/external/openssh/ |
kexgexs.c | 170 buffer_ptr(&kex->peer), buffer_len(&kex->peer),
|
kex.h | 128 Buffer peer; member in struct:Kex
|
/external/openssl/ssl/ |
ssl_asn1.c | 300 if (in->peer != NULL) 301 M_ASN1_I2D_len_EXP_opt(in->peer,i2d_X509,3,v3); 346 if (in->peer != NULL) 347 M_ASN1_I2D_put_EXP_opt(in->peer,i2d_X509,3,v3); 508 if (ret->peer != NULL) 510 X509_free(ret->peer); 511 ret->peer=NULL; 513 M_ASN1_D2I_get_EXP_opt(ret->peer,d2i_X509,3);
|
/external/mtpd/ |
pptp.c | 119 uint16_t peer; member in struct:packet::__anon9751::__anon9752::__anon9754::__anon9757 309 if (state == OCRQ && incoming.ocrp.peer == local) { 367 outgoing.icrp.peer = incoming.icrq.call; 376 outgoing.ocrp.peer = incoming.ocrq.call;
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_sake_common.h | 2 * EAP server/peer: EAP-SAKE shared routines 97 int peer, const u8 *eap, size_t eap_len,
|
eap_sake_common.c | 2 * EAP server/peer: EAP-SAKE shared routines 316 * @peer: MIC calculation for 0 = Server, 1 = Peer message 326 int peer, const u8 *eap, size_t eap_len, 338 if (peer) { 374 peer ? "Peer MIC" : "Server MIC",
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_sake_common.h | 2 * EAP server/peer: EAP-SAKE shared routines 91 int peer, const u8 *eap, size_t eap_len,
|
eap_sake_common.c | 2 * EAP server/peer: EAP-SAKE shared routines 310 * @peer: MIC calculation for 0 = Server, 1 = Peer message 320 int peer, const u8 *eap, size_t eap_len, 332 if (peer) { 368 peer ? "Peer MIC" : "Server MIC",
|
/external/wpa_supplicant_8/src/wps/ |
wps_upnp_web.c | 420 struct upnp_wps_peer *peer; local 424 peer = &iface->peer; 439 if (peer->wps) 440 wps_deinit(peer->wps); 446 peer->wps = wps_init(&cfg); 447 if (peer->wps) { 449 *reply = wps_get_msg(peer->wps, &op_code); 451 wps_deinit(peer->wps); 452 peer->wps = NULL [all...] |
wps_upnp_i.h | 112 /* FIX: maintain separate structures for each UPnP peer */ 113 struct upnp_wps_peer peer; member in struct:upnp_wps_device_interface
|
/external/openssl/apps/ |
pkeyutl.c | 516 EVP_PKEY *peer = NULL; local 524 peer = load_pubkey(bio_err, file, peerform, 0, NULL, NULL, "Peer Key"); 526 if (!peer) 528 BIO_printf(bio_err, "Error reading peer key %s\n", file); 533 ret = EVP_PKEY_derive_set_peer(ctx, peer); 535 EVP_PKEY_free(peer);
|
/system/core/adb/ |
transport.c | 417 asocket* peer = socket->peer; local 420 if (peer) { 421 peer->peer = NULL; 422 peer->close(peer); 443 asocket* peer = tracker->socket.peer; local 447 return peer->enqueue( peer, p ) [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
peerkey.c | 63 const u8 *peer, 74 if (peer) 96 if (peer) { 97 /* Peer MAC Address KDE */ 98 pos = wpa_add_kde(pos, RSN_KEY_DATA_MAC_ADDR, peer, ETH_ALEN); 106 if (peer) { 107 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK Error (peer " 109 MAC2STR(peer), mui, error_type); 133 /* KDEs: Peer RSN IE, Initiator MAC Address, Initiator Nonce */ 157 /* Peer RSN IE * 608 u8 peer[ETH_ALEN]; local [all...] |
wpa.h | 58 int (*tdls_oper)(void *ctx, int oper, const u8 *peer); 298 int wpa_sm_stkstart(struct wpa_sm *sm, const u8 *peer); 300 static inline int wpa_sm_stkstart(struct wpa_sm *sm, const u8 *peer)
|
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
peerkey.c | 68 const u8 *peer, 79 if (peer) 101 if (peer) { 102 /* Peer MAC Address KDE */ 103 pos = wpa_add_kde(pos, RSN_KEY_DATA_MAC_ADDR, peer, ETH_ALEN); 111 if (peer) { 112 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK Error (peer " 114 MAC2STR(peer), mui, error_type); 138 /* KDEs: Peer RSN IE, Initiator MAC Address, Initiator Nonce */ 162 /* Peer RSN IE * 613 u8 peer[ETH_ALEN]; local [all...] |
wpa.h | 264 int wpa_sm_stkstart(struct wpa_sm *sm, const u8 *peer); 266 static inline int wpa_sm_stkstart(struct wpa_sm *sm, const u8 *peer)
|
/external/kernel-headers/original/linux/ |
