Searched refs:peer (Results 151 - 175 of 224) sorted by relevance

123456789

/external/qemu/include/block/
H A Dblock_int.h159 DeviceState *peer; member in struct:BlockDriverState
/external/wpa_supplicant_8/hostapd/src/ap/
H A Dwpa_auth_i.h20 u8 peer[ETH_ALEN]; member in struct:wpa_stsl_negotiation
H A Ddrv_callbacks.c575 sta = ap_get_sta(hapd, rx_auth->peer);
577 sta = ap_sta_add(hapd, rx_auth->peer);
605 hostapd_sta_auth(hapd, rx_auth->peer, rx_auth->auth_transaction + 1,
/external/wpa_supplicant_8/src/ap/
H A Dwpa_auth_i.h20 u8 peer[ETH_ALEN]; member in struct:wpa_stsl_negotiation
H A Ddrv_callbacks.c575 sta = ap_get_sta(hapd, rx_auth->peer);
577 sta = ap_sta_add(hapd, rx_auth->peer);
605 hostapd_sta_auth(hapd, rx_auth->peer, rx_auth->auth_transaction + 1,
/external/wpa_supplicant_8/wpa_supplicant/
H A Ddriver_i.h548 enum tdls_oper oper, const u8 *peer)
552 return wpa_s->driver->tdls_oper(wpa_s->drv_priv, oper, peer);
591 enum wnm_oper oper, const u8 *peer,
596 return wpa_s->driver->wnm_oper(wpa_s->drv_priv, oper, peer, buf,
547 wpa_drv_tdls_oper(struct wpa_supplicant *wpa_s, enum tdls_oper oper, const u8 *peer) argument
590 wpa_drv_wnm_oper(struct wpa_supplicant *wpa_s, enum wnm_oper oper, const u8 *peer, u8 *buf, u16 *buf_len) argument
H A Dwpas_glue.c573 static int wpa_supplicant_tdls_oper(void *ctx, int oper, const u8 *peer) argument
576 return wpa_drv_tdls_oper(wpa_s, oper, peer);
581 void *ctx, const u8 *peer, int add, u16 aid, u16 capability,
594 params.addr = peer;
601 * qosinfo to check if the peer is WMM capable.
580 wpa_supplicant_tdls_peer_addset( void *ctx, const u8 *peer, int add, u16 aid, u16 capability, const u8 *supp_rates, size_t supp_rates_len, const struct ieee80211_ht_capabilities *ht_capab, const struct ieee80211_vht_capabilities *vht_capab, u8 qosinfo, const u8 *ext_capab, size_t ext_capab_len, const u8 *supp_channels, size_t supp_channels_len, const u8 *supp_oper_classes, size_t supp_oper_classes_len) argument
H A Dsme.c596 wpa_printf(MSG_DEBUG, "SAE: Failed to process peer "
638 if (os_memcmp(wpa_s->pending_bssid, data->auth.peer, ETH_ALEN) != 0) {
640 "unexpected peer " MACSTR,
641 MAC2STR(data->auth.peer));
645 wpa_dbg(wpa_s, MSG_DEBUG, "SME: Authentication response: peer=" MACSTR
647 MAC2STR(data->auth.peer), data->auth.auth_type,
717 os_memcpy(edata.ft_ies.target_ap, data->auth.peer, ETH_ALEN);
722 sme_associate(wpa_s, ssid->mode, data->auth.peer,
H A Devents.c2409 wpa_sm_stkstart(wpa_s->wpa, data->stkstart.peer);
2422 wpa_tdls_remove(wpa_s->wpa, data->tdls.peer);
2424 wpa_tdls_start(wpa_s->wpa, data->tdls.peer);
2426 wpa_drv_tdls_oper(wpa_s, TDLS_SETUP, data->tdls.peer);
2430 wpa_tdls_teardown_link(wpa_s->wpa, data->tdls.peer,
2434 data->tdls.peer);
2495 ibss_rsn_start(wpa_s->ibss_rsn, data->ibss_rsn_start.peer);
3424 ibss_rsn_stop(wpa_s->ibss_rsn, data->ibss_peer_lost.peer);
H A Dp2p_supplicant.h122 void wpas_p2p_remove_client(struct wpa_supplicant *wpa_s, const u8 *peer,
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dwpa_auth_i.h20 u8 peer[ETH_ALEN]; member in struct:wpa_stsl_negotiation
H A Ddrv_callbacks.c575 sta = ap_get_sta(hapd, rx_auth->peer);
577 sta = ap_sta_add(hapd, rx_auth->peer);
605 hostapd_sta_auth(hapd, rx_auth->peer, rx_auth->auth_transaction + 1,
/external/chromium_org/third_party/usrsctp/usrsctplib/netinet/
H A Dsctp_auth.c750 * find the best HMAC id to use for the peer based on local support
753 sctp_negotiate_hmacid(sctp_hmaclist_t *peer, sctp_hmaclist_t *local) argument
