/external/bluetooth/bluez/network/ |
D | connection.c | 76 struct network_peer *peer; member 93 struct network_peer *peer = l->data; in find_peer() local 95 if (!strcmp(peer->path, path)) in find_peer() 96 return peer; in find_peer() 156 emit_property_changed(connection, nc->peer->path, in bnep_watchdog_cb() 159 emit_property_changed(connection, nc->peer->path, in bnep_watchdog_cb() 162 emit_property_changed(connection, nc->peer->path, in bnep_watchdog_cb() 165 device_remove_disconnect_watch(nc->peer->device, nc->dc_id); in bnep_watchdog_cb() 210 bnep_kill_connection(&nc->peer->dst); in connection_destroy() 220 info("Network: disconnect %s", nc->peer->path); in disconnect_cb() [all …]
|
/external/qemu/ |
D | charpipe.c | 75 struct CharPipeHalf* peer; /* NULL if closed */ member 91 ph->peer = NULL; in charpipehalf_close() 99 CharPipeHalf* peer = ph->peer; in charpipehalf_write() local 106 if (bip == NULL && peer != NULL && peer->cs->chr_read != NULL) { in charpipehalf_write() 111 if (peer->cs->chr_can_read) { in charpipehalf_write() 112 size = qemu_chr_can_read( peer->cs ); in charpipehalf_write() 121 qemu_chr_read( peer->cs, (uint8_t*)buf, size ); in charpipehalf_write() 158 CharPipeHalf* peer = ph->peer; in charpipehalf_poll() local 161 if (peer == NULL || peer->cs->chr_read == NULL) in charpipehalf_poll() 182 int size2 = qemu_chr_can_read(peer->cs); in charpipehalf_poll() [all …]
|
/external/bluetooth/bluez/src/ |
D | storage.h | 37 int write_remote_class(bdaddr_t *local, bdaddr_t *peer, uint32_t class); 38 int read_remote_class(bdaddr_t *local, bdaddr_t *peer, uint32_t *class); 39 int write_device_name(bdaddr_t *local, bdaddr_t *peer, char *name); 41 int write_remote_eir(bdaddr_t *local, bdaddr_t *peer, uint8_t *data); 42 int read_remote_eir(bdaddr_t *local, bdaddr_t *peer, uint8_t *data); 43 int write_l2cap_info(bdaddr_t *local, bdaddr_t *peer, 46 int read_l2cap_info(bdaddr_t *local, bdaddr_t *peer, 49 int write_version_info(bdaddr_t *local, bdaddr_t *peer, uint16_t manufacturer, uint8_t lmp_ver, uin… 50 int write_features_info(bdaddr_t *local, bdaddr_t *peer, unsigned char *features); 51 int write_lastseen_info(bdaddr_t *local, bdaddr_t *peer, struct tm *tm); [all …]
|
D | dbus-hci.c | 444 void hcid_dbus_bonding_process_complete(bdaddr_t *local, bdaddr_t *peer, in hcid_dbus_bonding_process_complete() argument 452 if (!get_adapter_and_device(local, peer, &adapter, &device, TRUE)) in hcid_dbus_bonding_process_complete() 468 void hcid_dbus_simple_pairing_complete(bdaddr_t *local, bdaddr_t *peer, in hcid_dbus_simple_pairing_complete() argument 476 if (!get_adapter_and_device(local, peer, &adapter, &device, TRUE)) in hcid_dbus_simple_pairing_complete() 501 void hcid_dbus_inquiry_result(bdaddr_t *local, bdaddr_t *peer, uint32_t class, in hcid_dbus_inquiry_result() argument 515 ba2str(peer, peer_addr); in hcid_dbus_inquiry_result() 517 if (!get_adapter_and_device(local, peer, &adapter, &device, FALSE)) { in hcid_dbus_inquiry_result() 522 write_remote_class(local, peer, class); in hcid_dbus_inquiry_result() 525 write_remote_eir(local, peer, data); in hcid_dbus_inquiry_result() 541 bacpy(&match.bdaddr, peer); in hcid_dbus_inquiry_result() [all …]
|
D | dbus-hci.h | 26 void hcid_dbus_inquiry_result(bdaddr_t *local, bdaddr_t *peer, uint32_t class, int8_t rssi, uint8_t… 27 void hcid_dbus_remote_class(bdaddr_t *local, bdaddr_t *peer, uint32_t class); 28 void hcid_dbus_remote_name(bdaddr_t *local, bdaddr_t *peer, uint8_t status, char *name); 29 void hcid_dbus_conn_complete(bdaddr_t *local, uint8_t status, uint16_t handle, bdaddr_t *peer); 31 void hcid_dbus_bonding_process_complete(bdaddr_t *local, bdaddr_t *peer, uint8_t status); 32 void hcid_dbus_simple_pairing_complete(bdaddr_t *local, bdaddr_t *peer, uint8_t status); 43 int hcid_dbus_link_key_notify(bdaddr_t *local, bdaddr_t *peer,
|