net.h | 141 int *sockaddr_len, int peer); 251 int *addr_len, int peer), (sock, uaddr, addr_len, peer)) \
|
/external/apache-harmony/auth/src/test/java/common/org/ietf/jgss/ |
GSSManagerTest.java | 99 public GSSContext createContext(GSSName peer, Oid mech,
|
/external/wpa_supplicant_6/wpa_supplicant/src/wps/ |
wps_upnp_i.h | 156 /* FIX: maintain separate structures for each UPnP peer */ 157 struct upnp_wps_peer peer; member in struct:upnp_wps_device_sm
|
/external/wpa_supplicant_8/src/drivers/ |
driver.h | 785 /* Driver supports operating as a TDLS peer */ 1020 * @addr: Address of the peer STA (BSSID of the current AP when setting 1127 * @addr: peer address (BSSID of the AP) 1138 * @addr: peer address (BSSID of the AP) 3141 u8 peer[ETH_ALEN]; member in struct:wpa_event_data::stkstart 3148 u8 peer[ETH_ALEN]; member in struct:wpa_event_data::tdls 3180 u8 peer[ETH_ALEN]; member in struct:wpa_event_data::ibss_rsn_start 3187 u8 peer[ETH_ALEN]; member in struct:wpa_event_data::auth_info 3474 const u8 *peer; member in struct:wpa_event_data::p2p_prov_disc_req 3485 const u8 *peer; member in struct:wpa_event_data::p2p_prov_disc_resp 3509 u8 peer[ETH_ALEN]; member in struct:wpa_event_data::ibss_peer_lost [all...] |
/external/wpa_supplicant_8/src/p2p/ |
p2p.h | 94 * peer_device_addr - P2P Device Address of the peer 99 * peer_interface_addr - P2P Interface Address of the peer 124 * peer_config_timeout - Peer configuration timeout (in 10 msec units) 141 * struct p2p_peer_info - P2P peer information 145 * p2p_device_addr - P2P Device Address of the peer 371 * target peer is known or if other channels are scanned in steps). 432 * no need to wait for a response from the destination peer anymore. 489 * @info: P2P peer information 490 * @new_device: Inform if the peer is newly found 584 * @peer: Source address of the reques [all...] |
/bionic/libc/netbsd/resolv/ |
res_send.c | 407 struct sockaddr_storage peer; local 423 peerlen = sizeof(peer); 425 (struct sockaddr *)(void *)&peer, &peerlen) < 0) { 429 if (!sock_eq((struct sockaddr *)(void *)&peer, 745 struct sockaddr_storage peer; local 746 socklen_t size = sizeof peer; 749 (struct sockaddr *)(void *)&peer, &size) < 0 || 750 !sock_eq((struct sockaddr *)(void *)&peer, nsap)) { [all...] |
/external/openssl/crypto/bio/ |
bio.h | 598 #define BIO_ctrl_dgram_connect(b,peer) \ 599 (int)BIO_ctrl(b,BIO_CTRL_DGRAM_CONNECT,0, (char *)peer) 600 #define BIO_ctrl_set_connected(b, state, peer) \ 601 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_CONNECTED, state, (char *)peer) 606 #define BIO_dgram_get_peer(b,peer) \ 607 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_GET_PEER, 0, (char *)peer) 608 #define BIO_dgram_set_peer(b,peer) \ 609 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_PEER, 0, (char *)peer) [all...] |
/external/openssl/include/openssl/ |
bio.h | 598 #define BIO_ctrl_dgram_connect(b,peer) \ 599 (int)BIO_ctrl(b,BIO_CTRL_DGRAM_CONNECT,0, (char *)peer) 600 #define BIO_ctrl_set_connected(b, state, peer) \ 601 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_CONNECTED, state, (char *)peer) 606 #define BIO_dgram_get_peer(b,peer) \ 607 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_GET_PEER, 0, (char *)peer) 608 #define BIO_dgram_set_peer(b,peer) \ 609 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_PEER, 0, (char *)peer) [all...] |
/external/quake/quake/src/QW/qwfwd/ |
qwfwd.c | 67 typedef struct peer {
struct 72 struct peer *next;
223 if (p == NULL) { // new peer
224 printf("peer %s:%d added", inet_ntoa(fsin.sin_addr), (int)ntohs(fsin.sin_port));
253 printf("peer %s:%d removed (timeout)", inet_ntoa(p->sin.sin_addr), (int)ntohs(p->sin.sin_port));
259 printf ("peer %s:%d removed (timeout)", inet_ntoa(p->sin.sin_addr), (int)ntohs(p->sin.sin_port));
|