/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | tdls.c | 84 static void wpa_tdls_peer_free(struct wpa_sm *sm, struct wpa_tdls_peer *peer); 86 struct wpa_tdls_peer *peer); 175 static int wpa_tdls_del_key(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument 177 if (wpa_sm_set_key(sm, WPA_ALG_NONE, peer->addr, 188 static int wpa_tdls_set_key(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument 196 switch (peer->cipher) { 211 if (wpa_sm_set_key(sm, alg, peer->addr, -1, 1, 212 rsc, sizeof(rsc), peer->tpk.tk, key_len) < 0) { 236 struct wpa_tdls_peer *peer; local 258 for (peer 301 wpa_tdls_do_teardown(struct wpa_sm *sm, struct wpa_tdls_peer *peer, u16 reason_code) argument 318 struct wpa_tdls_peer *peer = timeout_ctx; local 363 wpa_tdls_tpk_retry_timeout_cancel(struct wpa_sm *sm, struct wpa_tdls_peer *peer, u8 action_code) argument 389 wpa_tdls_generate_tpk(struct wpa_tdls_peer *peer, const u8 *own_addr, const u8 *bssid) argument 563 wpa_supplicant_verify_tdls_mic(u8 trans_seq, struct wpa_tdls_peer *peer, const u8 *lnkid, const u8 *timeoutie, const struct wpa_tdls_ftie *ftie) argument 592 wpa_supplicant_verify_tdls_mic_teardown( u8 trans_seq, u16 rcode, u8 dtoken, struct wpa_tdls_peer *peer, const u8 *lnkid, const struct wpa_tdls_ftie *ftie) argument 618 struct wpa_tdls_peer *peer = timeout_ctx; local 641 wpa_tdls_peer_remove_from_list(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument 667 wpa_tdls_peer_clear(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument 700 wpa_tdls_peer_free(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument 708 wpa_tdls_linkid(struct wpa_sm *sm, struct wpa_tdls_peer *peer, struct wpa_tdls_lnkid *lnkid) argument 727 struct wpa_tdls_peer *peer; local 820 struct wpa_tdls_peer *peer; local 846 wpa_tdls_disable_peer_link(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument 856 struct wpa_tdls_peer *peer; local 889 struct wpa_tdls_peer *peer; local 912 struct wpa_tdls_peer *peer = NULL; local 1012 struct wpa_tdls_peer *peer; local 1039 wpa_tdls_send_tpk_m1(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument 1218 wpa_tdls_send_tpk_m2(struct wpa_sm *sm, const unsigned char *src_addr, u8 dtoken, struct wpa_tdls_lnkid *lnkid, const struct wpa_tdls_peer *peer) argument 1309 wpa_tdls_send_tpk_m3(struct wpa_sm *sm, const unsigned char *src_addr, u8 dtoken, struct wpa_tdls_lnkid *lnkid, const struct wpa_tdls_peer *peer) argument 1407 wpa_tdls_send_discovery_response(struct wpa_sm *sm, struct wpa_tdls_peer *peer, u8 dialog_token) argument 1499 struct wpa_tdls_peer *peer; local 1561 copy_supp_rates(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1577 copy_peer_ht_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1603 copy_peer_vht_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1629 copy_peer_ext_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1653 copy_peer_wmm_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1678 copy_peer_supp_channels(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1704 copy_peer_supp_oper_classes(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1730 wpa_tdls_addset_peer(struct wpa_sm *sm, struct wpa_tdls_peer *peer, int add) argument 1750 struct wpa_tdls_peer *peer; local 2099 wpa_tdls_enable_link(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument 2137 struct wpa_tdls_peer *peer; local 2417 struct wpa_tdls_peer *peer; local 2598 struct wpa_tdls_peer *peer; local 2650 struct wpa_tdls_peer *peer; local 2788 struct wpa_tdls_peer *peer, *tmp; local 2813 struct wpa_tdls_peer *peer, *tmp; local 2937 struct wpa_tdls_peer *peer; local 2984 struct wpa_tdls_peer *peer; local [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | tdls.c | 84 static void wpa_tdls_peer_free(struct wpa_sm *sm, struct wpa_tdls_peer *peer); 86 struct wpa_tdls_peer *peer); 175 static int wpa_tdls_del_key(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument 177 if (wpa_sm_set_key(sm, WPA_ALG_NONE, peer->addr, 188 static int wpa_tdls_set_key(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument 196 switch (peer->cipher) { 211 if (wpa_sm_set_key(sm, alg, peer->addr, -1, 1, 212 rsc, sizeof(rsc), peer->tpk.tk, key_len) < 0) { 236 struct wpa_tdls_peer *peer; local 258 for (peer 301 wpa_tdls_do_teardown(struct wpa_sm *sm, struct wpa_tdls_peer *peer, u16 reason_code) argument 318 struct wpa_tdls_peer *peer = timeout_ctx; local 363 wpa_tdls_tpk_retry_timeout_cancel(struct wpa_sm *sm, struct wpa_tdls_peer *peer, u8 action_code) argument 389 wpa_tdls_generate_tpk(struct wpa_tdls_peer *peer, const u8 *own_addr, const u8 *bssid) argument 563 wpa_supplicant_verify_tdls_mic(u8 trans_seq, struct wpa_tdls_peer *peer, const u8 *lnkid, const u8 *timeoutie, const struct wpa_tdls_ftie *ftie) argument 592 wpa_supplicant_verify_tdls_mic_teardown( u8 trans_seq, u16 rcode, u8 dtoken, struct wpa_tdls_peer *peer, const u8 *lnkid, const struct wpa_tdls_ftie *ftie) argument 618 struct wpa_tdls_peer *peer = timeout_ctx; local 641 wpa_tdls_peer_remove_from_list(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument 667 wpa_tdls_peer_clear(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument 700 wpa_tdls_peer_free(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument 708 wpa_tdls_linkid(struct wpa_sm *sm, struct wpa_tdls_peer *peer, struct wpa_tdls_lnkid *lnkid) argument 727 struct wpa_tdls_peer *peer; local 820 struct wpa_tdls_peer *peer; local 846 wpa_tdls_disable_peer_link(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument 856 struct wpa_tdls_peer *peer; local 889 struct wpa_tdls_peer *peer; local 912 struct wpa_tdls_peer *peer = NULL; local 1012 struct wpa_tdls_peer *peer; local 1039 wpa_tdls_send_tpk_m1(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument 1218 wpa_tdls_send_tpk_m2(struct wpa_sm *sm, const unsigned char *src_addr, u8 dtoken, struct wpa_tdls_lnkid *lnkid, const struct wpa_tdls_peer *peer) argument 1309 wpa_tdls_send_tpk_m3(struct wpa_sm *sm, const unsigned char *src_addr, u8 dtoken, struct wpa_tdls_lnkid *lnkid, const struct wpa_tdls_peer *peer) argument 1407 wpa_tdls_send_discovery_response(struct wpa_sm *sm, struct wpa_tdls_peer *peer, u8 dialog_token) argument 1499 struct wpa_tdls_peer *peer; local 1561 copy_supp_rates(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1577 copy_peer_ht_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1603 copy_peer_vht_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1629 