tdls_ftie *ftie) argument 582 struct wpa_tdls_peer *peer = timeout_ctx; local 605 wpa_tdls_peer_free(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument 623 wpa_tdls_linkid(struct wpa_sm *sm, struct wpa_tdls_peer *peer, struct wpa_tdls_lnkid *lnkid) argument 641 struct wpa_tdls_peer *peer; local 731 struct wpa_tdls_peer *peer; local 759 struct wpa_tdls_peer *peer; local 776 struct wpa_tdls_peer *peer = NULL; local 873 struct wpa_tdls_peer *peer; local 890 wpa_tdls_send_tpk_m1(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument 1068 wpa_tdls_send_tpk_m2(struct wpa_sm *sm, const unsigned char *src_addr, u8 dtoken, struct wpa_tdls_lnkid *lnkid, const struct wpa_tdls_peer *peer) argument 1151 wpa_tdls_send_tpk_m3(struct wpa_sm *sm, const unsigned char *src_addr, u8 dtoken, struct wpa_tdls_lnkid *lnkid, const struct wpa_tdls_peer *peer) argument 1232 wpa_tdls_send_discovery_response(struct wpa_sm *sm, struct wpa_tdls_peer *peer, u8 dialog_token) argument 1250 struct wpa_tdls_peer *peer; local 1305 copy_supp_rates(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1334 struct wpa_tdls_peer *peer; local 1655 wpa_tdls_enable_link(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument 1689 struct wpa_tdls_peer *peer; local 1897 struct wpa_tdls_peer *peer; local 2051 struct wpa_tdls_peer *peer; local 2101 struct wpa_tdls_peer *peer; local 2237 struct wpa_tdls_peer *peer, *tmp; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | tdls.c | 81 static void wpa_tdls_peer_free(struct wpa_sm *sm, struct wpa_tdls_peer *peer); 144 static int wpa_tdls_del_key(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument 146 if (wpa_sm_set_key(sm, WPA_ALG_NONE, peer->addr, 157 static int wpa_tdls_set_key(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument 165 switch (peer->cipher) { 180 if (wpa_sm_set_key(sm, alg, peer->addr, -1, 1, 181 rsc, sizeof(rsc), peer->tpk.tk, key_len) < 0) { 203 struct wpa_tdls_peer *peer; local 223 for (peer = sm->tdls; peer; pee 259 wpa_tdls_do_teardown(struct wpa_sm *sm, struct wpa_tdls_peer *peer, u16 reason_code, int free_peer) argument 284 struct wpa_tdls_peer *peer = timeout_ctx; local 327 wpa_tdls_tpk_retry_timeout_cancel(struct wpa_sm *sm, struct wpa_tdls_peer *peer, u8 action_code) argument 353 wpa_tdls_generate_tpk(struct wpa_tdls_peer *peer, const u8 *own_addr, const u8 *bssid) argument 527 wpa_supplicant_verify_tdls_mic(u8 trans_seq, struct wpa_tdls_peer *peer, const u8 *lnkid, const u8 *timeoutie, const struct wpa_tdls_ftie *ftie) argument 556 wpa_supplicant_verify_tdls_mic_teardown( u8 trans_seq, u16 rcode, u8 dtoken, struct wpa_tdls_peer *peer, const u8 *lnkid, const struct wpa_tdls_ftie *ftie) argument 582 struct wpa_tdls_peer *peer = timeout_ctx; local 605 wpa_tdls_peer_free(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument 623 wpa_tdls_linkid(struct wpa_sm *sm, struct wpa_tdls_peer *peer, struct wpa_tdls_lnkid *lnkid) argument 641 struct wpa_tdls_peer *peer; local 731 struct wpa_tdls_peer *peer; local 759 struct wpa_tdls_peer *peer; local 776 struct wpa_tdls_peer *peer = NULL; local 873 struct wpa_tdls_peer *peer; local 890 wpa_tdls_send_tpk_m1(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument 1068 wpa_tdls_send_tpk_m2(struct wpa_sm *sm, const unsigned char *src_addr, u8 dtoken, struct wpa_tdls_lnkid *lnkid, const struct wpa_tdls_peer *peer) argument 1151 wpa_tdls_send_tpk_m3(struct wpa_sm *sm, const unsigned char *src_addr, u8 dtoken, struct wpa_tdls_lnkid *lnkid, const struct wpa_tdls_peer *peer) argument 1232 wpa_tdls_send_discovery_response(struct wpa_sm *sm, struct wpa_tdls_peer *peer, u8 dialog_token) argument 1250 struct wpa_tdls_peer *peer; local 1305 copy_supp_rates(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1334 struct wpa_tdls_peer *peer; local 1655 wpa_tdls_enable_link(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument 1689 struct wpa_tdls_peer *peer; local 1897 struct wpa_tdls_peer *peer; local 2051 struct wpa_tdls_peer *peer; local 2101 struct wpa_tdls_peer *peer; local 2237 struct wpa_tdls_peer *peer, *tmp; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | ibss_rsn.c | 24 struct ibss_rsn_peer *peer; local 26 for (peer = ibss_rsn->peers; peer; peer = peer->next) 27 if (os_memcmp(addr, peer->addr, ETH_ALEN) == 0) 29 return peer; 33 static void ibss_rsn_free(struct ibss_rsn_peer *peer) argument 35 wpa_auth_sta_deinit(peer->auth); 36 wpa_sm_deinit(peer 43 struct ibss_rsn_peer *peer = ctx; local 50 struct ibss_rsn_peer *peer = ctx; local 58 struct ibss_rsn_peer *peer = ctx; local 103 struct ibss_rsn_peer *peer = ctx; local 121 struct ibss_rsn_peer *peer = ctx; local 150 struct ibss_rsn_peer *peer = ctx; local 177 ibss_rsn_supp_init(struct ibss_rsn_peer *peer, const u8 *own_addr, const u8 *psk) argument 304 struct ibss_rsn_peer *peer; local 317 ibss_set_sta_authorized(struct ibss_rsn *ibss_rsn, struct ibss_rsn_peer *peer, int authorized) argument 347 struct ibss_rsn_peer *peer = ibss_rsn_get_peer(ibss_rsn, addr); local 402 ibss_rsn_auth_init(struct ibss_rsn *ibss_rsn, struct ibss_rsn_peer *peer) argument 435 struct ibss_rsn_peer *peer; local 477 struct ibss_rsn_peer *peer, *prev; local 535 struct ibss_rsn_peer *peer, *prev; local 596 ibss_rsn_process_rx_eapol(struct ibss_rsn *ibss_rsn, struct ibss_rsn_peer *peer, const u8 *buf, size_t len) argument 627 struct ibss_rsn_peer *peer; local [all...] |
/external/okhttp/src/test/java/libcore/net/spdy/ |
H A D | SpdyConnectionTest.java | 28 private final MockSpdyPeer peer = new MockSpdyPeer(); field in class:SpdyConnectionTest 32 peer.acceptFrame(); 33 SpdyWriter reply = peer.sendFrame(); 37 SpdyWriter replyData = peer.sendFrame(); 41 peer.acceptFrame(); 42 peer.play(); 45 SpdyConnection connection = new SpdyConnection.Builder(true, peer.openSocket()).build(); 56 // verify the peer received what was expected 57 MockSpdyPeer.InFrame synStream = peer.takeFrame(); 62 MockSpdyPeer.InFrame requestData = peer [all...] |
