Searched refs:peer (Results 101 - 125 of 224) sorted by relevance

123456789

/external/chromium_org/chrome/test/chromedriver/server/
H A Dchromedriver_server.cc110 std::string peer_address = request.peer.ToStringWithoutPort();
114 LOG(WARNING) << "unauthorized access from " << request.peer.ToString();
/external/chromium_org/content/browser/resources/media/
H A Dwebrtc_internals.css6 .peer-connection-dump-root {
/external/chromium_org/third_party/openssl/openssl/crypto/bio/
H A Dbio.h601 #define BIO_ctrl_dgram_connect(b,peer) \
602 (int)BIO_ctrl(b,BIO_CTRL_DGRAM_CONNECT,0, (char *)peer)
603 #define BIO_ctrl_set_connected(b, state, peer) \
604 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_CONNECTED, state, (char *)peer)
609 #define BIO_dgram_get_peer(b,peer) \
610 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_GET_PEER, 0, (char *)peer)
611 #define BIO_dgram_set_peer(b,peer) \
612 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_PEER, 0, (char *)peer)
/external/chromium_org/third_party/openssl/openssl/include/openssl/
H A Dbio.h601 #define BIO_ctrl_dgram_connect(b,peer) \
602 (int)BIO_ctrl(b,BIO_CTRL_DGRAM_CONNECT,0, (char *)peer)
603 #define BIO_ctrl_set_connected(b, state, peer) \
604 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_CONNECTED, state, (char *)peer)
609 #define BIO_dgram_get_peer(b,peer) \
610 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_GET_PEER, 0, (char *)peer)
611 #define BIO_dgram_set_peer(b,peer) \
612 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_PEER, 0, (char *)peer)
/external/iproute2/include/
H A Dlibnetlink.h16 struct sockaddr_nl peer; member in struct:rtnl_handle
42 extern int rtnl_talk(struct rtnl_handle *rtnl, struct nlmsghdr *n, pid_t peer,
/external/openssl/crypto/bio/
H A Dbio.h601 #define BIO_ctrl_dgram_connect(b,peer) \
602 (int)BIO_ctrl(b,BIO_CTRL_DGRAM_CONNECT,0, (char *)peer)
603 #define BIO_ctrl_set_connected(b, state, peer) \
604 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_CONNECTED, state, (char *)peer)
609 #define BIO_dgram_get_peer(b,peer) \
610 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_GET_PEER, 0, (char *)peer)
611 #define BIO_dgram_set_peer(b,peer) \
612 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_PEER, 0, (char *)peer)
/external/openssl/include/openssl/
H A Dbio.h601 #define BIO_ctrl_dgram_connect(b,peer) \
602 (int)BIO_ctrl(b,BIO_CTRL_DGRAM_CONNECT,0, (char *)peer)
603 #define BIO_ctrl_set_connected(b, state, peer) \
604 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_CONNECTED, state, (char *)peer)
609 #define BIO_dgram_get_peer(b,peer) \
610 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_GET_PEER, 0, (char *)peer)
611 #define BIO_dgram_set_peer(b,peer) \
612 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_PEER, 0, (char *)peer)
/external/openssl/ssl/
H A Dssl_asn1.c308 if (in->peer != NULL)
309 M_ASN1_I2D_len_EXP_opt(in->peer,i2d_X509,3,v3);
356 if (in->peer != NULL)
357 M_ASN1_I2D_put_EXP_opt(in->peer,i2d_X509,3,v3);
523 if (ret->peer != NULL)
525 X509_free(ret->peer);
526 ret->peer=NULL;
528 M_ASN1_D2I_get_EXP_opt(ret->peer,d2i_X509,3);
/external/sepolicy/
H A Dunconfined.te89 allow unconfineddomain domain:peer recv;
/external/chromium_org/third_party/openssl/openssl/apps/
H A Ds_client.c292 BIO_printf(bio_err," -verify arg - turn on peer certificate verification\n");
619 struct sockaddr peer; local
620 int peerlen = sizeof(peer);
1312 if (getsockname(s, &peer, (void *)&peerlen) < 0)
1320 (void)BIO_ctrl_set_connected(sbio, 1, &peer);
1952 X509 *peer=NULL; local
1990 peer=SSL_get_peer_certificate(s);
1991 if (peer != NULL)
1995 PEM_write_bio_X509(bio,peer);
1996 X509_NAME_oneline(X509_get_subject_name(peer),
[all...]
/external/openssl/apps/
H A Ds_client.c292 BIO_printf(bio_err," -verify arg - turn on peer certificate verification\n");
623 struct sockaddr peer; local
624 int peerlen = sizeof(peer);
1339 if (getsockname(s, &peer, (void *)&peerlen) < 0)
1347 (void)BIO_ctrl_set_connected(sbio, 1, &peer);
1979 X509 *peer=NULL; local
2017 peer=SSL_get_peer_certificate(s);
2018 if (peer != NULL)
2022 PEM_write_bio_X509(bio,peer);
2023 X509_NAME_oneline(X509_get_subject_name(peer),
[all...]
