Searched refs:peer (Results 1 - 25 of 155) sorted by relevance

1234567

/external/wpa_supplicant_8/hostapd/src/rsn_supp/
H A Dtdls.c84 static void wpa_tdls_peer_free(struct wpa_sm *sm, struct wpa_tdls_peer *peer);
86 struct wpa_tdls_peer *peer);
175 static int wpa_tdls_del_key(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument
177 if (wpa_sm_set_key(sm, WPA_ALG_NONE, peer->addr,
188 static int wpa_tdls_set_key(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument
196 switch (peer->cipher) {
211 if (wpa_sm_set_key(sm, alg, peer->addr, -1, 1,
212 rsc, sizeof(rsc), peer->tpk.tk, key_len) < 0) {
236 struct wpa_tdls_peer *peer; local
258 for (peer
301 wpa_tdls_do_teardown(struct wpa_sm *sm, struct wpa_tdls_peer *peer, u16 reason_code) argument
318 struct wpa_tdls_peer *peer = timeout_ctx; local
363 wpa_tdls_tpk_retry_timeout_cancel(struct wpa_sm *sm, struct wpa_tdls_peer *peer, u8 action_code) argument
389 wpa_tdls_generate_tpk(struct wpa_tdls_peer *peer, const u8 *own_addr, const u8 *bssid) argument
563 wpa_supplicant_verify_tdls_mic(u8 trans_seq, struct wpa_tdls_peer *peer, const u8 *lnkid, const u8 *timeoutie, const struct wpa_tdls_ftie *ftie) argument
592 wpa_supplicant_verify_tdls_mic_teardown( u8 trans_seq, u16 rcode, u8 dtoken, struct wpa_tdls_peer *peer, const u8 *lnkid, const struct wpa_tdls_ftie *ftie) argument
618 struct wpa_tdls_peer *peer = timeout_ctx; local
641 wpa_tdls_peer_remove_from_list(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument
667 wpa_tdls_peer_clear(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument
700 wpa_tdls_peer_free(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument
708 wpa_tdls_linkid(struct wpa_sm *sm, struct wpa_tdls_peer *peer, struct wpa_tdls_lnkid *lnkid) argument
727 struct wpa_tdls_peer *peer; local
820 struct wpa_tdls_peer *peer; local
846 wpa_tdls_disable_peer_link(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument
856 struct wpa_tdls_peer *peer; local
889 struct wpa_tdls_peer *peer; local
912 struct wpa_tdls_peer *peer = NULL; local
1012 struct wpa_tdls_peer *peer; local
1039 wpa_tdls_send_tpk_m1(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument
1218 wpa_tdls_send_tpk_m2(struct wpa_sm *sm, const unsigned char *src_addr, u8 dtoken, struct wpa_tdls_lnkid *lnkid, const struct wpa_tdls_peer *peer) argument
1309 wpa_tdls_send_tpk_m3(struct wpa_sm *sm, const unsigned char *src_addr, u8 dtoken, struct wpa_tdls_lnkid *lnkid, const struct wpa_tdls_peer *peer) argument
1407 wpa_tdls_send_discovery_response(struct wpa_sm *sm, struct wpa_tdls_peer *peer, u8 dialog_token) argument
1499 struct wpa_tdls_peer *peer; local
1561 copy_supp_rates(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument
1577 copy_peer_ht_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument
1603 copy_peer_vht_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument
1629 copy_peer_ext_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument
1653 copy_peer_wmm_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument
1678 copy_peer_supp_channels(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument
1704 copy_peer_supp_oper_classes(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument
1730 wpa_tdls_addset_peer(struct wpa_sm *sm, struct wpa_tdls_peer *peer, int add) argument
1750 struct wpa_tdls_peer *peer; local
2099 wpa_tdls_enable_link(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument
2137 struct wpa_tdls_peer *peer; local
2417 struct wpa_tdls_peer *peer; local
2598 struct wpa_tdls_peer *peer; local
2650 struct wpa_tdls_peer *peer; local
2788 struct wpa_tdls_peer *peer, *tmp; local
2813 struct wpa_tdls_peer *peer, *tmp; local
2937 struct wpa_tdls_peer *peer; local
2984 struct wpa_tdls_peer *peer; local
[all...]
