/external/wpa_supplicant_8/src/rsn_supp/ |
D | tdls.c | 81 static void wpa_tdls_peer_free(struct wpa_sm *sm, struct wpa_tdls_peer *peer); 144 static int wpa_tdls_del_key(struct wpa_sm *sm, struct wpa_tdls_peer *peer) in wpa_tdls_del_key() argument 146 if (wpa_sm_set_key(sm, WPA_ALG_NONE, peer->addr, in wpa_tdls_del_key() 157 static int wpa_tdls_set_key(struct wpa_sm *sm, struct wpa_tdls_peer *peer) in wpa_tdls_set_key() argument 165 switch (peer->cipher) { in wpa_tdls_set_key() 180 if (wpa_sm_set_key(sm, alg, peer->addr, -1, 1, in wpa_tdls_set_key() 181 rsc, sizeof(rsc), peer->tpk.tk, key_len) < 0) { in wpa_tdls_set_key() 203 struct wpa_tdls_peer *peer; in wpa_tdls_tpk_send() local 223 for (peer = sm->tdls; peer; peer = peer->next) { in wpa_tdls_tpk_send() 224 if (os_memcmp(peer->addr, dest, ETH_ALEN) == 0) in wpa_tdls_tpk_send() [all …]
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | ibss_rsn.c | 24 struct ibss_rsn_peer *peer; in ibss_rsn_get_peer() local 26 for (peer = ibss_rsn->peers; peer; peer = peer->next) in ibss_rsn_get_peer() 27 if (os_memcmp(addr, peer->addr, ETH_ALEN) == 0) in ibss_rsn_get_peer() 29 return peer; in ibss_rsn_get_peer() 33 static void ibss_rsn_free(struct ibss_rsn_peer *peer) in ibss_rsn_free() argument 35 wpa_auth_sta_deinit(peer->auth); in ibss_rsn_free() 36 wpa_sm_deinit(peer->supp); in ibss_rsn_free() 37 os_free(peer); in ibss_rsn_free() 43 struct ibss_rsn_peer *peer = ctx; in supp_set_state() local 44 peer->supp_state = state; in supp_set_state() [all …]
|
D | README-P2P | 100 Flush P2P peer table and state. 104 p2p_prov_disc <peer device address> <display|keypad|pbc> [join] 106 Send P2P provision discovery request to the specified peer. The 107 parameters for this command are the P2P device address of the peer and 109 02:01:02:03:04:05 display" would request the peer to display a PIN for 110 us and "p2p_prov_disc 02:01:02:03:04:05 keypad" would request the peer 117 p2p_connect <peer device address> <pbc|pin|PIN#> [display|keypad] 120 Start P2P group formation with a discovered P2P peer. This includes 130 from local display, keypad=PIN entered from peer display). "persistent" 138 "auth" indicates that the WPS parameters are authorized for the peer [all …]
|
/external/bluetooth/bluez/network/ |
D | connection.c | 75 struct network_peer *peer; member 89 struct network_peer *peer = list->data; in find_peer() local 91 if (!strcmp(peer->path, path)) in find_peer() 92 return peer; in find_peer() 118 emit_property_changed(connection, nc->peer->path, in bnep_watchdog_cb() 121 emit_property_changed(connection, nc->peer->path, in bnep_watchdog_cb() 124 emit_property_changed(connection, nc->peer->path, in bnep_watchdog_cb() 127 device_remove_disconnect_watch(nc->peer->device, nc->dc_id); in bnep_watchdog_cb() 172 bnep_kill_connection(&nc->peer->dst); in connection_destroy() 182 info("Network: disconnect %s", nc->peer->path); in disconnect_cb() [all …]
|
/external/bluetooth/bluez/src/ |
