Home
last modified time | relevance | path

Searched refs:peer (Results 1 – 25 of 158) sorted by relevance

1234567

/external/wpa_supplicant_8/src/rsn_supp/
Dtdls.c81 static void wpa_tdls_peer_free(struct wpa_sm *sm, struct wpa_tdls_peer *peer);
144 static int wpa_tdls_del_key(struct wpa_sm *sm, struct wpa_tdls_peer *peer) in wpa_tdls_del_key() argument
146 if (wpa_sm_set_key(sm, WPA_ALG_NONE, peer->addr, in wpa_tdls_del_key()
157 static int wpa_tdls_set_key(struct wpa_sm *sm, struct wpa_tdls_peer *peer) in wpa_tdls_set_key() argument
165 switch (peer->cipher) { in wpa_tdls_set_key()
180 if (wpa_sm_set_key(sm, alg, peer->addr, -1, 1, in wpa_tdls_set_key()
181 rsc, sizeof(rsc), peer->tpk.tk, key_len) < 0) { in wpa_tdls_set_key()
203 struct wpa_tdls_peer *peer; in wpa_tdls_tpk_send() local
223 for (peer = sm->tdls; peer; peer = peer->next) { in wpa_tdls_tpk_send()
224 if (os_memcmp(peer->addr, dest, ETH_ALEN) == 0) in wpa_tdls_tpk_send()
[all …]
/external/wpa_supplicant_8/wpa_supplicant/
Dibss_rsn.c24 struct ibss_rsn_peer *peer; in ibss_rsn_get_peer() local
26 for (peer = ibss_rsn->peers; peer; peer = peer->next) in ibss_rsn_get_peer()
27 if (os_memcmp(addr, peer->addr, ETH_ALEN) == 0) in ibss_rsn_get_peer()
29 return peer; in ibss_rsn_get_peer()
33 static void ibss_rsn_free(struct ibss_rsn_peer *peer) in ibss_rsn_free() argument
35 wpa_auth_sta_deinit(peer->auth); in ibss_rsn_free()
36 wpa_sm_deinit(peer->supp); in ibss_rsn_free()
37 os_free(peer); in ibss_rsn_free()
43 struct ibss_rsn_peer *peer = ctx; in supp_set_state() local
44 peer->supp_state = state; in supp_set_state()
[all …]
DREADME-P2P100 Flush P2P peer table and state.
104 p2p_prov_disc <peer device address> <display|keypad|pbc> [join]
106 Send P2P provision discovery request to the specified peer. The
107 parameters for this command are the P2P device address of the peer and
109 02:01:02:03:04:05 display" would request the peer to display a PIN for
110 us and "p2p_prov_disc 02:01:02:03:04:05 keypad" would request the peer
117 p2p_connect <peer device address> <pbc|pin|PIN#> [display|keypad]
120 Start P2P group formation with a discovered P2P peer. This includes
130 from local display, keypad=PIN entered from peer display). "persistent"
138 "auth" indicates that the WPS parameters are authorized for the peer
[all …]
/external/bluetooth/bluez/network/
Dconnection.c75 struct network_peer *peer; member
89 struct network_peer *peer = list->data; in find_peer() local
91 if (!strcmp(peer->path, path)) in find_peer()
92 return peer; in find_peer()
118 emit_property_changed(connection, nc->peer->path, in bnep_watchdog_cb()
121 emit_property_changed(connection, nc->peer->path, in bnep_watchdog_cb()
124 emit_property_changed(connection, nc->peer->path, in bnep_watchdog_cb()
127 device_remove_disconnect_watch(nc->peer->device, nc->dc_id); in bnep_watchdog_cb()
172 bnep_kill_connection(&nc->peer->dst); in connection_destroy()
182 info("Network: disconnect %s", nc->peer->path); in disconnect_cb()
[all …]
/external/bluetooth/bluez/src/
Devent.c258 void btd_event_bonding_complete(bdaddr_t *local, bdaddr_t *peer, in btd_event_bonding_complete() argument
269 if (!get_adapter_and_device(local, peer, &adapter, &device, create)) in btd_event_bonding_complete()
276 void btd_event_simple_pairing_complete(bdaddr_t *local, bdaddr_t *peer, in btd_event_simple_pairing_complete() argument