/external/wpa_supplicant_8/src/rsn_supp/
H A Dtdls.c84 static void wpa_tdls_peer_free(struct wpa_sm *sm, struct wpa_tdls_peer *peer);
86 struct wpa_tdls_peer *peer);
175 static int wpa_tdls_del_key(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument
177 if (wpa_sm_set_key(sm, WPA_ALG_NONE, peer->addr,
188 static int wpa_tdls_set_key(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument
196 switch (peer->cipher) {
211 if (wpa_sm_set_key(sm, alg, peer->addr, -1, 1,
212 rsc, sizeof(rsc), peer->tpk.tk, key_len) < 0) {
236 struct wpa_tdls_peer *peer; local
258 for (peer
301 wpa_tdls_do_teardown(struct wpa_sm *sm, struct wpa_tdls_peer *peer, u16 reason_code) argument
318 struct wpa_tdls_peer *peer = timeout_ctx; local
363 wpa_tdls_tpk_retry_timeout_cancel(struct wpa_sm *sm, struct wpa_tdls_peer *peer, u8 action_code) argument
389 wpa_tdls_generate_tpk(struct wpa_tdls_peer *peer, const u8 *own_addr, const u8 *bssid) argument
563 wpa_supplicant_verify_tdls_mic(u8 trans_seq, struct wpa_tdls_peer *peer, const u8 *lnkid, const u8 *timeoutie, const struct wpa_tdls_ftie *ftie) argument
592 wpa_supplicant_verify_tdls_mic_teardown( u8 trans_seq, u16 rcode, u8 dtoken, struct wpa_tdls_peer *peer, const u8 *lnkid, const struct wpa_tdls_ftie *ftie) argument
618 struct wpa_tdls_peer *peer = timeout_ctx; local
641 wpa_tdls_peer_remove_from_list(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument
667 wpa_tdls_peer_clear(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument
700 wpa_tdls_peer_free(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument
708 wpa_tdls_linkid(struct wpa_sm *sm, struct wpa_tdls_peer *peer, struct wpa_tdls_lnkid *lnkid) argument
727 struct wpa_tdls_peer *peer; local
820 struct wpa_tdls_peer *peer; local
846 wpa_tdls_disable_peer_link(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument
856 struct wpa_tdls_peer *peer; local
889 struct wpa_tdls_peer *peer; local
912 struct wpa_tdls_peer *peer = NULL; local
1012 struct wpa_tdls_peer *peer; local
1039 wpa_tdls_send_tpk_m1(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument
1218 wpa_tdls_send_tpk_m2(struct wpa_sm *sm, const unsigned char *src_addr, u8 dtoken, struct wpa_tdls_lnkid *lnkid, const struct wpa_tdls_peer *peer) argument
1309 wpa_tdls_send_tpk_m3(struct wpa_sm *sm, const unsigned char *src_addr, u8 dtoken, struct wpa_tdls_lnkid *lnkid, const struct wpa_tdls_peer *peer) argument
1407 wpa_tdls_send_discovery_response(struct wpa_sm *sm, struct wpa_tdls_peer *peer, u8 dialog_token) argument
1499 struct wpa_tdls_peer *peer; local
1561 copy_supp_rates(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument
1577 copy_peer_ht_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument
1603 copy_peer_vht_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument
1629 copy_peer_ext_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument
1653 copy_peer_wmm_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument
1678 copy_peer_supp_channels(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument
1704 copy_peer_supp_oper_classes(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument
1730 wpa_tdls_addset_peer(struct wpa_sm *sm, struct wpa_tdls_peer *peer, int add) argument
1750 struct wpa_tdls_peer *peer; local
2099 wpa_tdls_enable_link(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument
2137 struct wpa_tdls_peer *peer; local
2417 struct wpa_tdls_peer *peer; local
2598 struct wpa_tdls_peer *peer; local
2650 struct wpa_tdls_peer *peer; local
2788 struct wpa_tdls_peer *peer, *tmp; local
2813 struct wpa_tdls_peer *peer, *tmp; local
2937 struct wpa_tdls_peer *peer; local
2984 struct wpa_tdls_peer *peer; local
