Home
last modified time | relevance | path

Searched refs:peer (Results 1 – 25 of 138) sorted by relevance

123456

/external/wpa_supplicant_8/src/rsn_supp/
Dtdls.c84 static void wpa_tdls_peer_free(struct wpa_sm *sm, struct wpa_tdls_peer *peer);
86 struct wpa_tdls_peer *peer);
175 static int wpa_tdls_del_key(struct wpa_sm *sm, struct wpa_tdls_peer *peer) in wpa_tdls_del_key() argument
177 if (wpa_sm_set_key(sm, WPA_ALG_NONE, peer->addr, in wpa_tdls_del_key()
188 static int wpa_tdls_set_key(struct wpa_sm *sm, struct wpa_tdls_peer *peer) in wpa_tdls_set_key() argument
196 switch (peer->cipher) { in wpa_tdls_set_key()
211 if (wpa_sm_set_key(sm, alg, peer->addr, -1, 1, in wpa_tdls_set_key()
212 rsc, sizeof(rsc), peer->tpk.tk, key_len) < 0) { in wpa_tdls_set_key()
236 struct wpa_tdls_peer *peer; in wpa_tdls_tpk_send() local
258 for (peer = sm->tdls; peer; peer = peer->next) { in wpa_tdls_tpk_send()
[all …]
/external/wpa_supplicant_8/wpa_supplicant/
Dibss_rsn.c30 struct ibss_rsn_peer *peer; in ibss_rsn_get_peer() local
32 for (peer = ibss_rsn->peers; peer; peer = peer->next) in ibss_rsn_get_peer()
33 if (os_memcmp(addr, peer->addr, ETH_ALEN) == 0) in ibss_rsn_get_peer()
35 return peer; in ibss_rsn_get_peer()
39 static void ibss_rsn_free(struct ibss_rsn_peer *peer) in ibss_rsn_free() argument
41 eloop_cancel_timeout(ibss_rsn_auth_timeout, peer, NULL); in ibss_rsn_free()
42 wpa_auth_sta_deinit(peer->auth); in ibss_rsn_free()
43 wpa_sm_deinit(peer->supp); in ibss_rsn_free()
44 os_free(peer); in ibss_rsn_free()
50 struct ibss_rsn_peer *peer = ctx; in supp_set_state() local
[all …]
DREADME-P2P88 The optional dev_id option can be used to specify a single P2P peer to
131 Flush P2P peer table and state.
135 p2p_prov_disc <peer device address> <display|keypad|pbc> [join|auto]
137 Send P2P provision discovery request to the specified peer. The
138 parameters for this command are the P2P device address of the peer and
140 02:01:02:03:04:05 display" would request the peer to display a PIN for
141 us and "p2p_prov_disc 02:01:02:03:04:05 keypad" would request the peer
148 out whether the peer device is operating as a GO and if so, use
151 p2p_connect <peer device address> <pbc|pin|PIN#|p2ps> [display|keypad|p2ps]
155 Start P2P group formation with a discovered P2P peer. This includes
[all …]
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/spdy/
DSpdy3ConnectionTest.java59 private final MockSpdyPeer peer = new MockSpdyPeer(); field in Spdy3ConnectionTest
62 peer.close(); in tearDown()
67 peer.acceptFrame(); // SYN_STREAM in clientCreatesStreamAndServerReplies()
68 peer.sendFrame() in clientCreatesStreamAndServerReplies()
70 peer.sendFrame().data(true, 1, new Buffer().writeUtf8("robot"), 5); in clientCreatesStreamAndServerReplies()
71 peer.acceptFrame(); // DATA in clientCreatesStreamAndServerReplies()
72 peer.play(); in clientCreatesStreamAndServerReplies()
75 SpdyConnection connection = connection(peer, SPDY3); in clientCreatesStreamAndServerReplies()
85 MockSpdyPeer.InFrame synStream = peer.takeFrame(); in clientCreatesStreamAndServerReplies()
93 MockSpdyPeer.InFrame requestData = peer.takeFrame(); in clientCreatesStreamAndServerReplies()
[all …]
DHttp2ConnectionTest.java50 private final MockSpdyPeer peer = new MockSpdyPeer(); field in Http2ConnectionTest
53 peer.close(); in tearDown()
57 peer.setVariantAndClient(HTTP_2, false); in serverPingsClientHttp2()
60 peer.sendFrame().ping(false, 2, 3); in serverPingsClientHttp2()
61 peer.acceptFrame(); // PING in serverPingsClientHttp2()
62 peer.play(); in serverPingsClientHttp2()