D | storage.c | 281 int write_remote_class(bdaddr_t *local, bdaddr_t *peer, uint32_t class) in write_remote_class() argument 289 ba2str(peer, addr); in write_remote_class() 295 int read_remote_class(bdaddr_t *local, bdaddr_t *peer, uint32_t *class) in read_remote_class() argument 301 ba2str(peer, addr); in read_remote_class() 317 int write_device_name(bdaddr_t *local, bdaddr_t *peer, char *name) in write_device_name() argument 333 ba2str(peer, addr); in write_device_name() 358 int write_remote_eir(bdaddr_t *local, bdaddr_t *peer, uint8_t *data) in write_remote_eir() argument 371 ba2str(peer, addr); in write_remote_eir() 375 int read_remote_eir(bdaddr_t *local, bdaddr_t *peer, uint8_t *data) in read_remote_eir() argument 382 ba2str(peer, addr); in read_remote_eir() [all …]
|
/external/openssl/crypto/bio/ |
D | bss_dgram.c | 103 struct sockaddr peer; member 174 struct sockaddr peer; in dgram_read() local 175 int peerlen = sizeof(peer); in dgram_read() 180 memset(&peer, 0x00, peerlen); in dgram_read() 186 ret=recvfrom(b->num,out,outl,0,&peer,(void *)&peerlen); in dgram_read() 189 BIO_ctrl(b, BIO_CTRL_DGRAM_CONNECT, 0, &peer); in dgram_read() 214 ret=sendto(b->num, (char *)in, inl, 0, &data->peer, sizeof(data->peer)); in dgram_write() 216 ret=sendto(b->num, in, inl, 0, &data->peer, sizeof(data->peer)); in dgram_write() 297 memcpy(&(data->peer),to, sizeof(struct sockaddr)); in dgram_ctrl() 335 memcpy(&(data->peer),to, sizeof(struct sockaddr)); in dgram_ctrl() [all …]
|
D | bss_bio.c | 127 BIO *peer; /* NULL if buf == NULL. member 153 b->peer = NULL; in bio_new() 172 if (b->peer) in bio_free() 200 assert(b->peer != NULL); in bio_read() 201 peer_b = b->peer->ptr; in bio_read() 292 assert(b->peer != NULL); in bio_nread0() 293 peer_b = b->peer->ptr; in bio_nread0() 335 peer_b = b->peer->ptr; in bio_nread() 365 assert(b->peer != NULL); in bio_write() 444 assert(b->peer != NULL); in bio_nwrite0() [all …]
|
D | bio.h | 536 #define BIO_ctrl_dgram_connect(b,peer) \ argument 537 (int)BIO_ctrl(b,BIO_CTRL_DGRAM_CONNECT,0, (char *)peer) 538 #define BIO_ctrl_set_connected(b, state, peer) \ argument 539 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_CONNECTED, state, (char *)peer) 544 #define BIO_dgram_set_peer(b,peer) \ argument 545 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_PEER, 0, (char *)peer)
|
/external/iptables/libipq/ |
D | libipq.c | 105 (struct sockaddr *)&h->peer, sizeof(h->peer)); in ipq_netlink_sendto() 133 addrlen = sizeof(h->peer); in ipq_netlink_recvfrom() 166 (struct sockaddr *)&h->peer, &addrlen); in ipq_netlink_recvfrom() 171 if (addrlen != sizeof(h->peer)) { in ipq_netlink_recvfrom() 175 if (h->peer.nl_pid != 0) { in ipq_netlink_recvfrom() 247 memset(&h->peer, 0, sizeof(struct sockaddr_nl)); in ipq_create_handle() 248 h->peer.nl_family = AF_NETLINK; in ipq_create_handle() 249 h->peer.nl_pid = 0; in ipq_create_handle() 250 h->peer.nl_groups = 0; in ipq_create_handle() 345 msg.msg_name = (void *)&h->peer; in ipq_set_verdict() [all …]
|
/external/ipsec-tools/src/racoon/ |
D | sainfo.c | 79 getsainfo(loc, rmt, peer, remoteid) 80 const vchar_t *loc, *rmt, *peer; 87 if (peer == NULL) 104 if (peer == NULL) 107 dpeer = ipsecdoi_id2str(peer); 133 if (ipsecdoi_chkcmpids(peer, s->id_i, 0))
|
D | TODO | 86 - limited session per peer 108 o IKE daemon should handle situations where peer does not run IKE daemon 116 o Reboot recovery (peer reboot losing it's security associations)
|
/external/openssl/apps/ |
D | sess_id.c | 234 if (x->peer == NULL) in MAIN() 237 X509_print(out,x->peer); in MAIN() 256 else if (!noout && (x->peer != NULL)) /* just print the certificate */ in MAIN() 259 i=(int)i2d_X509_bio(out,x->peer); in MAIN() 261 i=PEM_write_bio_X509(out,x->peer); in MAIN()
|