287 if (!get_adapter_and_device(local, peer, &adapter, &device, create)) in btd_event_simple_pairing_complete()
318 void btd_event_device_found(bdaddr_t *local, bdaddr_t *peer, uint32_t class, in btd_event_device_found() argument
329 update_lastseen(local, peer); in btd_event_device_found()
330 write_remote_class(local, peer, class); in btd_event_device_found()
333 write_remote_eir(local, peer, data); in btd_event_device_found()
335 adapter_update_found_devices(adapter, peer, class, rssi, data); in btd_event_device_found()
338 void btd_event_set_legacy_pairing(bdaddr_t *local, bdaddr_t *peer, in btd_event_set_legacy_pairing() argument
[all …]
Devent.h26 void btd_event_device_found(bdaddr_t *local, bdaddr_t *peer, uint32_t class,
28 void btd_event_set_legacy_pairing(bdaddr_t *local, bdaddr_t *peer, gboolean legacy);
29 void btd_event_remote_class(bdaddr_t *local, bdaddr_t *peer, uint32_t class);
30 void btd_event_remote_name(bdaddr_t *local, bdaddr_t *peer, uint8_t status, char *name);
31 void btd_event_conn_complete(bdaddr_t *local, bdaddr_t *peer);
32 void btd_event_conn_failed(bdaddr_t *local, bdaddr_t *peer, uint8_t status);
33 void btd_event_disconn_complete(bdaddr_t *local, bdaddr_t *peer);
34 void btd_event_bonding_complete(bdaddr_t *local, bdaddr_t *peer,
36 void btd_event_simple_pairing_complete(bdaddr_t *local, bdaddr_t *peer, uint8_t status);
37 void btd_event_returned_link_key(bdaddr_t *local, bdaddr_t *peer);
[all …]
Dstorage.h39 int write_remote_class(bdaddr_t *local, bdaddr_t *peer, uint32_t class);
40 int read_remote_class(bdaddr_t *local, bdaddr_t *peer, uint32_t *class);
41 int write_device_name(bdaddr_t *local, bdaddr_t *peer, char *name);
43 int write_remote_eir(bdaddr_t *local, bdaddr_t *peer, uint8_t *data);
44 int read_remote_eir(bdaddr_t *local, bdaddr_t *peer, uint8_t *data);
45 int write_version_info(bdaddr_t *local, bdaddr_t *peer, uint16_t manufacturer, uint8_t lmp_ver, uin…
46 int write_features_info(bdaddr_t *local, bdaddr_t *peer, unsigned char *page1, unsigned char *page2…
47 int read_remote_features(bdaddr_t *local, bdaddr_t *peer, unsigned char *page1, unsigned char *page…
48 int write_lastseen_info(bdaddr_t *local, bdaddr_t *peer, struct tm *tm);
49 int write_lastused_info(bdaddr_t *local, bdaddr_t *peer, struct tm *tm);
[all …]
Dstorage.c288 int write_remote_class(bdaddr_t *local, bdaddr_t *peer, uint32_t class) in write_remote_class() argument
296 ba2str(peer, addr); in write_remote_class()
302 int read_remote_class(bdaddr_t *local, bdaddr_t *peer, uint32_t *class) in read_remote_class() argument
308 ba2str(peer, addr); in read_remote_class()
324 int write_device_name(bdaddr_t *local, bdaddr_t *peer, char *name) in write_device_name() argument
340 ba2str(peer, addr); in write_device_name()
365 int write_remote_eir(bdaddr_t *local, bdaddr_t *peer, uint8_t *data) in write_remote_eir() argument
378 ba2str(peer, addr); in write_remote_eir()
382 int read_remote_eir(bdaddr_t *local, bdaddr_t *peer, uint8_t *data) in read_remote_eir() argument
389 ba2str(peer, addr); in read_remote_eir()
[all …]
/external/qemu/
Dcharpipe.c75 struct CharPipeHalf* peer; /* NULL if closed */ member
91 ph->peer = NULL; in charpipehalf_close()
99 CharPipeHalf* peer = ph->peer; in charpipehalf_write() local
106 if (bip == NULL && peer != NULL && peer->cs->chr_read != NULL) { in charpipehalf_write()
