/external/openssl/ssl/ |
s3_srvr.c | 511 ((s->session->peer != NULL) && 622 if (!s->session->peer) 2943 X509 *peer; local [all...] |
s2_clnt.c | 513 if (s->session->peer != NULL) /* can't happen*/ 520 s->session->peer = s->session->sess_cert->peer_key->x509; 522 CRYPTO_add(&s->session->peer->references, 1, CRYPTO_LOCK_X509); 526 || s->session->peer != s->session->sess_cert->peer_key->x509)
|
s2_srvr.c | 301 ((s->session->peer != NULL) && 1093 if (s->session->peer != NULL) 1094 X509_free(s->session->peer); 1095 s->session->peer=x509;
|
ssl_sess.c | 766 if (ss->peer != NULL) X509_free(ss->peer); 881 return s->peer; [all...] |
/external/wpa_supplicant_8/src/p2p/ |
p2p.h | 110 * peer_device_addr - P2P Device Address of the peer 115 * peer_interface_addr - P2P Interface Address of the peer 140 * peer_config_timeout - Peer configuration timeout (in 10 msec units) 157 * struct p2p_peer_info - P2P peer information 161 * p2p_device_addr - P2P Device Address of the peer 421 * target peer is known or if other channels are scanned in steps). 482 * no need to wait for a response from the destination peer anymore. 539 * @info: P2P peer information 540 * @new_device: Inform if the peer is newly found 634 * @peer: Source address of the reques [all...] |
p2p_i.h | 33 * If the peer was discovered based on an interface address (e.g., GO 112 u8 peer[ETH_ALEN]; member in struct:p2p_sd_query 175 * P2P_WAIT_PEER_CONNECT - Waiting peer in List for GO Neg 180 * P2P_WAIT_PEER_IDLE - Waiting peer idle for GO Neg 249 * go_neg_peer - Pointer to GO Negotiation peer 254 * invite_peer - Pointer to Invite peer 262 * sd_peer - Pointer to Service Discovery peer 446 * Keep track of which peer a given PD request was sent to. 616 struct p2p_device *peer); 719 void p2p_go_neg_failed(struct p2p_data *p2p, struct p2p_device *peer, [all...] |
p2p.c | 42 * P2P_PEER_EXPIRATION_AGE - Number of seconds after which inactive peer 95 * peer is the GO, so do not expire the peer entry. 108 * The peer is connected as a client in a group where 109 * we are the GO, so do not expire the peer entry. 116 /* If Connection is in progress, don't expire the peer 122 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Expiring old peer " 237 void p2p_go_neg_failed(struct p2p_data *p2p, struct p2p_device *peer, 251 if (peer) { 252 os_memcpy(res.peer_device_addr, peer->info.p2p_device_addr 2322 struct p2p_device *peer; local [all...] |
/packages/apps/Settings/src/com/android/settings/wifi/p2p/ |
WifiP2pSettings.java | 478 for (WifiP2pDevice peer: mPeers.getDeviceList()) { 479 if (DBG) Log.d(TAG, "-> " + peer); 480 mPeersGroup.addPreference(new WifiP2pPeer(getActivity(), peer)); 481 if (peer.status == WifiP2pDevice.CONNECTED) mConnectedDevices++;
|
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa_i.h | 42 u8 preauth_bssid[ETH_ALEN]; /* current RSN pre-auth peer or 276 const u8 *peer) 279 return sm->ctx->tdls_oper(sm->ctx->ctx, oper, peer);
|
/system/core/adb/ |
adb.c | 567 s->peer = create_remote_socket(p->msg.arg0, t); 568 s->peer->peer = s; 569 send_ready(s->id, s->peer->id, t); 578 if(s->peer == 0) { 579 s->peer = create_remote_socket(p->msg.arg0, t); 580 s->peer->peer = s; [all...] |
adb.h | 85 /* flag: set when the socket's peer has closed 98 asocket *peer; member in struct:asocket 112 /* enqueue is called by our peer when it has data 115 ** peer->ready() when we once again are ready to 120 /* ready is called by the peer when it is ready for 125 /* close is called by the peer when it has gone away. 127 ** peer once our close method is called.