D | event.c | 258 void btd_event_bonding_complete(bdaddr_t *local, bdaddr_t *peer, in btd_event_bonding_complete() argument 269 if (!get_adapter_and_device(local, peer, &adapter, &device, create)) in btd_event_bonding_complete() 276 void btd_event_simple_pairing_complete(bdaddr_t *local, bdaddr_t *peer, in btd_event_simple_pairing_complete() argument 287 if (!get_adapter_and_device(local, peer, &adapter, &device, create)) in btd_event_simple_pairing_complete() 318 void btd_event_device_found(bdaddr_t *local, bdaddr_t *peer, uint32_t class, in btd_event_device_found() argument 329 update_lastseen(local, peer); in btd_event_device_found() 330 write_remote_class(local, peer, class); in btd_event_device_found() 333 write_remote_eir(local, peer, data); in btd_event_device_found() 335 adapter_update_found_devices(adapter, peer, class, rssi, data); in btd_event_device_found() 338 void btd_event_set_legacy_pairing(bdaddr_t *local, bdaddr_t *peer, in btd_event_set_legacy_pairing() argument [all …]
|
D | event.h | 26 void btd_event_device_found(bdaddr_t *local, bdaddr_t *peer, uint32_t class, 28 void btd_event_set_legacy_pairing(bdaddr_t *local, bdaddr_t *peer, gboolean legacy); 29 void btd_event_remote_class(bdaddr_t *local, bdaddr_t *peer, uint32_t class); 30 void btd_event_remote_name(bdaddr_t *local, bdaddr_t *peer, uint8_t status, char *name); 31 void btd_event_conn_complete(bdaddr_t *local, bdaddr_t *peer); 32 void btd_event_conn_failed(bdaddr_t *local, bdaddr_t *peer, uint8_t status); 33 void btd_event_disconn_complete(bdaddr_t *local, bdaddr_t *peer); 34 void btd_event_bonding_complete(bdaddr_t *local, bdaddr_t *peer, 36 void btd_event_simple_pairing_complete(bdaddr_t *local, bdaddr_t *peer, uint8_t status); 37 void btd_event_returned_link_key(bdaddr_t *local, bdaddr_t *peer); [all …]
|
D | storage.h | 39 int write_remote_class(bdaddr_t *local, bdaddr_t *peer, uint32_t class); 40 int read_remote_class(bdaddr_t *local, bdaddr_t *peer, uint32_t *class); 41 int write_device_name(bdaddr_t *local, bdaddr_t *peer, char *name); 43 int write_remote_eir(bdaddr_t *local, bdaddr_t *peer, uint8_t *data); 44 int read_remote_eir(bdaddr_t *local, bdaddr_t *peer, uint8_t *data); 45 int write_version_info(bdaddr_t *local, bdaddr_t *peer, uint16_t manufacturer, uint8_t lmp_ver, uin… 46 int write_features_info(bdaddr_t *local, bdaddr_t *peer, unsigned char *page1, unsigned char *page2… 47 int read_remote_features(bdaddr_t *local, bdaddr_t *peer, unsigned char *page1, unsigned char *page… 48 int write_lastseen_info(bdaddr_t *local, bdaddr_t *peer, struct tm *tm); 49 int write_lastused_info(bdaddr_t *local, bdaddr_t *peer, struct tm *tm); [all …]
|
D | storage.c | 288 int write_remote_class(bdaddr_t *local, bdaddr_t *peer, uint32_t class) in write_remote_class() argument 296 ba2str(peer, addr); in write_remote_class() 302 int read_remote_class(bdaddr_t *local, bdaddr_t *peer, uint32_t *class) in read_remote_class() argument 308 ba2str(peer, addr); in read_remote_class() 324 int write_device_name(bdaddr_t *local, bdaddr_t *peer, char *name) in write_device_name() argument 340 ba2str(peer, addr); in write_device_name() 365 int write_remote_eir(bdaddr_t *local, bdaddr_t *peer, uint8_t *data) in write_remote_eir() argument 378 ba2str(peer, addr); in write_remote_eir() 382 int read_remote_eir(bdaddr_t *local, bdaddr_t *peer, uint8_t *data) in read_remote_eir() argument 389 ba2str(peer, addr); in read_remote_eir() [all …]
|
/external/qemu/ |
D | charpipe.c | 75 struct CharPipeHalf* peer; /* NULL if closed */ member 91 ph->peer = NULL; in charpipehalf_close() 99 CharPipeHalf* peer = ph->peer; in charpipehalf_write() local 106 if (bip == NULL && peer != NULL && peer->cs->chr_read != NULL) { in charpipehalf_write() 111 if (peer->cs->chr_can_read) { in charpipehalf_write() 112 size = qemu_chr_can_read( peer->cs ); in charpipehalf_write() 121 qemu_chr_read( peer->cs, (uint8_t*)buf, size ); in charpipehalf_write() 158 CharPipeHalf* peer = ph->peer; in charpipehalf_poll() local 161 if (peer == NULL || peer->cs->chr_read == NULL) in charpipehalf_poll() 182 int size2 = qemu_chr_can_read(peer->cs); in charpipehalf_poll() [all …]
