/external/wpa_supplicant_8/hostapd/src/wps/ |
H A D | wps_upnp.c | 1102 if (iface->peer.wps) 1103 wps_deinit(iface->peer.wps);
|
/external/wpa_supplicant_8/src/ap/ |
H A D | ap_drv_ops.c | 661 const u8 *peer, u8 *buf, u16 *buf_len) 665 return hapd->driver->wnm_oper(hapd->drv_priv, oper, peer, buf, 660 hostapd_drv_wnm_oper(struct hostapd_data *hapd, enum wnm_oper oper, const u8 *peer, u8 *buf, u16 *buf_len) argument
|
/external/wpa_supplicant_8/src/p2p/ |
H A D | p2p_sd.c | 58 return NULL; /* peer does not support SD */ 65 /* Use WSD only if the peer indicates support or it */ 82 os_memcmp(q->peer, dev->info.p2p_device_addr, ETH_ALEN) == 282 p2p_dbg(p2p, "No Listen/Operating frequency known for the peer " 427 * separately for each peer to avoid having to drop old 858 os_memcpy(q->peer, dst, ETH_ALEN);
|
/external/wpa_supplicant_8/src/wps/ |
H A D | wps_upnp.c | 1102 if (iface->peer.wps) 1103 wps_deinit(iface->peer.wps);
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | ap_drv_ops.c | 661 const u8 *peer, u8 *buf, u16 *buf_len) 665 return hapd->driver->wnm_oper(hapd->drv_priv, oper, peer, buf, 660 hostapd_drv_wnm_oper(struct hostapd_data *hapd, enum wnm_oper oper, const u8 *peer, u8 *buf, u16 *buf_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/p2p/ |
H A D | p2p_sd.c | 58 return NULL; /* peer does not support SD */ 65 /* Use WSD only if the peer indicates support or it */ 82 os_memcmp(q->peer, dev->info.p2p_device_addr, ETH_ALEN) == 282 p2p_dbg(p2p, "No Listen/Operating frequency known for the peer " 427 * separately for each peer to avoid having to drop old 858 os_memcpy(q->peer, dst, ETH_ALEN);
|
/external/wpa_supplicant_8/wpa_supplicant/src/wps/ |
H A D | wps_upnp.c | 1102 if (iface->peer.wps) 1103 wps_deinit(iface->peer.wps);
|
/external/openssh/ |
H A D | packet.c | 2352 (r = sshbuf_put_stringb(m, kex->peer)) != 0 || 2555 (kex->peer = sshbuf_new()) == NULL) { 2564 (r = sshbuf_get_stringb(m, kex->peer)) != 0 || 2577 if (kex->peer != NULL) 2578 sshbuf_free(kex->peer);
|
/external/iproute2/doc/ |
H A D | ip-cref.tex | 285 \item \verb|broadcast LLADDRESS|, \verb|brd LLADDRESS| or \verb|peer LLADDRESS| 287 --- change the link layer broadcast address or the peer address when 406 attached to each end. All packets sent to this link will reach the peer 407 and all packets received by us came from this single peer. 464 (or the peer address for pointopoint links) is a 471 NBMA links have no well-defined broadcast or peer address, 584 \item \verb|peer ADDRESS| 588 encoding the network prefix length. If a peer address is specified, 590 with the peer rather than with the local address. 3146 \# ---Optional peer addres [all...] |
/external/ipsec-tools/ |
H A D | setup.c | 657 const vchar_t *peer, int remoteid) 656 getsainfo(const vchar_t *src, const vchar_t *dst, const vchar_t *peer, int remoteid) argument
|
/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | driver_privsep.c | 399 os_memcpy(data.stkstart.peer, buf, ETH_ALEN);
|
H A D | driver_wext.c | 295 if (hwaddr_aton(custom + 17, data.stkstart.peer)) { 1818 * @addr: Address of the peer STA or ff:ff:ff:ff:ff:ff for
|
H A D | driver_nl80211.c | 7092 static int nl80211_tdls_oper(void *priv, enum tdls_oper oper, const u8 *peer) argument 7128 nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, peer)) {
|