|
/external/wpa_supplicant_8/wpa_supplicant/ |
ctrl_iface.c | 496 /* MLME-STKSTART.request(peer) */ 500 u8 peer[ETH_ALEN]; local 502 if (hwaddr_aton(addr, peer)) { 509 MAC2STR(peer)); 511 return wpa_sm_stkstart(wpa_s->wpa, peer); 521 u8 peer[ETH_ALEN]; local 524 if (hwaddr_aton(addr, peer)) { 531 MAC2STR(peer)); 534 ret = wpa_tdls_send_discovery_request(wpa_s->wpa, peer); 536 ret = wpa_drv_tdls_oper(wpa_s, TDLS_DISCOVERY_REQ, peer); 545 u8 peer[ETH_ALEN]; local 571 u8 peer[ETH_ALEN]; local 1338 u8 peer[ETH_ALEN]; local 4051 u8 *_peer = NULL, peer[ETH_ALEN]; local 4096 u8 peer[ETH_ALEN], go_dev_addr[ETH_ALEN], *go_dev = NULL; local [all...] |
wpas_glue.c | 546 static int wpa_supplicant_tdls_oper(void *ctx, int oper, const u8 *peer) 549 return wpa_drv_tdls_oper(wpa_s, oper, peer); 554 void *ctx, const u8 *peer, int add, u16 capability, 565 params.addr = peer; 572 * qosinfo to check if the peer is WMM capable.
|
sme.c | 497 wpa_printf(MSG_DEBUG, "SAE: Failed to process peer " 539 if (os_memcmp(wpa_s->pending_bssid, data->auth.peer, ETH_ALEN) != 0) { 541 "unexpected peer " MACSTR, 542 MAC2STR(data->auth.peer)); 546 wpa_dbg(wpa_s, MSG_DEBUG, "SME: Authentication response: peer=" MACSTR 548 MAC2STR(data->auth.peer), data->auth.auth_type, 616 os_memcpy(edata.ft_ies.target_ap, data->auth.peer, ETH_ALEN); 621 sme_associate(wpa_s, ssid->mode, data->auth.peer, [all...] |
events.c | [all...] |
/external/iproute2/lib/ |
libnetlink.c | 273 int rtnl_talk(struct rtnl_handle *rtnl, struct nlmsghdr *n, pid_t peer, 296 nladdr.nl_pid = peer; 348 if (nladdr.nl_pid != peer ||
|
/external/openssl/apps/ |
s_server.c | 464 BIO_printf(bio_err," -verify arg - turn on peer certificate verification\n"); 465 BIO_printf(bio_err," -Verify arg - turn on peer certificate verification, must have a cert.\n"); 468 BIO_printf(bio_err," -crl_check - check the peer certificate has not been revoked by its CA.\n" \ 470 BIO_printf(bio_err," -crl_check_all - check the peer certificate has not been revoked by its CA\n" \ 2387 X509 *peer; local 2706 X509 *peer; local [all...] |
/external/wpa_supplicant_8/src/drivers/ |
driver_atheros.c | 827 os_memcpy(event.auth.peer, mgmt->sa, ETH_ALEN); [all...] |
/bootable/recovery/minadbd/ |
adb.h | 84 /* flag: set when the socket's peer has closed 92 asocket *peer; member in struct:asocket 106 /* enqueue is called by our peer when it has data 109 ** peer->ready() when we once again are ready to 114 /* ready is called by the peer when it is ready for 119 /* close is called by the peer when it has gone away. 121 ** peer once our close method is called.
|
/external/clang/test/Analysis/ |
malloc.c | 976 void foo (xpc_connection_t peer) { 978 xpc_connection_set_context(peer, ctx); 979 xpc_connection_set_finalizer_f(peer, finalize_connection_context); 980 xpc_connection_resume(peer);
|
/external/qemu/ |
block_int.h | 159 DeviceState *peer; member in struct:BlockDriverState
|
/external/wpa_supplicant_8/src/ap/ |
wpa_auth_i.h | 20 u8 peer[ETH_ALEN]; member in struct:wpa_stsl_negotiation
|
ap_drv_ops.h | 109 enum wnm_oper oper, const u8 *peer,
|
/external/libppp/src/ |
lcp.c | 795 /* Set the MTU to what we want anyway - the peer won't care! */ 889 log_Printf(LogLCP, "Peer will only send PAP (not enabled)\n"); 909 log_Printf(LogLCP, "Peer will only send MSCHAP (not available" 912 log_Printf(LogLCP, "Peer will only send MSCHAPV2 (not available" 916 log_Printf(LogLCP, "Peer will only send %s (not %s)\n", [all...] |
/external/qemu/hw/ |
goldfish_pipe.c | 414 void* peer = svc->funcs.init(pipe, svc->opaque, pipeArgs); local 415 if (peer == NULL) { 421 pipe->opaque = peer; [all...] |