/external/openssh/ |
kexgexs.c | 170 buffer_ptr(&kex->peer), buffer_len(&kex->peer),
|
/external/openssl/ssl/ |
ssl_asn1.c | 300 if (in->peer != NULL) 301 M_ASN1_I2D_len_EXP_opt(in->peer,i2d_X509,3,v3); 346 if (in->peer != NULL) 347 M_ASN1_I2D_put_EXP_opt(in->peer,i2d_X509,3,v3); 508 if (ret->peer != NULL) 510 X509_free(ret->peer); 511 ret->peer=NULL; 513 M_ASN1_D2I_get_EXP_opt(ret->peer,d2i_X509,3);
|
/external/chromium_org/third_party/WebKit/Source/modules/websockets/ |
ThreadableWebSocketChannelClientWrapper.h | 58 WorkerThreadableWebSocketChannel::Peer* peer() const; 59 void didCreateWebSocketChannel(WorkerThreadableWebSocketChannel::Peer*); 106 WorkerThreadableWebSocketChannel::Peer* m_peer;
|
ThreadableWebSocketChannelClientWrapper.cpp | 76 WorkerThreadableWebSocketChannel::Peer* ThreadableWebSocketChannelClientWrapper::peer() const function in class:WebCore::ThreadableWebSocketChannelClientWrapper 81 void ThreadableWebSocketChannelClientWrapper::didCreateWebSocketChannel(WorkerThreadableWebSocketChannel::Peer* peer) 83 m_peer = peer;
|
/external/chromium_org/third_party/libjingle/source/talk/examples/peerconnection/server/ |
peer_channel.h | 40 // Represents a single peer connected to the server. 61 void ForwardRequestToPeer(DataSocket* ds, ChannelMember* peer); 102 // Finds a connected peer that's associated with the |ds| socket. 106 // peer for which the request is targeted at. 117 // Called when a socket was determined to be closing by the peer (or if the
|
/external/libppp/src/ |
datalink.h | 111 struct peerid peer; /* Peer identification */ member in struct:datalink
|
mp.h | 81 struct peerid peer; /* Who are we talking to */ member in struct:mp
|
datalink.c | 129 log_Printf(LogPHASE, "Call peer back on %s\n", dl->cbcp.fsm.phone); 607 strncpy(dl->peer.authname, name, sizeof dl->peer.authname - 1); 608 dl->peer.authname[sizeof dl->peer.authname - 1] = '\0'; 624 auth_Select(dl->bundle, dl->peer.authname); 643 dl->bundle->ncp.mp.peer = dl->peer; 645 auth_Select(dl->bundle, dl->peer.authname); 686 log_Printf(LogPHASE, "%s: Shutdown and await peer callback\n", dl->name) [all...] |
chap.c | 332 write(in[1], chap->challenge.peer + 1, *chap->challenge.peer); 361 *chap->challenge.local = *chap->challenge.peer = '\0'; 376 ans = chap_BuildAnswer(name, key, chap->auth.id, chap->challenge.peer 658 /* Give the peer another shot */ 679 *chap->challenge.local = *chap->challenge.peer = '\0'; 753 *chap->challenge.peer = alen; 754 bp = mbuf_Read(bp, chap->challenge.peer + 1, alen); 857 chap->challenge.peer[0] = sizeof resp->PeerChallenge; 858 memcpy(chap->challenge.peer + 1, resp->PeerChallenge [all...] |
ipcp.c | 520 struct in_addr peer; local 528 /* Try to give the peer a previously configured IP address */ 530 if (!ncpaddr_getip4(&iface->addr[n].peer, &peer)) 532 if ((pos = iplist_ip2pos(&ipcp->cfg.peer_list, peer)) != -1) { 620 struct in_addr peer, mask, ip; local 623 if (!ncpaddr_getip4(&addr->peer, &peer)) { 637 ip.s_addr = peer.s_addr & mask.s_addr; 643 if (!((ip.s_addr ^ peer.s_addr) & mask.s_addr)) 977 struct in_addr myaddr, peer; local [all...] |
radius.c | 542 * peer has misformatted the response. 570 * peer has misformatted the response. 1078 memcpy(&ac->peer.ip.addr, peer_ip, sizeof(ac->peer.ip.addr)); 1079 memcpy(&ac->peer.ip.mask, netmask, sizeof(ac->peer.ip.mask)); 1088 memcpy(&ac->peer.ipv6.ifid, ifid, sizeof(ac->peer.ipv6.ifid)); 1139 strncpy(ac->user_name, dl->peer.authname, sizeof ac->user_name); [all...] |
/external/mtpd/ |
pptp.c | 119 uint16_t peer; member in struct:packet::__anon25681::__anon25682::__anon25684::__anon25687 309 if (state == OCRQ && incoming.ocrp.peer == local) { 367 outgoing.icrp.peer = incoming.icrq.call; 376 outgoing.ocrp.peer = incoming.ocrq.call;
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_sake_common.h | 2 * EAP server/peer: EAP-SAKE shared routines 91 int peer, const u8 *eap, size_t eap_len,
|
eap_sake_common.c | 2 * EAP server/peer: EAP-SAKE shared routines 310 * @peer: MIC calculation for 0 = Server, 1 = Peer message 320 int peer, const u8 *eap, size_t eap_len, 332 if (peer) { 368 peer ? "Peer MIC" : "Server MIC",