|
D | qemu-sockets.c | 311 struct addrinfo ai, *peer = NULL, *local = NULL; in inet_dgram_opts() local 339 if (0 != (rc = getaddrinfo(addr, port, &ai, &peer))) { in inet_dgram_opts() 346 inet_print_addrinfo(__FUNCTION__, peer); in inet_dgram_opts() 352 ai.ai_family = peer->ai_family; in inet_dgram_opts() 374 sock = qemu_socket(peer->ai_family, peer->ai_socktype, peer->ai_protocol); in inet_dgram_opts() 377 inet_strfamily(peer->ai_family), strerror(errno)); in inet_dgram_opts() 396 if (getnameinfo((struct sockaddr*)peer->ai_addr, peer->ai_addrlen, in inet_dgram_opts() 402 if (connect(sock,peer->ai_addr,peer->ai_addrlen) < 0) { in inet_dgram_opts() 404 inet_strfamily(peer->ai_family), in inet_dgram_opts() 405 peer->ai_canonname, uaddr, uport, strerror(errno)); in inet_dgram_opts() [all …]
|
/external/openssl/apps/ |
D | s_cb.c | 771 } peer; in generate_cookie_callback() local 785 (void)BIO_dgram_get_peer(SSL_get_rbio(ssl), &peer); in generate_cookie_callback() 789 switch (peer.sa.sa_family) in generate_cookie_callback() 793 length += sizeof(peer.s4.sin_port); in generate_cookie_callback() 798 length += sizeof(peer.s6.sin6_port); in generate_cookie_callback() 813 switch (peer.sa.sa_family) in generate_cookie_callback() 817 &peer.s4.sin_port, in generate_cookie_callback() 818 sizeof(peer.s4.sin_port)); in generate_cookie_callback() 819 memcpy(buffer + sizeof(peer.s4.sin_port), in generate_cookie_callback() 820 &peer.s4.sin_addr, in generate_cookie_callback() [all …]
|
D | sess_id.c | 93 X509 *peer = NULL; in MAIN() local 167 peer = SSL_SESSION_get0_peer(x); in MAIN() 236 if (peer == NULL) in MAIN() 239 X509_print(out,peer); in MAIN() 258 else if (!noout && (peer != NULL)) /* just print the certificate */ in MAIN() 261 i=(int)i2d_X509_bio(out,peer); in MAIN() 263 i=PEM_write_bio_X509(out,peer); in MAIN()
|
/external/webkit/Source/WebCore/websockets/ |
D | WorkerThreadableWebSocketChannel.cpp | 236 …tWebSocketChannel(ScriptExecutionContext* context, Bridge* thisPtr, Peer* peer, RefPtr<ThreadableW… in setWebSocketChannel() argument 239 thisPtr->m_peer = peer; in setWebSocketChannel() 248 …Peer* peer = Peer::create(clientWrapper, thisPtr->m_loaderProxy, context, taskMode, url, protocol); in mainThreadCreateWebSocketChannel() local 249 …ToWorkerContext(createCallbackTask(&Bridge::setWebSocketChannel, thisPtr, peer, clientWrapper), ta… in mainThreadCreateWebSocketChannel() 271 …id WorkerThreadableWebSocketChannel::mainThreadConnect(ScriptExecutionContext* context, Peer* peer) in mainThreadConnect() argument 275 ASSERT(peer); in mainThreadConnect() 277 peer->connect(); in mainThreadConnect() 287 void WorkerThreadableWebSocketChannel::mainThreadSend(ScriptExecutionContext* context, Peer* peer, … in mainThreadSend() argument 291 ASSERT(peer); in mainThreadSend() 293 peer->send(message); in mainThreadSend() [all …]
|
/external/chromium/net/http/ |