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/
H A Dtdls.c84 static void wpa_tdls_peer_free(struct wpa_sm *sm, struct wpa_tdls_peer *peer);
86 struct wpa_tdls_peer *peer);
175 static int wpa_tdls_del_key(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument
177 if (wpa_sm_set_key(sm, WPA_ALG_NONE, peer->addr,
188 static int wpa_tdls_set_key(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument
196 switch (peer->cipher) {
211 if (wpa_sm_set_key(sm, alg, peer->addr, -1, 1,
212 rsc, sizeof(rsc), peer->tpk.tk, key_len) < 0) {
236 struct wpa_tdls_peer *peer; local
258 for (peer
301 wpa_tdls_do_teardown(struct wpa_sm *sm, struct wpa_tdls_peer *peer, u16 reason_code) argument
318 struct wpa_tdls_peer *peer = timeout_ctx; local
363 wpa_tdls_tpk_retry_timeout_cancel(struct wpa_sm *sm, struct wpa_tdls_peer *peer, u8 action_code) argument
389 wpa_tdls_generate_tpk(struct wpa_tdls_peer *peer, const u8 *own_addr, const u8 *bssid) argument
563 wpa_supplicant_verify_tdls_mic(u8 trans_seq, struct wpa_tdls_peer *peer, const u8 *lnkid, const u8 *timeoutie, const struct wpa_tdls_ftie *ftie) argument
592 wpa_supplicant_verify_tdls_mic_teardown( u8 trans_seq, u16 rcode, u8 dtoken, struct wpa_tdls_peer *peer, const u8 *lnkid, const struct wpa_tdls_ftie *ftie) argument
618 struct wpa_tdls_peer *peer = timeout_ctx; local
641 wpa_tdls_peer_remove_from_list(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument
667 wpa_tdls_peer_clear(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument
700 wpa_tdls_peer_free(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument
708 wpa_tdls_linkid(struct wpa_sm *sm, struct wpa_tdls_peer *peer, struct wpa_tdls_lnkid *lnkid) argument
727 struct wpa_tdls_peer *peer; local
820 struct wpa_tdls_peer *peer; local
846 wpa_tdls_disable_peer_link(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument
856 struct wpa_tdls_peer *peer; local
889 struct wpa_tdls_peer *peer; local
912 struct wpa_tdls_peer *peer = NULL; local
1012 struct wpa_tdls_peer *peer; local
1039 wpa_tdls_send_tpk_m1(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument
1218 wpa_tdls_send_tpk_m2(struct wpa_sm *sm, const unsigned char *src_addr, u8 dtoken, struct wpa_tdls_lnkid *lnkid, const struct wpa_tdls_peer *peer) argument
1309 wpa_tdls_send_tpk_m3(struct wpa_sm *sm, const unsigned char *src_addr, u8 dtoken, struct wpa_tdls_lnkid *lnkid, const struct wpa_tdls_peer *peer) argument
1407 wpa_tdls_send_discovery_response(struct wpa_sm *sm, struct wpa_tdls_peer *peer, u8 dialog_token) argument
1499 struct wpa_tdls_peer *peer; local
1561 copy_supp_rates(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument
1577 copy_peer_ht_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument
1603 copy_peer_vht_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument
1629 copy_peer_ext_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument
1653 copy_peer_wmm_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument
1678 copy_peer_supp_channels(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument
1704 copy_peer_supp_oper_classes(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument
1730 wpa_tdls_addset_peer(struct wpa_sm *sm, struct wpa_tdls_peer *peer, int add) argument
1750 struct wpa_tdls_peer *peer; local
2099 wpa_tdls_enable_link(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument
2137 struct wpa_tdls_peer *peer; local
2417 struct wpa_tdls_peer *peer; local
2598 struct wpa_tdls_peer *peer; local
2650 struct wpa_tdls_peer *peer; local
2788 struct wpa_tdls_peer *peer, *tmp; local
2813 struct wpa_tdls_peer *peer, *tmp; local
2937 struct wpa_tdls_peer *peer; local
2984 struct wpa_tdls_peer *peer; local
[all...]
