/external/openssl/ssl/ |
s2_clnt.c | 511 if (s->session->peer != NULL) /* can't happen*/ 518 s->session->peer = s->session->sess_cert->peer_key->x509; 520 CRYPTO_add(&s->session->peer->references, 1, CRYPTO_LOCK_X509); 524 || s->session->peer != s->session->sess_cert->peer_key->x509)
|
s2_srvr.c | 301 ((s->session->peer != NULL) && 1088 if (s->session->peer != NULL) 1089 X509_free(s->session->peer); 1090 s->session->peer=x509;
|
s3_clnt.c | 1127 /* Inconsistency alert: cert_chain does include the peer's 1177 if (s->session->peer != NULL) 1178 X509_free(s->session->peer); 1180 s->session->peer=x; 1187 if (s->session->peer != NULL) 1188 X509_free(s->session->peer); 1189 s->session->peer=NULL; [all...] |
ssl_sess.c | 721 if (ss->peer != NULL) X509_free(ss->peer); [all...] |
ssl.h | 175 * Version 1 - added the optional peer certificate 432 * Peer [ 3 ] EXPLICIT X509, -- optional Peer Certificate 434 * Verify_result [ 5 ] EXPLICIT INTEGER, -- X509_V_... code for `Peer' 479 X509 *peer; member in struct:ssl_session_st 480 /* when app_verify_callback accepts a session where the peer's certificate 506 unsigned char *tlsext_ecpointformatlist; /* peer's list */ 508 unsigned char *tlsext_ellipticcurvelist; /* peer's list */ [all...] |
/system/core/adb/ |
adb.h | 82 /* flag: set when the socket's peer has closed 90 asocket *peer; member in struct:asocket 104 /* enqueue is called by our peer when it has data 107 ** peer->ready() when we once again are ready to 112 /* ready is called by the peer when it is ready for 117 /* close is called by the peer when it has gone away. 119 ** peer once our close method is called.
|
/external/wpa_supplicant/ |
ctrl_iface.c | 102 /* MLME-STKSTART.request(peer) */ 106 u8 peer[ETH_ALEN]; local 108 if (hwaddr_aton(addr, peer)) { 110 "address '%s'", peer); 115 MAC2STR(peer)); 117 return wpa_sm_stkstart(wpa_s->wpa, peer); [all...] |
wpa.c | 875 * STK = PRF-X(SMK, "Peer key expansion", 1033 * @peer: MAC address of the peer STA 1037 * handshake with the peer. 1039 int wpa_sm_stkstart(struct wpa_sm *sm, const u8 *peer) 1081 os_memcpy(peerkey->addr, peer, ETH_ALEN); 2651 u8 peer[ETH_ALEN]; local [all...] |
events.c | 848 wpa_sm_stkstart(wpa_s->wpa, data->stkstart.peer);
|
/external/wpa_supplicant_6/wpa_supplicant/src/wps/ |
wps_upnp.c | [all...] |
wps_upnp_web.c | 812 *reply = sm->ctx->rx_req_get_device_info(sm->priv, &sm->peer); 841 *reply = sm->ctx->rx_req_put_message(sm->priv, &sm->peer, msg); [all...] |
/external/ipsec-tools/ |
setup.c | 353 const vchar_t *peer, int remoteid)
|
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
driver.h | 447 * @addr: address of the peer STA or ff:ff:ff:ff:ff:ff for 615 * @addr: peer address (BSSID of the AP) 626 * @addr: peer address (BSSID of the AP) 1291 u8 peer[ETH_ALEN]; member in struct:wpa_event_data::stkstart [all...] |
driver_privsep.c | 415 os_memcpy(data.stkstart.peer, buf, ETH_ALEN);
|
/external/wpa_supplicant_6/wpa_supplicant/ |
ctrl_iface.c | 107 /* MLME-STKSTART.request(peer) */ 111 u8 peer[ETH_ALEN]; local 113 if (hwaddr_aton(addr, peer)) { 115 "address '%s'", peer); 120 MAC2STR(peer)); 122 return wpa_sm_stkstart(wpa_s->wpa, peer); [all...] |
events.c | 1108 wpa_sm_stkstart(wpa_s->wpa, data->stkstart.peer);
|
wpa_priv.c | 1012 &data->stkstart.peer, ETH_ALEN);
|
/external/chromium/net/third_party/nss/ssl/ |
sslcon.c | [all...] |
sslsock.c | [all...] |
/external/iproute2/doc/ |
ip-cref.tex | 285 \item \verb|broadcast LLADDRESS|, \verb|brd LLADDRESS| or \verb|peer LLADDRESS| 287 --- change the link layer broadcast address or the peer address when 406 attached to each end. All packets sent to this link will reach the peer 407 and all packets received by us came from this single peer. 464 (or the peer address for pointopoint links) is a 471 NBMA links have no well-defined broadcast or peer address, 584 \item \verb|peer ADDRESS| 588 encoding the network prefix length. If a peer address is specified, 590 with the peer rather than with the local address. [all...] |
/external/openssl/include/openssl/ |
ssl.h | 175 * Version 1 - added the optional peer certificate 432 * Peer [ 3 ] EXPLICIT X509, -- optional Peer Certificate 434 * Verify_result [ 5 ] EXPLICIT INTEGER, -- X509_V_... code for `Peer' 479 X509 *peer; member in struct:ssl_session_st 480 /* when app_verify_callback accepts a session where the peer's certificate 506 unsigned char *tlsext_ecpointformatlist; /* peer's list */ 508 unsigned char *tlsext_ellipticcurvelist; /* peer's list */ [all...] |
/external/bluetooth/bluez/tools/ |
hciconfig.c | 760 static int get_link_key(const bdaddr_t *local, const bdaddr_t *peer, uint8_t *key) 768 ba2str(peer, addr); [all...] |
hcitool.c | 361 static char *get_device_name(const bdaddr_t *local, const bdaddr_t *peer) 368 ba2str(peer, addr); [all...] |
/external/dnsmasq/src/ |
dnsmasq.h | 590 struct sockaddr_in peer; member in struct:tftp_transfer
|
/external/netperf/ |
nettest_sctp.c | 2640 struct sockaddr_storage peer; local 3693 struct sockaddr_storage peer; local [all...] |