D | http_stream_factory_impl_unittest.cc | 105 HttpNetworkSessionPeer peer(session); in PreconnectHelper() local 108 peer.SetHttpStreamFactory(mock_factory); in PreconnectHelper() 218 HttpNetworkSessionPeer peer(session); in TEST() local 223 peer.SetTransportSocketPool(transport_conn_pool); in TEST() 228 peer.SetSSLSocketPool(ssl_conn_pool); in TEST() 241 HttpNetworkSessionPeer peer(session); in TEST() local 247 peer.SetSocketPoolForHTTPProxy(proxy_host, http_proxy_pool); in TEST() 252 peer.SetSocketPoolForSSLWithProxy(proxy_host, ssl_conn_pool); in TEST() 266 HttpNetworkSessionPeer peer(session); in TEST() local 272 peer.SetSocketPoolForSOCKSProxy(proxy_host, socks_proxy_pool); in TEST() [all …]
|
/external/openssl/crypto/bio/ |
D | bss_bio.c | 127 BIO *peer; /* NULL if buf == NULL. member 153 b->peer = NULL; in bio_new() 172 if (b->peer) in bio_free() 200 assert(b->peer != NULL); in bio_read() 201 peer_b = b->peer->ptr; in bio_read() 292 assert(b->peer != NULL); in bio_nread0() 293 peer_b = b->peer->ptr; in bio_nread0() 335 peer_b = b->peer->ptr; in bio_nread() 365 assert(b->peer != NULL); in bio_write() 444 assert(b->peer != NULL); in bio_nwrite0() [all …]
|
D | bss_dgram.c | 152 } peer; member 176 } peer; member 363 } peer; in dgram_read() member 367 sa.len.i=sizeof(sa.peer); in dgram_read() 372 memset(&sa.peer, 0x00, sizeof(sa.peer)); in dgram_read() 374 ret=recvfrom(b->num,out,outl,0,&sa.peer.sa,(void *)&sa.len); in dgram_read() 377 OPENSSL_assert(sa.len.s<=sizeof(sa.peer)); in dgram_read() 382 BIO_ctrl(b, BIO_CTRL_DGRAM_SET_PEER, 0, &sa.peer); in dgram_read() 409 int peerlen = sizeof(data->peer); in dgram_write() 411 if (data->peer.sa.sa_family == AF_INET) in dgram_write() [all …]
|
/external/iptables/libipq/ |
D | libipq.c | 107 (struct sockaddr *)&h->peer, sizeof(h->peer)); in ipq_netlink_sendto() 135 addrlen = sizeof(h->peer); in ipq_netlink_recvfrom() 168 (struct sockaddr *)&h->peer, &addrlen); in ipq_netlink_recvfrom() 173 if (addrlen != sizeof(h->peer)) { in ipq_netlink_recvfrom() 177 if (h->peer.nl_pid != 0) { in ipq_netlink_recvfrom() 249 memset(&h->peer, 0, sizeof(struct sockaddr_nl)); in ipq_create_handle() 250 h->peer.nl_family = AF_NETLINK; in ipq_create_handle() 251 h->peer.nl_pid = 0; in ipq_create_handle() 252 h->peer.nl_groups = 0; in ipq_create_handle() 347 msg.msg_name = (void *)&h->peer; in ipq_set_verdict() [all …]
|
/external/iproute2/ip/ |
D | ifcfg | 81 peer=$1 82 if [ "$peer" != "" ]; then 87 pfx="$ipaddr peer $peer" 141 elif [ "$peer" != "" ]; then 142 if ping -q -c 2 -w 4 $peer ; then 143 ip ro append default via $peer dev $dev metric 30001
|
/external/wpa_supplicant_8/src/p2p/ |
D | p2p_go_neg.c | 132 struct p2p_device *peer) in p2p_build_go_neg_req() argument 142 peer->dialog_token++; in p2p_build_go_neg_req() 143 if (peer->dialog_token == 0) in p2p_build_go_neg_req() 144 peer->dialog_token = 1; in p2p_build_go_neg_req() 145 p2p_buf_add_public_action_hdr(buf, P2P_GO_NEG_REQ, peer->dialog_token); in p2p_build_go_neg_req() 149 if (peer->flags & P2P_DEV_PREFER_PERSISTENT_GROUP) { in p2p_build_go_neg_req() 151 if (peer->flags & P2P_DEV_PREFER_PERSISTENT_RECONN) in p2p_build_go_neg_req() 170 p2p_buf_add_device_info(buf, p2p, peer); in p2p_build_go_neg_req() 176 p2p_build_wps_ie(p2p, buf, p2p_wps_method_pw_id(peer->wps_method), 0); in p2p_build_go_neg_req() 225 struct p2p_device *peer, in p2p_build_go_neg_resp() argument [all …]
|