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/spdy/
H A DSpdy3ConnectionTest.java59 private final MockSpdyPeer peer = new MockSpdyPeer(); field in class:Spdy3ConnectionTest
62 peer.close();
67 peer.acceptFrame(); // SYN_STREAM
68 peer.sendFrame()
70 peer.sendFrame().data(true, 1, new Buffer().writeUtf8("robot"), 5);
71 peer.acceptFrame(); // DATA
72 peer.play();
75 SpdyConnection connection = connection(peer, SPDY3);
84 // verify the peer received what was expected
85 MockSpdyPeer.InFrame synStream = peer
1310 connection(MockSpdyPeer peer, Variant variant) argument
1314 connectionBuilder(MockSpdyPeer peer, Variant variant) argument
[all...]
H A DHttp2ConnectionTest.java50 private final MockSpdyPeer peer = new MockSpdyPeer(); field in class:Http2ConnectionTest
53 peer.close();
57 peer.setVariantAndClient(HTTP_2, false);
60 peer.sendFrame().ping(false, 2, 3);
61 peer.acceptFrame(); // PING
62 peer.play();
65 connection(peer, HTTP_2);
67 // verify the peer received what was expected
68 MockSpdyPeer.InFrame ping = peer.takeFrame();
77 peer
452 connection(MockSpdyPeer peer, Variant variant) argument
456 connectionBuilder(MockSpdyPeer peer, Variant variant) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/
H A Dibss_rsn.c30 struct ibss_rsn_peer *peer; local
32 for (peer = ibss_rsn->peers; peer; peer = peer->next)
33 if (os_memcmp(addr, peer->addr, ETH_ALEN) == 0)
35 return peer;
39 static void ibss_rsn_free(struct ibss_rsn_peer *peer) argument
41 eloop_cancel_timeout(ibss_rsn_auth_timeout, peer, NULL);
42 wpa_auth_sta_deinit(peer
50 struct ibss_rsn_peer *peer = ctx; local
57 struct ibss_rsn_peer *peer = ctx; local
65 struct ibss_rsn_peer *peer = ctx; local
110 struct ibss_rsn_peer *peer = ctx; local
123 ibss_check_rsn_completed(struct ibss_rsn_peer *peer) argument
144 struct ibss_rsn_peer *peer = ctx; local
175 struct ibss_rsn_peer *peer = ctx; local
202 ibss_rsn_supp_init(struct ibss_rsn_peer *peer, const u8 *own_addr, const u8 *psk) argument
310 struct ibss_rsn_peer *peer; local
346 struct ibss_rsn_peer *peer; local
359 ibss_set_sta_authorized(struct ibss_rsn *ibss_rsn, struct ibss_rsn_peer *peer, int authorized) argument
389 struct ibss_rsn_peer *peer = ibss_rsn_get_peer(ibss_rsn, addr); local
445 ibss_rsn_auth_init(struct ibss_rsn *ibss_rsn, struct ibss_rsn_peer *peer) argument
505 ibss_rsn_is_auth_started(struct ibss_rsn_peer * peer) argument
515 struct ibss_rsn_peer *peer; local
554 struct ibss_rsn_peer *peer = eloop_ctx; local
571 struct ibss_rsn_peer *peer; local
604 ibss_rsn_peer_authenticated(struct ibss_rsn *ibss_rsn, struct ibss_rsn_peer *peer, int reason) argument
630 struct ibss_rsn_peer *peer, *prev; local
688 struct ibss_rsn_peer *peer, *prev; local
749 ibss_rsn_process_rx_eapol(struct ibss_rsn *ibss_rsn, struct ibss_rsn_peer *peer, const u8 *buf, size_t len) argument
791 struct ibss_rsn_peer *peer; local
830 ibss_rsn_handle_auth_1_of_2(struct ibss_rsn *ibss_rsn, struct ibss_rsn_peer *peer, const u8* addr) argument
883 struct ibss_rsn_peer *peer; local
[all...]
