/external/wpa_supplicant_8/src/rsn_supp/ |
D | tdls.c | 85 static void wpa_tdls_peer_free(struct wpa_sm *sm, struct wpa_tdls_peer *peer); 87 struct wpa_tdls_peer *peer); 176 static int wpa_tdls_del_key(struct wpa_sm *sm, struct wpa_tdls_peer *peer) in wpa_tdls_del_key() argument 178 if (wpa_sm_set_key(sm, WPA_ALG_NONE, peer->addr, in wpa_tdls_del_key() 189 static int wpa_tdls_set_key(struct wpa_sm *sm, struct wpa_tdls_peer *peer) in wpa_tdls_set_key() argument 197 switch (peer->cipher) { in wpa_tdls_set_key() 212 if (wpa_sm_set_key(sm, alg, peer->addr, -1, 1, in wpa_tdls_set_key() 213 rsc, sizeof(rsc), peer->tpk.tk, key_len) < 0) { in wpa_tdls_set_key() 237 struct wpa_tdls_peer *peer; in wpa_tdls_tpk_send() local 259 for (peer = sm->tdls; peer; peer = peer->next) { in wpa_tdls_tpk_send() [all …]
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | ibss_rsn.c | 30 struct ibss_rsn_peer *peer; in ibss_rsn_get_peer() local 32 for (peer = ibss_rsn->peers; peer; peer = peer->next) in ibss_rsn_get_peer() 33 if (os_memcmp(addr, peer->addr, ETH_ALEN) == 0) in ibss_rsn_get_peer() 35 return peer; in ibss_rsn_get_peer() 39 static void ibss_rsn_free(struct ibss_rsn_peer *peer) in ibss_rsn_free() argument 41 eloop_cancel_timeout(ibss_rsn_auth_timeout, peer, NULL); in ibss_rsn_free() 42 wpa_auth_sta_deinit(peer->auth); in ibss_rsn_free() 43 wpa_sm_deinit(peer->supp); in ibss_rsn_free() 44 os_free(peer); in ibss_rsn_free() 50 struct ibss_rsn_peer *peer = ctx; in supp_set_state() local [all …]
|
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/framed/ |
D | Spdy3ConnectionTest.java | 61 private final MockSpdyPeer peer = new MockSpdyPeer(); field in Spdy3ConnectionTest 64 peer.close(); in tearDown() 69 peer.acceptFrame(); // SYN_STREAM in clientCreatesStreamAndServerReplies() 70 peer.sendFrame() in clientCreatesStreamAndServerReplies() 72 peer.sendFrame().data(true, 1, new Buffer().writeUtf8("robot"), 5); in clientCreatesStreamAndServerReplies() 73 peer.acceptFrame(); // DATA in clientCreatesStreamAndServerReplies() 74 peer.play(); in clientCreatesStreamAndServerReplies() 77 FramedConnection connection = connection(peer, SPDY3); in clientCreatesStreamAndServerReplies() 87 MockSpdyPeer.InFrame synStream = peer.takeFrame(); in clientCreatesStreamAndServerReplies() 95 MockSpdyPeer.InFrame requestData = peer.takeFrame(); in clientCreatesStreamAndServerReplies() [all …]
|
D | Http2ConnectionTest.java | 52 private final MockSpdyPeer peer = new MockSpdyPeer(); field in Http2ConnectionTest 55 peer.close(); in tearDown() 59 peer.setVariantAndClient(HTTP_2, false); in serverPingsClientHttp2() 62 peer.sendFrame().ping(false, 2, 3); in serverPingsClientHttp2() 63 peer.acceptFrame(); // PING in serverPingsClientHttp2() 64 peer.play(); in serverPingsClientHttp2() 67 connection(peer, HTTP_2); in serverPingsClientHttp2() 70 MockSpdyPeer.InFrame ping = peer.takeFrame(); in serverPingsClientHttp2() 79 peer.setVariantAndClient(HTTP_2, false); in clientPingsServerHttp2() 82 peer.acceptFrame(); // PING in clientPingsServerHttp2() [all …]
|
/external/wpa_supplicant_8/src/pae/ |
