/external/wpa_supplicant_8/src/drivers/ |
driver.h | 851 /* Driver supports operating as a TDLS peer */ 1135 * @addr: Address of the peer STA (BSSID of the current AP when setting 3301 u8 peer[ETH_ALEN]; member in struct:wpa_event_data::stkstart 3308 u8 peer[ETH_ALEN]; member in struct:wpa_event_data::tdls 3358 u8 peer[ETH_ALEN]; member in struct:wpa_event_data::ibss_rsn_start 3365 u8 peer[ETH_ALEN]; member in struct:wpa_event_data::auth_info 3657 const u8 *peer; member in struct:wpa_event_data::p2p_prov_disc_req 3668 const u8 *peer; member in struct:wpa_event_data::p2p_prov_disc_resp 3692 u8 peer[ETH_ALEN]; member in struct:wpa_event_data::ibss_peer_lost [all...] |
/external/libppp/src/ |
ipcp.c | 520 struct in_addr peer; local 528 /* Try to give the peer a previously configured IP address */ 530 if (!ncpaddr_getip4(&iface->addr[n].peer, &peer)) 532 if ((pos = iplist_ip2pos(&ipcp->cfg.peer_list, peer)) != -1) { 620 struct in_addr peer, mask, ip; local 623 if (!ncpaddr_getip4(&addr->peer, &peer)) { 637 ip.s_addr = peer.s_addr & mask.s_addr; 643 if (!((ip.s_addr ^ peer.s_addr) & mask.s_addr)) 977 struct in_addr myaddr, peer; local [all...] |
radius.c | 542 * peer has misformatted the response. 570 * peer has misformatted the response. 1078 memcpy(&ac->peer.ip.addr, peer_ip, sizeof(ac->peer.ip.addr)); 1079 memcpy(&ac->peer.ip.mask, netmask, sizeof(ac->peer.ip.mask)); 1088 memcpy(&ac->peer.ipv6.ifid, ifid, sizeof(ac->peer.ipv6.ifid)); 1139 strncpy(ac->user_name, dl->peer.authname, sizeof ac->user_name); [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
driver_i.h | 624 const u8 *peer, int role, const u8 *bssid, 631 return wpa_s->driver->p2p_invite(wpa_s->drv_priv, peer, role, bssid, 650 enum tdls_oper oper, const u8 *peer) 654 return wpa_s->driver->tdls_oper(wpa_s->drv_priv, oper, peer); 693 enum wnm_oper oper, const u8 *peer, 698 return wpa_s->driver->wnm_oper(wpa_s->drv_priv, oper, peer, buf,
|
p2p_supplicant.h | 81 void wpas_prov_disc_req(void *ctx, const u8 *peer, u16 config_methods, 86 void wpas_prov_disc_resp(void *ctx, const u8 *peer, u16 config_methods);
|
p2p_supplicant.c | 821 wpa_printf(MSG_DEBUG, "P2P: Start WPS Enrollee for peer " MACSTR, 5553 const u8 *peer; local 5639 u8 peer[ETH_ALEN]; local [all...] |
/external/kernel-headers/original/linux/ |
net.h | 141 int *sockaddr_len, int peer); 251 int *addr_len, int peer), (sock, uaddr, addr_len, peer)) \
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_sake_common.c | 2 * EAP server/peer: EAP-SAKE shared routines 310 * @peer: MIC calculation for 0 = Server, 1 = Peer message 320 int peer, const u8 *eap, size_t eap_len, 332 if (peer) { 368 peer ? "Peer MIC" : "Server MIC",
|
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa.h | 58 int (*tdls_oper)(void *ctx, int oper, const u8 *peer); 302 int wpa_sm_stkstart(struct wpa_sm *sm, const u8 *peer); 304 static inline int wpa_sm_stkstart(struct wpa_sm *sm, const u8 *peer)
|
/external/apache-harmony/auth/src/test/java/common/org/ietf/jgss/ |
GSSManagerTest.java | 99 public GSSContext createContext(GSSName peer, Oid mech,
|
/external/openssh/ |
kex.h | 128 Buffer peer; member in struct:Kex
|
/external/wpa_supplicant_8/src/wps/ |
wps_upnp_i.h | 112 /* FIX: maintain separate structures for each UPnP peer */ 113 struct upnp_wps_peer peer; member in struct:upnp_wps_device_interface
|
/bionic/libc/netbsd/resolv/ |
res_send.c | 420 struct sockaddr_storage peer; local 436 peerlen = sizeof(peer); 438 (struct sockaddr *)(void *)&peer, &peerlen) < 0) { 442 if (!sock_eq((struct sockaddr *)(void *)&peer, 763 struct sockaddr_storage peer; local 764 socklen_t size = sizeof peer; 767 (struct sockaddr *)(void *)&peer, &size) < 0 || 768 !sock_eq((struct sockaddr *)(void *)&peer, nsap)) { [all...] |
