/external/libppp/src/ |
radius.h | 98 } peer; member in struct:radacct
|
lqr.c | 232 memcpy(&lastlqr, &p->hdlc.lqm.lqr.peer, sizeof lastlqr); 233 lqr_ChangeOrder(lqr, &p->hdlc.lqm.lqr.peer); 234 lqr_Dump(l->name, "Input", &p->hdlc.lqm.lqr.peer); 235 /* we have received an LQR from our peer */ 247 lqr_Analyse(&p->hdlc, &lastlqr, &p->hdlc.lqm.lqr.peer); 255 lastlqr.PeerInLQRs == p->hdlc.lqm.lqr.peer.PeerInLQRs)) 275 memset(&physical->hdlc.lqm.lqr.peer, '\0', 276 sizeof physical->hdlc.lqm.lqr.peer); 404 log_Printf(LogLQM, " Likely due to both peer congestion" 407 log_Printf(LogLQM, " Likely due to peer congestion\n") [all...] |
datalink.h | 111 struct peerid peer; /* Peer identification */ member in struct:datalink
|
mp.h | 81 struct peerid peer; /* Who are we talking to */ member in struct:mp
|
datalink.c | 129 log_Printf(LogPHASE, "Call peer back on %s\n", dl->cbcp.fsm.phone); 607 strncpy(dl->peer.authname, name, sizeof dl->peer.authname - 1); 608 dl->peer.authname[sizeof dl->peer.authname - 1] = '\0'; 624 auth_Select(dl->bundle, dl->peer.authname); 643 dl->bundle->ncp.mp.peer = dl->peer; 645 auth_Select(dl->bundle, dl->peer.authname); 686 log_Printf(LogPHASE, "%s: Shutdown and await peer callback\n", dl->name) [all...] |
chap.c | 332 write(in[1], chap->challenge.peer + 1, *chap->challenge.peer); 361 *chap->challenge.local = *chap->challenge.peer = '\0'; 376 ans = chap_BuildAnswer(name, key, chap->auth.id, chap->challenge.peer 658 /* Give the peer another shot */ 679 *chap->challenge.local = *chap->challenge.peer = '\0'; 753 *chap->challenge.peer = alen; 754 bp = mbuf_Read(bp, chap->challenge.peer + 1, alen); 857 chap->challenge.peer[0] = sizeof resp->PeerChallenge; 858 memcpy(chap->challenge.peer + 1, resp->PeerChallenge [all...] |
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/rpcsvc/ |
yp.x | 88 peername peer; 134 peername peer;
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/rpcsvc/ |
yp.x | 88 peername peer; 134 peername peer;
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/rpcsvc/ |
yp.x | 88 peername peer; 134 peername peer;
|
/external/wpa_supplicant_8/src/ap/ |
peerkey_auth.c | 51 struct wpa_state_machine *sm, const u8 *peer, 64 if (peer) { 65 pos = wpa_add_kde(pos, RSN_KEY_DATA_MAC_ADDR, peer, ETH_ALEN, 102 /* Initiator = sm->addr; Peer = kde.mac_addr */ 202 const u8 *smk, const u8 *peer) 223 /* Peer RSN IE */ 227 /* Peer MAC Address */ 228 pos = wpa_add_kde(pos, RSN_KEY_DATA_MAC_ADDR, peer, ETH_ALEN, NULL, 0); 276 /* Peer = sm->addr; Initiator = kde.mac_addr; 277 * Peer Nonce = key->key_nonce; Initiator Nonce = kde.nonce * [all...] |
/external/wpa_supplicant_8/src/p2p/ |
p2p_build.c | 151 struct p2p_device *peer) 166 if (peer && peer->wps_method != WPS_NOT_READY) { 167 if (peer->wps_method == WPS_PBC) 169 else if (peer->wps_method == WPS_PIN_DISPLAY || 170 peer->wps_method == WPS_PIN_KEYPAD)
|
/external/bluetooth/bluedroid/btif/src/ |