/external/wpa_supplicant_8/wpa_supplicant/dbus/
H A Ddbus_new_handlers.c2084 * wpas_dbus_handler_tdls_discover - Discover TDLS peer
2094 u8 peer[ETH_ALEN]; local
2098 if (get_peer_hwaddr_helper(message, __func__, peer, &error_reply) < 0)
2101 wpa_printf(MSG_DEBUG, "DBUS TDLS_DISCOVER " MACSTR, MAC2STR(peer));
2104 ret = wpa_tdls_send_discovery_request(wpa_s->wpa, peer);
2106 ret = wpa_drv_tdls_oper(wpa_s, TDLS_DISCOVERY_REQ, peer);
2128 u8 peer[ETH_ALEN]; local
2132 if (get_peer_hwaddr_helper(message, __func__, peer, &error_reply) < 0)
2135 wpa_printf(MSG_DEBUG, "DBUS TDLS_SETUP " MACSTR, MAC2STR(peer));
2137 wpa_tdls_remove(wpa_s->wpa, peer);
2163 u8 peer[ETH_ALEN]; local
2192 u8 peer[ETH_ALEN]; local
[all...]
/external/wpa_supplicant_8/hostapd/src/p2p/
H A Dp2p.c42 * P2P_PEER_EXPIRATION_AGE - Number of seconds after which inactive peer
64 * GO Negotiation is in progress with the peer, so
65 * don't expire the peer entry until GO Negotiation
76 * peer is the GO, so do not expire the peer entry.
89 * The peer is connected as a client in a group where
90 * we are the GO, so do not expire the peer entry.
96 p2p_dbg(p2p, "Expiring old peer entry " MACSTR,
214 void p2p_go_neg_failed(struct p2p_data *p2p, struct p2p_device *peer, argument
229 if (peer) {
1613 p2p_go_complete(struct p2p_data *p2p, struct p2p_device *peer) argument
2293 struct p2p_device *peer; local
4572 p2p_loop_on_known_peers(struct p2p_data *p2p, void (*peer_callback)(struct p2p_peer_info *peer, void *user_data), void *user_data) argument
[all...]
/external/wpa_supplicant_8/src/p2p/
H A Dp2p.c42 * P2P_PEER_EXPIRATION_AGE - Number of seconds after which inactive peer
64 * GO Negotiation is in progress with the peer, so
65 * don't expire the peer entry until GO Negotiation
76 * peer is the GO, so do not expire the peer entry.
89 * The peer is connected as a client in a group where
90 * we are the GO, so do not expire the peer entry.
96 p2p_dbg(p2p, "Expiring old peer entry " MACSTR,
214 void p2p_go_neg_failed(struct p2p_data *p2p, struct p2p_device *peer, argument
229 if (peer) {
1613 p2p_go_complete(struct p2p_data *p2p, struct p2p_device *peer) argument
2293 struct p2p_device *peer; local
4572 p2p_loop_on_known_peers(struct p2p_data *p2p, void (*peer_callback)(struct p2p_peer_info *peer, void *user_data), void *user_data) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/p2p/
H A Dp2p.c42 * P2P_PEER_EXPIRATION_AGE - Number of seconds after which inactive peer
64 * GO Negotiation is in progress with the peer, so
65 * don't expire the peer entry until GO Negotiation
76 * peer is the GO, so do not expire the peer entry.
89 * The peer is connected as a client in a group where
90 * we are the GO, so do not expire the peer entry.
96 p2p_dbg(p2p, "Expiring old peer entry " MACSTR,
214 void p2p_go_neg_failed(struct p2p_data *p2p, struct p2p_device *peer, argument
229 if (peer) {
1613 p2p_go_complete(struct p2p_data *p2p, struct p2p_device *peer) argument
2293 struct p2p_device *peer; local
4572 p2p_loop_on_known_peers(struct p2p_data *p2p, void (*peer_callback)(struct p2p_peer_info *peer, void *user_data), void *user_data) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/drivers/
H A Ddriver.h980 /* Driver supports operating as a TDLS peer */
1309 /* TDLS peer capabilities for send_tdls_mgmt() */
1378 * @addr: Address of the peer STA (BSSID of the current AP when setting
1485 * @addr: peer address (BSSID of the AP)
2050 * TDLS peer entries.
2501 * @dst: Destination (peer) MAC address
2505 * @peer_capab: TDLS peer capability (TDLS_PEER_* bitfield)
2521 * @peer: Destination (peer) MAC address
2527 int (*tdls_oper)(void *priv, enum tdls_oper oper, const u8 *peer);
3699 u8 peer[ETH_ALEN]; member in struct:wpa_event_data::stkstart
3706 u8 peer[ETH_ALEN]; member in struct:wpa_event_data::tdls
3756 u8 peer[ETH_ALEN]; member in struct:wpa_event_data::ibss_rsn_start
3763 u8 peer[ETH_ALEN]; member in struct:wpa_event_data::auth_info
4008 u8 peer[ETH_ALEN]; member in struct:wpa_event_data::ibss_peer_lost
[all...]