111 if (peer->cs->chr_can_read) { in charpipehalf_write()
112 size = qemu_chr_can_read( peer->cs ); in charpipehalf_write()
121 qemu_chr_read( peer->cs, (uint8_t*)buf, size ); in charpipehalf_write()
158 CharPipeHalf* peer = ph->peer; in charpipehalf_poll() local
161 if (peer == NULL || peer->cs->chr_read == NULL) in charpipehalf_poll()
182 int size2 = qemu_chr_can_read(peer->cs); in charpipehalf_poll()
[all …]
Dqemu-sockets.c311 struct addrinfo ai, *peer = NULL, *local = NULL; in inet_dgram_opts() local
339 if (0 != (rc = getaddrinfo(addr, port, &ai, &peer))) { in inet_dgram_opts()
346 inet_print_addrinfo(__FUNCTION__, peer); in inet_dgram_opts()
352 ai.ai_family = peer->ai_family; in inet_dgram_opts()
374 sock = qemu_socket(peer->ai_family, peer->ai_socktype, peer->ai_protocol); in inet_dgram_opts()
377 inet_strfamily(peer->ai_family), strerror(errno)); in inet_dgram_opts()
396 if (getnameinfo((struct sockaddr*)peer->ai_addr, peer->ai_addrlen, in inet_dgram_opts()
402 if (connect(sock,peer->ai_addr,peer->ai_addrlen) < 0) { in inet_dgram_opts()
404 inet_strfamily(peer->ai_family), in inet_dgram_opts()
405 peer->ai_canonname, uaddr, uport, strerror(errno)); in inet_dgram_opts()
[all …]
/external/openssl/apps/
Ds_cb.c771 } peer; in generate_cookie_callback() local
785 (void)BIO_dgram_get_peer(SSL_get_rbio(ssl), &peer); in generate_cookie_callback()
789 switch (peer.sa.sa_family) in generate_cookie_callback()
793 length += sizeof(peer.s4.sin_port); in generate_cookie_callback()
798 length += sizeof(peer.s6.sin6_port); in generate_cookie_callback()
813 switch (peer.sa.sa_family) in generate_cookie_callback()
817 &peer.s4.sin_port, in generate_cookie_callback()
818 sizeof(peer.s4.sin_port)); in generate_cookie_callback()
819 memcpy(buffer + sizeof(peer.s4.sin_port), in generate_cookie_callback()
820 &peer.s4.sin_addr, in generate_cookie_callback()
[all …]
Dsess_id.c93 X509 *peer = NULL; in MAIN() local
167 peer = SSL_SESSION_get0_peer(x); in MAIN()
236 if (peer == NULL) in MAIN()
239 X509_print(out,peer); in MAIN()
258 else if (!noout && (peer != NULL)) /* just print the certificate */ in MAIN()
261 i=(int)i2d_X509_bio(out,peer); in MAIN()
263 i=PEM_write_bio_X509(out,peer); in MAIN()
/external/webkit/Source/WebCore/websockets/
DWorkerThreadableWebSocketChannel.cpp236 …tWebSocketChannel(ScriptExecutionContext* context, Bridge* thisPtr, Peer* peer, RefPtr<ThreadableW… in setWebSocketChannel() argument
239 thisPtr->m_peer = peer; in setWebSocketChannel()
248 …Peer* peer = Peer::create(clientWrapper, thisPtr->m_loaderProxy, context, taskMode, url, protocol); in mainThreadCreateWebSocketChannel() local
249 …ToWorkerContext(createCallbackTask(&Bridge::setWebSocketChannel, thisPtr, peer, clientWrapper), ta… in mainThreadCreateWebSocketChannel()
271 …id WorkerThreadableWebSocketChannel::mainThreadConnect(ScriptExecutionContext* context, Peer* peer) in mainThreadConnect() argument
275 ASSERT(peer); in mainThreadConnect()
277 peer->connect(); in mainThreadConnect()
287 void WorkerThreadableWebSocketChannel::mainThreadSend(ScriptExecutionContext* context, Peer* peer, … in mainThreadSend() argument
291 ASSERT(peer); in mainThreadSend()
293 peer->send(message); in mainThreadSend()
[all …]
/external/chromium/net/http/
Dhttp_stream_factory_impl_unittest.cc105 HttpNetworkSessionPeer peer(session); in PreconnectHelper() local
108 peer.SetHttpStreamFactory(mock_factory); in PreconnectHelper()