D | ieee802_1x_kay.c | 166 mi = body->peer + i; in ieee802_1x_mka_dump_peer_body() 291 struct ieee802_1x_kay_peer *peer; in get_peer_mi() local 293 dl_list_for_each(peer, peers, struct ieee802_1x_kay_peer, list) { in get_peer_mi() 294 if (os_memcmp(peer->mi, mi, MI_LEN) == 0) in get_peer_mi() 295 return peer; in get_peer_mi() 343 struct ieee802_1x_kay_peer *peer; in ieee802_1x_kay_get_peer() local 345 peer = get_peer_mi(&participant->live_peers, mi); in ieee802_1x_kay_get_peer() 346 if (peer) in ieee802_1x_kay_get_peer() 347 return peer; in ieee802_1x_kay_get_peer() 391 struct ieee802_1x_kay_peer *peer; in ieee802_1x_kay_get_peer_sci() local [all …]
|
/external/v8/tools/testrunner/server/ |
D | status_handler.py | 36 def _StatusQuery(peer, query): argument 38 code = sock.connect_ex((peer.address, constants.STATUS_PORT)) 55 def RequestTrustedPubkeys(peer, server): argument 56 pubkey_list = _StatusQuery(peer, [constants.LIST_TRUSTED_PUBKEYS]) 59 result = _StatusQuery(peer, [constants.GET_SIGNED_PUBKEY, pubkey]) 63 def NotifyNewTrusted(peer, data): argument 64 _StatusQuery(peer, [constants.NOTIFY_NEW_TRUSTED] + data) 67 def ITrustYouNow(peer): argument 68 _StatusQuery(peer, [constants.TRUST_YOU_NOW]) 71 def TryTransitiveTrust(peer, pubkey, server): argument [all …]
|
D | main.py | 151 def AddPeer(self, peer): argument 154 if p.address == peer.address: 156 self.peers.append(peer) 157 if peer.trusted: 158 status_handler.ITrustYouNow(peer) 187 for peer in self.peers: 188 if peer.address == self.ip: continue 189 if peer.pubkey == fingerprint: 190 status_handler.ITrustYouNow(peer) 193 status_handler.NotifyNewTrusted(peer, result)
|
/external/boringssl/src/crypto/bio/ |
D | pair.c | 64 BIO *peer; /* NULL if buf == NULL. member 111 peer_bio = b->peer; in bio_destroy_pair() 119 assert(peer_b->peer == bio); in bio_destroy_pair() 121 peer_b->peer = NULL; in bio_destroy_pair() 127 b->peer = NULL; in bio_destroy_pair() 144 if (b->peer) { in bio_free() 190 if (!b || !b->peer) { in BIO_zero_copy_get_read_buf() 195 peer_b = b->peer->ptr; in BIO_zero_copy_get_read_buf() 196 if (!peer_b || !peer_b->peer || peer_b->peer->ptr != b) { in BIO_zero_copy_get_read_buf() 236 if (!b || !b->peer) { in BIO_zero_copy_get_read_buf_done() [all …]
|
/external/iputils/ |
D | tftpd.c | 79 int peer; variable 189 peer = socket(from.sa.sa_family, SOCK_DGRAM, 0); in main() 190 if (peer < 0) { in main() 194 if (connect(peer, (struct sockaddr *)&from, sizeof(from)) < 0) { in main() 372 if (send(peer, dp, size + 4, confirmed) != size + 4) { in sendfile() 380 n = recv(peer, ackbuf, sizeof (ackbuf), 0); in sendfile() 398 synchnet(peer); in sendfile() 437 if (send(peer, ackbuf, 4, confirmed) != 4) { in recvfile() 445 n = recv(peer, dp, PKTSIZE, 0); in recvfile() 461 (void) synchnet(peer); in recvfile() [all …]
|
/external/iptables/libipq/ |
D | libipq.c | 107 (struct sockaddr *)&h->peer, sizeof(h->peer)); in ipq_netlink_sendto() 135 addrlen = sizeof(h->peer); in ipq_netlink_recvfrom() 168 (struct sockaddr *)&h->peer, &addrlen); in ipq_netlink_recvfrom() 173 if (addrlen != sizeof(h->peer)) { in ipq_netlink_recvfrom() 177 if (h->peer.nl_pid != 0) { in ipq_netlink_recvfrom() 248 memset(&h->peer, 0, sizeof(struct sockaddr_nl)); in ipq_create_handle() 249 h->peer.nl_family = AF_NETLINK; in ipq_create_handle() 250 h->peer.nl_pid = 0; in ipq_create_handle() 251 h->peer.nl_groups = 0; in ipq_create_handle() 346 msg.msg_name = (void *)&h->peer; in ipq_set_verdict() [all …]
|
/external/iproute2/ip/ |