btif_pan.c | 240 (const bt_bdaddr_t*)conn->peer, btpan_conn_local_role, btpan_remote_role); 438 if(memcmp(btpan_cb.conns[i].peer, addr, sizeof(BD_ADDR)) == 0) 448 memset(&conn->peer, 0, sizeof(conn->peer)); 464 bdcpy(btpan_cb.conns[i].peer, addr); 480 memset(&p->peer, 0, 6); 500 || memcmp(btpan_cb.conns[i].peer, eth_hdr->h_dest, sizeof(BD_ADDR)) == 0)) 586 callback.connection_state_cb(BTPAN_STATE_DISCONNECTED, 0, (const bt_bdaddr_t*)conn->peer,
|
/external/iproute2/include/ |
libnetlink.h | 15 struct sockaddr_nl peer; member in struct:rtnl_handle 46 extern int rtnl_talk(struct rtnl_handle *rtnl, struct nlmsghdr *n, pid_t peer,
|
/external/openssh/ |
kexdhs.c | 129 buffer_ptr(&kex->peer), buffer_len(&kex->peer),
|
kexecdhc.c | 135 buffer_ptr(&kex->peer), buffer_len(&kex->peer),
|
kexecdhs.c | 127 buffer_ptr(&kex->peer), buffer_len(&kex->peer),
|
kexgexc.c | 177 buffer_ptr(&kex->peer), buffer_len(&kex->peer),
|
kexgexs.c | 170 buffer_ptr(&kex->peer), buffer_len(&kex->peer),
|
/external/openssl/ssl/ |
ssl_asn1.c | 300 if (in->peer != NULL) 301 M_ASN1_I2D_len_EXP_opt(in->peer,i2d_X509,3,v3); 346 if (in->peer != NULL) 347 M_ASN1_I2D_put_EXP_opt(in->peer,i2d_X509,3,v3); 508 if (ret->peer != NULL) 510 X509_free(ret->peer); 511 ret->peer=NULL; 513 M_ASN1_D2I_get_EXP_opt(ret->peer,d2i_X509,3);
|
/external/mtpd/ |
pptp.c | 119 uint16_t peer; member in struct:packet::__anon12300::__anon12301::__anon12303::__anon12306 309 if (state == OCRQ && incoming.ocrp.peer == local) { 367 outgoing.icrp.peer = incoming.icrq.call; 376 outgoing.ocrp.peer = incoming.ocrq.call;
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_sake_common.h | 2 * EAP server/peer: EAP-SAKE shared routines 91 int peer, const u8 *eap, size_t eap_len,
|
/external/wpa_supplicant_8/src/wps/ |
wps_upnp_web.c | 420 struct upnp_wps_peer *peer; local 424 peer = &iface->peer; 439 if (peer->wps) 440 wps_deinit(peer->wps); 446 peer->wps = wps_init(&cfg); 447 if (peer->wps) { 449 *reply = wps_get_msg(peer->wps, &op_code); 451 wps_deinit(peer->wps); 452 peer->wps = NULL [all...] |
/external/openssl/apps/ |
pkeyutl.c | 516 EVP_PKEY *peer = NULL; local 524 peer = load_pubkey(bio_err, file, peerform, 0, NULL, NULL, "Peer Key"); 526 if (!peer) 528 BIO_printf(bio_err, "Error reading peer key %s\n", file); 533 ret = EVP_PKEY_derive_set_peer(ctx, peer); 535 EVP_PKEY_free(peer);
|
/system/core/adb/ |
transport.c | 417 asocket* peer = socket->peer; local 420 if (peer) { 421 peer->peer = NULL; 422 peer->close(peer); 443 asocket* peer = tracker->socket.peer; local 447 return peer->enqueue( peer, p ) [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
peerkey.c | 63 const u8 *peer, 74 if (peer) 96 if (peer) { 97 /* Peer MAC Address KDE */ 98 pos = wpa_add_kde(pos, RSN_KEY_DATA_MAC_ADDR, peer, ETH_ALEN); 106 if (peer) { 107 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK Error (peer " 109 MAC2STR(peer), mui, error_type); 133 /* KDEs: Peer RSN IE, Initiator MAC Address, Initiator Nonce */ 157 /* Peer RSN IE * 600 u8 peer[ETH_ALEN]; local [all...] |