Home
last modified time | relevance | path

Searched refs:peer (Results 1 - 25 of 325) sorted by relevance

12345678910>>...13

/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/rsn_supp/
H A Dtdls.c86 static void wpa_tdls_peer_free(struct wpa_sm *sm, struct wpa_tdls_peer *peer);
88 struct wpa_tdls_peer *peer);
181 static int wpa_tdls_del_key(struct wpa_sm *sm, struct wpa_tdls_peer *peer) in wpa_tdls_del_key() argument
184 if (wpa_sm_set_key(sm, -1, WPA_ALG_NONE, peer->addr, in wpa_tdls_del_key()
186 if (wpa_sm_set_key(sm, WPA_ALG_NONE, peer->addr, in wpa_tdls_del_key()
198 static int wpa_tdls_set_key(struct wpa_sm *sm, struct wpa_tdls_peer *peer) in wpa_tdls_set_key() argument
204 if (peer->tk_set) { in wpa_tdls_set_key()
212 wpa_printf(MSG_INFO, "TDLS: TPK-TK for the peer " MACSTR_SEC in wpa_tdls_set_key()
214 MAC2STR_SEC(peer->addr)); in wpa_tdls_set_key()
220 switch (peer in wpa_tdls_set_key()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/rsn_supp/
H A Dtdls.c86 static void wpa_tdls_peer_free(struct wpa_sm *sm, struct wpa_tdls_peer *peer);
88 struct wpa_tdls_peer *peer);
178 static int wpa_tdls_del_key(struct wpa_sm *sm, struct wpa_tdls_peer *peer) in wpa_tdls_del_key() argument
180 if (wpa_sm_set_key(sm, WPA_ALG_NONE, peer->addr, in wpa_tdls_del_key()
191 static int wpa_tdls_set_key(struct wpa_sm *sm, struct wpa_tdls_peer *peer) in wpa_tdls_set_key() argument
197 if (peer->tk_set) { in wpa_tdls_set_key()
205 wpa_printf(MSG_INFO, "TDLS: TPK-TK for the peer " MACSTR in wpa_tdls_set_key()
207 MAC2STR(peer->addr)); in wpa_tdls_set_key()
213 switch (peer->cipher) { in wpa_tdls_set_key()
228 wpa_printf(MSG_DEBUG, "TDLS: Configure pairwise key for peer " MACST in wpa_tdls_set_key()
256 struct wpa_tdls_peer *peer; wpa_tdls_tpk_send() local
320 wpa_tdls_do_teardown(struct wpa_sm *sm, struct wpa_tdls_peer *peer, u16 reason_code) wpa_tdls_do_teardown() argument
337 struct wpa_tdls_peer *peer = timeout_ctx; wpa_tdls_tpk_retry_timeout() local
382 wpa_tdls_tpk_retry_timeout_cancel(struct wpa_sm *sm, struct wpa_tdls_peer *peer, u8 action_code) wpa_tdls_tpk_retry_timeout_cancel() argument
408 wpa_tdls_generate_tpk(struct wpa_tdls_peer *peer, const u8 *own_addr, const u8 *bssid) wpa_tdls_generate_tpk() argument
580 wpa_supplicant_verify_tdls_mic(u8 trans_seq, struct wpa_tdls_peer *peer, const u8 *lnkid, const u8 *timeoutie, const struct wpa_tdls_ftie *ftie) wpa_supplicant_verify_tdls_mic() argument
609 wpa_supplicant_verify_tdls_mic_teardown( u8 trans_seq, u16 rcode, u8 dtoken, struct wpa_tdls_peer *peer, const u8 *lnkid, const struct wpa_tdls_ftie *ftie) wpa_supplicant_verify_tdls_mic_teardown() argument
635 struct wpa_tdls_peer *peer = timeout_ctx; wpa_tdls_tpk_timeout() local
664 wpa_tdls_peer_remove_from_list(struct wpa_sm *sm, struct wpa_tdls_peer *peer) wpa_tdls_peer_remove_from_list() argument
690 wpa_tdls_peer_clear(struct wpa_sm *sm, struct wpa_tdls_peer *peer) wpa_tdls_peer_clear() argument
723 wpa_tdls_peer_free(struct wpa_sm *sm, struct wpa_tdls_peer *peer) wpa_tdls_peer_free() argument
731 wpa_tdls_linkid(struct wpa_sm *sm, struct wpa_tdls_peer *peer, struct wpa_tdls_lnkid *lnkid) wpa_tdls_linkid() argument
750 struct wpa_tdls_peer *peer; wpa_tdls_send_teardown() local
843 struct wpa_tdls_peer *peer; wpa_tdls_teardown_link() local
869 wpa_tdls_disable_peer_link(struct wpa_sm *sm, struct wpa_tdls_peer *peer) wpa_tdls_disable_peer_link() argument
879 struct wpa_tdls_peer *peer; wpa_tdls_disable_unreachable_link() local
912 struct wpa_tdls_peer *peer; wpa_tdls_get_link_status() local
