/external/chromium_org/third_party/usrsctp/usrsctplib/netinet/ |
H A D | sctp_auth.c | 735 * find the best HMAC id to use for the peer based on local support 738 sctp_negotiate_hmacid(sctp_hmaclist_t *peer, sctp_hmaclist_t *local) argument 742 if ((local == NULL) || (peer == NULL)) 745 for (i = 0; i < peer->num_algo; i++) { 747 if (peer->hmac[i] == local->hmac[j]) { 750 "SCTP: negotiated peer HMAC id %u\n", 751 peer->hmac[i]); 752 return (peer->hmac[i]); 1548 /* negotiate what HMAC to use for the peer */ 1920 /* did the peer sen [all...] |
/external/chromium_org/net/quic/crypto/ |
H A D | crypto_server_test.cc | 162 QuicCryptoServerConfigPeer peer(&test_->config_); 163 base::Lock* m = peer.GetStrikeRegisterClientLock();
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | events.c | 2411 wpa_sm_stkstart(wpa_s->wpa, data->stkstart.peer); 2424 wpa_tdls_remove(wpa_s->wpa, data->tdls.peer); 2426 wpa_tdls_start(wpa_s->wpa, data->tdls.peer); 2428 wpa_drv_tdls_oper(wpa_s, TDLS_SETUP, data->tdls.peer); 2432 wpa_tdls_teardown_link(wpa_s->wpa, data->tdls.peer, 2436 data->tdls.peer); 2497 ibss_rsn_start(wpa_s->ibss_rsn, data->ibss_rsn_start.peer); 3428 ibss_rsn_stop(wpa_s->ibss_rsn, data->ibss_peer_lost.peer);
|
H A D | p2p_supplicant.h | 123 void wpas_p2p_remove_client(struct wpa_supplicant *wpa_s, const u8 *peer,
|
/external/chromium_org/ipc/ |
H A D | ipc_sync_channel_unittest.cc | 1270 RestrictedDispatchDeadlockServer* peer) 1275 peer_(peer) { } 1381 RestrictedDispatchDeadlockClient2* peer, 1386 peer_(peer), 1267 RestrictedDispatchDeadlockServer(int server_num, WaitableEvent* server_ready_event, WaitableEvent** events, RestrictedDispatchDeadlockServer* peer) argument 1380 RestrictedDispatchDeadlockClient1(RestrictedDispatchDeadlockServer* server, RestrictedDispatchDeadlockClient2* peer, WaitableEvent* server_ready_event, WaitableEvent** events) argument
|
/external/wpa_supplicant_8/hostapd/src/pae/ |
H A D | ieee802_1x_kay_i.h | 308 u8 peer[0]; member in struct:ieee802_1x_mka_peer_body
|
/external/wpa_supplicant_8/src/pae/ |
H A D | ieee802_1x_kay_i.h | 308 u8 peer[0]; member in struct:ieee802_1x_mka_peer_body
|
/external/wpa_supplicant_8/wpa_supplicant/src/pae/ |
H A D | ieee802_1x_kay_i.h | 308 u8 peer[0]; member in struct:ieee802_1x_mka_peer_body
|
/external/chromium_org/third_party/boringssl/src/ssl/ |
H A D | ssl_sess.c | 709 if (ss->peer != NULL) X509_free(ss->peer); 807 return s->peer;
|
H A D | d1_srvr.c | 408 ((s->session->peer != NULL) &&
|
/external/libnl/lib/route/ |
H A D | addr.c | 21 * @note The address may not contain a prefix length if the peer address 40 * // The peer address can be specified if necessary, in either case a peer 43 * // Note: Real peer addresses are only supported by IPv4 for now. 80 * // local nor peer address have been specified. 91 * // The peer address can be specified if necessary, in either case a peer 94 * // Note: Real peer addresses are only supported by IPv4 for now. 250 * with IFA_ADDRESS being the peer address if they differ */ 322 nl_dump(p, " peer 888 rtnl_addr_set_peer(struct rtnl_addr *addr, struct nl_addr *peer) argument [all...] |
/external/openssl/ssl/ |
