HomeSort by relevance Sort by last modified time
    Searched refs:peer (Results 51 - 75 of 162) sorted by null

1 23 4 5 6 7

  /external/libppp/src/
radius.h 98 } peer; member in struct:radacct
lqr.c 232 memcpy(&lastlqr, &p->hdlc.lqm.lqr.peer, sizeof lastlqr);
233 lqr_ChangeOrder(lqr, &p->hdlc.lqm.lqr.peer);
234 lqr_Dump(l->name, "Input", &p->hdlc.lqm.lqr.peer);
235 /* we have received an LQR from our peer */
247 lqr_Analyse(&p->hdlc, &lastlqr, &p->hdlc.lqm.lqr.peer);
255 lastlqr.PeerInLQRs == p->hdlc.lqm.lqr.peer.PeerInLQRs))
275 memset(&physical->hdlc.lqm.lqr.peer, '\0',
276 sizeof physical->hdlc.lqm.lqr.peer);
404 log_Printf(LogLQM, " Likely due to both peer congestion"
407 log_Printf(LogLQM, " Likely due to peer congestion\n")
    [all...]
datalink.h 111 struct peerid peer; /* Peer identification */ member in struct:datalink
mp.h 81 struct peerid peer; /* Who are we talking to */ member in struct:mp
datalink.c 129 log_Printf(LogPHASE, "Call peer back on %s\n", dl->cbcp.fsm.phone);
607 strncpy(dl->peer.authname, name, sizeof dl->peer.authname - 1);
608 dl->peer.authname[sizeof dl->peer.authname - 1] = '\0';
624 auth_Select(dl->bundle, dl->peer.authname);
643 dl->bundle->ncp.mp.peer = dl->peer;
645 auth_Select(dl->bundle, dl->peer.authname);
686 log_Printf(LogPHASE, "%s: Shutdown and await peer callback\n", dl->name)
    [all...]
chap.c 332 write(in[1], chap->challenge.peer + 1, *chap->challenge.peer);
361 *chap->challenge.local = *chap->challenge.peer = '\0';
376 ans = chap_BuildAnswer(name, key, chap->auth.id, chap->challenge.peer
658 /* Give the peer another shot */
679 *chap->challenge.local = *chap->challenge.peer = '\0';
753 *chap->challenge.peer = alen;
754 bp = mbuf_Read(bp, chap->challenge.peer + 1, alen);
857 chap->challenge.peer[0] = sizeof resp->PeerChallenge;
858 memcpy(chap->challenge.peer + 1, resp->PeerChallenge
    [all...]
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/rpcsvc/
yp.x 88 peername peer;
134 peername peer;
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/rpcsvc/
yp.x 88 peername peer;
134 peername peer;
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/rpcsvc/
yp.x 88 peername peer;
134 peername peer;
  /external/wpa_supplicant_8/src/ap/
peerkey_auth.c 51 struct wpa_state_machine *sm, const u8 *peer,
64 if (peer) {
65 pos = wpa_add_kde(pos, RSN_KEY_DATA_MAC_ADDR, peer, ETH_ALEN,
102 /* Initiator = sm->addr; Peer = kde.mac_addr */
202 const u8 *smk, const u8 *peer)
223 /* Peer RSN IE */
227 /* Peer MAC Address */
228 pos = wpa_add_kde(pos, RSN_KEY_DATA_MAC_ADDR, peer, ETH_ALEN, NULL, 0);
276 /* Peer = sm->addr; Initiator = kde.mac_addr;
277 * Peer Nonce = key->key_nonce; Initiator Nonce = kde.nonce *
    [all...]
  /external/wpa_supplicant_8/src/p2p/
p2p_build.c 151 struct p2p_device *peer)
166 if (peer && peer->wps_method != WPS_NOT_READY) {
167 if (peer->wps_method == WPS_PBC)
169 else if (peer->wps_method == WPS_PIN_DISPLAY ||
170 peer->wps_method == WPS_PIN_KEYPAD)
  /external/bluetooth/bluedroid/btif/src/