935 struct wpa_tdls_peer *peer = NULL; wpa_tdls_recv_teardown() local
1035 struct wpa_tdls_peer *peer; wpa_tdls_add_peer() local
1062 wpa_tdls_send_tpk_m1(struct wpa_sm *sm, struct wpa_tdls_peer *peer) wpa_tdls_send_tpk_m1() argument
1243 wpa_tdls_send_tpk_m2(struct wpa_sm *sm, const unsigned char *src_addr, u8 dtoken, struct wpa_tdls_lnkid *lnkid, const struct wpa_tdls_peer *peer) wpa_tdls_send_tpk_m2() argument
1334 wpa_tdls_send_tpk_m3(struct wpa_sm *sm, const unsigned char *src_addr, u8 dtoken, struct wpa_tdls_lnkid *lnkid, const struct wpa_tdls_peer *peer) wpa_tdls_send_tpk_m3() argument
1432 wpa_tdls_send_discovery_response(struct wpa_sm *sm, struct wpa_tdls_peer *peer, u8 dialog_token) wpa_tdls_send_discovery_response() argument
1524 struct wpa_tdls_peer *peer; wpa_tdls_process_discovery_request() local
1586 copy_supp_rates(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) copy_supp_rates() argument
1602 copy_peer_ht_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) copy_peer_ht_capab() argument
1628 copy_peer_vht_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) copy_peer_vht_capab() argument
1654 copy_peer_ext_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) copy_peer_ext_capab() argument
1678 copy_peer_wmm_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) copy_peer_wmm_capab() argument
1703 copy_peer_supp_channels(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) copy_peer_supp_channels() argument
1729 copy_peer_supp_oper_classes(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) copy_peer_supp_oper_classes() argument
1755 wpa_tdls_addset_peer(struct wpa_sm *sm, struct wpa_tdls_peer *peer, int add) wpa_tdls_addset_peer() argument
1788 struct wpa_tdls_peer *peer; wpa_tdls_process_tpk_m1() local
2146 wpa_tdls_enable_link(struct wpa_sm *sm, struct wpa_tdls_peer *peer) wpa_tdls_enable_link() argument
2184 struct wpa_tdls_peer *peer; wpa_tdls_process_tpk_m2() local
2473 struct wpa_tdls_peer *peer; wpa_tdls_process_tpk_m3() local
2654 struct wpa_tdls_peer *peer; wpa_tdls_start() local
2706 struct wpa_tdls_peer *peer; wpa_tdls_remove() local
2844 struct wpa_tdls_peer *peer, *tmp; wpa_tdls_teardown_peers() local
2869 struct wpa_tdls_peer *peer, *tmp; wpa_tdls_remove_peers() local
2995 struct wpa_tdls_peer *peer; wpa_tdls_enable_chan_switch() local
3042 struct wpa_tdls_peer *peer; wpa_tdls_disable_chan_switch() local
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/
H A Dibss_rsn.c30 struct ibss_rsn_peer *peer; in ibss_rsn_get_peer() local
32 for (peer = ibss_rsn->peers; peer; peer = peer->next) in ibss_rsn_get_peer()
33 if (os_memcmp(addr, peer->addr, ETH_ALEN) == 0) in ibss_rsn_get_peer()
35 return peer; in ibss_rsn_get_peer()
39 static void ibss_rsn_free(struct ibss_rsn_peer *peer) in ibss_rsn_free() argument
41 eloop_cancel_timeout(ibss_rsn_auth_timeout, peer, NULL); in ibss_rsn_free()
42 wpa_auth_sta_deinit(peer in ibss_rsn_free()
50 struct ibss_rsn_peer *peer = ctx; supp_set_state() local
57 struct ibss_rsn_peer *peer = ctx; supp_get_state() local
65 struct ibss_rsn_peer *peer = ctx; supp_ether_send() local
116 struct ibss_rsn_peer *peer = ctx; supp_get_beacon_ie() local
130 ibss_check_rsn_completed(struct ibss_rsn_peer *peer) ibss_check_rsn_completed() argument
154 struct ibss_rsn_peer *peer = ctx; supp_set_key() local
190 struct ibss_rsn_peer *peer = ctx; supp_get_network_ctx() local
223 ibss_rsn_supp_init(struct ibss_rsn_peer *peer, const u8 *own_addr, const u8 *psk) ibss_rsn_supp_init() argument