/external/v8/tools/testrunner/server/
H A Dstatus_handler.py36 def _StatusQuery(peer, query):
38 code = sock.connect_ex((peer.address, constants.STATUS_PORT))
55 def RequestTrustedPubkeys(peer, server):
56 pubkey_list = _StatusQuery(peer, [constants.LIST_TRUSTED_PUBKEYS])
59 result = _StatusQuery(peer, [constants.GET_SIGNED_PUBKEY, pubkey])
63 def NotifyNewTrusted(peer, data):
64 _StatusQuery(peer, [constants.NOTIFY_NEW_TRUSTED] + data)
67 def ITrustYouNow(peer):
68 _StatusQuery(peer, [constants.TRUST_YOU_NOW])
71 def TryTransitiveTrust(peer, pubke
[all...]
H A Dmain.py151 def AddPeer(self, peer):
154 if p.address == peer.address:
156 self.peers.append(peer)
157 if peer.trusted:
158 status_handler.ITrustYouNow(peer)
187 for peer in self.peers:
188 if peer.address == self.ip: continue
189 if peer.pubkey == fingerprint:
190 status_handler.ITrustYouNow(peer)
193 status_handler.NotifyNewTrusted(peer, resul
[all...]
/external/v8/tools/testrunner/objects/
H A Dworkpacket.py33 def __init__(self, peer=None, context=None, tests=None, binaries=None,
35 self.peer = peer
50 for shell in self.peer.shells:
64 for t in self.peer.tests:
/external/boringssl/src/crypto/bio/
H A Dpair.c64 BIO *peer; /* NULL if buf == NULL. member in struct:bio_bio_st
65 * If peer != NULL, then peer->ptr is also a bio_bio_st,
66 * and its "peer" member points back to us.
67 * peer != NULL iff init != 0 in the BIO. */
69 /* This is for what we write (i.e. reading uses peer's struct): */
70 int closed; /* valid iff peer != NULL */
71 size_t len; /* valid iff buf != NULL; 0 if peer == NULL */
82 size_t request; /* valid iff peer != NULL; 0 if len != 0,
83 * otherwise set by peer t
[all...]
/external/v8/tools/testrunner/network/
H A Ddistro.py77 # Pick the least-busy peer. Sorting the list for each test
81 # If the peer already has a shell assigned and would need this one
83 peer = peers[index]
84 if (shell.total_duration < peer.needed_work and
85 len(peer.shells) > 0 and
90 peer.AddTests(shell)
H A Dnetwork_execution.py38 from ..objects import peer namespace
49 return [ peer.Peer.Unpack(p) for p in data ]
143 # Spawn one thread for each peer.
170 def _TalkToPeer(self, peer):
173 code = sock.connect_ex((peer.address, constants.PEER_PORT))
176 peer.runtime = None
178 packet = workpacket.WorkPacket(peer=peer, context=self.context,
191 # The peer is reporting an error.
193 print("\nPeer %s reports error: %s" % (peer
[all...]
