HomeSort by relevance Sort by last modified time
    Searched refs:peer (Results 51 - 75 of 147) sorted by null

1 23 4 5 6

  /external/openssh/
kexgexs.c 170 buffer_ptr(&kex->peer), buffer_len(&kex->peer),
kex.h 128 Buffer peer; member in struct:Kex
  /external/openssl/ssl/
ssl_asn1.c 300 if (in->peer != NULL)
301 M_ASN1_I2D_len_EXP_opt(in->peer,i2d_X509,3,v3);
346 if (in->peer != NULL)
347 M_ASN1_I2D_put_EXP_opt(in->peer,i2d_X509,3,v3);
508 if (ret->peer != NULL)
510 X509_free(ret->peer);
511 ret->peer=NULL;
513 M_ASN1_D2I_get_EXP_opt(ret->peer,d2i_X509,3);
  /external/mtpd/
pptp.c 119 uint16_t peer; member in struct:packet::__anon9751::__anon9752::__anon9754::__anon9757
309 if (state == OCRQ && incoming.ocrp.peer == local) {
367 outgoing.icrp.peer = incoming.icrq.call;
376 outgoing.ocrp.peer = incoming.ocrq.call;
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
eap_sake_common.h 2 * EAP server/peer: EAP-SAKE shared routines
97 int peer, const u8 *eap, size_t eap_len,
eap_sake_common.c 2 * EAP server/peer: EAP-SAKE shared routines
316 * @peer: MIC calculation for 0 = Server, 1 = Peer message
326 int peer, const u8 *eap, size_t eap_len,
338 if (peer) {
374 peer ? "Peer MIC" : "Server MIC",
  /external/wpa_supplicant_8/src/eap_common/
eap_sake_common.h 2 * EAP server/peer: EAP-SAKE shared routines
91 int peer, const u8 *eap, size_t eap_len,
eap_sake_common.c 2 * EAP server/peer: EAP-SAKE shared routines
310 * @peer: MIC calculation for 0 = Server, 1 = Peer message
320 int peer, const u8 *eap, size_t eap_len,
332 if (peer) {
368 peer ? "Peer MIC" : "Server MIC",
  /external/wpa_supplicant_8/src/wps/
wps_upnp_web.c 420 struct upnp_wps_peer *peer; local
424 peer = &iface->peer;
439 if (peer->wps)
440 wps_deinit(peer->wps);
446 peer->wps = wps_init(&cfg);
447 if (peer->wps) {
449 *reply = wps_get_msg(peer->wps, &op_code);
451 wps_deinit(peer->wps);
452 peer->wps = NULL
    [all...]
wps_upnp_i.h 112 /* FIX: maintain separate structures for each UPnP peer */
113 struct upnp_wps_peer peer; member in struct:upnp_wps_device_interface
  /external/openssl/apps/
pkeyutl.c 516 EVP_PKEY *peer = NULL; local
524 peer = load_pubkey(bio_err, file, peerform, 0, NULL, NULL, "Peer Key");
526 if (!peer)
528 BIO_printf(bio_err, "Error reading peer key %s\n", file);
533 ret = EVP_PKEY_derive_set_peer(ctx, peer);
535 EVP_PKEY_free(peer);
  /system/core/adb/
transport.c 417 asocket* peer = socket->peer; local
420 if (peer) {
421 peer->peer = NULL;
422 peer->close(peer);
443 asocket* peer = tracker->socket.peer; local
447 return peer->enqueue( peer, p )
    [all...]
  /external/wpa_supplicant_8/src/rsn_supp/
peerkey.c 63 const u8 *peer,
74 if (peer)
96 if (peer) {
97 /* Peer MAC Address KDE */
98 pos = wpa_add_kde(pos, RSN_KEY_DATA_MAC_ADDR, peer, ETH_ALEN);
106 if (peer) {
107 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK Error (peer "
109 MAC2STR(peer), mui, error_type);
133 /* KDEs: Peer RSN IE, Initiator MAC Address, Initiator Nonce */
157 /* Peer RSN IE *
608 u8 peer[ETH_ALEN]; local
    [all...]
wpa.h 58 int (*tdls_oper)(void *ctx, int oper, const u8 *peer);
298 int wpa_sm_stkstart(struct wpa_sm *sm, const u8 *peer);
300 static inline int wpa_sm_stkstart(struct wpa_sm *sm, const u8 *peer)
  /external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/
peerkey.c 68 const u8 *peer,
79 if (peer)
101 if (peer) {
102 /* Peer MAC Address KDE */
103 pos = wpa_add_kde(pos, RSN_KEY_DATA_MAC_ADDR, peer, ETH_ALEN);
111 if (peer) {
112 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK Error (peer "
114 MAC2STR(peer), mui, error_type);
138 /* KDEs: Peer RSN IE, Initiator MAC Address, Initiator Nonce */
162 /* Peer RSN IE *
613 u8 peer[ETH_ALEN]; local
    [all...]
wpa.h 264 int wpa_sm_stkstart(struct wpa_sm *sm, const u8 *peer);
266 static inline int wpa_sm_stkstart(struct wpa_sm *sm, const u8 *peer)