copy_peer_ext_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1653 copy_peer_wmm_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1678 copy_peer_supp_channels(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1704 copy_peer_supp_oper_classes(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1730 wpa_tdls_addset_peer(struct wpa_sm *sm, struct wpa_tdls_peer *peer, int add) argument 1750 struct wpa_tdls_peer *peer; local 2099 wpa_tdls_enable_link(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument 2137 struct wpa_tdls_peer *peer; local 2417 struct wpa_tdls_peer *peer; local 2598 struct wpa_tdls_peer *peer; local 2650 struct wpa_tdls_peer *peer; local 2788 struct wpa_tdls_peer *peer, *tmp; local 2813 struct wpa_tdls_peer *peer, *tmp; local 2937 struct wpa_tdls_peer *peer; local 2984 struct wpa_tdls_peer *peer; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | tdls.c | 84 static void wpa_tdls_peer_free(struct wpa_sm *sm, struct wpa_tdls_peer *peer); 86 struct wpa_tdls_peer *peer); 175 static int wpa_tdls_del_key(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument 177 if (wpa_sm_set_key(sm, WPA_ALG_NONE, peer->addr, 188 static int wpa_tdls_set_key(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument 196 switch (peer->cipher) { 211 if (wpa_sm_set_key(sm, alg, peer->addr, -1, 1, 212 rsc, sizeof(rsc), peer->tpk.tk, key_len) < 0) { 236 struct wpa_tdls_peer *peer; local 258 for (peer 301 wpa_tdls_do_teardown(struct wpa_sm *sm, struct wpa_tdls_peer *peer, u16 reason_code) argument 318 struct wpa_tdls_peer *peer = timeout_ctx; local 363 wpa_tdls_tpk_retry_timeout_cancel(struct wpa_sm *sm, struct wpa_tdls_peer *peer, u8 action_code) argument 389 wpa_tdls_generate_tpk(struct wpa_tdls_peer *peer, const u8 *own_addr, const u8 *bssid) argument 563 wpa_supplicant_verify_tdls_mic(u8 trans_seq, struct wpa_tdls_peer *peer, const u8 *lnkid, const u8 *timeoutie, const struct wpa_tdls_ftie *ftie) argument 592 wpa_supplicant_verify_tdls_mic_teardown( u8 trans_seq, u16 rcode, u8 dtoken, struct wpa_tdls_peer *peer, const u8 *lnkid, const struct wpa_tdls_ftie *ftie) argument 618 struct wpa_tdls_peer *peer = timeout_ctx; local 641 wpa_tdls_peer_remove_from_list(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument 667 wpa_tdls_peer_clear(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument 700 wpa_tdls_peer_free(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument 708 wpa_tdls_linkid(struct wpa_sm *sm, struct wpa_tdls_peer *peer, struct wpa_tdls_lnkid *lnkid) argument 727 struct wpa_tdls_peer *peer; local 820 struct wpa_tdls_peer *peer; local 846 wpa_tdls_disable_peer_link(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument 856 struct wpa_tdls_peer *peer; local 889 struct wpa_tdls_peer *peer; local 912 struct wpa_tdls_peer *peer = NULL; local 1012 struct wpa_tdls_peer *peer; local 1039 wpa_tdls_send_tpk_m1(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument 1218 wpa_tdls_send_tpk_m2(struct wpa_sm *sm, const unsigned char *src_addr, u8 dtoken, struct wpa_tdls_lnkid *lnkid, const struct wpa_tdls_peer *peer) argument 1309 wpa_tdls_send_tpk_m3(struct wpa_sm *sm, const unsigned char *src_addr, u8 dtoken, struct wpa_tdls_lnkid *lnkid, const struct wpa_tdls_peer *peer) argument 1407 wpa_tdls_send_discovery_response(struct wpa_sm *sm, struct wpa_tdls_peer *peer, u8 dialog_token) argument 1499 struct wpa_tdls_peer *peer; local 1561 copy_supp_rates(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1577 copy_peer_ht_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1603 copy_peer_vht_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1629 copy_peer_ext_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1653 copy_peer_wmm_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1678 copy_peer_supp_channels(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1704 copy_peer_supp_oper_classes(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1730 wpa_tdls_addset_peer(struct wpa_sm *sm, struct wpa_tdls_peer *peer, int add) argument 1750 struct wpa_tdls_peer *peer; local 2099 wpa_tdls_enable_link(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument 2137 struct wpa_tdls_peer *peer; local 2417 struct wpa_tdls_peer *peer; local 2598 struct wpa_tdls_peer *peer; local 2650 struct wpa_tdls_peer *peer; local 2788 struct wpa_tdls_peer *peer, *tmp; local 2813 struct wpa_tdls_peer *peer, *tmp; local 2937 struct wpa_tdls_peer *peer; local 2984 struct wpa_tdls_peer *peer; local [all...] |
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/spdy/ |
H A D | Spdy3ConnectionTest.java | 59 private final MockSpdyPeer peer = new MockSpdyPeer(); field in class:Spdy3ConnectionTest 62 peer.close(); 67 peer.acceptFrame(); // SYN_STREAM 68 peer.sendFrame() 70 peer.sendFrame().data(true, 1, new Buffer().writeUtf8("robot"), 5); 71 peer.acceptFrame(); // DATA 72 peer.play(); 75 SpdyConnection connection = connection(peer, SPDY3); 84 // verify the peer received what was expected 85 MockSpdyPeer.InFrame synStream = peer 1310 connection(MockSpdyPeer peer, Variant variant) argument 1314 connectionBuilder(MockSpdyPeer peer, Variant variant) argument [all...] |
H A D | Http2ConnectionTest.java | 50 private final MockSpdyPeer peer = new MockSpdyPeer(); field in class:Http2ConnectionTest 53 peer.close(); 57 peer.setVariantAndClient(HTTP_2, false); 60 peer.sendFrame().ping(false, 2, 3); 61 peer.acceptFrame(); // PING 62 peer.play(); 65 connection(peer, HTTP_2); 67 // verify the peer received what was expected 68 MockSpdyPeer.InFrame ping = peer.takeFrame(); 77 peer 452 connection(MockSpdyPeer peer, Variant variant) argument 456 connectionBuilder(MockSpdyPeer peer, Variant variant) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | ibss_rsn.c | 30 struct ibss_rsn_peer *peer; local 32 for (peer = ibss_rsn->peers; peer; peer = peer->next) 33 if (os_memcmp(addr, peer->addr, ETH_ALEN) == 0) 35 return peer; 39 static void ibss_rsn_free(struct ibss_rsn_peer *peer) argument 41 eloop_cancel_timeout(ibss_rsn_auth_timeout, peer, NULL); 42 wpa_auth_sta_deinit(peer 50 struct ibss_rsn_peer *peer = ctx; local 57 struct ibss_rsn_peer *peer = ctx; local 65 struct ibss_rsn_peer *peer = ctx; local 110 struct ibss_rsn_peer *peer = ctx; local 123 ibss_check_rsn_completed(struct ibss_rsn_peer *peer) argument 144 struct ibss_rsn_peer *peer = ctx; local 175 struct ibss_rsn_peer *peer = ctx; local 202 ibss_rsn_supp_init(struct ibss_rsn_peer *peer, const u8 *own_addr, const u8 *psk) argument 310 struct ibss_rsn_peer *peer; local 346 struct ibss_rsn_peer *peer; local 359 ibss_set_sta_authorized(struct ibss_rsn *ibss_rsn, struct ibss_rsn_peer *peer, int authorized) argument 389 struct ibss_rsn_peer *peer = ibss_rsn_get_peer(ibss_rsn, addr); local 445 ibss_rsn_auth_init(struct ibss_rsn *ibss_rsn, struct ibss_rsn_peer *peer) argument 505 ibss_rsn_is_auth_started(struct ibss_rsn_peer * peer) argument 515 struct ibss_rsn_peer *peer; local 554 struct ibss_rsn_peer *peer = eloop_ctx; local 571 struct ibss_rsn_peer *peer; local 604 ibss_rsn_peer_authenticated(struct ibss_rsn *ibss_rsn, struct ibss_rsn_peer *peer, int reason) argument 630 struct ibss_rsn_peer *peer, *prev; local 688 struct ibss_rsn_peer *peer, *prev; local 749 ibss_rsn_process_rx_eapol(struct ibss_rsn *ibss_rsn, struct ibss_rsn_peer *peer, const u8 *buf, size_t len) argument 791 struct ibss_rsn_peer *peer; local 830 ibss_rsn_handle_auth_1_of_2(struct ibss_rsn *ibss_rsn, struct ibss_rsn_peer *peer, const u8* addr) argument 883 struct ibss_rsn_peer *peer; local [all...] |
/external/v8/tools/testrunner/server/ |
H A D | status_handler.py | 36 def _StatusQuery(peer, query): 38 code = sock.connect_ex((peer.address, constants.STATUS_PORT)) 55 def RequestTrustedPubkeys(peer, server): 56 pubkey_list = _StatusQuery(peer, [constants.LIST_TRUSTED_PUBKEYS]) 59 result = _StatusQuery(peer, [constants.GET_SIGNED_PUBKEY, pubkey]) 63 def NotifyNewTrusted(peer, data): 64 _StatusQuery(peer, [constants.NOTIFY_NEW_TRUSTED] + data) 67 def ITrustYouNow(peer): 68 _StatusQuery(peer, [constants.TRUST_YOU_NOW]) 71 def TryTransitiveTrust(peer, pubke [all...] |
H A D | main.py | 151 def AddPeer(self, peer): 154 if p.address == peer.address: 156 self.peers.append(peer) 157 if peer.trusted: 158 status_handler.ITrustYouNow(peer) 187 for peer in self.peers: 188 if peer.address == self.ip: continue 189 if peer.pubkey == fingerprint: 190 status_handler.ITrustYouNow(peer) 193 status_handler.NotifyNewTrusted(peer, resul [all...] |
/external/v8/tools/testrunner/objects/ |
H A D | workpacket.py | 33 def __init__(self, peer=None, context=None, tests=None, binaries=None, 35 self.peer = peer 50 for shell in self.peer.shells: 64 for t in self.peer.tests:
|
/external/boringssl/src/crypto/bio/ |
H A D | pair.c | 64 BIO *peer; /* NULL if buf == NULL. member in struct:bio_bio_st 65 * If peer != NULL, then peer->ptr is also a bio_bio_st, 66 * and its "peer" member points back to us. 67 * peer != NULL iff init != 0 in the BIO. */ 69 /* This is for what we write (i.e. reading uses peer's struct): */ 70 int closed; /* valid iff peer != NULL */ 71 size_t len; /* valid iff buf != NULL; 0 if peer == NULL */ 82 size_t request; /* valid iff peer != NULL; 0 if len != 0, 83 * otherwise set by peer t [all...] |
/external/v8/tools/testrunner/network/ |
H A D | distro.py | 77 # Pick the least-busy peer. Sorting the list for each test 81 # If the peer already has a shell assigned and would need this one 83 peer = peers[index] 84 if (shell.total_duration < peer.needed_work and 85 len(peer.shells) > 0 and 90 peer.AddTests(shell)
|
