/external/wpa_supplicant_8/src/rsn_supp/ |
D | tdls.c | 84 static void wpa_tdls_peer_free(struct wpa_sm *sm, struct wpa_tdls_peer *peer); 86 struct wpa_tdls_peer *peer); 175 static int wpa_tdls_del_key(struct wpa_sm *sm, struct wpa_tdls_peer *peer) in wpa_tdls_del_key() argument 177 if (wpa_sm_set_key(sm, WPA_ALG_NONE, peer->addr, in wpa_tdls_del_key() 188 static int wpa_tdls_set_key(struct wpa_sm *sm, struct wpa_tdls_peer *peer) in wpa_tdls_set_key() argument 196 switch (peer->cipher) { in wpa_tdls_set_key() 211 if (wpa_sm_set_key(sm, alg, peer->addr, -1, 1, in wpa_tdls_set_key() 212 rsc, sizeof(rsc), peer->tpk.tk, key_len) < 0) { in wpa_tdls_set_key() 236 struct wpa_tdls_peer *peer; in wpa_tdls_tpk_send() local 258 for (peer = sm->tdls; peer; peer = peer->next) { in wpa_tdls_tpk_send() [all …]
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | ibss_rsn.c | 30 struct ibss_rsn_peer *peer; in ibss_rsn_get_peer() local 32 for (peer = ibss_rsn->peers; peer; peer = peer->next) in ibss_rsn_get_peer() 33 if (os_memcmp(addr, peer->addr, ETH_ALEN) == 0) in ibss_rsn_get_peer() 35 return peer; in ibss_rsn_get_peer() 39 static void ibss_rsn_free(struct ibss_rsn_peer *peer) in ibss_rsn_free() argument 41 eloop_cancel_timeout(ibss_rsn_auth_timeout, peer, NULL); in ibss_rsn_free() 42 wpa_auth_sta_deinit(peer->auth); in ibss_rsn_free() 43 wpa_sm_deinit(peer->supp); in ibss_rsn_free() 44 os_free(peer); in ibss_rsn_free() 50 struct ibss_rsn_peer *peer = ctx; in supp_set_state() local [all …]
|
D | README-P2P | 88 The optional dev_id option can be used to specify a single P2P peer to 131 Flush P2P peer table and state. 135 p2p_prov_disc <peer device address> <display|keypad|pbc> [join|auto] 137 Send P2P provision discovery request to the specified peer. The 138 parameters for this command are the P2P device address of the peer and 140 02:01:02:03:04:05 display" would request the peer to display a PIN for 141 us and "p2p_prov_disc 02:01:02:03:04:05 keypad" would request the peer 148 out whether the peer device is operating as a GO and if so, use 151 p2p_connect <peer device address> <pbc|pin|PIN#|p2ps> [display|keypad|p2ps] 155 Start P2P group formation with a discovered P2P peer. This includes [all …]
|
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/spdy/ |
D | Spdy3ConnectionTest.java | 59 private final MockSpdyPeer peer = new MockSpdyPeer(); field in Spdy3ConnectionTest 62 peer.close(); in tearDown() 67 peer.acceptFrame(); // SYN_STREAM in clientCreatesStreamAndServerReplies() 68 peer.sendFrame() in clientCreatesStreamAndServerReplies() 70 peer.sendFrame().data(true, 1, new Buffer().writeUtf8("robot"), 5); in clientCreatesStreamAndServerReplies() 71 peer.acceptFrame(); // DATA in clientCreatesStreamAndServerReplies() 72 peer.play(); in clientCreatesStreamAndServerReplies() 75 SpdyConnection connection = connection(peer, SPDY3); in clientCreatesStreamAndServerReplies() 85 MockSpdyPeer.InFrame synStream = peer.takeFrame(); in clientCreatesStreamAndServerReplies() 93 MockSpdyPeer.InFrame requestData = peer.takeFrame(); in clientCreatesStreamAndServerReplies() [all …]