  /external/kernel-headers/original/linux/
net.h 141 int *sockaddr_len, int peer);
251 int *addr_len, int peer), (sock, uaddr, addr_len, peer)) \
  /external/apache-harmony/auth/src/test/java/common/org/ietf/jgss/
GSSManagerTest.java 99 public GSSContext createContext(GSSName peer, Oid mech,
  /external/wpa_supplicant_6/wpa_supplicant/src/wps/
wps_upnp_i.h 156 /* FIX: maintain separate structures for each UPnP peer */
157 struct upnp_wps_peer peer; member in struct:upnp_wps_device_sm
  /external/wpa_supplicant_8/src/drivers/
driver.h 785 /* Driver supports operating as a TDLS peer */
1020 * @addr: Address of the peer STA (BSSID of the current AP when setting
1127 * @addr: peer address (BSSID of the AP)
1138 * @addr: peer address (BSSID of the AP)
3141 u8 peer[ETH_ALEN]; member in struct:wpa_event_data::stkstart
3148 u8 peer[ETH_ALEN]; member in struct:wpa_event_data::tdls
3180 u8 peer[ETH_ALEN]; member in struct:wpa_event_data::ibss_rsn_start
3187 u8 peer[ETH_ALEN]; member in struct:wpa_event_data::auth_info
3474 const u8 *peer; member in struct:wpa_event_data::p2p_prov_disc_req
3485 const u8 *peer; member in struct:wpa_event_data::p2p_prov_disc_resp
3509 u8 peer[ETH_ALEN]; member in struct:wpa_event_data::ibss_peer_lost
    [all...]
  /external/wpa_supplicant_8/src/p2p/
p2p.h 94 * peer_device_addr - P2P Device Address of the peer
99 * peer_interface_addr - P2P Interface Address of the peer
124 * peer_config_timeout - Peer configuration timeout (in 10 msec units)
141 * struct p2p_peer_info - P2P peer information
145 * p2p_device_addr - P2P Device Address of the peer
371 * target peer is known or if other channels are scanned in steps).
432 * no need to wait for a response from the destination peer anymore.
489 * @info: P2P peer information
490 * @new_device: Inform if the peer is newly found
584 * @peer: Source address of the reques
    [all...]
  /bionic/libc/netbsd/resolv/
res_send.c 407 struct sockaddr_storage peer; local
423 peerlen = sizeof(peer);
425 (struct sockaddr *)(void *)&peer, &peerlen) < 0) {
429 if (!sock_eq((struct sockaddr *)(void *)&peer,
745 struct sockaddr_storage peer; local
746 socklen_t size = sizeof peer;
749 (struct sockaddr *)(void *)&peer, &size) < 0 ||
750 !sock_eq((struct sockaddr *)(void *)&peer, nsap)) {
    [all...]
  /external/openssl/crypto/bio/
bio.h 598 #define BIO_ctrl_dgram_connect(b,peer) \
599 (int)BIO_ctrl(b,BIO_CTRL_DGRAM_CONNECT,0, (char *)peer)
600 #define BIO_ctrl_set_connected(b, state, peer) \
601 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_CONNECTED, state, (char *)peer)
606 #define BIO_dgram_get_peer(b,peer) \
607 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_GET_PEER, 0, (char *)peer)
608 #define BIO_dgram_set_peer(b,peer) \
609 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_PEER, 0, (char *)peer)
    [all...]
  /external/openssl/include/openssl/
bio.h 598 #define BIO_ctrl_dgram_connect(b,peer) \
599 (int)BIO_ctrl(b,BIO_CTRL_DGRAM_CONNECT,0, (char *)peer)
600 #define BIO_ctrl_set_connected(b, state, peer) \
601 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_CONNECTED, state, (char *)peer)
606 #define BIO_dgram_get_peer(b,peer) \
607 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_GET_PEER, 0, (char *)peer)
608 #define BIO_dgram_set_peer(b,peer) \
609 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_PEER, 0, (char *)peer)
    [all...]
  /external/quake/quake/src/QW/qwfwd/
qwfwd.c 67 typedef struct peer { struct
72 struct peer *next;
223 if (p == NULL) { // new peer
224 printf("peer %s:%d added", inet_ntoa(fsin.sin_addr), (int)ntohs(fsin.sin_port));
253 printf("peer %s:%d removed (timeout)", inet_ntoa(p->sin.sin_addr), (int)ntohs(p->sin.sin_port));
259 printf ("peer %s:%d removed (timeout)", inet_ntoa(p->sin.sin_addr), (int)ntohs(p->sin.sin_port));

Completed in 1397 milliseconds

1 23 4 5 6