/external/mtpd/ |
pptp.c | 118 uint16_t peer; member in struct:packet::__anon5411::__anon5412::__anon5414::__anon5417 312 if (state == OCRQ && incoming.ocrp.peer == local) { 370 outgoing.icrp.peer = incoming.icrq.call; 379 outgoing.ocrp.peer = incoming.ocrq.call;
|
/external/wpa_supplicant/ |
eap_sake_common.h | 2 * EAP server/peer: EAP-SAKE shared routines 101 int peer, const u8 *eap, size_t eap_len,
|
eap_sake_common.c | 2 * EAP server/peer: EAP-SAKE shared routines 315 * @peer: MIC calculation for 0 = Server, 1 = Peer message 325 int peer, const u8 *eap, size_t eap_len, 337 if (peer) { 373 peer ? "Peer MIC" : "Server MIC",
|
wpa.h | 141 int wpa_sm_stkstart(struct wpa_sm *sm, const u8 *peer); 259 static inline int wpa_sm_stkstart(struct wpa_sm *sm, const u8 *peer)
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_sake_common.h | 2 * EAP server/peer: EAP-SAKE shared routines 97 int peer, const u8 *eap, size_t eap_len,
|
eap_sake_common.c | 2 * EAP server/peer: EAP-SAKE shared routines 316 * @peer: MIC calculation for 0 = Server, 1 = Peer message 326 int peer, const u8 *eap, size_t eap_len, 338 if (peer) { 374 peer ? "Peer MIC" : "Server MIC",
|
/external/openssl/apps/ |
pkeyutl.c | 516 EVP_PKEY *peer = NULL; local 524 peer = load_pubkey(bio_err, file, peerform, 0, NULL, NULL, "Peer Key"); 526 if (!peer) 528 BIO_printf(bio_err, "Error reading peer key %s\n", file); 533 ret = EVP_PKEY_derive_set_peer(ctx, peer); 535 EVP_PKEY_free(peer);
|
s_client.c | 286 BIO_printf(bio_err," -verify arg - turn on peer certificate verification\n"); 437 struct sockaddr peer; local 438 int peerlen = sizeof(peer); 1008 if (getsockname(s, &peer, (void *)&peerlen) < 0) 1016 (void)BIO_ctrl_set_connected(sbio, 1, &peer); 1634 X509 *peer=NULL; local [all...] |
s_server.c | 411 BIO_printf(bio_err," -verify arg - turn on peer certificate verification\n"); 412 BIO_printf(bio_err," -Verify arg - turn on peer certificate verification, must have a cert.\n"); 415 BIO_printf(bio_err," -crl_check - check the peer certificate has not been revoked by its CA.\n" \ 417 BIO_printf(bio_err," -crl_check_all - check the peer certificate has not been revoked by its CA\n" \ 2159 X509 *peer; local 2390 X509 *peer; local [all...] |
/system/core/adb/ |
transport.c | 392 asocket* peer = socket->peer; local 395 if (peer) { 396 peer->peer = NULL; 397 peer->close(peer); 418 asocket* peer = tracker->socket.peer; local 422 return peer->enqueue( peer, p ) [all...] |
adb.c | 340 s->peer = create_remote_socket(p->msg.arg0, t); 341 s->peer->peer = s; 342 send_ready(s->id, s->peer->id, t); 351 if(s->peer == 0) { 352 s->peer = create_remote_socket(p->msg.arg0, t); 353 s->peer->peer = s; [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
peerkey.c | 68 const u8 *peer, 79 if (peer) 101 if (peer) { 102 /* Peer MAC Address KDE */ 103 pos = wpa_add_kde(pos, RSN_KEY_DATA_MAC_ADDR, peer, ETH_ALEN); 111 if (peer) { 112 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK Error (peer " 114 MAC2STR(peer), mui, error_type); 138 /* KDEs: Peer RSN IE, Initiator MAC Address, Initiator Nonce */ 162 /* Peer RSN IE * 613 u8 peer[ETH_ALEN]; local [all...] |
wpa.h | 264 int wpa_sm_stkstart(struct wpa_sm *sm, const u8 *peer); 266 static inline int wpa_sm_stkstart(struct wpa_sm *sm, const u8 *peer)
|
/external/kernel-headers/original/linux/ |
net.h | 141 int *sockaddr_len, int peer); 251 int *addr_len, int peer), (sock, uaddr, addr_len, peer)) \
|