|
D | Http2ConnectionTest.java | 50 private final MockSpdyPeer peer = new MockSpdyPeer(); field in Http2ConnectionTest 53 peer.close(); in tearDown() 57 peer.setVariantAndClient(HTTP_2, false); in serverPingsClientHttp2() 60 peer.sendFrame().ping(false, 2, 3); in serverPingsClientHttp2() 61 peer.acceptFrame(); // PING in serverPingsClientHttp2() 62 peer.play(); in serverPingsClientHttp2() 65 connection(peer, HTTP_2); in serverPingsClientHttp2() 68 MockSpdyPeer.InFrame ping = peer.takeFrame(); in serverPingsClientHttp2() 77 peer.setVariantAndClient(HTTP_2, false); in clientPingsServerHttp2() 80 peer.acceptFrame(); // PING in clientPingsServerHttp2() [all …]
|
/external/wpa_supplicant_8/src/pae/ |
D | ieee802_1x_kay.c | 166 mi = body->peer + i; in ieee802_1x_mka_dump_peer_body() 291 struct ieee802_1x_kay_peer *peer; in get_peer_mi() local 293 dl_list_for_each(peer, peers, struct ieee802_1x_kay_peer, list) { in get_peer_mi() 294 if (os_memcmp(peer->mi, mi, MI_LEN) == 0) in get_peer_mi() 295 return peer; in get_peer_mi() 343 struct ieee802_1x_kay_peer *peer; in ieee802_1x_kay_get_peer() local 345 peer = get_peer_mi(&participant->live_peers, mi); in ieee802_1x_kay_get_peer() 346 if (peer) in ieee802_1x_kay_get_peer() 347 return peer; in ieee802_1x_kay_get_peer() 391 struct ieee802_1x_kay_peer *peer; in ieee802_1x_kay_get_peer_sci() local [all …]
|
/external/v8/tools/testrunner/server/ |
D | status_handler.py | 36 def _StatusQuery(peer, query): argument 38 code = sock.connect_ex((peer.address, constants.STATUS_PORT)) 55 def RequestTrustedPubkeys(peer, server): argument 56 pubkey_list = _StatusQuery(peer, [constants.LIST_TRUSTED_PUBKEYS]) 59 result = _StatusQuery(peer, [constants.GET_SIGNED_PUBKEY, pubkey]) 63 def NotifyNewTrusted(peer, data): argument 64 _StatusQuery(peer, [constants.NOTIFY_NEW_TRUSTED] + data) 67 def ITrustYouNow(peer): argument 68 _StatusQuery(peer, [constants.TRUST_YOU_NOW]) 71 def TryTransitiveTrust(peer, pubkey, server): argument [all …]
|
D | main.py | 151 def AddPeer(self, peer): argument 154 if p.address == peer.address: 156 self.peers.append(peer) 157 if peer.trusted: 158 status_handler.ITrustYouNow(peer) 187 for peer in self.peers: 188 if peer.address == self.ip: continue 189 if peer.pubkey == fingerprint: 190 status_handler.ITrustYouNow(peer) 193 status_handler.NotifyNewTrusted(peer, result)
|
/external/boringssl/src/crypto/bio/ |
