HomeSort by relevance Sort by last modified time
    Searched refs:peer (Results 26 - 50 of 85) sorted by null

12 3 4

  /external/mtpd/
pptp.c 118 uint16_t peer; member in struct:packet::__anon5411::__anon5412::__anon5414::__anon5417
312 if (state == OCRQ && incoming.ocrp.peer == local) {
370 outgoing.icrp.peer = incoming.icrq.call;
379 outgoing.ocrp.peer = incoming.ocrq.call;
  /external/wpa_supplicant/
eap_sake_common.h 2 * EAP server/peer: EAP-SAKE shared routines
101 int peer, const u8 *eap, size_t eap_len,
eap_sake_common.c 2 * EAP server/peer: EAP-SAKE shared routines
315 * @peer: MIC calculation for 0 = Server, 1 = Peer message
325 int peer, const u8 *eap, size_t eap_len,
337 if (peer) {
373 peer ? "Peer MIC" : "Server MIC",
wpa.h 141 int wpa_sm_stkstart(struct wpa_sm *sm, const u8 *peer);
259 static inline int wpa_sm_stkstart(struct wpa_sm *sm, const u8 *peer)
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
eap_sake_common.h 2 * EAP server/peer: EAP-SAKE shared routines
97 int peer, const u8 *eap, size_t eap_len,
eap_sake_common.c 2 * EAP server/peer: EAP-SAKE shared routines
316 * @peer: MIC calculation for 0 = Server, 1 = Peer message
326 int peer, const u8 *eap, size_t eap_len,
338 if (peer) {
374 peer ? "Peer MIC" : "Server MIC",
  /external/openssl/apps/
pkeyutl.c 516 EVP_PKEY *peer = NULL; local
524 peer = load_pubkey(bio_err, file, peerform, 0, NULL, NULL, "Peer Key");
526 if (!peer)
528 BIO_printf(bio_err, "Error reading peer key %s\n", file);
533 ret = EVP_PKEY_derive_set_peer(ctx, peer);
535 EVP_PKEY_free(peer);
s_client.c 286 BIO_printf(bio_err," -verify arg - turn on peer certificate verification\n");
437 struct sockaddr peer; local
438 int peerlen = sizeof(peer);
1008 if (getsockname(s, &peer, (void *)&peerlen) < 0)
1016 (void)BIO_ctrl_set_connected(sbio, 1, &peer);
1634 X509 *peer=NULL; local
    [all...]
s_server.c 411 BIO_printf(bio_err," -verify arg - turn on peer certificate verification\n");
412 BIO_printf(bio_err," -Verify arg - turn on peer certificate verification, must have a cert.\n");
415 BIO_printf(bio_err," -crl_check - check the peer certificate has not been revoked by its CA.\n" \
417 BIO_printf(bio_err," -crl_check_all - check the peer certificate has not been revoked by its CA\n" \
2159 X509 *peer; local
2390 X509 *peer; local
    [all...]
  /system/core/adb/
transport.c 392 asocket* peer = socket->peer; local
395 if (peer) {
396 peer->peer = NULL;
397 peer->close(peer);
418 asocket* peer = tracker->socket.peer; local
422 return peer->enqueue( peer, p )
    [all...]
adb.c 340 s->peer = create_remote_socket(p->msg.arg0, t);
341 s->peer->peer = s;
342 send_ready(s->id, s->peer->id, t);
351 if(s->peer == 0) {
352 s->peer = create_remote_socket(p->msg.arg0, t);
353 s->peer->peer = s;
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/
peerkey.c 68 const u8 *peer,
79 if (peer)
101 if (peer) {
102 /* Peer MAC Address KDE */
103 pos = wpa_add_kde(pos, RSN_KEY_DATA_MAC_ADDR, peer, ETH_ALEN);
111 if (peer) {
112 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK Error (peer "
114 MAC2STR(peer), mui, error_type);
138 /* KDEs: Peer RSN IE, Initiator MAC Address, Initiator Nonce */
162 /* Peer RSN IE *
613 u8 peer[ETH_ALEN]; local
    [all...]
wpa.h 264 int wpa_sm_stkstart(struct wpa_sm *sm, const u8 *peer);
266 static inline int wpa_sm_stkstart(struct wpa_sm *sm, const u8 *peer)
  /external/kernel-headers/original/linux/
net.h 141 int *sockaddr_len, int peer);
251 int *addr_len, int peer), (sock, uaddr, addr_len, peer)) \