/external/wpa_supplicant_6/wpa_supplicant/src/wps/ |
wps_upnp_i.h | 156 /* FIX: maintain separate structures for each UPnP peer */ 157 struct upnp_wps_peer peer; member in struct:upnp_wps_device_sm
|
/bionic/libc/netbsd/resolv/ |
res_send.c | 399 struct sockaddr_storage peer; local 415 peerlen = sizeof(peer); 417 (struct sockaddr *)(void *)&peer, &peerlen) < 0) { 421 if (!sock_eq((struct sockaddr *)(void *)&peer, 695 struct sockaddr_storage peer; local 696 socklen_t size = sizeof peer; 699 (struct sockaddr *)(void *)&peer, &size) < 0 || 700 !sock_eq((struct sockaddr *)(void *)&peer, nsap)) {
|
/external/openssl/crypto/bio/ |
bio.h | 534 #define BIO_ctrl_dgram_connect(b,peer) \ 535 (int)BIO_ctrl(b,BIO_CTRL_DGRAM_CONNECT,0, (char *)peer) 536 #define BIO_ctrl_set_connected(b, state, peer) \ 537 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_CONNECTED, state, (char *)peer) 542 #define BIO_dgram_get_peer(b,peer) \ 543 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_GET_PEER, 0, (char *)peer) 544 #define BIO_dgram_set_peer(b,peer) \ 545 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_PEER, 0, (char *)peer)
|
/external/openssl/include/openssl/ |
bio.h | 534 #define BIO_ctrl_dgram_connect(b,peer) \ 535 (int)BIO_ctrl(b,BIO_CTRL_DGRAM_CONNECT,0, (char *)peer) 536 #define BIO_ctrl_set_connected(b, state, peer) \ 537 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_CONNECTED, state, (char *)peer) 542 #define BIO_dgram_get_peer(b,peer) \ 543 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_GET_PEER, 0, (char *)peer) 544 #define BIO_dgram_set_peer(b,peer) \ 545 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_PEER, 0, (char *)peer)
|
/external/quake/quake/src/QW/qwfwd/ |
qwfwd.c | 67 typedef struct peer {
struct 72 struct peer *next;
223 if (p == NULL) { // new peer
224 printf("peer %s:%d added", inet_ntoa(fsin.sin_addr), (int)ntohs(fsin.sin_port));
253 printf("peer %s:%d removed (timeout)", inet_ntoa(p->sin.sin_addr), (int)ntohs(p->sin.sin_port));
259 printf ("peer %s:%d removed (timeout)", inet_ntoa(p->sin.sin_addr), (int)ntohs(p->sin.sin_port));
|
/frameworks/base/graphics/java/android/graphics/ |
Region.java | 323 Region peer = (Region) obj; local 324 return nativeEquals(mNativeRegion, peer.mNativeRegion);
|
/external/iproute2/ip/ |
ipaddress.c | 69 fprintf(stderr, "IFADDR := PREFIX | ADDR peer PREFIX\n"); 269 fprintf(fp, " peer "); 460 fprintf(fp, " peer %s/%d ", 897 inet_prefix peer; local 915 if (strcmp(*argv, "peer") == 0 || 920 duparg("peer", *argv); 921 get_prefix(&peer, *argv, req.ifa.ifa_family); 922 peer_len = peer.bytelen; 924 req.ifa.ifa_family = peer.family; 925 addattr_l(&req.n, sizeof(req), IFA_ADDRESS, &peer.data, peer.bytelen) [all...] |
/frameworks/base/core/java/com/android/internal/os/ |
ZygoteInit.java | 87 * If true, zygote forks for each peer. If false, a select loop is used 606 * Runs the zygote in accept-and-fork mode. In this mode, each peer 615 ZygoteConnection peer = acceptCommandPeer(); local 622 // The child process should handle the peer requests 633 peer.run(); 636 peer.closeSocket();
|
/external/iproute2/misc/ |
ss.c | 1845 int peer; member in struct:unixstat 1875 char *peer; local [all...] |
/external/openssl/ssl/ |
s3_srvr.c | 440 ((s->session->peer != NULL) && 2686 X509 *peer; local [all...] |
/external/iproute2/lib/ |
libnetlink.c | 273 int rtnl_talk(struct rtnl_handle *rtnl, struct nlmsghdr *n, pid_t peer, 296 nladdr.nl_pid = peer; 348 if (nladdr.nl_pid != peer ||
|