/external/qemu/include/block/ |
H A D | block_int.h | 159 DeviceState *peer; member in struct:BlockDriverState
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | wpa_auth_i.h | 20 u8 peer[ETH_ALEN]; member in struct:wpa_stsl_negotiation
|
H A D | drv_callbacks.c | 575 sta = ap_get_sta(hapd, rx_auth->peer); 577 sta = ap_sta_add(hapd, rx_auth->peer); 605 hostapd_sta_auth(hapd, rx_auth->peer, rx_auth->auth_transaction + 1,
|
/external/wpa_supplicant_8/src/ap/ |
H A D | wpa_auth_i.h | 20 u8 peer[ETH_ALEN]; member in struct:wpa_stsl_negotiation
|
H A D | drv_callbacks.c | 575 sta = ap_get_sta(hapd, rx_auth->peer); 577 sta = ap_sta_add(hapd, rx_auth->peer); 605 hostapd_sta_auth(hapd, rx_auth->peer, rx_auth->auth_transaction + 1,
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | driver_i.h | 548 enum tdls_oper oper, const u8 *peer) 552 return wpa_s->driver->tdls_oper(wpa_s->drv_priv, oper, peer); 591 enum wnm_oper oper, const u8 *peer, 596 return wpa_s->driver->wnm_oper(wpa_s->drv_priv, oper, peer, buf, 547 wpa_drv_tdls_oper(struct wpa_supplicant *wpa_s, enum tdls_oper oper, const u8 *peer) argument 590 wpa_drv_wnm_oper(struct wpa_supplicant *wpa_s, enum wnm_oper oper, const u8 *peer, u8 *buf, u16 *buf_len) argument
|
H A D | wpas_glue.c | 573 static int wpa_supplicant_tdls_oper(void *ctx, int oper, const u8 *peer) argument 576 return wpa_drv_tdls_oper(wpa_s, oper, peer); 581 void *ctx, const u8 *peer, int add, u16 aid, u16 capability, 594 params.addr = peer; 601 * qosinfo to check if the peer is WMM capable. 580 wpa_supplicant_tdls_peer_addset( void *ctx, const u8 *peer, int add, u16 aid, u16 capability, const u8 *supp_rates, size_t supp_rates_len, const struct ieee80211_ht_capabilities *ht_capab, const struct ieee80211_vht_capabilities *vht_capab, u8 qosinfo, const u8 *ext_capab, size_t ext_capab_len, const u8 *supp_channels, size_t supp_channels_len, const u8 *supp_oper_classes, size_t supp_oper_classes_len) argument
|
H A D | sme.c | 596 wpa_printf(MSG_DEBUG, "SAE: Failed to process peer " 638 if (os_memcmp(wpa_s->pending_bssid, data->auth.peer, ETH_ALEN) != 0) { 640 "unexpected peer " MACSTR, 641 MAC2STR(data->auth.peer)); 645 wpa_dbg(wpa_s, MSG_DEBUG, "SME: Authentication response: peer=" MACSTR 647 MAC2STR(data->auth.peer), data->auth.auth_type, 717 os_memcpy(edata.ft_ies.target_ap, data->auth.peer, ETH_ALEN); 722 sme_associate(wpa_s, ssid->mode, data->auth.peer,
|
H A D | events.c | 2409 wpa_sm_stkstart(wpa_s->wpa, data->stkstart.peer); 2422 wpa_tdls_remove(wpa_s->wpa, data->tdls.peer); 2424 wpa_tdls_start(wpa_s->wpa, data->tdls.peer); 2426 wpa_drv_tdls_oper(wpa_s, TDLS_SETUP, data->tdls.peer); 2430 wpa_tdls_teardown_link(wpa_s->wpa, data->tdls.peer, 2434 data->tdls.peer); 2495 ibss_rsn_start(wpa_s->ibss_rsn, data->ibss_rsn_start.peer); 3424 ibss_rsn_stop(wpa_s->ibss_rsn, data->ibss_peer_lost.peer);
|
H A D | p2p_supplicant.h | 122 void wpas_p2p_remove_client(struct wpa_supplicant *wpa_s, const u8 *peer,
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | wpa_auth_i.h | 20 u8 peer[ETH_ALEN]; member in struct:wpa_stsl_negotiation
|
H A D | drv_callbacks.c | 575 sta = ap_get_sta(hapd, rx_auth->peer); 577 sta = ap_sta_add(hapd, rx_auth->peer); 605 hostapd_sta_auth(hapd, rx_auth->peer, rx_auth->auth_transaction + 1,
|
/external/chromium_org/third_party/usrsctp/usrsctplib/netinet/ |