65 connection(peer, HTTP_2); in serverPingsClientHttp2()
68 MockSpdyPeer.InFrame ping = peer.takeFrame(); in serverPingsClientHttp2()
77 peer.setVariantAndClient(HTTP_2, false); in clientPingsServerHttp2()
80 peer.acceptFrame(); // PING in clientPingsServerHttp2()
[all …]
/external/wpa_supplicant_8/src/pae/
Dieee802_1x_kay.c166 mi = body->peer + i; in ieee802_1x_mka_dump_peer_body()
291 struct ieee802_1x_kay_peer *peer; in get_peer_mi() local
293 dl_list_for_each(peer, peers, struct ieee802_1x_kay_peer, list) { in get_peer_mi()
294 if (os_memcmp(peer->mi, mi, MI_LEN) == 0) in get_peer_mi()
295 return peer; in get_peer_mi()
343 struct ieee802_1x_kay_peer *peer; in ieee802_1x_kay_get_peer() local
345 peer = get_peer_mi(&participant->live_peers, mi); in ieee802_1x_kay_get_peer()
346 if (peer) in ieee802_1x_kay_get_peer()
347 return peer; in ieee802_1x_kay_get_peer()
391 struct ieee802_1x_kay_peer *peer; in ieee802_1x_kay_get_peer_sci() local
[all …]
/external/v8/tools/testrunner/server/
Dstatus_handler.py36 def _StatusQuery(peer, query): argument
38 code = sock.connect_ex((peer.address, constants.STATUS_PORT))
55 def RequestTrustedPubkeys(peer, server): argument
56 pubkey_list = _StatusQuery(peer, [constants.LIST_TRUSTED_PUBKEYS])
59 result = _StatusQuery(peer, [constants.GET_SIGNED_PUBKEY, pubkey])
63 def NotifyNewTrusted(peer, data): argument
64 _StatusQuery(peer, [constants.NOTIFY_NEW_TRUSTED] + data)
67 def ITrustYouNow(peer): argument
68 _StatusQuery(peer, [constants.TRUST_YOU_NOW])
71 def TryTransitiveTrust(peer, pubkey, server): argument
[all …]
Dmain.py151 def AddPeer(self, peer): argument
154 if p.address == peer.address:
156 self.peers.append(peer)
157 if peer.trusted:
158 status_handler.ITrustYouNow(peer)
187 for peer in self.peers:
188 if peer.address == self.ip: continue
189 if peer.pubkey == fingerprint:
190 status_handler.ITrustYouNow(peer)
193 status_handler.NotifyNewTrusted(peer, result)
/external/boringssl/src/crypto/bio/
Dpair.c64 BIO *peer; /* NULL if buf == NULL. member
111 peer_bio = b->peer; in bio_destroy_pair()
119 assert(peer_b->peer == bio); in bio_destroy_pair()
121 peer_b->peer = NULL; in bio_destroy_pair()
127 b->peer = NULL; in bio_destroy_pair()
144 if (b->peer) { in bio_free()
190 if (!b || !b->peer) { in BIO_zero_copy_get_read_buf()
196 peer_b = b->peer->ptr; in BIO_zero_copy_get_read_buf()
197 if (!peer_b || !peer_b->peer || peer_b->peer->ptr != b) { in BIO_zero_copy_get_read_buf()
239 if (!b || !b->peer) { in BIO_zero_copy_get_read_buf_done()
[all …]
/external/iputils/
Dtftpd.c79 int peer; variable
189 peer = socket(from.sa.sa_family, SOCK_DGRAM, 0); in main()
190 if (peer < 0) { in main()
194 if (connect(peer, (struct sockaddr *)&from, sizeof(from)) < 0) { in main()
372 if (send(peer, dp, size + 4, confirmed) != size + 4) { in sendfile()
380 n = recv(peer, ackbuf, sizeof (ackbuf), 0); in sendfile()
398 synchnet(peer); in sendfile()
437 if (send(peer, ackbuf, 4, confirmed) != 4) { in recvfile()
445 n = recv(peer, dp, PKTSIZE, 0); in recvfile()
461 (void) synchnet(peer); in recvfile()
[all …]
/external/iptables/libipq/
Dlibipq.c107 (struct sockaddr *)&h->peer, sizeof(h->peer)); in ipq_netlink_sendto()
135 addrlen = sizeof(h->peer); in ipq_netlink_recvfrom()
168 (struct sockaddr *)&h->peer, &addrlen); in ipq_netlink_recvfrom()
173 if (addrlen != sizeof(h->peer)) { in ipq_netlink_recvfrom()
177 if (h->peer.nl_pid != 0) { in ipq_netlink_recvfrom()
248 memset(&h->peer, 0, sizeof(struct sockaddr_nl)); in ipq_create_handle()
249 h->peer.nl_family = AF_NETLINK; in ipq_create_handle()
250 h->peer.nl_pid = 0; in ipq_create_handle()