218 HttpNetworkSessionPeer peer(session); in TEST() local
223 peer.SetTransportSocketPool(transport_conn_pool); in TEST()
228 peer.SetSSLSocketPool(ssl_conn_pool); in TEST()
241 HttpNetworkSessionPeer peer(session); in TEST() local
247 peer.SetSocketPoolForHTTPProxy(proxy_host, http_proxy_pool); in TEST()
252 peer.SetSocketPoolForSSLWithProxy(proxy_host, ssl_conn_pool); in TEST()
266 HttpNetworkSessionPeer peer(session); in TEST() local
272 peer.SetSocketPoolForSOCKSProxy(proxy_host, socks_proxy_pool); in TEST()
[all …]
/external/openssl/crypto/bio/
Dbss_bio.c127 BIO *peer; /* NULL if buf == NULL. member
153 b->peer = NULL; in bio_new()
172 if (b->peer) in bio_free()
200 assert(b->peer != NULL); in bio_read()
201 peer_b = b->peer->ptr; in bio_read()
292 assert(b->peer != NULL); in bio_nread0()
293 peer_b = b->peer->ptr; in bio_nread0()
335 peer_b = b->peer->ptr; in bio_nread()
365 assert(b->peer != NULL); in bio_write()
444 assert(b->peer != NULL); in bio_nwrite0()
[all …]
Dbss_dgram.c152 } peer; member
176 } peer; member
363 } peer; in dgram_read() member
367 sa.len.i=sizeof(sa.peer); in dgram_read()
372 memset(&sa.peer, 0x00, sizeof(sa.peer)); in dgram_read()
374 ret=recvfrom(b->num,out,outl,0,&sa.peer.sa,(void *)&sa.len); in dgram_read()
377 OPENSSL_assert(sa.len.s<=sizeof(sa.peer)); in dgram_read()
382 BIO_ctrl(b, BIO_CTRL_DGRAM_SET_PEER, 0, &sa.peer); in dgram_read()
409 int peerlen = sizeof(data->peer); in dgram_write()
411 if (data->peer.sa.sa_family == AF_INET) in dgram_write()
[all …]
/external/iptables/libipq/
Dlibipq.c107 (struct sockaddr *)&h->peer, sizeof(h->peer)); in ipq_netlink_sendto()
135 addrlen = sizeof(h->peer); in ipq_netlink_recvfrom()
168 (struct sockaddr *)&h->peer, &addrlen); in ipq_netlink_recvfrom()
173 if (addrlen != sizeof(h->peer)) { in ipq_netlink_recvfrom()
177 if (h->peer.nl_pid != 0) { in ipq_netlink_recvfrom()
249 memset(&h->peer, 0, sizeof(struct sockaddr_nl)); in ipq_create_handle()
250 h->peer.nl_family = AF_NETLINK; in ipq_create_handle()
251 h->peer.nl_pid = 0; in ipq_create_handle()
252 h->peer.nl_groups = 0; in ipq_create_handle()
347 msg.msg_name = (void *)&h->peer; in ipq_set_verdict()
[all …]
/external/iproute2/ip/
Difcfg81 peer=$1
82 if [ "$peer" != "" ]; then
87 pfx="$ipaddr peer $peer"
141 elif [ "$peer" != "" ]; then
142 if ping -q -c 2 -w 4 $peer ; then
143 ip ro append default via $peer dev $dev metric 30001
/external/wpa_supplicant_8/src/p2p/
Dp2p_go_neg.c132 struct p2p_device *peer) in p2p_build_go_neg_req() argument
142 peer->dialog_token++; in p2p_build_go_neg_req()
143 if (peer->dialog_token == 0) in p2p_build_go_neg_req()
144 peer->dialog_token = 1; in p2p_build_go_neg_req()
145 p2p_buf_add_public_action_hdr(buf, P2P_GO_NEG_REQ, peer->dialog_token); in p2p_build_go_neg_req()
149 if (peer->flags & P2P_DEV_PREFER_PERSISTENT_GROUP) { in p2p_build_go_neg_req()
151 if (peer->flags & P2P_DEV_PREFER_PERSISTENT_RECONN) in p2p_build_go_neg_req()
170 p2p_buf_add_device_info(buf, p2p, peer); in p2p_build_go_neg_req()
176 p2p_build_wps_ie(p2p, buf, p2p_wps_method_pw_id(peer->wps_method), 0); in p2p_build_go_neg_req()
225 struct p2p_device *peer, in p2p_build_go_neg_resp() argument
[all …]
Dp2p_invitation.c18 struct p2p_device *peer, in p2p_build_invitation_req() argument
29 peer->dialog_token++; in p2p_build_invitation_req()
30 if (peer->dialog_token == 0) in p2p_build_invitation_req()
