/third_party/wpa_supplicant/wpa_supplicant-2.9/src/rsn_supp/ |
D | tdls.c | 86 static void wpa_tdls_peer_free(struct wpa_sm *sm, struct wpa_tdls_peer *peer); 88 struct wpa_tdls_peer *peer); 178 static int wpa_tdls_del_key(struct wpa_sm *sm, struct wpa_tdls_peer *peer) in wpa_tdls_del_key() argument 180 if (wpa_sm_set_key(sm, WPA_ALG_NONE, peer->addr, in wpa_tdls_del_key() 191 static int wpa_tdls_set_key(struct wpa_sm *sm, struct wpa_tdls_peer *peer) in wpa_tdls_set_key() argument 197 if (peer->tk_set) { in wpa_tdls_set_key() 207 MAC2STR(peer->addr)); in wpa_tdls_set_key() 213 switch (peer->cipher) { in wpa_tdls_set_key() 229 MAC2STR(peer->addr)); in wpa_tdls_set_key() 230 if (wpa_sm_set_key(sm, alg, peer->addr, -1, 1, in wpa_tdls_set_key() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/rsn_supp/ |
D | tdls.c | 86 static void wpa_tdls_peer_free(struct wpa_sm *sm, struct wpa_tdls_peer *peer); 88 struct wpa_tdls_peer *peer); 181 static int wpa_tdls_del_key(struct wpa_sm *sm, struct wpa_tdls_peer *peer) in wpa_tdls_del_key() argument 183 if (wpa_sm_set_key(sm, WPA_ALG_NONE, peer->addr, in wpa_tdls_del_key() 194 static int wpa_tdls_set_key(struct wpa_sm *sm, struct wpa_tdls_peer *peer) in wpa_tdls_set_key() argument 200 if (peer->tk_set) { in wpa_tdls_set_key() 210 MAC2STR_SEC(peer->addr)); in wpa_tdls_set_key() 216 switch (peer->cipher) { in wpa_tdls_set_key() 232 MAC2STR_SEC(peer->addr)); in wpa_tdls_set_key() 233 if (wpa_sm_set_key(sm, alg, peer->addr, 0, 1, rsc, sizeof(rsc), in wpa_tdls_set_key() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
D | ibss_rsn.c | 30 struct ibss_rsn_peer *peer; in ibss_rsn_get_peer() local 32 for (peer = ibss_rsn->peers; peer; peer = peer->next) in ibss_rsn_get_peer() 33 if (os_memcmp(addr, peer->addr, ETH_ALEN) == 0) in ibss_rsn_get_peer() 35 return peer; in ibss_rsn_get_peer() 39 static void ibss_rsn_free(struct ibss_rsn_peer *peer) in ibss_rsn_free() argument 41 eloop_cancel_timeout(ibss_rsn_auth_timeout, peer, NULL); in ibss_rsn_free() 42 wpa_auth_sta_deinit(peer->auth); in ibss_rsn_free() 43 wpa_sm_deinit(peer->supp); in ibss_rsn_free() 44 os_free(peer); in ibss_rsn_free() 50 struct ibss_rsn_peer *peer = ctx; in supp_set_state() local [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
D | ibss_rsn.c | 30 struct ibss_rsn_peer *peer; in ibss_rsn_get_peer() local 32 for (peer = ibss_rsn->peers; peer; peer = peer->next) in ibss_rsn_get_peer() 33 if (os_memcmp(addr, peer->addr, ETH_ALEN) == 0) in ibss_rsn_get_peer() 35 return peer; in ibss_rsn_get_peer() 39 static void ibss_rsn_free(struct ibss_rsn_peer *peer) in ibss_rsn_free() argument 41 eloop_cancel_timeout(ibss_rsn_auth_timeout, peer, NULL); in ibss_rsn_free() 42 wpa_auth_sta_deinit(peer->auth); in ibss_rsn_free() 43 wpa_sm_deinit(peer->supp); in ibss_rsn_free() 44 os_free(peer); in ibss_rsn_free() 50 struct ibss_rsn_peer *peer = ctx; in supp_set_state() local [all …]
|
/third_party/libwebsockets/lib/misc/ |