/external/wpa_supplicant_8/src/drivers/ |
H A D | driver_privsep.c | 399 os_memcpy(data.stkstart.peer, buf, ETH_ALEN);
|
H A D | driver_wext.c | 295 if (hwaddr_aton(custom + 17, data.stkstart.peer)) { 1818 * @addr: Address of the peer STA or ff:ff:ff:ff:ff:ff for
|
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/ |
H A D | driver_privsep.c | 399 os_memcpy(data.stkstart.peer, buf, ETH_ALEN);
|
H A D | driver_wext.c | 295 if (hwaddr_aton(custom + 17, data.stkstart.peer)) { 1818 * @addr: Address of the peer STA or ff:ff:ff:ff:ff:ff for
|
/external/toybox/toys/pending/ |
H A D | ip.c | 744 char *line_feed = " ", *flags,*peer = "brd"; local 779 if (link->flags & IFF_POINTOPOINT) peer = "peer"; 789 line_feed, link->type, link->laddr, peer ,link->bcast); 957 *brd = toybuf+768, *peer = toybuf+1024, *any = toybuf+1280, local 1016 sprintf(peer, " peer %s/%d ", lbuf_ifa, ifa->ifa_prefixlen); 1036 printf("%s%s%s%s%s %c", family, brd, peer, scope, label, 1065 struct arglist cmd_objectlist[] = {{"dev",0}, {"peer", 1},
|
/external/dnsmasq/src/ |
H A D | dnsmasq.h | 592 struct sockaddr_in peer; member in struct:tftp_transfer
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | wpa_priv.c | 872 &data->stkstart.peer, ETH_ALEN);
|
/external/boringssl/src/ssl/ |
H A D | s3_clnt.c | 998 /* Inconsistency alert: cert_chain does include the peer's certificate, which 1036 X509_free(s->session->peer); 1037 s->session->peer = X509_up_ref(x);
|
H A D | ssl_lib.c | 776 r = s->session->peer; 795 /* If we are a client, cert_chain includes the peer's own certificate; if we 964 /* If we are waiting for a close from our peer, we are closed */
|
/external/netperf/ |
H A D | nettest_sctp.c | 2649 struct sockaddr_storage peer; 3704 struct sockaddr_storage peer; 4329 struct sockaddr_storage peeraddr; /* to communicate with peer */ 2640 struct sockaddr_storage peer; local 3693 struct sockaddr_storage peer; local
|
/external/boringssl/include/openssl/ |
H A D | ssl.h | 428 * before sending certificates to the peer. 527 * Version 1 - added the optional peer certificate. */ 655 X509 *peer; member in struct:ssl_session_st 656 /* when app_verify_callback accepts a session where the peer's certificate is 686 peer_sha256[SHA256_DIGEST_LENGTH]; /* SHA256 of peer certificate */ 722 /* SSL_get_secure_renegotiation_support returns one if the peer supports secure 1025 * hash of the peer's certifiate and then discard it to save memory and 1230 * the peer are rejected. It may be set at any point in a connection's lifetime 1477 * peer. Otherwise, they will be rejected with a fatal error. */ 1533 * for the peer, bu [all...] |
/external/boringssl/src/include/openssl/ |
H A D | ssl.h | 428 * before sending certificates to the peer. 527 * Version 1 - added the optional peer certificate. */ 655 X509 *peer; member in struct:ssl_session_st 656 /* when app_verify_callback accepts a session where the peer's certificate is 686 peer_sha256[SHA256_DIGEST_LENGTH]; /* SHA256 of peer certificate */ 722 /* SSL_get_secure_renegotiation_support returns one if the peer supports secure 1025 * hash of the peer's certifiate and then discard it to save memory and 1230 * the peer are rejected. It may be set at any point in a connection's lifetime 1477 * peer. Otherwise, they will be rejected with a fatal error. */ 1533 * for the peer, bu [all...] |