Searched refs:peer (Results 126 - 150 of 155) sorted by relevance

1234567

/external/wpa_supplicant_8/hostapd/src/wps/
H A Dwps_upnp.c1102 if (iface->peer.wps)
1103 wps_deinit(iface->peer.wps);
/external/wpa_supplicant_8/src/ap/
H A Dap_drv_ops.c661 const u8 *peer, u8 *buf, u16 *buf_len)
665 return hapd->driver->wnm_oper(hapd->drv_priv, oper, peer, buf,
660 hostapd_drv_wnm_oper(struct hostapd_data *hapd, enum wnm_oper oper, const u8 *peer, u8 *buf, u16 *buf_len) argument
/external/wpa_supplicant_8/src/p2p/
H A Dp2p_sd.c58 return NULL; /* peer does not support SD */
65 /* Use WSD only if the peer indicates support or it */
82 os_memcmp(q->peer, dev->info.p2p_device_addr, ETH_ALEN) ==
282 p2p_dbg(p2p, "No Listen/Operating frequency known for the peer "
427 * separately for each peer to avoid having to drop old
858 os_memcpy(q->peer, dst, ETH_ALEN);
/external/wpa_supplicant_8/src/wps/
H A Dwps_upnp.c1102 if (iface->peer.wps)
1103 wps_deinit(iface->peer.wps);
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dap_drv_ops.c661 const u8 *peer, u8 *buf, u16 *buf_len)
665 return hapd->driver->wnm_oper(hapd->drv_priv, oper, peer, buf,
660 hostapd_drv_wnm_oper(struct hostapd_data *hapd, enum wnm_oper oper, const u8 *peer, u8 *buf, u16 *buf_len) argument
/external/wpa_supplicant_8/wpa_supplicant/src/p2p/
H A Dp2p_sd.c58 return NULL; /* peer does not support SD */
65 /* Use WSD only if the peer indicates support or it */
82 os_memcmp(q->peer, dev->info.p2p_device_addr, ETH_ALEN) ==
282 p2p_dbg(p2p, "No Listen/Operating frequency known for the peer "
427 * separately for each peer to avoid having to drop old
858 os_memcpy(q->peer, dst, ETH_ALEN);
/external/wpa_supplicant_8/wpa_supplicant/src/wps/
H A Dwps_upnp.c1102 if (iface->peer.wps)
1103 wps_deinit(iface->peer.wps);
/external/openssh/
H A Dpacket.c2352 (r = sshbuf_put_stringb(m, kex->peer)) != 0 ||
2555 (kex->peer = sshbuf_new()) == NULL) {
2564 (r = sshbuf_get_stringb(m, kex->peer)) != 0 ||
2577 if (kex->peer != NULL)
2578 sshbuf_free(kex->peer);
/external/iproute2/doc/
H A Dip-cref.tex285 \item \verb|broadcast LLADDRESS|, \verb|brd LLADDRESS| or \verb|peer LLADDRESS|
287 --- change the link layer broadcast address or the peer address when
406 attached to each end. All packets sent to this link will reach the peer
407 and all packets received by us came from this single peer.
464 (or the peer address for pointopoint links) is a
471 NBMA links have no well-defined broadcast or peer address,
584 \item \verb|peer ADDRESS|
588 encoding the network prefix length. If a peer address is specified,
590 with the peer rather than with the local address.
3146 \# ---Optional peer addres
[all...]
/external/ipsec-tools/
H A Dsetup.c657 const vchar_t *peer, int remoteid)
656 getsainfo(const vchar_t *src, const vchar_t *dst, const vchar_t *peer, int remoteid) argument
/external/wpa_supplicant_8/hostapd/src/drivers/
H A Ddriver_privsep.c399 os_memcpy(data.stkstart.peer, buf, ETH_ALEN);
H A Ddriver_wext.c295 if (hwaddr_aton(custom + 17, data.stkstart.peer)) {
1818 * @addr: Address of the peer STA or ff:ff:ff:ff:ff:ff for
H A Ddriver_nl80211.c7092 static int nl80211_tdls_oper(void *priv, enum tdls_oper oper, const u8 *peer) argument
7128 nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, peer)) {