/external/openssl/apps/ |
H A D | s_cb.c | 771 } peer; local 784 /* Read peer information */ 785 (void)BIO_dgram_get_peer(SSL_get_rbio(ssl), &peer); local 787 /* Create buffer with peer's address and port */ 789 switch (peer.sa.sa_family) 793 length += sizeof(peer.s4.sin_port); 798 length += sizeof(peer.s6.sin6_port); 813 switch (peer.sa.sa_family) 817 &peer.s4.sin_port, 818 sizeof(peer 859 } peer; local 866 (void)BIO_dgram_get_peer(SSL_get_rbio(ssl), &peer); local [all...] |
H A D | sess_id.c | 93 X509 *peer = NULL; local 167 peer = SSL_SESSION_get0_peer(x); 236 if (peer == NULL) 239 X509_print(out,peer); 258 else if (!noout && (peer != NULL)) /* just print the certificate */ 261 i=(int)i2d_X509_bio(out,peer); 263 i=PEM_write_bio_X509(out,peer);
|
/external/qemu/ |
H A D | charpipe.c | 75 struct CharPipeHalf* peer; /* NULL if closed */ member in struct:CharPipeHalf 91 ph->peer = NULL; 99 CharPipeHalf* peer = ph->peer; local 106 if (bip == NULL && peer != NULL && peer->cs->chr_read != NULL) { 107 /* no buffered data, try to write directly to the peer */ 111 if (peer->cs->chr_can_read) { 112 size = qemu_chr_can_read( peer->cs ); 121 qemu_chr_read( peer 158 CharPipeHalf* peer = ph->peer; local 297 CharDriverState* peer = cbuf->endpoint; local 348 CharDriverState* peer = cbuf->endpoint; local [all...] |
H A D | qemu-sockets.c | 289 /* connect to peer */ 311 struct addrinfo ai, *peer = NULL, *local = NULL; local 318 /* lookup peer addr */ 339 if (0 != (rc = getaddrinfo(addr, port, &ai, &peer))) { 345 fprintf(stderr, "%s: peer (%s:%s)\n", __FUNCTION__, addr, port); 346 inet_print_addrinfo(__FUNCTION__, peer); 352 ai.ai_family = peer->ai_family; 374 sock = qemu_socket(peer->ai_family, peer->ai_socktype, peer [all...] |
/external/webkit/Source/WebCore/websockets/ |
H A D | WorkerThreadableWebSocketChannel.cpp | 236 void WorkerThreadableWebSocketChannel::Bridge::setWebSocketChannel(ScriptExecutionContext* context, Bridge* thisPtr, Peer* peer, RefPtr<ThreadableWebSocketChannelClientWrapper> workerClientWrapper) argument 239 thisPtr->m_peer = peer; 248 Peer* peer = Peer::create(clientWrapper, thisPtr->m_loaderProxy, context, taskMode, url, protocol); local 249 thisPtr->m_loaderProxy.postTaskForModeToWorkerContext(createCallbackTask(&Bridge::setWebSocketChannel, thisPtr, peer, clientWrapper), taskMode); 271 void WorkerThreadableWebSocketChannel::mainThreadConnect(ScriptExecutionContext* context, Peer* peer) argument 275 ASSERT(peer); 277 peer->connect(); 287 void WorkerThreadableWebSocketChannel::mainThreadSend(ScriptExecutionContext* context, Peer* peer, const String& message) argument 291 ASSERT(peer); 293 peer 309 mainThreadBufferedAmount(ScriptExecutionContext* context, Peer* peer) argument 333 mainThreadClose(ScriptExecutionContext* context, Peer* peer) argument 348 mainThreadDestroy(ScriptExecutionContext* context, Peer* peer) argument 361 Peer* peer = m_peer; local 368 mainThreadSuspend(ScriptExecutionContext* context, Peer* peer) argument 383 mainThreadResume(ScriptExecutionContext* context, Peer* peer) argument [all...] |