D | pair.c | 64 BIO *peer; /* NULL if buf == NULL. member 111 peer_bio = b->peer; in bio_destroy_pair() 119 assert(peer_b->peer == bio); in bio_destroy_pair() 121 peer_b->peer = NULL; in bio_destroy_pair() 127 b->peer = NULL; in bio_destroy_pair() 144 if (b->peer) { in bio_free() 190 if (!b || !b->peer) { in BIO_zero_copy_get_read_buf() 196 peer_b = b->peer->ptr; in BIO_zero_copy_get_read_buf() 197 if (!peer_b || !peer_b->peer || peer_b->peer->ptr != b) { in BIO_zero_copy_get_read_buf() 239 if (!b || !b->peer) { in BIO_zero_copy_get_read_buf_done() [all …]
|
/external/iputils/ |
D | tftpd.c | 79 int peer; variable 189 peer = socket(from.sa.sa_family, SOCK_DGRAM, 0); in main() 190 if (peer < 0) { in main() 194 if (connect(peer, (struct sockaddr *)&from, sizeof(from)) < 0) { in main() 372 if (send(peer, dp, size + 4, confirmed) != size + 4) { in sendfile() 380 n = recv(peer, ackbuf, sizeof (ackbuf), 0); in sendfile() 398 synchnet(peer); in sendfile() 437 if (send(peer, ackbuf, 4, confirmed) != 4) { in recvfile() 445 n = recv(peer, dp, PKTSIZE, 0); in recvfile() 461 (void) synchnet(peer); in recvfile() [all …]
|
/external/iptables/libipq/ |
D | libipq.c | 107 (struct sockaddr *)&h->peer, sizeof(h->peer)); in ipq_netlink_sendto() 135 addrlen = sizeof(h->peer); in ipq_netlink_recvfrom() 168 (struct sockaddr *)&h->peer, &addrlen); in ipq_netlink_recvfrom() 173 if (addrlen != sizeof(h->peer)) { in ipq_netlink_recvfrom() 177 if (h->peer.nl_pid != 0) { in ipq_netlink_recvfrom() 248 memset(&h->peer, 0, sizeof(struct sockaddr_nl)); in ipq_create_handle() 249 h->peer.nl_family = AF_NETLINK; in ipq_create_handle() 250 h->peer.nl_pid = 0; in ipq_create_handle() 251 h->peer.nl_groups = 0; in ipq_create_handle() 346 msg.msg_name = (void *)&h->peer; in ipq_set_verdict() [all …]
|
/external/iproute2/ip/ |
D | ifcfg | 81 peer=$1 82 if [ "$peer" != "" ]; then 87 pfx="$ipaddr peer $peer" 141 elif [ "$peer" != "" ]; then 142 if ping -q -c 2 -w 4 $peer ; then 143 ip ro append default via $peer dev $dev metric 30001
|
/external/v8/tools/testrunner/objects/ |
D | workpacket.py | 33 def __init__(self, peer=None, context=None, tests=None, binaries=None, argument 35 self.peer = peer 50 for shell in self.peer.shells: 64 for t in self.peer.tests:
|
/external/wpa_supplicant_8/src/p2p/ |
D | p2p_go_neg.c | 138 struct p2p_device *peer) in p2p_build_go_neg_req() argument 158 p2p_buf_add_public_action_hdr(buf, P2P_GO_NEG_REQ, peer->dialog_token); in p2p_build_go_neg_req() 162 if (peer->flags & P2P_DEV_PREFER_PERSISTENT_GROUP) { in p2p_build_go_neg_req() 164 if (peer->flags & P2P_DEV_PREFER_PERSISTENT_RECONN) in p2p_build_go_neg_req() 174 p2p_buf_add_go_intent(buf, (p2p->go_intent << 1) | peer->tie_breaker); in p2p_build_go_neg_req() 183 p2p_buf_add_device_info(buf, p2p, peer); in p2p_build_go_neg_req() 189 pw_id = p2p_wps_method_pw_id(peer->wps_method); in p2p_build_go_neg_req() 190 if (peer->oob_pw_id) in p2p_build_go_neg_req() 191 pw_id = peer->oob_pw_id; in p2p_build_go_neg_req() 269 struct p2p_device *peer, in p2p_build_go_neg_resp() argument [all …]
|