H A D | network_execution.py | 38 from ..objects import peer namespace 49 return [ peer.Peer.Unpack(p) for p in data ] 143 # Spawn one thread for each peer. 170 def _TalkToPeer(self, peer): 173 code = sock.connect_ex((peer.address, constants.PEER_PORT)) 176 peer.runtime = None 178 packet = workpacket.WorkPacket(peer=peer, context=self.context, 191 # The peer is reporting an error. 193 print("\nPeer %s reports error: %s" % (peer [all...] |
/external/iproute2/ip/ |
H A D | ifcfg | 81 peer=$1 82 if [ "$peer" != "" ]; then 87 pfx="$ipaddr peer $peer" 141 elif [ "$peer" != "" ]; then 142 if ping -q -c 2 -w 4 $peer ; then 143 ip ro append default via $peer dev $dev metric 30001
|
/external/wpa_supplicant_8/hostapd/src/pae/ |
H A D | ieee802_1x_kay.c | 166 mi = body->peer + i; 291 struct ieee802_1x_kay_peer *peer; local 293 dl_list_for_each(peer, peers, struct ieee802_1x_kay_peer, list) { 294 if (os_memcmp(peer->mi, mi, MI_LEN) == 0) 295 return peer; 343 struct ieee802_1x_kay_peer *peer; local 345 peer = get_peer_mi(&participant->live_peers, mi); 346 if (peer) 347 return peer; 391 struct ieee802_1x_kay_peer *peer; local 519 struct ieee802_1x_kay_peer *peer; local 563 struct ieee802_1x_kay_peer *peer; local 595 struct ieee802_1x_kay_peer *peer; local 710 struct ieee802_1x_kay_peer *peer; local 804 struct ieee802_1x_kay_peer *peer; local 823 struct ieee802_1x_kay_peer *peer; local 865 struct ieee802_1x_kay_peer *peer; local 884 struct ieee802_1x_kay_peer *peer; local 985 struct ieee802_1x_kay_peer *peer; local 1242 struct ieee802_1x_kay_peer *peer; local 1521 struct ieee802_1x_kay_peer *peer; local 1949 struct ieee802_1x_kay_peer *peer; local 2091 struct ieee802_1x_kay_peer *peer; local 2204 struct ieee802_1x_kay_peer *peer; local 2354 struct ieee802_1x_kay_peer *peer, *pre_peer; local 3408 struct ieee802_1x_kay_peer *peer; local [all...] |
/external/wpa_supplicant_8/src/pae/ |
H A D | ieee802_1x_kay.c | 166 mi = body->peer + i; 291 struct ieee802_1x_kay_peer *peer; local 293 dl_list_for_each(peer, peers, struct ieee802_1x_kay_peer, list) { 294 if (os_memcmp(peer->mi, mi, MI_LEN) == 0) 295 return peer; 343 struct ieee802_1x_kay_peer *peer; local 345 peer = get_peer_mi(&participant->live_peers, mi); 346 if (peer) 347 return peer; 391 struct ieee802_1x_kay_peer *peer; local 519 struct ieee802_1x_kay_peer *peer; local 563 struct ieee802_1x_kay_peer *peer; local 595 struct ieee802_1x_kay_peer *peer; local 710 struct ieee802_1x_kay_peer *peer; local 804 struct ieee802_1x_kay_peer *peer; local 823 struct ieee802_1x_kay_peer *peer; local 865 struct ieee802_1x_kay_peer *peer; local 884 struct ieee802_1x_kay_peer *peer; local 985 struct ieee802_1x_kay_peer *peer; local 1242 struct ieee802_1x_kay_peer *peer; local 1521 struct ieee802_1x_kay_peer *peer; local 1949 struct ieee802_1x_kay_peer *peer; local 2091 struct ieee802_1x_kay_peer *peer; local 2204 struct ieee802_1x_kay_peer *peer; local 2354 struct ieee802_1x_kay_peer *peer, *pre_peer; local 3408 struct ieee802_1x_kay_peer *peer; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/pae/ |