31 peer->dialog_token = 1; in p2p_build_invitation_req()
33 peer->dialog_token); in p2p_build_invitation_req()
50 dev_addr = peer->info.p2p_device_addr; in p2p_build_invitation_req()
54 p2p_buf_add_device_info(buf, p2p, peer); in p2p_build_invitation_req()
62 struct p2p_device *peer, in p2p_build_invitation_resp() argument
406 int p2p_invite(struct p2p_data *p2p, const u8 *peer, enum p2p_invite_role role, in p2p_invite() argument
416 MAC2STR(peer), role, persistent_group, force_freq); in p2p_invite()
[all …]
/external/openssh/
Dkex.c184 buffer_clear(&kex->peer); in kex_finish()
238 buffer_append(&kex->peer, ptr, dlen); in kex_input_kexinit()
258 buffer_init(&kex->peer); in kex_setup()
378 proposals_match(char *my[PROPOSAL_MAX], char *peer[PROPOSAL_MAX]) in proposals_match()
389 if ((p = strchr(peer[*idx], ',')) != NULL) in proposals_match()
391 if (strcmp(my[*idx], peer[*idx]) != 0) { in proposals_match()
393 my[*idx], peer[*idx]); in proposals_match()
405 char **my, **peer; in kex_choose_conf() local
412 peer = kex_buf2prop(&kex->peer, &first_kex_follows); in kex_choose_conf()
415 cprop=peer; in kex_choose_conf()
[all …]
/external/openssl/crypto/evp/
Dpmeth_fn.c285 int EVP_PKEY_derive_set_peer(EVP_PKEY_CTX *ctx, EVP_PKEY *peer) in EVP_PKEY_derive_set_peer() argument
301 ret = ctx->pmeth->ctrl(ctx, EVP_PKEY_CTRL_PEER_KEY, 0, peer); in EVP_PKEY_derive_set_peer()
315 if (ctx->pkey->type != peer->type) in EVP_PKEY_derive_set_peer()
327 if (!EVP_PKEY_missing_parameters(peer) && in EVP_PKEY_derive_set_peer()
328 !EVP_PKEY_cmp_parameters(ctx->pkey, peer)) in EVP_PKEY_derive_set_peer()
337 ctx->peerkey = peer; in EVP_PKEY_derive_set_peer()
339 ret = ctx->pmeth->ctrl(ctx, EVP_PKEY_CTRL_PEER_KEY, 1, peer); in EVP_PKEY_derive_set_peer()
347 CRYPTO_add(&peer->references,1,CRYPTO_LOCK_EVP_PKEY); in EVP_PKEY_derive_set_peer()
/external/ipsec-tools/src/racoon/
Dsainfo.c79 getsainfo(loc, rmt, peer, remoteid)
80 const vchar_t *loc, *rmt, *peer;
87 if (peer == NULL)
104 if (peer == NULL)
107 dpeer = ipsecdoi_id2str(peer);
133 if (ipsecdoi_chkcmpids(peer, s->id_i, 0))
/external/dnsmasq/src/
Dtftp.c46 struct sockaddr_in addr, peer; in tftp_request() local
72 msg.msg_name = &peer; in tftp_request()
73 msg.msg_namelen = sizeof(peer); in tftp_request()
153 transfer->peer = peer; in tftp_request()
194 len = tftp_err(ERR_ILL, packet, _("unsupported request from %s"), inet_ntoa(peer.sin_addr)); in tftp_request()
244 strncat(daemon->namebuff, inet_ntoa(peer.sin_addr), (MAXDNAME-1) - strlen(daemon->namebuff)); in tftp_request()
276 (struct sockaddr *)&peer, sizeof(peer)) == -1 && errno == EINTR); in tftp_request()
282 …my_syslog(MS_TFTP | LOG_INFO, _("TFTP sent %s to %s"), daemon->namebuff, inet_ntoa(peer.sin_addr)); in tftp_request()
418 inet_ntoa(transfer->peer.sin_addr)); in check_tftp_listeners()
448 transfer->file->filename, inet_ntoa(transfer->peer.sin_addr)); in check_tftp_listeners()
[all …]
/external/chromium/chrome/common/extensions/
Dextension_localization_peer.cc18 webkit_glue::ResourceLoaderBridge::Peer* peer, in ExtensionLocalizationPeer() argument
21 : original_peer_(peer), in ExtensionLocalizationPeer()
32 webkit_glue::ResourceLoaderBridge::Peer* peer, in CreateExtensionLocalizationPeer() argument
40 new ExtensionLocalizationPeer(peer, message_sender, request_url) : NULL; in CreateExtensionLocalizationPeer()

1234567