/external/qemu/hw/ |
goldfish_pipe.c | 416 void* peer = svc->funcs.init(pipe, svc->opaque, pipeArgs); local 417 if (peer == NULL) { 423 pipe->opaque = peer; [all...] |
/external/wpa_supplicant_8/src/ap/ |
drv_callbacks.c | 442 sta = ap_get_sta(hapd, rx_auth->peer); 444 sta = ap_sta_add(hapd, rx_auth->peer); 472 hostapd_sta_auth(hapd, rx_auth->peer, rx_auth->auth_transaction + 1,
|
ap_drv_ops.c | 616 const u8 *peer, u8 *buf, u16 *buf_len) 620 return hapd->driver->wnm_oper(hapd->drv_priv, oper, peer, buf,
|
/external/wpa_supplicant_6/wpa_supplicant/ |
ctrl_iface.c | 107 /* MLME-STKSTART.request(peer) */ 111 u8 peer[ETH_ALEN]; local 113 if (hwaddr_aton(addr, peer)) { 115 "address '%s'", peer); 120 MAC2STR(peer)); 122 return wpa_sm_stkstart(wpa_s->wpa, peer); [all...] |
events.c | 1114 wpa_sm_stkstart(wpa_s->wpa, data->stkstart.peer);
|
wpa_priv.c | 1012 &data->stkstart.peer, ETH_ALEN);
|
/external/wpa_supplicant_8/wpa_supplicant/ |
events.c | [all...] |
/external/openssl/ssl/ |
s3_clnt.c | [all...] |
ssl.h | 175 * Version 1 - added the optional peer certificate 455 * Peer [ 3 ] EXPLICIT X509, -- optional Peer Certificate 457 * Verify_result [ 5 ] EXPLICIT INTEGER, -- X509_V_... code for `Peer' 505 X509 *peer; member in struct:ssl_session_st 506 /* when app_verify_callback accepts a session where the peer's certificate 532 unsigned char *tlsext_ecpointformatlist; /* peer's list */ 534 unsigned char *tlsext_ellipticcurvelist; /* peer's list */ [all...] |
/external/qemu/ |
block.c | 689 assert(!bs->peer); 707 if (bs->peer) { 710 bs->peer = qdev; 716 assert(bs->peer == qdev); 717 bs->peer = NULL; 722 return bs->peer; [all...] |
/external/chromium-trace/trace-viewer/third_party/pywebsocket/src/mod_pywebsocket/ |
_stream_hybi.py | 656 # other peer. Just forget them. 845 it sends out TCP RST packet to the other peer.
|
/external/libppp/src/ |
command.c | 592 mp_Enddisc(bundle->ncp.mp.peer.enddisc.class, 593 bundle->ncp.mp.peer.enddisc.address, 594 bundle->ncp.mp.peer.enddisc.len)); 601 nargv[arg] = subst(nargv[arg], "USER", bundle->ncp.mp.peer.authname); 812 "Add iface address", "iface add addr[/bits| mask] peer", NULL}, 814 "Add or change an iface address", "iface add! addr[/bits| mask] peer", 3179 struct ncpaddr peer, addr; local [all...] |
cbcp.c | 125 log_Printf(LogCBCP, "%s: Timeout waiting for peer %s\n", 319 if (*cbcp->p->dl->peer.authname == '\0' || 320 !auth_SetPhoneList(cbcp->p->dl->peer.authname, cbcp->fsm.phone, 357 * so that we (hopefully) agree with the peer 385 * The peer has given us an address type spec - make sure we 395 /* we accept the REQ even if the peer didn't specify an addr->type */ 401 log_Printf(LogPHASE, "CBCP: no number to pass to the peer !\n"); 411 * This violates the spec, but if the peer has told us the 423 * If the peer's insisting on deciding the number, make sure 424 * it's one of the ones in our list. If it is, let the peer [all...] |
/external/sepolicy/ |
access_vectors | 811 # network peer labels 812 class peer
|
/external/wpa_supplicant_8/src/p2p/ |
p2p_sd.c | 57 return NULL; /* peer does not support SD */ 64 /* Use WSD only if the peer indicates support or it */ 70 os_memcmp(q->peer, dev->info.p2p_device_addr, ETH_ALEN) == 240 "peer " MACSTR " to send SD Request", 398 * separately for each peer to avoid having to drop old 926 os_memcpy(q->peer, dst, ETH_ALEN);
|
/external/wpa_supplicant_8/src/wps/ |
wps_upnp.c | [all...] |
/external/iproute2/doc/ |
ip-cref.tex | 285 \item \verb|broadcast LLADDRESS|, \verb|brd LLADDRESS| or \verb|peer LLADDRESS| 287 --- change the link layer broadcast address or the peer address when 406 attached to each end. All packets sent to this link will reach the peer 407 and all packets received by us came from this single peer. 464 (or the peer address for pointopoint links) is a 471 NBMA links have no well-defined broadcast or peer address, 584 \item \verb|peer ADDRESS| 588 encoding the network prefix length. If a peer address is specified, 590 with the peer rather than with the local address. [all...] |
/external/openssl/include/openssl/ |
ssl.h | 175 * Version 1 - added the optional peer certificate 455 * Peer [ 3 ] EXPLICIT X509, -- optional Peer Certificate 457 * Verify_result [ 5 ] EXPLICIT INTEGER, -- X509_V_... code for `Peer' 505 X509 *peer; member in struct:ssl_session_st 506 /* when app_verify_callback accepts a session where the peer's certificate 532 unsigned char *tlsext_ecpointformatlist; /* peer's list */ 534 unsigned char *tlsext_ellipticcurvelist; /* peer's list */ [all...] |
/external/ipsec-tools/ |
setup.c | 648 const vchar_t *peer, int remoteid)
|
/external/wpa_supplicant_8/src/drivers/ |
driver_privsep.c | 405 os_memcpy(data.stkstart.peer, buf, ETH_ALEN);
|
/external/openssh/ |
monitor_wrap.c | 589 buffer_put_string(m, buffer_ptr(&kex->peer), buffer_len(&kex->peer)); [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/wps/ |
wps_upnp_web.c | 812 *reply = sm->ctx->rx_req_get_device_info(sm->priv, &sm->peer); 841 *reply = sm->ctx->rx_req_put_message(sm->priv, &sm->peer, msg); [all...] |
/frameworks/base/core/java/android/app/ |
ActivityThread.java | 1544 ResourcesKey peer = (ResourcesKey) obj; local [all...] |
/external/dnsmasq/src/ |
dnsmasq.h | 590 struct sockaddr_in peer; member in struct:tftp_transfer
|
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
driver_privsep.c | 415 os_memcpy(data.stkstart.peer, buf, ETH_ALEN);
|