D | ifcfg | 81 peer=$1 82 if [ "$peer" != "" ]; then 87 pfx="$ipaddr peer $peer" 141 elif [ "$peer" != "" ]; then 142 if ping -q -c 2 -w 4 $peer ; then 143 ip ro append default via $peer dev $dev metric 30001
|
/external/wpa_supplicant_8/src/wps/ |
D | wps_upnp_web.c | 413 static void wps_upnp_peer_del(struct upnp_wps_peer *peer) in wps_upnp_peer_del() argument 415 dl_list_del(&peer->list); in wps_upnp_peer_del() 416 if (peer->wps) in wps_upnp_peer_del() 417 wps_deinit(peer->wps); in wps_upnp_peer_del() 418 os_free(peer); in wps_upnp_peer_del() 429 struct upnp_wps_peer *peer; in web_process_get_device_info() local 439 peer = os_zalloc(sizeof(*peer)); in web_process_get_device_info() 440 if (!peer) in web_process_get_device_info() 455 peer->wps = wps_init(&cfg); in web_process_get_device_info() 456 if (peer->wps) { in web_process_get_device_info() [all …]
|
/external/v8/tools/testrunner/objects/ |
D | workpacket.py | 33 def __init__(self, peer=None, context=None, tests=None, binaries=None, argument 35 self.peer = peer 50 for shell in self.peer.shells: 64 for t in self.peer.tests:
|
/external/curl/tests/server/ |
D | tftpd.c | 200 static curl_socket_t peer = CURL_SOCKET_BAD; variable 842 peer = socket(AF_INET, SOCK_DGRAM, 0); in main() 843 if(CURL_SOCKET_BAD == peer) { in main() 848 if(connect(peer, &from.sa, sizeof(from.sa4)) < 0) { in main() 857 peer = socket(AF_INET6, SOCK_DGRAM, 0); in main() 858 if(CURL_SOCKET_BAD == peer) { in main() 863 if(connect(peer, &from.sa, sizeof(from.sa6)) < 0) { in main() 881 sclose(peer); in main() 882 peer = CURL_SOCKET_BAD; in main() 906 if((peer != sock) && (peer != CURL_SOCKET_BAD)) in main() [all …]
|
/external/parameter-framework/asio-1.10.6/include/asio/ |
D | basic_socket_acceptor.hpp | 920 void accept(basic_socket<Protocol1, SocketService>& peer, in accept() argument 925 peer, static_cast<endpoint_type*>(0), ec); in accept() 954 basic_socket<Protocol1, SocketService>& peer, in accept() argument 959 peer, static_cast<endpoint_type*>(0), ec); in accept() 1003 async_accept(basic_socket<Protocol1, SocketService>& peer, in ASIO_INITFN_RESULT_TYPE() 1012 peer, static_cast<endpoint_type*>(0), in ASIO_INITFN_RESULT_TYPE() 1040 void accept(basic_socket<protocol_type, SocketService>& peer, in accept() argument 1045 peer, &peer_endpoint, ec); in accept() 1079 basic_socket<protocol_type, SocketService>& peer, in accept() argument 1083 this->get_implementation(), peer, &peer_endpoint, ec); in accept() [all …]
|
/external/v8/tools/testrunner/network/ |
D | network_execution.py | 38 from ..objects import peer 49 return [ peer.Peer.Unpack(p) for p in data ] 168 def _TalkToPeer(self, peer): argument 171 code = sock.connect_ex((peer.address, constants.PEER_PORT)) 174 peer.runtime = None 176 packet = workpacket.WorkPacket(peer=peer, context=self.context, 191 print("\nPeer %s reports error: %s" % (peer.address, data[1])) 217 peer.runtime = time.time() - start_time 225 compression.Send([constants.UNRESPONSIVE_PEER, peer.address],
|
D | distro.py | 83 peer = peers[index] 84 if (shell.total_duration < peer.needed_work and 85 len(peer.shells) > 0 and 90 peer.AddTests(shell)
|
/external/autotest/client/site_tests/peerd_DiscoverServices/ |