D | p2p_invitation.c | 19 struct p2p_device *peer, in p2p_build_invitation_req() argument 56 peer->dialog_token++; in p2p_build_invitation_req() 57 if (peer->dialog_token == 0) in p2p_build_invitation_req() 58 peer->dialog_token = 1; in p2p_build_invitation_req() 60 peer->dialog_token); in p2p_build_invitation_req() 71 !(peer->flags & P2P_DEV_NO_PREF_CHAN)) in p2p_build_invitation_req() 81 dev_addr = peer->info.p2p_device_addr; in p2p_build_invitation_req() 85 p2p_buf_add_device_info(buf, p2p, peer); in p2p_build_invitation_req() 106 struct p2p_device *peer, in p2p_build_invitation_resp() argument 633 int p2p_invite(struct p2p_data *p2p, const u8 *peer, enum p2p_invite_role role, in p2p_invite() argument [all …]
|
/external/v8/tools/testrunner/network/ |
D | network_execution.py | 38 from ..objects import peer 49 return [ peer.Peer.Unpack(p) for p in data ] 170 def _TalkToPeer(self, peer): argument 173 code = sock.connect_ex((peer.address, constants.PEER_PORT)) 176 peer.runtime = None 178 packet = workpacket.WorkPacket(peer=peer, context=self.context, 193 print("\nPeer %s reports error: %s" % (peer.address, data[1])) 219 peer.runtime = time.time() - start_time 227 compression.Send([constants.UNRESPONSIVE_PEER, peer.address],
|
D | distro.py | 83 peer = peers[index] 84 if (shell.total_duration < peer.needed_work and 85 len(peer.shells) > 0 and 90 peer.AddTests(shell)
|
/external/boringssl/src/ssl/ |
D | ssl_asn1.c | 203 if (in->peer && !in->peer_sha256_valid) { in SSL_SESSION_to_bytes_full() 205 int len = i2d_X509(in->peer, NULL); in SSL_SESSION_to_bytes_full() 214 if (buf != NULL && i2d_X509(in->peer, &buf) < 0) { in SSL_SESSION_to_bytes_full() 415 CBS peer, sid_ctx, peer_sha256, original_handshake_hash; in d2i_SSL_SESSION() local 439 !CBS_get_optional_asn1(&session, &peer, &has_peer, kPeerTag) || in d2i_SSL_SESSION() 533 X509_free(ret->peer); in d2i_SSL_SESSION() 534 ret->peer = NULL; in d2i_SSL_SESSION() 537 ptr = CBS_data(&peer); in d2i_SSL_SESSION() 538 ret->peer = d2i_X509(NULL, &ptr, CBS_len(&peer)); in d2i_SSL_SESSION() 539 if (ret->peer == NULL) { in d2i_SSL_SESSION() [all …]
|
/external/ipsec-tools/src/racoon/ |
D | sainfo.c | 79 getsainfo(loc, rmt, peer, remoteid) 80 const vchar_t *loc, *rmt, *peer; 87 if (peer == NULL) 104 if (peer == NULL) 107 dpeer = ipsecdoi_id2str(peer); 133 if (ipsecdoi_chkcmpids(peer, s->id_i, 0))
|
/external/dnsmasq/src/ |
D | tftp.c | 46 struct sockaddr_in addr, peer; in tftp_request() local 72 msg.msg_name = &peer; in tftp_request() 73 msg.msg_namelen = sizeof(peer); in tftp_request() 153 transfer->peer = peer; in tftp_request() 194 len = tftp_err(ERR_ILL, packet, _("unsupported request from %s"), inet_ntoa(peer.sin_addr)); in tftp_request() 244 strncat(daemon->namebuff, inet_ntoa(peer.sin_addr), (MAXDNAME-1) - strlen(daemon->namebuff)); in tftp_request() 276 (struct sockaddr *)&peer, sizeof(peer)) == -1 && errno == EINTR); in tftp_request() 282 …my_syslog(MS_TFTP | LOG_INFO, _("TFTP sent %s to %s"), daemon->namebuff, inet_ntoa(peer.sin_addr)); in tftp_request() 418 inet_ntoa(transfer->peer.sin_addr)); in check_tftp_listeners() 448 transfer->file->filename, inet_ntoa(transfer->peer.sin_addr)); in check_tftp_listeners() [all …]