D | s_client.c | 333 struct sockaddr peer; in MAIN() local 334 int peerlen = sizeof(peer); in MAIN() 777 if (getsockname(s, &peer, (void *)&peerlen) < 0) in MAIN() 785 (void)BIO_ctrl_set_connected(sbio, 1, &peer); in MAIN() 1328 X509 *peer=NULL; in print_stuff() local 1365 peer=SSL_get_peer_certificate(s); in print_stuff() 1366 if (peer != NULL) in print_stuff() 1370 PEM_write_bio_X509(bio,peer); in print_stuff() 1371 X509_NAME_oneline(X509_get_subject_name(peer), in print_stuff() 1374 X509_NAME_oneline(X509_get_issuer_name(peer), in print_stuff() [all …]
|
D | s_server.c | 1938 X509 *peer; in init_ssl_connection() local 1964 peer=SSL_get_peer_certificate(con); in init_ssl_connection() 1965 if (peer != NULL) in init_ssl_connection() 1968 PEM_write_bio_X509(bio_s_out,peer); in init_ssl_connection() 1969 X509_NAME_oneline(X509_get_subject_name(peer),buf,sizeof buf); in init_ssl_connection() 1971 X509_NAME_oneline(X509_get_issuer_name(peer),buf,sizeof buf); in init_ssl_connection() 1973 X509_free(peer); in init_ssl_connection() 2168 X509 *peer; in www_body() local 2233 peer=SSL_get_peer_certificate(con); in www_body() 2234 if (peer != NULL) in www_body() [all …]
|
/external/openssl/ssl/ |
D | ssl_asn1.c | 232 if (in->peer != NULL) in i2d_SSL_SESSION() 233 M_ASN1_I2D_len_EXP_opt(in->peer,i2d_X509,3,v3); in i2d_SSL_SESSION() 263 if (in->peer != NULL) in i2d_SSL_SESSION() 264 M_ASN1_I2D_put_EXP_opt(in->peer,i2d_X509,3,v3); in i2d_SSL_SESSION() 410 if (ret->peer != NULL) in d2i_SSL_SESSION() 412 X509_free(ret->peer); in d2i_SSL_SESSION() 413 ret->peer=NULL; in d2i_SSL_SESSION() 415 M_ASN1_D2I_get_EXP_opt(ret->peer,d2i_X509,3); in d2i_SSL_SESSION()
|
D | s3_srvr.c | 396 ((s->session->peer != NULL) && in IMPLEMENT_ssl3_meth_func() 2182 if (((clnt_pub_pkey=X509_get_pubkey(s->session->peer)) in ssl3_get_client_key_exchange() 2301 X509 *peer; in ssl3_get_cert_verify() local 2312 if (s->session->peer != NULL) in ssl3_get_cert_verify() 2314 peer=s->session->peer; in ssl3_get_cert_verify() 2315 pkey=X509_get_pubkey(peer); in ssl3_get_cert_verify() 2316 type=X509_certificate_type(peer,pkey); in ssl3_get_cert_verify() 2320 peer=NULL; in ssl3_get_cert_verify() 2327 if ((peer != NULL) && (type | EVP_PKT_SIGN)) in ssl3_get_cert_verify() 2337 if (peer == NULL) in ssl3_get_cert_verify() [all …]
|
D | s2_clnt.c | 511 if (s->session->peer != NULL) /* can't happen*/ in get_server_hello() 518 s->session->peer = s->session->sess_cert->peer_key->x509; in get_server_hello() 520 CRYPTO_add(&s->session->peer->references, 1, CRYPTO_LOCK_X509); in get_server_hello() 524 || s->session->peer != s->session->sess_cert->peer_key->x509) in get_server_hello()
|
/external/mtpd/ |
D | pptp.c | 118 uint16_t peer; member 312 if (state == OCRQ && incoming.ocrp.peer == local) { in pptp_process() 370 outgoing.icrp.peer = incoming.icrq.call; in pptp_process() 379 outgoing.ocrp.peer = incoming.ocrq.call; in pptp_process()
|
/external/wpa_supplicant/ |
D | eap_sake_common.c | 325 int peer, const u8 *eap, size_t eap_len, in eap_sake_compute_mic() argument 337 if (peer) { in eap_sake_compute_mic() 373 peer ? "Peer MIC" : "Server MIC", in eap_sake_compute_mic()
|
D | wpa_supplicant.h | 244 u8 peer[ETH_ALEN]; member
|
D | wpa.h | 141 int wpa_sm_stkstart(struct wpa_sm *sm, const u8 *peer); 259 static inline int wpa_sm_stkstart(struct wpa_sm *sm, const u8 *peer) in wpa_sm_stkstart() argument
|
D | eap_sake_common.h | 101 int peer, const u8 *eap, size_t eap_len,
|
/external/openssl/include/openssl/ |
D | bio.h | 536 #define BIO_ctrl_dgram_connect(b,peer) \ argument 537 (int)BIO_ctrl(b,BIO_CTRL_DGRAM_CONNECT,0, (char *)peer) 538 #define BIO_ctrl_set_connected(b, state, peer) \ argument 539 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_CONNECTED, state, (char *)peer) 544 #define BIO_dgram_set_peer(b,peer) \ argument 545 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_PEER, 0, (char *)peer)
|
/external/iptables/include/libipq/ |
D | libipq.h | 58 struct sockaddr_nl peer; member
|