D | peer-limits.c | 31 struct lws_peer *peer) in __lws_peer_remove_from_peer_wait_list() argument 36 if (*p == peer) { in __lws_peer_remove_from_peer_wait_list() 65 struct lws_peer *peer) in __lws_peer_add_to_peer_wait_list() argument 67 __lws_peer_remove_from_peer_wait_list(context, peer); in __lws_peer_add_to_peer_wait_list() 69 peer->peer_wait_list = context->peer_wait_list; in __lws_peer_add_to_peer_wait_list() 70 context->peer_wait_list = peer; in __lws_peer_add_to_peer_wait_list() 82 struct lws_peer *peer; in lws_get_or_create_peer() local 142 peer = lws_zalloc(sizeof(*peer), "peer"); in lws_get_or_create_peer() 143 if (!peer) { in lws_get_or_create_peer() 150 peer->next = context->pl_hash_table[hash]; in lws_get_or_create_peer() [all …]
|
/third_party/node/deps/npm/tap-snapshots/test/lib/utils/ |
D | explain-eresolve.js.test.cjs | 10 Found: [1m@isaacs/testing-peer-dep-conflict-chain-d[22m@[1m2.0.0[22m[2m[22m 11 [2mnode_modules/@isaacs/testing-peer-dep-conflict-chain-d[22m 12 [1m@isaacs/testing-peer-dep-conflict-chain-d[22m@"[1m2[22m" from the root project 15 [35mpeer[39m [1m@isaacs/testing-peer-dep-conflict-chain-d[22m@"[1m1[22m" from [1m@isaacs/tes… 16 [2mnode_modules/@isaacs/testing-peer-dep-conflict-chain-c[22m 17 [1m@isaacs/testing-peer-dep-conflict-chain-c[22m@"[1m1[22m" from the root project 22 Found: @isaacs/testing-peer-dep-conflict-chain-d@2.0.0 23 node_modules/@isaacs/testing-peer-dep-conflict-chain-d 24 @isaacs/testing-peer-dep-conflict-chain-d@"2" from the root project 27 peer @isaacs/testing-peer-dep-conflict-chain-d@"1" from @isaacs/testing-peer-dep-conflict-chain-c@1… [all …]
|
/third_party/openssl/test/helpers/ |
D | handshake.c | 732 static int create_peer(PEER *peer, SSL_CTX *ctx) in create_peer() argument 743 peer->ssl = ssl; in create_peer() 744 peer->write_buf = write_buf; in create_peer() 745 peer->read_buf = read_buf; in create_peer() 746 peer->write_buf_len = peer->read_buf_len = peer_buffer_size; in create_peer() 755 static void peer_free_data(PEER *peer) in peer_free_data() argument 757 SSL_free(peer->ssl); in peer_free_data() 758 OPENSSL_free(peer->write_buf); in peer_free_data() 759 OPENSSL_free(peer->read_buf); in peer_free_data() 766 static void do_handshake_step(PEER *peer) in do_handshake_step() argument [all …]
|
/third_party/openssl/test/recipes/30-test_evp_data/ |
D | evppkey_ecc.txt | 44 # ECDH Alice with Bob peer 50 # ECDH Bob with Alice peer 56 # ECC CDH Alice with Bob peer 63 # ECC CDH Bob with Alice peer 76 # ECC CDH Bob with Malice peer 84 # ECC CDH Alice with Malice peer 122 # ECDH Alice with Bob peer 128 # ECDH Bob with Alice peer 134 # ECC CDH Alice with Bob peer 141 # ECC CDH Bob with Alice peer [all …]
|
D | evppkey_brainpool.txt | 42 # ECDH Alice with Bob peer 47 # ECDH Bob with Alice peer 80 # ECDH Alice with Bob peer 85 # ECDH Bob with Alice peer 120 # ECDH Alice with Bob peer 125 # ECDH Bob with Alice peer 160 # ECDH Alice with Bob peer 165 # ECDH Bob with Alice peer 200 # ECDH Alice with Bob peer 205 # ECDH Bob with Alice peer [all …]