H A D | ieee802_1x_kay.c | 166 mi = body->peer + i; 291 struct ieee802_1x_kay_peer *peer; local 293 dl_list_for_each(peer, peers, struct ieee802_1x_kay_peer, list) { 294 if (os_memcmp(peer->mi, mi, MI_LEN) == 0) 295 return peer; 343 struct ieee802_1x_kay_peer *peer; local 345 peer = get_peer_mi(&participant->live_peers, mi); 346 if (peer) 347 return peer; 391 struct ieee802_1x_kay_peer *peer; local 519 struct ieee802_1x_kay_peer *peer; local 563 struct ieee802_1x_kay_peer *peer; local 595 struct ieee802_1x_kay_peer *peer; local 710 struct ieee802_1x_kay_peer *peer; local 804 struct ieee802_1x_kay_peer *peer; local 823 struct ieee802_1x_kay_peer *peer; local 865 struct ieee802_1x_kay_peer *peer; local 884 struct ieee802_1x_kay_peer *peer; local 985 struct ieee802_1x_kay_peer *peer; local 1242 struct ieee802_1x_kay_peer *peer; local 1521 struct ieee802_1x_kay_peer *peer; local 1949 struct ieee802_1x_kay_peer *peer; local 2091 struct ieee802_1x_kay_peer *peer; local 2204 struct ieee802_1x_kay_peer *peer; local 2354 struct ieee802_1x_kay_peer *peer, *pre_peer; local 3408 struct ieee802_1x_kay_peer *peer; local [all...] |
/external/iptables/libipq/ |
H A D | libipq.c | 77 { IPQ_ERR_ADDRLEN, "Invalid peer address length" }, 107 (struct sockaddr *)&h->peer, sizeof(h->peer)); 135 addrlen = sizeof(h->peer); 168 (struct sockaddr *)&h->peer, &addrlen); 173 if (addrlen != sizeof(h->peer)) { 177 if (h->peer.nl_pid != 0) { 248 memset(&h->peer, 0, sizeof(struct sockaddr_nl)); 249 h->peer.nl_family = AF_NETLINK; 250 h->peer [all...] |
/external/iputils/ |
H A D | tftpd.c | 79 int peer; variable 189 peer = socket(from.sa.sa_family, SOCK_DGRAM, 0); 190 if (peer < 0) { 194 if (connect(peer, (struct sockaddr *)&from, sizeof(from)) < 0) { 372 if (send(peer, dp, size + 4, confirmed) != size + 4) { 380 n = recv(peer, ackbuf, sizeof (ackbuf), 0); 398 synchnet(peer); 437 if (send(peer, ackbuf, 4, confirmed) != 4) { 445 n = recv(peer, dp, PKTSIZE, 0); 461 (void) synchnet(peer); [all...] |
/external/wpa_supplicant_8/hostapd/src/p2p/ |
H A D | p2p_go_neg.c | 54 p2p_info(p2p, "Mismatching country (ours=%c%c peer's=%c%c)", 65 p2p_info(p2p, "Invalid peer Channel List"); 79 p2p_dbg(p2p, "Own reg_classes %d peer reg_classes %d intersection reg_classes %d", 138 struct p2p_device *peer) 158 p2p_buf_add_public_action_hdr(buf, P2P_GO_NEG_REQ, peer->dialog_token); 162 if (peer->flags & P2P_DEV_PREFER_PERSISTENT_GROUP) { 164 if (peer->flags & P2P_DEV_PREFER_PERSISTENT_RECONN) 174 p2p_buf_add_go_intent(buf, (p2p->go_intent << 1) | peer->tie_breaker); 183 p2p_buf_add_device_info(buf, p2p, peer); 189 pw_id = p2p_wps_method_pw_id(peer 137 p2p_build_go_neg_req(struct p2p_data *p2p, struct p2p_device *peer) argument 268 p2p_build_go_neg_resp(struct p2p_data *p2p, struct p2p_device *peer, u8 dialog_token, u8 status, u8 tie_breaker) argument 865 p2p_build_go_neg_conf(struct p2p_data *p2p, struct p2p_device *peer, u8 dialog_token, u8 status, const u8 *resp_chan, int go) argument [all...] |
/external/wpa_supplicant_8/src/p2p/ |