251 h->peer.nl_groups = 0; in ipq_create_handle()
346 msg.msg_name = (void *)&h->peer; in ipq_set_verdict()
[all …]
/external/iproute2/ip/
Difcfg81 peer=$1
82 if [ "$peer" != "" ]; then
87 pfx="$ipaddr peer $peer"
141 elif [ "$peer" != "" ]; then
142 if ping -q -c 2 -w 4 $peer ; then
143 ip ro append default via $peer dev $dev metric 30001
/external/v8/tools/testrunner/objects/
Dworkpacket.py33 def __init__(self, peer=None, context=None, tests=None, binaries=None, argument
35 self.peer = peer
50 for shell in self.peer.shells:
64 for t in self.peer.tests:
/external/wpa_supplicant_8/src/p2p/
Dp2p_go_neg.c138 struct p2p_device *peer) in p2p_build_go_neg_req() argument
158 p2p_buf_add_public_action_hdr(buf, P2P_GO_NEG_REQ, peer->dialog_token); in p2p_build_go_neg_req()
162 if (peer->flags & P2P_DEV_PREFER_PERSISTENT_GROUP) { in p2p_build_go_neg_req()
164 if (peer->flags & P2P_DEV_PREFER_PERSISTENT_RECONN) in p2p_build_go_neg_req()
174 p2p_buf_add_go_intent(buf, (p2p->go_intent << 1) | peer->tie_breaker); in p2p_build_go_neg_req()
183 p2p_buf_add_device_info(buf, p2p, peer); in p2p_build_go_neg_req()
189 pw_id = p2p_wps_method_pw_id(peer->wps_method); in p2p_build_go_neg_req()
190 if (peer->oob_pw_id) in p2p_build_go_neg_req()
191 pw_id = peer->oob_pw_id; in p2p_build_go_neg_req()
269 struct p2p_device *peer, in p2p_build_go_neg_resp() argument
[all …]
Dp2p_invitation.c19 struct p2p_device *peer, in p2p_build_invitation_req() argument
56 peer->dialog_token++; in p2p_build_invitation_req()
57 if (peer->dialog_token == 0) in p2p_build_invitation_req()
58 peer->dialog_token = 1; in p2p_build_invitation_req()
60 peer->dialog_token); in p2p_build_invitation_req()
71 !(peer->flags & P2P_DEV_NO_PREF_CHAN)) in p2p_build_invitation_req()
81 dev_addr = peer->info.p2p_device_addr; in p2p_build_invitation_req()
85 p2p_buf_add_device_info(buf, p2p, peer); in p2p_build_invitation_req()
106 struct p2p_device *peer, in p2p_build_invitation_resp() argument
633 int p2p_invite(struct p2p_data *p2p, const u8 *peer, enum p2p_invite_role role, in p2p_invite() argument
[all …]
/external/v8/tools/testrunner/network/
Dnetwork_execution.py38 from ..objects import peer
49 return [ peer.Peer.Unpack(p) for p in data ]
170 def _TalkToPeer(self, peer): argument
173 code = sock.connect_ex((peer.address, constants.PEER_PORT))
176 peer.runtime = None
178 packet = workpacket.WorkPacket(peer=peer, context=self.context,
193 print("\nPeer %s reports error: %s" % (peer.address, data[1]))
219 peer.runtime = time.time() - start_time
227 compression.Send([constants.UNRESPONSIVE_PEER, peer.address],
Ddistro.py83 peer = peers[index]
84 if (shell.total_duration < peer.needed_work and
85 len(peer.shells) > 0 and
90 peer.AddTests(shell)
/external/boringssl/src/ssl/
Dssl_asn1.c203 if (in->peer && !in->peer_sha256_valid) { in SSL_SESSION_to_bytes_full()
205 int len = i2d_X509(in->peer, NULL); in SSL_SESSION_to_bytes_full()
214 if (buf != NULL && i2d_X509(in->peer, &buf) < 0) { in SSL_SESSION_to_bytes_full()
415 CBS peer, sid_ctx, peer_sha256, original_handshake_hash; in d2i_SSL_SESSION() local
439 !CBS_get_optional_asn1(&session, &peer, &has_peer, kPeerTag) || in d2i_SSL_SESSION()
533 X509_free(ret->peer); in d2i_SSL_SESSION()
534 ret->peer = NULL; in d2i_SSL_SESSION()
537 ptr = CBS_data(&peer); in d2i_SSL_SESSION()
538 ret->peer = d2i_X509(NULL, &ptr, CBS_len(&peer)); in d2i_SSL_SESSION()
539 if (ret->peer == NULL) { in d2i_SSL_SESSION()
[all …]
/external/ipsec-tools/src/racoon/
Dsainfo.c79 getsainfo(loc, rmt, peer, remoteid)
80 const vchar_t *loc, *rmt, *peer;