/external/iproute2/ip/ |
H A D | ifcfg | 81 peer=$1 82 if [ "$peer" != "" ]; then 87 pfx="$ipaddr peer $peer" 141 elif [ "$peer" != "" ]; then 142 if ping -q -c 2 -w 4 $peer ; then 143 ip ro append default via $peer dev $dev metric 30001
|
/external/chromium/net/http/ |
H A D | http_stream_factory_impl_unittest.cc | 105 HttpNetworkSessionPeer peer(session); 108 peer.SetHttpStreamFactory(mock_factory); 218 HttpNetworkSessionPeer peer(session); 223 peer.SetTransportSocketPool(transport_conn_pool); 228 peer.SetSSLSocketPool(ssl_conn_pool); 241 HttpNetworkSessionPeer peer(session); 247 peer.SetSocketPoolForHTTPProxy(proxy_host, http_proxy_pool); 252 peer.SetSocketPoolForSSLWithProxy(proxy_host, ssl_conn_pool); 266 HttpNetworkSessionPeer peer(session); 272 peer [all...] |
/external/bluetooth/bluedroid/btif/co/ |
H A D | bta_pan_co.c | 105 //bdcpy(conn->peer, peer_addr); 126 ** peer is closed. 203 ALOGD("pan bt peer addr: %02x:%02x:%02x:%02x:%02x:%02x, update its ethernet addr: %02x:%02x:%02x:%02x:%02x:%02x", 204 conn->peer[0], conn->peer[1], conn->peer[2], conn->peer[3],conn->peer[4], conn->peer[5], 308 ** Description protocol filter indication from peer devic [all...] |
/external/iptables/libipq/ |
H A D | libipq.c | 77 { IPQ_ERR_ADDRLEN, "Invalid peer address length" }, 107 (struct sockaddr *)&h->peer, sizeof(h->peer)); 135 addrlen = sizeof(h->peer); 168 (struct sockaddr *)&h->peer, &addrlen); 173 if (addrlen != sizeof(h->peer)) { 177 if (h->peer.nl_pid != 0) { 249 memset(&h->peer, 0, sizeof(struct sockaddr_nl)); 250 h->peer.nl_family = AF_NETLINK; 251 h->peer [all...] |
/external/chromium/chrome/common/extensions/ |
H A D | extension_localization_peer.cc | 18 webkit_glue::ResourceLoaderBridge::Peer* peer, 21 : original_peer_(peer), 32 webkit_glue::ResourceLoaderBridge::Peer* peer, 40 new ExtensionLocalizationPeer(peer, message_sender, request_url) : NULL; 17 ExtensionLocalizationPeer( webkit_glue::ResourceLoaderBridge::Peer* peer, IPC::Message::Sender* message_sender, const GURL& request_url) argument 31 CreateExtensionLocalizationPeer( webkit_glue::ResourceLoaderBridge::Peer* peer, IPC::Message::Sender* message_sender, const std::string& mime_type, const GURL& request_url) argument
|
H A D | extension_localization_peer.h | 27 webkit_glue::ResourceLoaderBridge::Peer* peer, 54 webkit_glue::ResourceLoaderBridge::Peer* peer, 62 // Original peer that handles the request once we are done processing data_.