D | peerd_DiscoverServices.py | 85 peer = self._peerd.has_peer(self.PEER_ID) 86 if peer is None: 89 logging.debug('Found peer=%s', peer) 90 if len(peer.services) != len(self.PEER_SERVICES): 92 len(peer.services), len(self.PEER_SERVICES)) 96 for s in peer.services:
|
/external/wpa_supplicant_8/src/p2p/ |
D | p2p_go_neg.c | 138 struct p2p_device *peer) in p2p_build_go_neg_req() argument 158 p2p_buf_add_public_action_hdr(buf, P2P_GO_NEG_REQ, peer->dialog_token); in p2p_build_go_neg_req() 162 if (peer->flags & P2P_DEV_PREFER_PERSISTENT_GROUP) { in p2p_build_go_neg_req() 164 if (peer->flags & P2P_DEV_PREFER_PERSISTENT_RECONN) in p2p_build_go_neg_req() 174 p2p_buf_add_go_intent(buf, (p2p->go_intent << 1) | peer->tie_breaker); in p2p_build_go_neg_req() 183 p2p_buf_add_device_info(buf, p2p, peer); in p2p_build_go_neg_req() 192 pw_id = p2p_wps_method_pw_id(peer->wps_method); in p2p_build_go_neg_req() 193 if (peer->oob_pw_id) in p2p_build_go_neg_req() 194 pw_id = peer->oob_pw_id; in p2p_build_go_neg_req() 272 struct p2p_device *peer, in p2p_build_go_neg_resp() argument [all …]
|
/external/ipsec-tools/src/racoon/ |
D | sainfo.c | 79 getsainfo(loc, rmt, peer, remoteid) 80 const vchar_t *loc, *rmt, *peer; 87 if (peer == NULL) 104 if (peer == NULL) 107 dpeer = ipsecdoi_id2str(peer); 133 if (ipsecdoi_chkcmpids(peer, s->id_i, 0))
|
/external/dnsmasq/src/ |
D | tftp.c | 46 struct sockaddr_in addr, peer; in tftp_request() local 72 msg.msg_name = &peer; in tftp_request() 73 msg.msg_namelen = sizeof(peer); in tftp_request() 153 transfer->peer = peer; in tftp_request() 194 len = tftp_err(ERR_ILL, packet, _("unsupported request from %s"), inet_ntoa(peer.sin_addr)); in tftp_request() 244 strncat(daemon->namebuff, inet_ntoa(peer.sin_addr), (MAXDNAME-1) - strlen(daemon->namebuff)); in tftp_request() 276 (struct sockaddr *)&peer, sizeof(peer)) == -1 && errno == EINTR); in tftp_request() 282 …my_syslog(MS_TFTP | LOG_INFO, _("TFTP sent %s to %s"), daemon->namebuff, inet_ntoa(peer.sin_addr)); in tftp_request() 418 inet_ntoa(transfer->peer.sin_addr)); in check_tftp_listeners() 448 transfer->file->filename, inet_ntoa(transfer->peer.sin_addr)); in check_tftp_listeners() [all …]
|
/external/autotest/client/site_tests/video_WebRtcPeerConnectionWithCamera/ |
D | control | 7 PURPOSE = "Check WebRTC local peer connection can be established" 8 CRITERIA = "This test will fail if WebRTC peer connection not established" 21 This test starts a local WebRTC call with two peer connections and ensures 23 checking both the video tag's attributes and peer connection stats
|
/external/autotest/client/cros/tendo/ |
D | peerd_dbus_helper.py | 112 peer = Peer(uuid=peer_properties[PEER_PROPERTY_ID], 115 peers.append(peer) 151 for peer in peers: 152 if peer.uuid != uuid: 154 return peer
|
/external/tcpdump/tests/ |
D | of10_p3295-vv.out | 34 peer 0x00000000 41 peer 0x00000000 48 peer 0x00000000 55 peer 0x00000000 62 peer 0x00000000 69 peer 0x00000000 76 peer 0x00000000 83 peer 0x00000000 90 peer 0x00000000 97 peer 0x00000000 [all …]
|
/external/autotest/client/site_tests/p2p_ServeFiles/ |
D | p2p_ServeFiles.py | 113 peer = host.SimpleHost(self._sim, '94:EB:2C:00:00:61', '169.254.10.55') 117 zero = zeroconf.ZeroconfDaemon(peer, 'peer') 158 self._sim.run_on_simulator(lambda: peer.tcp_forward(1234, ips[0], port)) 160 ret = self._p2p_fetch(peer.ip_addr, 1234, 'file') 165 peer.id_addr)
|