/external/iproute2/ip/
H A Difcfg81 peer=$1
82 if [ "$peer" != "" ]; then
87 pfx="$ipaddr peer $peer"
141 elif [ "$peer" != "" ]; then
142 if ping -q -c 2 -w 4 $peer ; then
143 ip ro append default via $peer dev $dev metric 30001
/external/wpa_supplicant_8/hostapd/src/pae/
H A Dieee802_1x_kay.c166 mi = body->peer + i;
291 struct ieee802_1x_kay_peer *peer; local
293 dl_list_for_each(peer, peers, struct ieee802_1x_kay_peer, list) {
294 if (os_memcmp(peer->mi, mi, MI_LEN) == 0)
295 return peer;
343 struct ieee802_1x_kay_peer *peer; local
345 peer = get_peer_mi(&participant->live_peers, mi);
346 if (peer)
347 return peer;
391 struct ieee802_1x_kay_peer *peer; local
519 struct ieee802_1x_kay_peer *peer; local
563 struct ieee802_1x_kay_peer *peer; local
595 struct ieee802_1x_kay_peer *peer; local
710 struct ieee802_1x_kay_peer *peer; local
804 struct ieee802_1x_kay_peer *peer; local
823 struct ieee802_1x_kay_peer *peer; local
865 struct ieee802_1x_kay_peer *peer; local
884 struct ieee802_1x_kay_peer *peer; local
985 struct ieee802_1x_kay_peer *peer; local
1242 struct ieee802_1x_kay_peer *peer; local
1521 struct ieee802_1x_kay_peer *peer; local
1949 struct ieee802_1x_kay_peer *peer; local
2091 struct ieee802_1x_kay_peer *peer; local
2204 struct ieee802_1x_kay_peer *peer; local
2354 struct ieee802_1x_kay_peer *peer, *pre_peer; local
3408 struct ieee802_1x_kay_peer *peer; local
[all...]
/external/wpa_supplicant_8/src/pae/
H A Dieee802_1x_kay.c166 mi = body->peer + i;
291 struct ieee802_1x_kay_peer *peer; local
293 dl_list_for_each(peer, peers, struct ieee802_1x_kay_peer, list) {
294 if (os_memcmp(peer->mi, mi, MI_LEN) == 0)
295 return peer;
343 struct ieee802_1x_kay_peer *peer; local
345 peer = get_peer_mi(&participant->live_peers, mi);
346 if (peer)
347 return peer;
391 struct ieee802_1x_kay_peer *peer; local
519 struct ieee802_1x_kay_peer *peer; local
563 struct ieee802_1x_kay_peer *peer; local
595 struct ieee802_1x_kay_peer *peer; local
710 struct ieee802_1x_kay_peer *peer; local
804 struct ieee802_1x_kay_peer *peer; local
823 struct ieee802_1x_kay_peer *peer; local
865 struct ieee802_1x_kay_peer *peer; local
884 struct ieee802_1x_kay_peer *peer; local
985 struct ieee802_1x_kay_peer *peer; local
1242 struct ieee802_1x_kay_peer *peer; local
1521 struct ieee802_1x_kay_peer *peer; local
1949 struct ieee802_1x_kay_peer *peer; local
2091 struct ieee802_1x_kay_peer *peer; local
2204 struct ieee802_1x_kay_peer *peer; local
2354 struct ieee802_1x_kay_peer *peer, *pre_peer; local
3408 struct ieee802_1x_kay_peer *peer; local
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/pae/
H A Dieee802_1x_kay.c166 mi = body->peer + i;
291 struct ieee802_1x_kay_peer *peer; local
293 dl_list_for_each(peer, peers, struct ieee802_1x_kay_peer, list) {
294 if (os_memcmp(peer->mi, mi, MI_LEN) == 0)
295 return peer;
343 struct ieee802_1x_kay_peer *peer; local
345 peer = get_peer_mi(&participant->live_peers, mi);
346 if (peer)
347 return peer;
391 struct ieee802_1x_kay_peer *peer; local
519 struct ieee802_1x_kay_peer *peer; local
563 struct ieee802_1x_kay_peer *peer; local
595 struct ieee802_1x_kay_peer *peer; local
710 struct ieee802_1x_kay_peer *peer; local
804 struct ieee802_1x_kay_peer *peer; local
823 struct ieee802_1x_kay_peer *peer; local
865 struct ieee802_1x_kay_peer *peer; local
884 struct ieee802_1x_kay_peer *peer; local
985 struct ieee802_1x_kay_peer *peer; local
1242 struct ieee802_1x_kay_peer *peer; local
1521 struct ieee802_1x_kay_peer *peer; local
1949 struct ieee802_1x_kay_peer *peer; local
2091 struct ieee802_1x_kay_peer *peer; local
2204 struct ieee802_1x_kay_peer *peer; local
2354 struct ieee802_1x_kay_peer *peer, *pre_peer; local
3408 struct ieee802_1x_kay_peer *peer; local
[all...]