|
D | evppkey_ecdh.txt | 53 # ECDH Alice with Bob peer 59 # ECDH Bob with Alice peer 97 # ECDH Alice with Bob peer 104 # ECDH Bob with Alice peer 142 # ECDH Alice with Bob peer 149 # ECDH Bob with Alice peer 188 # ECDH Alice with Bob peer 195 # ECDH Bob with Alice peer 236 # ECDH Alice with Bob peer 243 # ECDH Bob with Alice peer [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/pae/ |
D | ieee802_1x_kay.c | 193 mi = body->peer + i; in ieee802_1x_mka_dump_peer_body() 321 struct ieee802_1x_kay_peer *peer; in get_peer_mi() local 323 dl_list_for_each(peer, peers, struct ieee802_1x_kay_peer, list) { in get_peer_mi() 324 if (os_memcmp(peer->mi, mi, MI_LEN) == 0) in get_peer_mi() 325 return peer; in get_peer_mi() 383 struct ieee802_1x_kay_peer *peer; in ieee802_1x_kay_get_peer() local 385 peer = ieee802_1x_kay_get_live_peer(participant, mi); in ieee802_1x_kay_get_peer() 386 if (peer) in ieee802_1x_kay_get_peer() 387 return peer; in ieee802_1x_kay_get_peer() 443 struct ieee802_1x_kay_peer *peer; in ieee802_1x_kay_get_peer_sci() local [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/pae/ |
D | ieee802_1x_kay.c | 193 mi = body->peer + i; in ieee802_1x_mka_dump_peer_body() 321 struct ieee802_1x_kay_peer *peer; in get_peer_mi() local 323 dl_list_for_each(peer, peers, struct ieee802_1x_kay_peer, list) { in get_peer_mi() 324 if (os_memcmp(peer->mi, mi, MI_LEN) == 0) in get_peer_mi() 325 return peer; in get_peer_mi() 383 struct ieee802_1x_kay_peer *peer; in ieee802_1x_kay_get_peer() local 385 peer = ieee802_1x_kay_get_live_peer(participant, mi); in ieee802_1x_kay_get_peer() 386 if (peer) in ieee802_1x_kay_get_peer() 387 return peer; in ieee802_1x_kay_get_peer() 443 struct ieee802_1x_kay_peer *peer; in ieee802_1x_kay_get_peer_sci() local [all …]
|
/third_party/node/deps/npm/node_modules/@npmcli/arborist/lib/ |
D | peer-entry-sets.js | 18 if (edge.valid && edge.peer && edge.to) { 23 if (edge.valid && edge.peer) { 29 for (const peer of unionSet) { 30 for (const edge of peer.edgesIn) { 37 if (!edge.peer || edge.from.isTop) { 39 const sub = new Set([peer]) 40 for (const peer of sub) { 41 for (const edge of peer.edgesOut.values()) { 42 if (edge.valid && edge.peer && edge.to) {
|
D | place-dep.js | 83 if (!target.isTop && targetEdge && targetEdge.peer) { 202 if (this.edge.peer && !this.edge.valid) { 262 if (this.edge.peer && !this.placed.satisfies(this.edge)) { 295 if (peerEdge.valid || !peerEdge.peer || peerEdge.peerConflicted) { 299 const peer = virtualRoot.children.get(peerEdge.name) 305 if (!peer) { 310 if (!peer.satisfies(peerEdge)) { 325 dep: peer, 361 !edge.peer || 464 if (!edge.peer) { [all …]
|
/third_party/openssl/doc/man3/ |