H A D | p2p_go_neg.c | 54 p2p_info(p2p, "Mismatching country (ours=%c%c peer's=%c%c)", 65 p2p_info(p2p, "Invalid peer Channel List"); 79 p2p_dbg(p2p, "Own reg_classes %d peer reg_classes %d intersection reg_classes %d", 138 struct p2p_device *peer) 158 p2p_buf_add_public_action_hdr(buf, P2P_GO_NEG_REQ, peer->dialog_token); 162 if (peer->flags & P2P_DEV_PREFER_PERSISTENT_GROUP) { 164 if (peer->flags & P2P_DEV_PREFER_PERSISTENT_RECONN) 174 p2p_buf_add_go_intent(buf, (p2p->go_intent << 1) | peer->tie_breaker); 183 p2p_buf_add_device_info(buf, p2p, peer); 189 pw_id = p2p_wps_method_pw_id(peer 137 p2p_build_go_neg_req(struct p2p_data *p2p, struct p2p_device *peer) argument 268 p2p_build_go_neg_resp(struct p2p_data *p2p, struct p2p_device *peer, u8 dialog_token, u8 status, u8 tie_breaker) argument 865 p2p_build_go_neg_conf(struct p2p_data *p2p, struct p2p_device *peer, u8 dialog_token, u8 status, const u8 *resp_chan, int go) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/p2p/ |
H A D | p2p_go_neg.c | 54 p2p_info(p2p, "Mismatching country (ours=%c%c peer's=%c%c)", 65 p2p_info(p2p, "Invalid peer Channel List"); 79 p2p_dbg(p2p, "Own reg_classes %d peer reg_classes %d intersection reg_classes %d", 138 struct p2p_device *peer) 158 p2p_buf_add_public_action_hdr(buf, P2P_GO_NEG_REQ, peer->dialog_token); 162 if (peer->flags & P2P_DEV_PREFER_PERSISTENT_GROUP) { 164 if (peer->flags & P2P_DEV_PREFER_PERSISTENT_RECONN) 174 p2p_buf_add_go_intent(buf, (p2p->go_intent << 1) | peer->tie_breaker); 183 p2p_buf_add_device_info(buf, p2p, peer); 189 pw_id = p2p_wps_method_pw_id(peer 137 p2p_build_go_neg_req(struct p2p_data *p2p, struct p2p_device *peer) argument 268 p2p_build_go_neg_resp(struct p2p_data *p2p, struct p2p_device *peer, u8 dialog_token, u8 status, u8 tie_breaker) argument 865 p2p_build_go_neg_conf(struct p2p_data *p2p, struct p2p_device *peer, u8 dialog_token, u8 status, const u8 *resp_chan, int go) argument [all...] |
/external/ipsec-tools/src/racoon/ |
H A D | sainfo.c | 76 * First pass is for sainfo from a specified peer, second for others. 79 getsainfo(loc, rmt, peer, remoteid) 80 const vchar_t *loc, *rmt, *peer; 87 if (peer == NULL) 104 if (peer == NULL) 107 dpeer = ipsecdoi_id2str(peer); 110 "getsainfo params: loc=\'%s\', rmt=\'%s\', peer=\'%s\', id=%i\n", 133 if (ipsecdoi_chkcmpids(peer, s->id_i, 0)) 294 snprintf(buf, 255, "loc=\'%s\', rmt=\'%s\', peer=\'%s\', id=%i",
|
/external/dnsmasq/src/ |
H A D | tftp.c | 46 struct sockaddr_in addr, peer; local 72 msg.msg_name = &peer; 73 msg.msg_namelen = sizeof(peer); 153 transfer->peer = peer; 194 len = tftp_err(ERR_ILL, packet, _("unsupported request from %s"), inet_ntoa(peer.sin_addr)); 244 strncat(daemon->namebuff, inet_ntoa(peer.sin_addr), (MAXDNAME-1) - strlen(daemon->namebuff)); 276 (struct sockaddr *)&peer, sizeof(peer)) == -1 && errno == EINTR); 282 my_syslog(MS_TFTP | LOG_INFO, _("TFTP sent %s to %s"), daemon->namebuff, inet_ntoa(peer [all...] |
/external/boringssl/src/ssl/ |
H A D | ssl_asn1.c | 104 * peer [3] Certificate OPTIONAL, 201 /* The peer certificate is only serialized if the SHA-256 isn't 203 if (in->peer && !in->peer_sha256_valid) { 205 int len = i2d_X509(in->peer, NULL); 214 if (buf != NULL && i2d_X509(in->peer, &buf) < 0) { 415 CBS peer, sid_ctx, peer_sha256, original_handshake_hash; local 439 !CBS_get_optional_asn1(&session, &peer, &has_peer, kPeerTag) || 533 X509_free(ret->peer); 534 ret->peer = NULL; 537 ptr = CBS_data(&peer); [all...] |
/external/strace/ |
H A D | socketutils.c | 216 uint32_t peer = 0; local 240 peer = *(uint32_t *)RTA_DATA(attr); 249 if (peer || path_len) { 251 if (peer) 252 tprintf("->%u", peer);
|