btif_pan.c 240 (const bt_bdaddr_t*)conn->peer, btpan_conn_local_role, btpan_remote_role);
438 if(memcmp(btpan_cb.conns[i].peer, addr, sizeof(BD_ADDR)) == 0)
448 memset(&conn->peer, 0, sizeof(conn->peer));
464 bdcpy(btpan_cb.conns[i].peer, addr);
480 memset(&p->peer, 0, 6);
500 || memcmp(btpan_cb.conns[i].peer, eth_hdr->h_dest, sizeof(BD_ADDR)) == 0))
586 callback.connection_state_cb(BTPAN_STATE_DISCONNECTED, 0, (const bt_bdaddr_t*)conn->peer,
  /external/iproute2/include/
libnetlink.h 15 struct sockaddr_nl peer; member in struct:rtnl_handle
46 extern int rtnl_talk(struct rtnl_handle *rtnl, struct nlmsghdr *n, pid_t peer,
  /external/openssh/
kexdhs.c 129 buffer_ptr(&kex->peer), buffer_len(&kex->peer),
kexecdhc.c 135 buffer_ptr(&kex->peer), buffer_len(&kex->peer),
kexecdhs.c 127 buffer_ptr(&kex->peer), buffer_len(&kex->peer),
kexgexc.c 177 buffer_ptr(&kex->peer), buffer_len(&kex->peer),
kexgexs.c 170 buffer_ptr(&kex->peer), buffer_len(&kex->peer),
  /external/openssl/ssl/
ssl_asn1.c 300 if (in->peer != NULL)
301 M_ASN1_I2D_len_EXP_opt(in->peer,i2d_X509,3,v3);
346 if (in->peer != NULL)
347 M_ASN1_I2D_put_EXP_opt(in->peer,i2d_X509,3,v3);
508 if (ret->peer != NULL)
510 X509_free(ret->peer);
511 ret->peer=NULL;
513 M_ASN1_D2I_get_EXP_opt(ret->peer,d2i_X509,3);
  /external/mtpd/
pptp.c 119 uint16_t peer; member in struct:packet::__anon12300::__anon12301::__anon12303::__anon12306
309 if (state == OCRQ && incoming.ocrp.peer == local) {
367 outgoing.icrp.peer = incoming.icrq.call;
376 outgoing.ocrp.peer = incoming.ocrq.call;
  /external/wpa_supplicant_8/src/eap_common/
eap_sake_common.h 2 * EAP server/peer: EAP-SAKE shared routines
91 int peer, const u8 *eap, size_t eap_len,
  /external/wpa_supplicant_8/src/wps/
wps_upnp_web.c 420 struct upnp_wps_peer *peer; local
424 peer = &iface->peer;
439 if (peer->wps)
440 wps_deinit(peer->wps);
446 peer->wps = wps_init(&cfg);
447 if (peer->wps) {
449 *reply = wps_get_msg(peer->wps, &op_code);
451 wps_deinit(peer->wps);
452 peer->wps = NULL
    [all...]
  /external/openssl/apps/
pkeyutl.c 516 EVP_PKEY *peer = NULL; local
524 peer = load_pubkey(bio_err, file, peerform, 0, NULL, NULL, "Peer Key");
526 if (!peer)
528 BIO_printf(bio_err, "Error reading peer key %s\n", file);
533 ret = EVP_PKEY_derive_set_peer(ctx, peer);
535 EVP_PKEY_free(peer);
  /system/core/adb/
transport.c 417 asocket* peer = socket->peer; local
420 if (peer) {
421 peer->peer = NULL;
422 peer->close(peer);
443 asocket* peer = tracker->socket.peer; local
447 return peer->enqueue( peer, p )
    [all...]
  /external/wpa_supplicant_8/src/rsn_supp/
peerkey.c 63 const u8 *peer,
74 if (peer)
96 if (peer) {
97 /* Peer MAC Address KDE */
98 pos = wpa_add_kde(pos, RSN_KEY_DATA_MAC_ADDR, peer, ETH_ALEN);
106 if (peer) {
107 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK Error (peer "
109 MAC2STR(peer), mui, error_type);
133 /* KDEs: Peer RSN IE, Initiator MAC Address, Initiator Nonce */
157 /* Peer RSN IE *
600 u8 peer[ETH_ALEN]; local
    [all...]

Completed in 495 milliseconds

1 23 4 5 6 7