H A D | ssl_sess.c | 778 if (ss->peer != NULL) X509_free(ss->peer); 893 return s->peer;
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | drv_callbacks.c | 580 sta = ap_get_sta(hapd, rx_auth->peer); 582 sta = ap_sta_add(hapd, rx_auth->peer); 610 hostapd_sta_auth(hapd, rx_auth->peer, rx_auth->auth_transaction + 1,
|
H A D | ap_drv_ops.h | 119 enum wnm_oper oper, const u8 *peer,
|
/external/wpa_supplicant_8/src/ap/ |
H A D | drv_callbacks.c | 580 sta = ap_get_sta(hapd, rx_auth->peer); 582 sta = ap_sta_add(hapd, rx_auth->peer); 610 hostapd_sta_auth(hapd, rx_auth->peer, rx_auth->auth_transaction + 1,
|
H A D | ap_drv_ops.h | 119 enum wnm_oper oper, const u8 *peer,
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | drv_callbacks.c | 580 sta = ap_get_sta(hapd, rx_auth->peer); 582 sta = ap_sta_add(hapd, rx_auth->peer); 610 hostapd_sta_auth(hapd, rx_auth->peer, rx_auth->auth_transaction + 1,
|
H A D | ap_drv_ops.h | 119 enum wnm_oper oper, const u8 *peer,
|
/external/chromium_org/net/third_party/nss/ssl/ |
H A D | sslcon.c | 1832 ** Scan list of ciphers received from peer and look for a match in 2828 SSL_TRC(1, ("%d: SSL[%d]: client, using nonce for peer=0x%08x " 2830 SSL_GETPID(), ss->fd, ss->sec.ci.peer, ss->sec.ci.port)); 2869 sid->addr = ss->sec.ci.peer; 2995 /* Get peer name of server */ 3024 sid = ssl_LookupSID(&ss->sec.ci.peer, ss->sec.ci.port, ss->peerID, 3075 sid->addr = ss->sec.ci.peer; 3346 /* Get peer name of client */ 3456 SSL_GETPID(), ss->fd, ss->sec.ci.peer.pr_s6_addr32[0], 3457 ss->sec.ci.peer [all...] |
/external/qemu/ |
H A D | block.c | 691 assert(!bs->peer); 709 if (bs->peer) { 712 bs->peer = qdev; 718 assert(bs->peer == qdev); 719 bs->peer = NULL; 724 return bs->peer;
|
/external/qemu/hw/android/goldfish/ |
H A D | pipe.c | 421 void* peer = svc->funcs.init(pipe, svc->opaque, pipeArgs); local 422 if (peer == NULL) { 428 pipe->opaque = peer;
|
/external/chromium_org/chromeos/dbus/ |
H A D | fake_shill_device_client.cc | 244 const std::string& peer, 241 PerformTDLSOperation( const dbus::ObjectPath& device_path, const std::string& operation, const std::string& peer, const StringCallback& callback, const ErrorCallback& error_callback) argument
|
/external/chromium_org/net/server/ |
H A D | http_server.cc | 227 // Sets peer address if exists. 228 connection->socket()->GetPeerAddress(&request.peer);
|
/external/chromium_org/third_party/boringssl/src/include/openssl/ |
H A D | evp.h | 514 /* EVP_PKEY_derive_set_peer sets the peer's key to be used for key derivation 515 * by |ctx| to |peer|. It should be called after |EVP_PKEY_derive_init|. (For 516 * example, this is used to set the peer's key in (EC)DH.) It returns one on 518 OPENSSL_EXPORT int EVP_PKEY_derive_set_peer(EVP_PKEY_CTX *ctx, EVP_PKEY *peer); 570 * 0: Is called from |EVP_PKEY_derive_set_peer| and |p2| contains a peer key. 573 * peer key. If the return value is <= 0, the key is rejected. 574 * 2: Is called with |p2| == NULL to test whether the peer's key was used. 576 * 3: Is called with |p2| == NULL to set whether the peer's key was used.
|
/external/sepolicy/ |
H A D | access_vectors | 811 # network peer labels 812 class peer
|