87 if (peer == NULL)
104 if (peer == NULL)
107 dpeer = ipsecdoi_id2str(peer);
133 if (ipsecdoi_chkcmpids(peer, s->id_i, 0))
/external/dnsmasq/src/
Dtftp.c46 struct sockaddr_in addr, peer; in tftp_request() local
72 msg.msg_name = &peer; in tftp_request()
73 msg.msg_namelen = sizeof(peer); in tftp_request()
153 transfer->peer = peer; in tftp_request()
194 len = tftp_err(ERR_ILL, packet, _("unsupported request from %s"), inet_ntoa(peer.sin_addr)); in tftp_request()
244 strncat(daemon->namebuff, inet_ntoa(peer.sin_addr), (MAXDNAME-1) - strlen(daemon->namebuff)); in tftp_request()
276 (struct sockaddr *)&peer, sizeof(peer)) == -1 && errno == EINTR); in tftp_request()
282 …my_syslog(MS_TFTP | LOG_INFO, _("TFTP sent %s to %s"), daemon->namebuff, inet_ntoa(peer.sin_addr)); in tftp_request()
418 inet_ntoa(transfer->peer.sin_addr)); in check_tftp_listeners()
448 transfer->file->filename, inet_ntoa(transfer->peer.sin_addr)); in check_tftp_listeners()
[all …]
/external/tcpdump/tests/
Dof10_p3295-vv.out34 peer 0x00000000
41 peer 0x00000000
48 peer 0x00000000
55 peer 0x00000000
62 peer 0x00000000
69 peer 0x00000000
76 peer 0x00000000
83 peer 0x00000000
90 peer 0x00000000
97 peer 0x00000000
[all …]
/external/openssh/
Dkex.c281 sshbuf_reset(kex->peer); in kex_input_newkeys()
334 if ((r = sshbuf_put(kex->peer, ptr, dlen)) != 0) in kex_input_kexinit()
380 if ((kex->peer = sshbuf_new()) == NULL || in kex_new()
445 sshbuf_free(kex->peer); in kex_free()
558 proposals_match(char *my[PROPOSAL_MAX], char *peer[PROPOSAL_MAX]) in proposals_match()
569 if ((p = strchr(peer[*idx], ',')) != NULL) in proposals_match()
571 if (strcmp(my[*idx], peer[*idx]) != 0) { in proposals_match()
573 my[*idx], peer[*idx]); in proposals_match()
586 char **my = NULL, **peer = NULL; in kex_choose_conf() local
593 (r = kex_buf2prop(kex->peer, &first_kex_follows, &peer)) != 0) in kex_choose_conf()
[all …]
/external/boringssl/src/crypto/evp/
Devp_ctx.c375 int EVP_PKEY_derive_set_peer(EVP_PKEY_CTX *ctx, EVP_PKEY *peer) { in EVP_PKEY_derive_set_peer() argument
392 ret = ctx->pmeth->ctrl(ctx, EVP_PKEY_CTRL_PEER_KEY, 0, peer); in EVP_PKEY_derive_set_peer()
407 if (ctx->pkey->type != peer->type) { in EVP_PKEY_derive_set_peer()
417 if (!EVP_PKEY_missing_parameters(peer) && in EVP_PKEY_derive_set_peer()
418 !EVP_PKEY_cmp_parameters(ctx->pkey, peer)) { in EVP_PKEY_derive_set_peer()
425 ctx->peerkey = peer; in EVP_PKEY_derive_set_peer()
427 ret = ctx->pmeth->ctrl(ctx, EVP_PKEY_CTRL_PEER_KEY, 1, peer); in EVP_PKEY_derive_set_peer()
434 EVP_PKEY_up_ref(peer); in EVP_PKEY_derive_set_peer()
/external/strace/
Dsocketutils.c216 uint32_t peer = 0; in unix_parse_response() local
240 peer = *(uint32_t *)RTA_DATA(attr); in unix_parse_response()
249 if (peer || path_len) { in unix_parse_response()
251 if (peer) in unix_parse_response()
252 tprintf("->%u", peer); in unix_parse_response()
/external/wpa_supplicant_8/src/wps/
Dwps_upnp_web.c419 struct upnp_wps_peer *peer; in web_process_get_device_info() local
429 peer = &iface->peer; in web_process_get_device_info()
439 if (peer->wps) in web_process_get_device_info()
440 wps_deinit(peer->wps); in web_process_get_device_info()
446 peer->wps = wps_init(&cfg); in web_process_get_device_info()
447 if (peer->wps) { in web_process_get_device_info()
449 *reply = wps_get_msg(peer->wps, &op_code); in web_process_get_device_info()
451 wps_deinit(peer->wps); in web_process_get_device_info()
452 peer->wps = NULL; in web_process_get_device_info()
490 res = wps_process_msg(iface->peer.wps, WSC_UPnP, msg); in web_process_put_message()
[all …]

123456