D | p2p_invitation.c | 18 struct p2p_device *peer, in p2p_build_invitation_req() argument 29 peer->dialog_token++; in p2p_build_invitation_req() 30 if (peer->dialog_token == 0) in p2p_build_invitation_req() 31 peer->dialog_token = 1; in p2p_build_invitation_req() 33 peer->dialog_token); in p2p_build_invitation_req() 50 dev_addr = peer->info.p2p_device_addr; in p2p_build_invitation_req() 54 p2p_buf_add_device_info(buf, p2p, peer); in p2p_build_invitation_req() 62 struct p2p_device *peer, in p2p_build_invitation_resp() argument 406 int p2p_invite(struct p2p_data *p2p, const u8 *peer, enum p2p_invite_role role, in p2p_invite() argument 416 MAC2STR(peer), role, persistent_group, force_freq); in p2p_invite() [all …]
|
/external/openssh/ |
D | kex.c | 184 buffer_clear(&kex->peer); in kex_finish() 238 buffer_append(&kex->peer, ptr, dlen); in kex_input_kexinit() 258 buffer_init(&kex->peer); in kex_setup() 378 proposals_match(char *my[PROPOSAL_MAX], char *peer[PROPOSAL_MAX]) in proposals_match() 389 if ((p = strchr(peer[*idx], ',')) != NULL) in proposals_match() 391 if (strcmp(my[*idx], peer[*idx]) != 0) { in proposals_match() 393 my[*idx], peer[*idx]); in proposals_match() 405 char **my, **peer; in kex_choose_conf() local 412 peer = kex_buf2prop(&kex->peer, &first_kex_follows); in kex_choose_conf() 415 cprop=peer; in kex_choose_conf() [all …]
|
/external/openssl/crypto/evp/ |
D | pmeth_fn.c | 285 int EVP_PKEY_derive_set_peer(EVP_PKEY_CTX *ctx, EVP_PKEY *peer) in EVP_PKEY_derive_set_peer() argument 301 ret = ctx->pmeth->ctrl(ctx, EVP_PKEY_CTRL_PEER_KEY, 0, peer); in EVP_PKEY_derive_set_peer() 315 if (ctx->pkey->type != peer->type) in EVP_PKEY_derive_set_peer() 327 if (!EVP_PKEY_missing_parameters(peer) && in EVP_PKEY_derive_set_peer() 328 !EVP_PKEY_cmp_parameters(ctx->pkey, peer)) in EVP_PKEY_derive_set_peer() 337 ctx->peerkey = peer; in EVP_PKEY_derive_set_peer() 339 ret = ctx->pmeth->ctrl(ctx, EVP_PKEY_CTRL_PEER_KEY, 1, peer); in EVP_PKEY_derive_set_peer() 347 CRYPTO_add(&peer->references,1,CRYPTO_LOCK_EVP_PKEY); in EVP_PKEY_derive_set_peer()
|
/external/ipsec-tools/src/racoon/ |
D | sainfo.c | 79 getsainfo(loc, rmt, peer, remoteid) 80 const vchar_t *loc, *rmt, *peer; 87 if (peer == NULL) 104 if (peer == NULL) 107 dpeer = ipsecdoi_id2str(peer); 133 if (ipsecdoi_chkcmpids(peer, s->id_i, 0))
|
/external/dnsmasq/src/ |
D | tftp.c | 46 struct sockaddr_in addr, peer; in tftp_request() local 72 msg.msg_name = &peer; in tftp_request() 73 msg.msg_namelen = sizeof(peer); in tftp_request() 153 transfer->peer = peer; in tftp_request() 194 len = tftp_err(ERR_ILL, packet, _("unsupported request from %s"), inet_ntoa(peer.sin_addr)); in tftp_request() 244 strncat(daemon->namebuff, inet_ntoa(peer.sin_addr), (MAXDNAME-1) - strlen(daemon->namebuff)); in tftp_request() 276 (struct sockaddr *)&peer, sizeof(peer)) == -1 && errno == EINTR); in tftp_request() 282 …my_syslog(MS_TFTP | LOG_INFO, _("TFTP sent %s to %s"), daemon->namebuff, inet_ntoa(peer.sin_addr)); in tftp_request() 418 inet_ntoa(transfer->peer.sin_addr)); in check_tftp_listeners() 448 transfer->file->filename, inet_ntoa(transfer->peer.sin_addr)); in check_tftp_listeners() [all …]
|
/external/chromium/chrome/common/extensions/ |
D | extension_localization_peer.cc | 18 webkit_glue::ResourceLoaderBridge::Peer* peer, in ExtensionLocalizationPeer() argument 21 : original_peer_(peer), in ExtensionLocalizationPeer() 32 webkit_glue::ResourceLoaderBridge::Peer* peer, in CreateExtensionLocalizationPeer() argument 40 new ExtensionLocalizationPeer(peer, message_sender, request_url) : NULL; in CreateExtensionLocalizationPeer()
|