/external/wpa_supplicant_8/src/drivers/
H A Ddriver_privsep.c399 os_memcpy(data.stkstart.peer, buf, ETH_ALEN);
H A Ddriver_wext.c295 if (hwaddr_aton(custom + 17, data.stkstart.peer)) {
1818 * @addr: Address of the peer STA or ff:ff:ff:ff:ff:ff for
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/
H A Ddriver_privsep.c399 os_memcpy(data.stkstart.peer, buf, ETH_ALEN);
H A Ddriver_wext.c295 if (hwaddr_aton(custom + 17, data.stkstart.peer)) {
1818 * @addr: Address of the peer STA or ff:ff:ff:ff:ff:ff for
/external/toybox/toys/pending/
H A Dip.c744 char *line_feed = " ", *flags,*peer = "brd"; local
779 if (link->flags & IFF_POINTOPOINT) peer = "peer";
789 line_feed, link->type, link->laddr, peer ,link->bcast);
957 *brd = toybuf+768, *peer = toybuf+1024, *any = toybuf+1280, local
1016 sprintf(peer, " peer %s/%d ", lbuf_ifa, ifa->ifa_prefixlen);
1036 printf("%s%s%s%s%s %c", family, brd, peer, scope, label,
1065 struct arglist cmd_objectlist[] = {{"dev",0}, {"peer", 1},
/external/dnsmasq/src/
H A Ddnsmasq.h592 struct sockaddr_in peer; member in struct:tftp_transfer
/external/wpa_supplicant_8/wpa_supplicant/
H A Dwpa_priv.c872 &data->stkstart.peer, ETH_ALEN);
/external/boringssl/src/ssl/
H A Ds3_clnt.c998 /* Inconsistency alert: cert_chain does include the peer's certificate, which
1036 X509_free(s->session->peer);
1037 s->session->peer = X509_up_ref(x);
H A Dssl_lib.c776 r = s->session->peer;
795 /* If we are a client, cert_chain includes the peer's own certificate; if we
964 /* If we are waiting for a close from our peer, we are closed */
/external/netperf/
H A Dnettest_sctp.c2649 struct sockaddr_storage peer;
3704 struct sockaddr_storage peer;
4329 struct sockaddr_storage peeraddr; /* to communicate with peer */
2640 struct sockaddr_storage peer; local
3693 struct sockaddr_storage peer; local
/external/boringssl/include/openssl/
H A Dssl.h428 * before sending certificates to the peer.
527 * Version 1 - added the optional peer certificate. */
655 X509 *peer; member in struct:ssl_session_st
656 /* when app_verify_callback accepts a session where the peer's certificate is
686 peer_sha256[SHA256_DIGEST_LENGTH]; /* SHA256 of peer certificate */
722 /* SSL_get_secure_renegotiation_support returns one if the peer supports secure
1025 * hash of the peer's certifiate and then discard it to save memory and
1230 * the peer are rejected. It may be set at any point in a connection's lifetime
1477 * peer. Otherwise, they will be rejected with a fatal error. */
1533 * for the peer, bu
[all...]
/external/boringssl/src/include/openssl/
H A Dssl.h428 * before sending certificates to the peer.
527 * Version 1 - added the optional peer certificate. */
655 X509 *peer; member in struct:ssl_session_st
656 /* when app_verify_callback accepts a session where the peer's certificate is
686 peer_sha256[SHA256_DIGEST_LENGTH]; /* SHA256 of peer certificate */
722 /* SSL_get_secure_renegotiation_support returns one if the peer supports secure
1025 * hash of the peer's certifiate and then discard it to save memory and
1230 * the peer are rejected. It may be set at any point in a connection's lifetime
1477 * peer. Otherwise, they will be rejected with a fatal error. */
1533 * for the peer, bu
[all...]

Completed in 877 milliseconds

1234567