/external/openssl/crypto/bio/ |
bio.h | 598 #define BIO_ctrl_dgram_connect(b,peer) \ 599 (int)BIO_ctrl(b,BIO_CTRL_DGRAM_CONNECT,0, (char *)peer) 600 #define BIO_ctrl_set_connected(b, state, peer) \ 601 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_CONNECTED, state, (char *)peer) 606 #define BIO_dgram_get_peer(b,peer) \ 607 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_GET_PEER, 0, (char *)peer) 608 #define BIO_dgram_set_peer(b,peer) \ 609 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_PEER, 0, (char *)peer) [all...] |
/external/openssl/include/openssl/ |
bio.h | 598 #define BIO_ctrl_dgram_connect(b,peer) \ 599 (int)BIO_ctrl(b,BIO_CTRL_DGRAM_CONNECT,0, (char *)peer) 600 #define BIO_ctrl_set_connected(b, state, peer) \ 601 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_CONNECTED, state, (char *)peer) 606 #define BIO_dgram_get_peer(b,peer) \ 607 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_GET_PEER, 0, (char *)peer) 608 #define BIO_dgram_set_peer(b,peer) \ 609 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_PEER, 0, (char *)peer) [all...] |
/external/quake/quake/src/QW/qwfwd/ |
qwfwd.c | 67 typedef struct peer {
struct 72 struct peer *next;
223 if (p == NULL) { // new peer
224 printf("peer %s:%d added", inet_ntoa(fsin.sin_addr), (int)ntohs(fsin.sin_port));
253 printf("peer %s:%d removed (timeout)", inet_ntoa(p->sin.sin_addr), (int)ntohs(p->sin.sin_port));
259 printf ("peer %s:%d removed (timeout)", inet_ntoa(p->sin.sin_addr), (int)ntohs(p->sin.sin_port));
|
/frameworks/base/graphics/java/android/graphics/ |
Region.java | 376 Region peer = (Region) obj; local 377 return nativeEquals(mNativeRegion, peer.mNativeRegion);
|
/frameworks/base/services/java/com/android/server/am/ |
NativeCrashListener.java | 125 InetSocketAddress peer = new InetSocketAddress(); local 129 peerFd = Libcore.os.accept(serverFd, peer);
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/rpcsvc/ |
yp.h | 94 peername peer; member in struct:ypmap_parms 144 peername peer; member in struct:ypresp_master
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/rpcsvc/ |
yp.h | 94 peername peer; member in struct:ypmap_parms 144 peername peer; member in struct:ypresp_master
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/rpcsvc/ |
yp.h | 94 peername peer; member in struct:ypmap_parms 144 peername peer; member in struct:ypresp_master
|
/external/openssl/apps/ |
s_client.c | 292 BIO_printf(bio_err," -verify arg - turn on peer certificate verification\n"); 618 struct sockaddr peer; local 619 int peerlen = sizeof(peer); 1942 X509 *peer=NULL; local [all...] |
/external/iproute2/ip/ |
ipaddress.c | 69 fprintf(stderr, "IFADDR := PREFIX | ADDR peer PREFIX\n"); 300 fprintf(fp, " peer "); 551 fprintf(fp, " peer %s/%d ", 995 inet_prefix peer; local 1013 if (strcmp(*argv, "peer") == 0 || 1018 duparg("peer", *argv); 1019 get_prefix(&peer, *argv, req.ifa.ifa_family); 1020 peer_len = peer.bytelen; 1022 req.ifa.ifa_family = peer.family; 1023 addattr_l(&req.n, sizeof(req), IFA_ADDRESS, &peer.data, peer.bytelen) [all...] |
/external/chromium/webkit/glue/ |
resource_loader_bridge.h | 14 // In turn, the bridge's owner on the WebKit end will implement the Peer 270 // within webkit. The Peer and it's bridge should have identical lifetimes 276 class Peer { 278 virtual ~Peer() {} 364 // the peer's methods will be called asynchronously to report various events. 365 virtual bool Start(Peer* peer) = 0; 370 // the peer is still valid.
|
/external/iproute2/misc/ |
ss.c | 1902 int peer; member in struct:unixstat 1932 char *peer; local [all...] |