/external/iptables/libipq/
H A Dlibipq.c77 { IPQ_ERR_ADDRLEN, "Invalid peer address length" },
107 (struct sockaddr *)&h->peer, sizeof(h->peer));
135 addrlen = sizeof(h->peer);
168 (struct sockaddr *)&h->peer, &addrlen);
173 if (addrlen != sizeof(h->peer)) {
177 if (h->peer.nl_pid != 0) {
248 memset(&h->peer, 0, sizeof(struct sockaddr_nl));
249 h->peer.nl_family = AF_NETLINK;
250 h->peer
[all...]
/external/iputils/
H A Dtftpd.c79 int peer; variable
189 peer = socket(from.sa.sa_family, SOCK_DGRAM, 0);
190 if (peer < 0) {
194 if (connect(peer, (struct sockaddr *)&from, sizeof(from)) < 0) {
372 if (send(peer, dp, size + 4, confirmed) != size + 4) {
380 n = recv(peer, ackbuf, sizeof (ackbuf), 0);
398 synchnet(peer);
437 if (send(peer, ackbuf, 4, confirmed) != 4) {
445 n = recv(peer, dp, PKTSIZE, 0);
461 (void) synchnet(peer);
[all...]
/external/wpa_supplicant_8/hostapd/src/p2p/
H A Dp2p_go_neg.c54 p2p_info(p2p, "Mismatching country (ours=%c%c peer's=%c%c)",
65 p2p_info(p2p, "Invalid peer Channel List");
79 p2p_dbg(p2p, "Own reg_classes %d peer reg_classes %d intersection reg_classes %d",
138 struct p2p_device *peer)
158 p2p_buf_add_public_action_hdr(buf, P2P_GO_NEG_REQ, peer->dialog_token);
162 if (peer->flags & P2P_DEV_PREFER_PERSISTENT_GROUP) {
164 if (peer->flags & P2P_DEV_PREFER_PERSISTENT_RECONN)
174 p2p_buf_add_go_intent(buf, (p2p->go_intent << 1) | peer->tie_breaker);
183 p2p_buf_add_device_info(buf, p2p, peer);
189 pw_id = p2p_wps_method_pw_id(peer
137 p2p_build_go_neg_req(struct p2p_data *p2p, struct p2p_device *peer) argument
268 p2p_build_go_neg_resp(struct p2p_data *p2p, struct p2p_device *peer, u8 dialog_token, u8 status, u8 tie_breaker) argument
865 p2p_build_go_neg_conf(struct p2p_data *p2p, struct p2p_device *peer, u8 dialog_token, u8 status, const u8 *resp_chan, int go) argument
[all...]