|
/external/libppp/src/ |
H A D | iface.h | 34 struct ncpaddr peer; /* peer address */ member in struct:iface_addr
|
H A D | iface.c | 189 ncpaddr_setsa(&addr->peer, sa[RTAX_BRD]); 191 ncpaddr_init(&addr->peer); 214 ncpaddr_getsa(&addr->peer, &sspeer); 229 if (ncpaddr_family(&addr->peer) == AF_UNSPEC) { 242 ifra.ifra_name, buf, ncpaddr_ntoa(&addr->peer), res); 254 if (ncpaddr_family(&addr->peer) == AF_UNSPEC) 274 if (ncpaddr_family(&addr->peer) == AF_UNSPEC) 278 snprintf(dst, sizeof dst, "%s", ncpaddr_ntoa(&addr->peer)); 299 ncpaddr_getsa(&addr->peer, &sspeer); 314 if (ncpaddr_family(&addr->peer) 432 iface_Add(struct iface *iface, struct ncp *ncp, const struct ncprange *ifa, const struct ncpaddr *peer, int how) argument [all...] |
H A D | chap.h | 52 u_char peer[CHAPCHALLENGELEN + AUTHLEN]; /* Peer gave us this one */ member in struct:chap::__anon8033
|
H A D | mppe.c | 113 * The peer has missed a packet. Mark the next output frame to be FLUSHED 539 u_int32_t mval, peer; local 541 ua_ntohl(o->data, &peer); 551 * whatever the peer asks for. 555 mval |= (peer & MPPE_OPT_BITMASK); 563 mval |= (peer & MPPE_OPT_STATELESS); 572 * The peer has requested the given options 578 u_int32_t mval, peer; local 581 ua_ntohl(o->data, &peer); 583 if (peer ! [all...] |
/external/openssl/crypto/bio/ |
H A D | bss_bio.c | 57 * of this kind, handled by the same thread (i.e. the "peer" is actually 127 BIO *peer; /* NULL if buf == NULL. member in struct:bio_bio_st 128 * If peer != NULL, then peer->ptr is also a bio_bio_st, 129 * and its "peer" member points back to us. 130 * peer != NULL iff init != 0 in the BIO. */ 132 /* This is for what we write (i.e. reading uses peer's struct): */ 133 int closed; /* valid iff peer != NULL */ 134 size_t len; /* valid iff buf != NULL; 0 if peer == NULL */ 139 size_t request; /* valid iff peer ! [all...] |
H A D | bss_dgram.c | 152 } peer; member in struct:bio_dgram_data_st 176 } peer; member in struct:bio_dgram_sctp_data_st 363 } peer; member in struct:__anon9712 367 sa.len.i=sizeof(sa.peer); 372 memset(&sa.peer, 0x00, sizeof(sa.peer)); 374 ret=recvfrom(b->num,out,outl,0,&sa.peer.sa,(void *)&sa.len); 377 OPENSSL_assert(sa.len.s<=sizeof(sa.peer)); 382 BIO_ctrl(b, BIO_CTRL_DGRAM_SET_PEER, 0, &sa.peer); 409 int peerlen = sizeof(data->peer); [all...] |
/external/openssl/crypto/evp/ |
H A D | pmeth_fn.c | 285 int EVP_PKEY_derive_set_peer(EVP_PKEY_CTX *ctx, EVP_PKEY *peer) argument 301 ret = ctx->pmeth->ctrl(ctx, EVP_PKEY_CTRL_PEER_KEY, 0, peer); 315 if (ctx->pkey->type != peer->type) 322 /* ran@cryptocom.ru: For clarity. The error is if parameters in peer are 327 if (!EVP_PKEY_missing_parameters(peer) && 328 !EVP_PKEY_cmp_parameters(ctx->pkey, peer)) 337 ctx->peerkey = peer; 339 ret = ctx->pmeth->ctrl(ctx, EVP_PKEY_CTRL_PEER_KEY, 1, peer); 347 CRYPTO_add(&peer->references,1,CRYPTO_LOCK_EVP_PKEY);
|
/external/wpa_supplicant_6/wpa_supplicant/src/wps/ |
H A D | wps_upnp.h | 29 void *priv, struct upnp_wps_peer *peer); 31 void *priv, struct upnp_wps_peer *peer,
|
/external/ipsec-tools/src/racoon/ |
H A D | sainfo.c | 76 * First pass is for sainfo from a specified peer, second for others. 79 getsainfo(loc, rmt, peer, remoteid) 80 const vchar_t *loc, *rmt, *peer; 87 if (peer == NULL) 104 if (peer == NULL) 107 dpeer = ipsecdoi_id2str(peer); 110 "getsainfo params: loc=\'%s\', rmt=\'%s\', peer=\'%s\', id=%i\n", 133 if (ipsecdoi_chkcmpids(peer, s->id_i, 0)) 294 snprintf(buf, 255, "loc=\'%s\', rmt=\'%s\', peer=\'%s\', id=%i",
|