D | SSL_get_peer_cert_chain.pod | 6 chain of the peer 18 forming the certificate chain sent by the peer. If called on the client side, 19 the stack also contains the peer's certificate; if called on the server 20 side, the peer's certificate must be obtained separately using 22 If the peer did not present a certificate, NULL is returned. 24 NB: SSL_get_peer_cert_chain() returns the peer chain as sent by the peer: it 25 only consists of certificates the peer has sent (in the order the peer 29 of the peer including the peer's end entity certificate. It must be called 30 after a session has been successfully established. If peer verification was 54 No certificate was presented by the peer or no connection was established [all …]
|
/third_party/node/deps/npm/node_modules/@npmcli/arborist/lib/arborist/ |
D | load-virtual.js | 82 root.peer = false 106 node.peer = true 129 const peer = lock.peerDependencies || {} constant 134 if (meta.optional && peer[name] !== undefined) { 135 peerOptional[name] = peer[name] 136 delete peer[name] 158 const lockByType = ({ dev, optional, peer, peerOptional, prod, workspace: lockWS }) property 259 const peer = sw.peer constant 274 peer, property 280 node.peer = !!sw.peer [all …]
|
/third_party/node/deps/openssl/openssl/crypto/bio/ |
D | bss_bio.c | 59 BIO *peer; /* NULL if buf == NULL. If peer != NULL, then member 100 if (b->peer) in bio_free() 122 assert(b->peer != NULL); in bio_read() 123 peer_b = b->peer->ptr; in bio_read() 212 assert(b->peer != NULL); in bio_nread0() 213 peer_b = b->peer->ptr; in bio_nread0() 254 peer_b = b->peer->ptr; in bio_nread() 281 assert(b->peer != NULL); in bio_write() 358 assert(b->peer != NULL); in bio_nwrite0() 427 if (b->peer) { in bio_ctrl() [all …]
|
/third_party/openssl/crypto/bio/ |
D | bss_bio.c | 59 BIO *peer; /* NULL if buf == NULL. If peer != NULL, then member 100 if (b->peer) in bio_free() 122 assert(b->peer != NULL); in bio_read() 123 peer_b = b->peer->ptr; in bio_read() 212 assert(b->peer != NULL); in bio_nread0() 213 peer_b = b->peer->ptr; in bio_nread0() 254 peer_b = b->peer->ptr; in bio_nread() 281 assert(b->peer != NULL); in bio_write() 358 assert(b->peer != NULL); in bio_nwrite0() 427 if (b->peer) { in bio_ctrl() [all …]
|
/third_party/curl/lib/vquic/ |
D | vquic-tls.c | 214 struct ssl_peer *peer, in curl_ossl_init_ssl() argument 230 if(peer->sni) { in curl_ossl_init_ssl() 231 if(!SSL_set_tlsext_host_name(ctx->ssl, peer->sni)) { in curl_ossl_init_ssl() 260 struct ssl_peer *peer, in curl_gtls_init_ctx() argument 282 peer, ctx->gtls, pverifyresult); in curl_gtls_init_ctx() 463 struct ssl_peer *peer, in curl_wssl_init_ssl() argument 480 if(peer->sni) { in curl_wssl_init_ssl() 482 peer->sni, (unsigned short)strlen(peer->sni)); in curl_wssl_init_ssl() 492 struct ssl_peer *peer, in Curl_vquic_tls_init() argument 508 return curl_ossl_init_ssl(ctx, data, peer, alpn, alpn_len, user_data); in Curl_vquic_tls_init() [all …]
|
/third_party/glib/patch/ |
D | backport-gio-tests-gdbus-peer-Unref-cached-property-GVariant-value.patch | 4 Subject: [PATCH] gio/tests/gdbus-peer: Unref cached property GVariant value 12 gio/tests/gdbus-peer.c | 1 + 15 diff --git a/gio/tests/gdbus-peer.c b/gio/tests/gdbus-peer.c 17 --- a/gio/tests/gdbus-peer.c 18 +++ b/gio/tests/gdbus-peer.c