/external/wpa_supplicant_8/src/p2p/
H A Dp2p_go_neg.c54 p2p_info(p2p, "Mismatching country (ours=%c%c peer's=%c%c)",
65 p2p_info(p2p, "Invalid peer Channel List");
79 p2p_dbg(p2p, "Own reg_classes %d peer reg_classes %d intersection reg_classes %d",
138 struct p2p_device *peer)
158 p2p_buf_add_public_action_hdr(buf, P2P_GO_NEG_REQ, peer->dialog_token);
162 if (peer->flags & P2P_DEV_PREFER_PERSISTENT_GROUP) {
164 if (peer->flags & P2P_DEV_PREFER_PERSISTENT_RECONN)
174 p2p_buf_add_go_intent(buf, (p2p->go_intent << 1) | peer->tie_breaker);
183 p2p_buf_add_device_info(buf, p2p, peer);
189 pw_id = p2p_wps_method_pw_id(peer
137 p2p_build_go_neg_req(struct p2p_data *p2p, struct p2p_device *peer) argument
268 p2p_build_go_neg_resp(struct p2p_data *p2p, struct p2p_device *peer, u8 dialog_token, u8 status, u8 tie_breaker) argument
865 p2p_build_go_neg_conf(struct p2p_data *p2p, struct p2p_device *peer, u8 dialog_token, u8 status, const u8 *resp_chan, int go) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/p2p/
H A Dp2p_go_neg.c54 p2p_info(p2p, "Mismatching country (ours=%c%c peer's=%c%c)",
65 p2p_info(p2p, "Invalid peer Channel List");
79 p2p_dbg(p2p, "Own reg_classes %d peer reg_classes %d intersection reg_classes %d",
138 struct p2p_device *peer)
158 p2p_buf_add_public_action_hdr(buf, P2P_GO_NEG_REQ, peer->dialog_token);
162 if (peer->flags & P2P_DEV_PREFER_PERSISTENT_GROUP) {
164 if (peer->flags & P2P_DEV_PREFER_PERSISTENT_RECONN)
174 p2p_buf_add_go_intent(buf, (p2p->go_intent << 1) | peer->tie_breaker);
183 p2p_buf_add_device_info(buf, p2p, peer);
189 pw_id = p2p_wps_method_pw_id(peer
137 p2p_build_go_neg_req(struct p2p_data *p2p, struct p2p_device *peer) argument
268 p2p_build_go_neg_resp(struct p2p_data *p2p, struct p2p_device *peer, u8 dialog_token, u8 status, u8 tie_breaker) argument
865 p2p_build_go_neg_conf(struct p2p_data *p2p, struct p2p_device *peer, u8 dialog_token, u8 status, const u8 *resp_chan, int go) argument
[all...]
/external/ipsec-tools/src/racoon/
H A Dsainfo.c76 * First pass is for sainfo from a specified peer, second for others.
79 getsainfo(loc, rmt, peer, remoteid)
80 const vchar_t *loc, *rmt, *peer;
87 if (peer == NULL)
104 if (peer == NULL)
107 dpeer = ipsecdoi_id2str(peer);
110 "getsainfo params: loc=\'%s\', rmt=\'%s\', peer=\'%s\', id=%i\n",
133 if (ipsecdoi_chkcmpids(peer, s->id_i, 0))
294 snprintf(buf, 255, "loc=\'%s\', rmt=\'%s\', peer=\'%s\', id=%i",
/external/dnsmasq/src/
H A Dtftp.c46 struct sockaddr_in addr, peer; local
72 msg.msg_name = &peer;
73 msg.msg_namelen = sizeof(peer);
153 transfer->peer = peer;
194 len = tftp_err(ERR_ILL, packet, _("unsupported request from %s"), inet_ntoa(peer.sin_addr));
244 strncat(daemon->namebuff, inet_ntoa(peer.sin_addr), (MAXDNAME-1) - strlen(daemon->namebuff));
276 (struct sockaddr *)&peer, sizeof(peer)) == -1 && errno == EINTR);
282 my_syslog(MS_TFTP | LOG_INFO, _("TFTP sent %s to %s"), daemon->namebuff, inet_ntoa(peer
[all...]
/external/boringssl/src/ssl/
H A Dssl_asn1.c104 * peer [3] Certificate OPTIONAL,
201 /* The peer certificate is only serialized if the SHA-256 isn't
203 if (in->peer && !in->peer_sha256_valid) {
205 int len = i2d_X509(in->peer, NULL);
214 if (buf != NULL && i2d_X509(in->peer, &buf) < 0) {
415 CBS peer, sid_ctx, peer_sha256, original_handshake_hash; local
439 !CBS_get_optional_asn1(&session, &peer, &has_peer, kPeerTag) ||
533 X509_free(ret->peer);
534 ret->peer = NULL;
537 ptr = CBS_data(&peer);
[all...]
/external/strace/
H A Dsocketutils.c216 uint32_t peer = 0; local
240 peer = *(uint32_t *)RTA_DATA(attr);
249 if (peer || path_len) {
251 if (peer)
252 tprintf("->%u", peer);

Completed in 607 milliseconds

1234567