  /external/wpa_supplicant_6/wpa_supplicant/src/wps/
wps_upnp_i.h 156 /* FIX: maintain separate structures for each UPnP peer */
157 struct upnp_wps_peer peer; member in struct:upnp_wps_device_sm
  /bionic/libc/netbsd/resolv/
res_send.c 399 struct sockaddr_storage peer; local
415 peerlen = sizeof(peer);
417 (struct sockaddr *)(void *)&peer, &peerlen) < 0) {
421 if (!sock_eq((struct sockaddr *)(void *)&peer,
695 struct sockaddr_storage peer; local
696 socklen_t size = sizeof peer;
699 (struct sockaddr *)(void *)&peer, &size) < 0 ||
700 !sock_eq((struct sockaddr *)(void *)&peer, nsap)) {
  /external/openssl/crypto/bio/
bio.h 534 #define BIO_ctrl_dgram_connect(b,peer) \
535 (int)BIO_ctrl(b,BIO_CTRL_DGRAM_CONNECT,0, (char *)peer)
536 #define BIO_ctrl_set_connected(b, state, peer) \
537 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_CONNECTED, state, (char *)peer)
542 #define BIO_dgram_get_peer(b,peer) \
543 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_GET_PEER, 0, (char *)peer)
544 #define BIO_dgram_set_peer(b,peer) \
545 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_PEER, 0, (char *)peer)
  /external/openssl/include/openssl/
bio.h 534 #define BIO_ctrl_dgram_connect(b,peer) \
535 (int)BIO_ctrl(b,BIO_CTRL_DGRAM_CONNECT,0, (char *)peer)
536 #define BIO_ctrl_set_connected(b, state, peer) \
537 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_CONNECTED, state, (char *)peer)
542 #define BIO_dgram_get_peer(b,peer) \
543 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_GET_PEER, 0, (char *)peer)
544 #define BIO_dgram_set_peer(b,peer) \
545 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_PEER, 0, (char *)peer)
  /external/quake/quake/src/QW/qwfwd/
qwfwd.c 67 typedef struct peer { struct
72 struct peer *next;
223 if (p == NULL) { // new peer
224 printf("peer %s:%d added", inet_ntoa(fsin.sin_addr), (int)ntohs(fsin.sin_port));
253 printf("peer %s:%d removed (timeout)", inet_ntoa(p->sin.sin_addr), (int)ntohs(p->sin.sin_port));
259 printf ("peer %s:%d removed (timeout)", inet_ntoa(p->sin.sin_addr), (int)ntohs(p->sin.sin_port));
  /frameworks/base/graphics/java/android/graphics/
Region.java 323 Region peer = (Region) obj; local
324 return nativeEquals(mNativeRegion, peer.mNativeRegion);
  /external/iproute2/ip/
ipaddress.c 69 fprintf(stderr, "IFADDR := PREFIX | ADDR peer PREFIX\n");
269 fprintf(fp, " peer ");
460 fprintf(fp, " peer %s/%d ",
897 inet_prefix peer; local
915 if (strcmp(*argv, "peer") == 0 ||
920 duparg("peer", *argv);
921 get_prefix(&peer, *argv, req.ifa.ifa_family);
922 peer_len = peer.bytelen;
924 req.ifa.ifa_family = peer.family;
925 addattr_l(&req.n, sizeof(req), IFA_ADDRESS, &peer.data, peer.bytelen)
    [all...]
  /frameworks/base/core/java/com/android/internal/os/
ZygoteInit.java 87 * If true, zygote forks for each peer. If false, a select loop is used
606 * Runs the zygote in accept-and-fork mode. In this mode, each peer
615 ZygoteConnection peer = acceptCommandPeer(); local
622 // The child process should handle the peer requests
633 peer.run();
636 peer.closeSocket();
  /external/iproute2/misc/
ss.c 1845 int peer; member in struct:unixstat
1875 char *peer; local
    [all...]
  /external/openssl/ssl/
s3_srvr.c 440 ((s->session->peer != NULL) &&
2686 X509 *peer; local
    [all...]
  /external/iproute2/lib/
libnetlink.c 273 int rtnl_talk(struct rtnl_handle *rtnl, struct nlmsghdr *n, pid_t peer,
296 nladdr.nl_pid = peer;
348 if (nladdr.nl_pid != peer ||

Completed in 1367 milliseconds

12 3 4