|
/art/runtime/native/ |
java_lang_Thread.cc | 112 static void Thread_nativeSetName(JNIEnv* env, jobject peer, jstring java_name) { 116 if (soa.Decode<mirror::Object*>(peer) == soa.Self()->GetPeer()) { 125 Thread* thread = Thread::SuspendForDebugger(peer, true, &timed_out);
|
/external/wpa_supplicant_8/src/wps/ |
wps_upnp_web.c | 420 struct upnp_wps_peer *peer; local 424 peer = &iface->peer; 439 if (peer->wps) 440 wps_deinit(peer->wps); 446 peer->wps = wps_init(&cfg); 447 if (peer->wps) { 449 *reply = wps_get_msg(peer->wps, &op_code); 451 wps_deinit(peer->wps); 452 peer->wps = NULL [all...] |
/external/chromium_org/third_party/openssl/openssl/apps/ |
pkeyutl.c | 516 EVP_PKEY *peer = NULL; local 524 peer = load_pubkey(bio_err, file, peerform, 0, NULL, NULL, "Peer Key"); 526 if (!peer) 528 BIO_printf(bio_err, "Error reading peer key %s\n", file); 533 ret = EVP_PKEY_derive_set_peer(ctx, peer); 535 EVP_PKEY_free(peer);
|
/external/openssl/apps/ |
pkeyutl.c | 516 EVP_PKEY *peer = NULL; local 524 peer = load_pubkey(bio_err, file, peerform, 0, NULL, NULL, "Peer Key"); 526 if (!peer) 528 BIO_printf(bio_err, "Error reading peer key %s\n", file); 533 ret = EVP_PKEY_derive_set_peer(ctx, peer); 535 EVP_PKEY_free(peer);
|
/system/core/adb/ |
transport.c | 422 asocket* peer = socket->peer; local 425 if (peer) { 426 peer->peer = NULL; 427 peer->close(peer); 448 asocket* peer = tracker->socket.peer; local 452 return peer->enqueue( peer, p ) [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
peerkey.c | 63 const u8 *peer, 74 if (peer) 96 if (peer) { 97 /* Peer MAC Address KDE */ 98 pos = wpa_add_kde(pos, RSN_KEY_DATA_MAC_ADDR, peer, ETH_ALEN); 106 if (peer) { 107 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK Error (peer " 109 MAC2STR(peer), mui, error_type); 133 /* KDEs: Peer RSN IE, Initiator MAC Address, Initiator Nonce */ 157 /* Peer RSN IE * 600 u8 peer[ETH_ALEN]; local [all...] |
/external/wpa_supplicant_8/src/drivers/ |
driver.h | 879 /* Driver supports operating as a TDLS peer */ 1205 * @addr: Address of the peer STA (BSSID of the current AP when setting 3506 u8 peer[ETH_ALEN]; member in struct:wpa_event_data::stkstart 3513 u8 peer[ETH_ALEN]; member in struct:wpa_event_data::tdls 3563 u8 peer[ETH_ALEN]; member in struct:wpa_event_data::ibss_rsn_start 3570 u8 peer[ETH_ALEN]; member in struct:wpa_event_data::auth_info 3862 const u8 *peer; member in struct:wpa_event_data::p2p_prov_disc_req 3873 const u8 *peer; member in struct:wpa_event_data::p2p_prov_disc_resp 3897 u8 peer[ETH_ALEN]; member in struct:wpa_event_data::ibss_peer_lost [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
driver_i.h | 635 const u8 *peer, int role, const u8 *bssid, 642 return wpa_s->driver->p2p_invite(wpa_s->drv_priv, peer, role, bssid, 661 enum tdls_oper oper, const u8 *peer) 665 return wpa_s->driver->tdls_oper(wpa_s->drv_priv, oper, peer); 704 enum wnm_oper oper, const u8 *peer, 709 return wpa_s->driver->wnm_oper(wpa_s->drv_priv, oper, peer, buf,
|
p2p_supplicant.h | 84 void wpas_prov_disc_req(void *ctx, const u8 *peer, u16 config_methods, 89 void wpas_prov_disc_resp(void *ctx, const u8 *peer, u16 config_methods); 162 void wpas_p2p_remove_client(struct wpa_supplicant *wpa_s, const u8 *peer,
|
/external/chromium_org/net/http/ |
http_stream_factory_impl_unittest.cc | 261 HttpNetworkSessionPeer peer(session); 264 peer.SetHttpStreamFactory(mock_factory); 404 HttpNetworkSessionPeer peer(session); 417 peer.SetClientSocketPoolManager(mock_pool_manager); 432 HttpNetworkSessionPeer peer(session); 446 peer.SetClientSocketPoolManager(mock_pool_manager); 461 HttpNetworkSessionPeer peer(session); 475 peer.SetClientSocketPoolManager(mock_pool_manager); 490 HttpNetworkSessionPeer peer(session); 510 peer.SetClientSocketPoolManager(mock_pool_manager) [all...] |
/external/kernel-headers/original/linux/ |
net.h | 141 int *sockaddr_len, int peer); 251 int *addr_len, int peer), (sock, uaddr, addr_len, peer)) \
|