/external/wpa_supplicant_8/src/drivers/
H A Ddriver.h980 /* Driver supports operating as a TDLS peer */
1309 /* TDLS peer capabilities for send_tdls_mgmt() */
1378 * @addr: Address of the peer STA (BSSID of the current AP when setting
1485 * @addr: peer address (BSSID of the AP)
2050 * TDLS peer entries.
2501 * @dst: Destination (peer) MAC address
2505 * @peer_capab: TDLS peer capability (TDLS_PEER_* bitfield)
2521 * @peer: Destination (peer) MAC address
2527 int (*tdls_oper)(void *priv, enum tdls_oper oper, const u8 *peer);
3699 u8 peer[ETH_ALEN]; member in struct:wpa_event_data::stkstart
3706 u8 peer[ETH_ALEN]; member in struct:wpa_event_data::tdls
3756 u8 peer[ETH_ALEN]; member in struct:wpa_event_data::ibss_rsn_start
3763 u8 peer[ETH_ALEN]; member in struct:wpa_event_data::auth_info
4008 u8 peer[ETH_ALEN]; member in struct:wpa_event_data::ibss_peer_lost
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/
H A Ddriver.h980 /* Driver supports operating as a TDLS peer */
1309 /* TDLS peer capabilities for send_tdls_mgmt() */
1378 * @addr: Address of the peer STA (BSSID of the current AP when setting
1485 * @addr: peer address (BSSID of the AP)
2050 * TDLS peer entries.
2501 * @dst: Destination (peer) MAC address
2505 * @peer_capab: TDLS peer capability (TDLS_PEER_* bitfield)
2521 * @peer: Destination (peer) MAC address
2527 int (*tdls_oper)(void *priv, enum tdls_oper oper, const u8 *peer);
3699 u8 peer[ETH_ALEN]; member in struct:wpa_event_data::stkstart
3706 u8 peer[ETH_ALEN]; member in struct:wpa_event_data::tdls
3756 u8 peer[ETH_ALEN]; member in struct:wpa_event_data::ibss_rsn_start
3763 u8 peer[ETH_ALEN]; member in struct:wpa_event_data::auth_info
4008 u8 peer[ETH_ALEN]; member in struct:wpa_event_data::ibss_peer_lost
[all...]
/external/iproute2/ip/
H A Dipaddress.c70 fprintf(stderr, "IFADDR := PREFIX | ADDR peer PREFIX\n");
448 fprintf(fp, " peer ");
608 fprintf(fp, " peer %s/%d ",
1062 inet_prefix peer; local
1080 if (strcmp(*argv, "peer") == 0 ||
1085 duparg("peer", *argv);
1086 get_prefix(&peer, *argv, req.ifa.ifa_family);
1087 peer_len = peer.bytelen;
1089 req.ifa.ifa_family = peer.family;
1090 addattr_l(&req.n, sizeof(req), IFA_ADDRESS, &peer
[all...]
/external/wpa_supplicant_8/hostapd/src/rsn_supp/
H A Dwpa.h59 int (*tdls_oper)(void *ctx, int oper, const u8 *peer);
307 int wpa_sm_stkstart(struct wpa_sm *sm, const u8 *peer);
311 static inline int wpa_sm_stkstart(struct wpa_sm *sm, const u8 *peer) argument
/external/wpa_supplicant_8/src/rsn_supp/
H A Dwpa.h59 int (*tdls_oper)(void *ctx, int oper, const u8 *peer);
307 int wpa_sm_stkstart(struct wpa_sm *sm, const u8 *peer);
311 static inline int wpa_sm_stkstart(struct wpa_sm *sm, const u8 *peer) argument
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/
H A Dwpa.h59 int (*tdls_oper)(void *ctx, int oper, const u8 *peer);
307 int wpa_sm_stkstart(struct wpa_sm *sm, const u8 *peer);
311 static inline int wpa_sm_stkstart(struct wpa_sm *sm, const u8 *peer) argument
/external/chromium_org/chromeos/dbus/
H A Dfake_shill_device_client.h82 const std::string& peer,
H A Dshill_device_client.h162 const std::string& peer,
/external/chromium_org/third_party/openssl/openssl/ssl/
H A Ds3_srvr.c511 ((s->session->peer != NULL) &&
622 if (!s->session->peer)
2614 if (((clnt_pub_pkey=X509_get_pubkey(s->session->peer))
2865 client_pub_pkey = X509_get_pubkey(s->session->peer);
2946 X509 *peer; local
2960 if (s->session->peer != NULL)
2962 peer=s->session->peer;
2963 pkey=X509_get_pubkey(peer);
2964 type=X509_certificate_type(peer,pke
[all...]

Completed in 629 milliseconds

123456789