757 if ((local == NULL) || (peer == NULL))
760 for (i = 0; i < peer->num_algo; i++) {
762 if (peer->hmac[i] == local->hmac[j]) {
765 "SCTP: negotiated peer HMAC id %u\n",
766 peer->hmac[i]);
767 return (peer->hmac[i]);
1563 /* negotiate what HMAC to use for the peer */
1934 /* did the peer sen
[all...]
/external/chromium_org/net/quic/crypto/
H A Dcrypto_server_test.cc162 QuicCryptoServerConfigPeer peer(&test_->config_);
163 base::Lock* m = peer.GetStrikeRegisterClientLock();
/external/chromium_org/ipc/
H A Dipc_sync_channel_unittest.cc1270 RestrictedDispatchDeadlockServer* peer)
1275 peer_(peer) { }
1381 RestrictedDispatchDeadlockClient2* peer,
1386 peer_(peer),
1267 RestrictedDispatchDeadlockServer(int server_num, WaitableEvent* server_ready_event, WaitableEvent** events, RestrictedDispatchDeadlockServer* peer) argument
1380 RestrictedDispatchDeadlockClient1(RestrictedDispatchDeadlockServer* server, RestrictedDispatchDeadlockClient2* peer, WaitableEvent* server_ready_event, WaitableEvent** events) argument
/external/chromium_org/net/server/
H A Dhttp_server.cc142 // Sets peer address if exists.
143 socket->GetPeerAddress(&request.peer);
/external/wpa_supplicant_8/hostapd/src/pae/
H A Dieee802_1x_kay_i.h308 u8 peer[0]; member in struct:ieee802_1x_mka_peer_body
/external/wpa_supplicant_8/src/pae/
H A Dieee802_1x_kay_i.h308 u8 peer[0]; member in struct:ieee802_1x_mka_peer_body
/external/wpa_supplicant_8/wpa_supplicant/src/pae/
H A Dieee802_1x_kay_i.h308 u8 peer[0]; member in struct:ieee802_1x_mka_peer_body
/external/chromium_org/third_party/openssl/openssl/ssl/
H A Dssl_sess.c766 if (ss->peer != NULL) X509_free(ss->peer);
881 return s->peer;
H A Ds3_clnt.c1275 /* Inconsistency alert: cert_chain does include the peer's
1325 if (s->session->peer != NULL)
1326 X509_free(s->session->peer);
1328 s->session->peer=x;
1335 if (s->session->peer != NULL)
1336 X509_free(s->session->peer);
1337 s->session->peer=NULL;
2826 /* If we have client certificate, use its secret as peer key */
/external/libnl/lib/route/
H A Daddr.c21 * @note The address may not contain a prefix length if the peer address
40 * // The peer address can be specified if necessary, in either case a peer
43 * // Note: Real peer addresses are only supported by IPv4 for now.
80 * // local nor peer address have been specified.
91 * // The peer address can be specified if necessary, in either case a peer
94 * // Note: Real peer addresses are only supported by IPv4 for now.
250 * with IFA_ADDRESS being the peer address if they differ */
322 nl_dump(p, " peer
888 rtnl_addr_set_peer(struct rtnl_addr *addr, struct nl_addr *peer) argument
[all...]
/external/openssl/ssl/
H A Dssl_sess.c778 if (ss->peer != NULL) X509_free(ss->peer);
893 return s->peer;
/external/chromium_org/net/third_party/nss/ssl/
H A Dsslcon.c1832 ** Scan list of ciphers received from peer and look for a match in
2828 SSL_TRC(1, ("%d: SSL[%d]: client, using nonce for peer=0x%08x "
2830 SSL_GETPID(), ss->fd, ss->sec.ci.peer, ss->sec.ci.port));
2869 sid->addr = ss->sec.ci.peer;
2995 /* Get peer name of server */
3024 sid = ssl_LookupSID(&ss->sec.ci.peer, ss->sec.ci.port, ss->peerID,
3075 sid->addr = ss->sec.ci.peer;
3346 /* Get peer name of client */
3456 SSL_GETPID(), ss->fd, ss->sec.ci.peer.pr_s6_addr32[0],
3457 ss->sec.ci.peer
[all...]
/external/qemu/
H A Dblock.c691 assert(!bs->peer);
709 if (bs->peer) {
712 bs->peer = qdev;
718 assert(bs->peer == qdev);
719 bs->peer = NULL;
724 return bs->peer;

Completed in 485 milliseconds

123456789