H A D | sctp_auth.c | 750 * find the best HMAC id to use for the peer based on local support 753 sctp_negotiate_hmacid(sctp_hmaclist_t *peer, sctp_hmaclist_t *local) argument 757 if ((local == NULL) || (peer == NULL)) 760 for (i = 0; i < peer->num_algo; i++) { 762 if (peer->hmac[i] == local->hmac[j]) { 765 "SCTP: negotiated peer HMAC id %u\n", 766 peer->hmac[i]); 767 return (peer->hmac[i]); 1563 /* negotiate what HMAC to use for the peer */ 1934 /* did the peer sen [all...] |
/external/chromium_org/net/quic/crypto/ |
H A D | crypto_server_test.cc | 162 QuicCryptoServerConfigPeer peer(&test_->config_); 163 base::Lock* m = peer.GetStrikeRegisterClientLock();
|
/external/chromium_org/ipc/ |
H A D | ipc_sync_channel_unittest.cc | 1270 RestrictedDispatchDeadlockServer* peer) 1275 peer_(peer) { } 1381 RestrictedDispatchDeadlockClient2* peer, 1386 peer_(peer), 1267 RestrictedDispatchDeadlockServer(int server_num, WaitableEvent* server_ready_event, WaitableEvent** events, RestrictedDispatchDeadlockServer* peer) argument 1380 RestrictedDispatchDeadlockClient1(RestrictedDispatchDeadlockServer* server, RestrictedDispatchDeadlockClient2* peer, WaitableEvent* server_ready_event, WaitableEvent** events) argument
|
/external/chromium_org/net/server/ |
H A D | http_server.cc | 142 // Sets peer address if exists. 143 socket->GetPeerAddress(&request.peer);
|
/external/wpa_supplicant_8/hostapd/src/pae/ |
H A D | ieee802_1x_kay_i.h | 308 u8 peer[0]; member in struct:ieee802_1x_mka_peer_body
|
/external/wpa_supplicant_8/src/pae/ |
H A D | ieee802_1x_kay_i.h | 308 u8 peer[0]; member in struct:ieee802_1x_mka_peer_body
|
/external/wpa_supplicant_8/wpa_supplicant/src/pae/ |
H A D | ieee802_1x_kay_i.h | 308 u8 peer[0]; member in struct:ieee802_1x_mka_peer_body
|
/external/chromium_org/third_party/openssl/openssl/ssl/ |
H A D | ssl_sess.c | 766 if (ss->peer != NULL) X509_free(ss->peer); 881 return s->peer;
|
H A D | s3_clnt.c | 1275 /* Inconsistency alert: cert_chain does include the peer's 1325 if (s->session->peer != NULL) 1326 X509_free(s->session->peer); 1328 s->session->peer=x; 1335 if (s->session->peer != NULL) 1336 X509_free(s->session->peer); 1337 s->session->peer=NULL; 2826 /* If we have client certificate, use its secret as peer key */
|
/external/libnl/lib/route/ |
H A D | addr.c | 21 * @note The address may not contain a prefix length if the peer address 40 * // The peer address can be specified if necessary, in either case a peer 43 * // Note: Real peer addresses are only supported by IPv4 for now. 80 * // local nor peer address have been specified. 91 * // The peer address can be specified if necessary, in either case a peer 94 * // Note: Real peer addresses are only supported by IPv4 for now. 250 * with IFA_ADDRESS being the peer address if they differ */ 322 nl_dump(p, " peer 888 rtnl_addr_set_peer(struct rtnl_addr *addr, struct nl_addr *peer) argument [all...] |
/external/openssl/ssl/ |
H A D | ssl_sess.c | 778 if (ss->peer != NULL) X509_free(ss->peer); 893 return s->peer;
|
/external/chromium_org/net/third_party/nss/ssl/ |
H A D | sslcon.c | 1832 ** Scan list of ciphers received from peer and look for a match in 2828 SSL_TRC(1, ("%d: SSL[%d]: client, using nonce for peer=0x%08x " 2830 SSL_GETPID(), ss->fd, ss->sec.ci.peer, ss->sec.ci.port)); 2869 sid->addr = ss->sec.ci.peer; 2995 /* Get peer name of server */ 3024 sid = ssl_LookupSID(&ss->sec.ci.peer, ss->sec.ci.port, ss->peerID, 3075 sid->addr = ss->sec.ci.peer; 3346 /* Get peer name of client */ 3456 SSL_GETPID(), ss->fd, ss->sec.ci.peer.pr_s6_addr32[0], 3457 ss->sec.ci.peer [all...] |
/external/qemu/ |
H A D | block.c | 691 assert(!bs->peer); 709 if (bs->peer) { 712 bs->peer = qdev; 718 assert(bs->peer == qdev); 719 bs->peer = NULL; 724 return bs->peer;
|