|
/external/tcpdump/tests/ |
D | of10_p3295-vv.out | 34 peer 0x00000000 41 peer 0x00000000 48 peer 0x00000000 55 peer 0x00000000 62 peer 0x00000000 69 peer 0x00000000 76 peer 0x00000000 83 peer 0x00000000 90 peer 0x00000000 97 peer 0x00000000 [all …]
|
/external/openssh/ |
D | kex.c | 281 sshbuf_reset(kex->peer); in kex_input_newkeys() 334 if ((r = sshbuf_put(kex->peer, ptr, dlen)) != 0) in kex_input_kexinit() 380 if ((kex->peer = sshbuf_new()) == NULL || in kex_new() 445 sshbuf_free(kex->peer); in kex_free() 558 proposals_match(char *my[PROPOSAL_MAX], char *peer[PROPOSAL_MAX]) in proposals_match() 569 if ((p = strchr(peer[*idx], ',')) != NULL) in proposals_match() 571 if (strcmp(my[*idx], peer[*idx]) != 0) { in proposals_match() 573 my[*idx], peer[*idx]); in proposals_match() 586 char **my = NULL, **peer = NULL; in kex_choose_conf() local 593 (r = kex_buf2prop(kex->peer, &first_kex_follows, &peer)) != 0) in kex_choose_conf() [all …]
|
/external/boringssl/src/crypto/evp/ |
D | evp_ctx.c | 375 int EVP_PKEY_derive_set_peer(EVP_PKEY_CTX *ctx, EVP_PKEY *peer) { in EVP_PKEY_derive_set_peer() argument 392 ret = ctx->pmeth->ctrl(ctx, EVP_PKEY_CTRL_PEER_KEY, 0, peer); in EVP_PKEY_derive_set_peer() 407 if (ctx->pkey->type != peer->type) { in EVP_PKEY_derive_set_peer() 417 if (!EVP_PKEY_missing_parameters(peer) && in EVP_PKEY_derive_set_peer() 418 !EVP_PKEY_cmp_parameters(ctx->pkey, peer)) { in EVP_PKEY_derive_set_peer() 425 ctx->peerkey = peer; in EVP_PKEY_derive_set_peer() 427 ret = ctx->pmeth->ctrl(ctx, EVP_PKEY_CTRL_PEER_KEY, 1, peer); in EVP_PKEY_derive_set_peer() 434 EVP_PKEY_up_ref(peer); in EVP_PKEY_derive_set_peer()
|
/external/strace/ |
D | socketutils.c | 216 uint32_t peer = 0; in unix_parse_response() local 240 peer = *(uint32_t *)RTA_DATA(attr); in unix_parse_response() 249 if (peer || path_len) { in unix_parse_response() 251 if (peer) in unix_parse_response() 252 tprintf("->%u", peer); in unix_parse_response()
|
/external/wpa_supplicant_8/src/wps/ |
D | wps_upnp_web.c | 419 struct upnp_wps_peer *peer; in web_process_get_device_info() local 429 peer = &iface->peer; in web_process_get_device_info() 439 if (peer->wps) in web_process_get_device_info() 440 wps_deinit(peer->wps); in web_process_get_device_info() 446 peer->wps = wps_init(&cfg); in web_process_get_device_info() 447 if (peer->wps) { in web_process_get_device_info() 449 *reply = wps_get_msg(peer->wps, &op_code); in web_process_get_device_info() 451 wps_deinit(peer->wps); in web_process_get_device_info() 452 peer->wps = NULL; in web_process_get_device_info() 490 res = wps_process_msg(iface->peer.wps, WSC_UPnP, msg); in web_process_put_message() [all …]
|