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/wps/ |
D | wps_upnp_web.c | 413 static void wps_upnp_peer_del(struct upnp_wps_peer *peer) in wps_upnp_peer_del() argument 415 dl_list_del(&peer->list); in wps_upnp_peer_del() 416 if (peer->wps) in wps_upnp_peer_del() 417 wps_deinit(peer->wps); in wps_upnp_peer_del() 418 os_free(peer); in wps_upnp_peer_del() 429 struct upnp_wps_peer *peer; in web_process_get_device_info() local 439 peer = os_zalloc(sizeof(*peer)); in web_process_get_device_info() 440 if (!peer) in web_process_get_device_info() 455 peer->wps = wps_init(&cfg); in web_process_get_device_info() 456 if (peer->wps) { in web_process_get_device_info() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/wps/ |
D | wps_upnp_web.c | 413 static void wps_upnp_peer_del(struct upnp_wps_peer *peer) in wps_upnp_peer_del() argument 415 dl_list_del(&peer->list); in wps_upnp_peer_del() 416 if (peer->wps) in wps_upnp_peer_del() 417 wps_deinit(peer->wps); in wps_upnp_peer_del() 418 os_free(peer); in wps_upnp_peer_del() 429 struct upnp_wps_peer *peer; in web_process_get_device_info() local 439 peer = os_zalloc(sizeof(*peer)); in web_process_get_device_info() 440 if (!peer) in web_process_get_device_info() 455 peer->wps = wps_init(&cfg); in web_process_get_device_info() 456 if (peer->wps) { in web_process_get_device_info() [all …]
|
/third_party/node/test/parallel/ |
D | test-tls-cert-chains-concat.js | 23 const peer = pair.client.conn.getPeerCertificate(); constant 24 debug('peer:\n', peer); 25 assert.strictEqual(peer.subject.emailAddress, 'adam.lippai@tresorit.com'); 26 assert.strictEqual(peer.subject.CN, 'Ádám Lippai'); 27 assert.strictEqual(peer.issuer.CN, 'ca3'); 28 assert.match(peer.serialNumber, /5B75D77EDC7FB5B7FA9F1424DA4C64FB815DCBDE/i);
|
/third_party/curl/tests/server/ |
D | tftpd.c | 199 static curl_socket_t peer = CURL_SOCKET_BAD; variable 791 peer = socket(AF_INET, SOCK_DGRAM, 0); in main() 792 if(CURL_SOCKET_BAD == peer) { in main() 797 if(connect(peer, &from.sa, sizeof(from.sa4)) < 0) { in main() 806 peer = socket(AF_INET6, SOCK_DGRAM, 0); in main() 807 if(CURL_SOCKET_BAD == peer) { in main() 812 if(connect(peer, &from.sa, sizeof(from.sa6)) < 0) { in main() 830 sclose(peer); in main() 831 peer = CURL_SOCKET_BAD; in main() 850 if((peer != sock) && (peer != CURL_SOCKET_BAD)) in main() [all …]
|
/third_party/node/deps/openssl/openssl/apps/ |
D | sess_id.c | 51 X509 *peer = NULL; in sess_id_main() local 109 peer = SSL_SESSION_get0_peer(x); in sess_id_main() 134 if (peer == NULL) in sess_id_main() 137 X509_print(out, peer); in sess_id_main() 156 } else if (!noout && (peer != NULL)) { /* just print the certificate */ in sess_id_main() 158 i = (int)i2d_X509_bio(out, peer); in sess_id_main() 160 i = PEM_write_bio_X509(out, peer); in sess_id_main()
|