344 struct ibss_rsn_peer *peer; auth_set_key() local
384 struct ibss_rsn_peer *peer; auth_for_each_sta() local
397 ibss_set_sta_authorized(struct ibss_rsn *ibss_rsn, struct ibss_rsn_peer *peer, int authorized) ibss_set_sta_authorized() argument
427 struct ibss_rsn_peer *peer = ibss_rsn_get_peer(ibss_rsn, addr); auth_set_eapol() local
483 ibss_rsn_auth_init(struct ibss_rsn *ibss_rsn, struct ibss_rsn_peer *peer) ibss_rsn_auth_init() argument
539 ibss_rsn_is_auth_started(struct ibss_rsn_peer * peer) ibss_rsn_is_auth_started() argument
549 struct ibss_rsn_peer *peer; ibss_rsn_peer_init() local
588 struct ibss_rsn_peer *peer = eloop_ctx; ibss_rsn_auth_timeout() local
605 struct ibss_rsn_peer *peer; ibss_rsn_start() local
638 ibss_rsn_peer_authenticated(struct ibss_rsn *ibss_rsn, struct ibss_rsn_peer *peer, int reason) ibss_rsn_peer_authenticated() argument
664 struct ibss_rsn_peer *peer, *prev; ibss_rsn_stop() local
723 struct ibss_rsn_peer *peer, *prev; ibss_rsn_deinit() local
785 ibss_rsn_process_rx_eapol(struct ibss_rsn *ibss_rsn, struct ibss_rsn_peer *peer, const u8 *buf, size_t len) ibss_rsn_process_rx_eapol() argument
826 struct ibss_rsn_peer *peer; ibss_rsn_rx_eapol() local
865 ibss_rsn_handle_auth_1_of_2(struct ibss_rsn *ibss_rsn, struct ibss_rsn_peer *peer, const u8* addr) ibss_rsn_handle_auth_1_of_2() argument
934 struct ibss_rsn_peer *peer; ibss_rsn_handle_auth() local
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/
H A Dibss_rsn.c30 struct ibss_rsn_peer *peer; in ibss_rsn_get_peer() local
32 for (peer = ibss_rsn->peers; peer; peer = peer->next) in ibss_rsn_get_peer()
33 if (os_memcmp(addr, peer->addr, ETH_ALEN) == 0) in ibss_rsn_get_peer()
35 return peer; in ibss_rsn_get_peer()
39 static void ibss_rsn_free(struct ibss_rsn_peer *peer) in ibss_rsn_free() argument
41 eloop_cancel_timeout(ibss_rsn_auth_timeout, peer, NULL); in ibss_rsn_free()
42 wpa_auth_sta_deinit(peer in ibss_rsn_free()
50 struct ibss_rsn_peer *peer = ctx; supp_set_state() local
57 struct ibss_rsn_peer *peer = ctx; supp_get_state() local
65 struct ibss_rsn_peer *peer = ctx; supp_ether_send() local
110 struct ibss_rsn_peer *peer = ctx; supp_get_beacon_ie() local
123 ibss_check_rsn_completed(struct ibss_rsn_peer *peer) ibss_check_rsn_completed() argument
144 struct ibss_rsn_peer *peer = ctx; supp_set_key() local
175 struct ibss_rsn_peer *peer = ctx; supp_get_network_ctx() local
202 ibss_rsn_supp_init(struct ibss_rsn_peer *peer, const u8 *own_addr, const u8 *psk) ibss_rsn_supp_init() argument
317 struct ibss_rsn_peer *peer; auth_set_key() local
353 struct ibss_rsn_peer *peer; auth_for_each_sta() local
366 ibss_set_sta_authorized(struct ibss_rsn *ibss_rsn, struct ibss_rsn_peer *peer, int authorized) ibss_set_sta_authorized() argument
396 struct ibss_rsn_peer *peer = ibss_rsn_get_peer(ibss_rsn, addr); auth_set_eapol() local
452 ibss_rsn_auth_init(struct ibss_rsn *ibss_rsn, struct ibss_rsn_peer *peer) ibss_rsn_auth_init() argument
512 ibss_rsn_is_auth_started(struct ibss_rsn_peer * peer) ibss_rsn_is_auth_started() argument
522 struct ibss_rsn_peer *peer; ibss_rsn_peer_init() local
561 struct ibss_rsn_peer *peer = eloop_ctx; ibss_rsn_auth_timeout() local
578 struct ibss_rsn_peer *peer; ibss_rsn_start() local
611 ibss_rsn_peer_authenticated(struct ibss_rsn *ibss_rsn, struct ibss_rsn_peer *peer, int reason) ibss_rsn_peer_authenticated() argument
637 struct ibss_rsn_peer *peer, *prev; ibss_rsn_stop() local
696 struct ibss_rsn_peer *peer, *prev; ibss_rsn_deinit() local
758 ibss_rsn_process_rx_eapol(struct ibss_rsn *ibss_rsn, struct ibss_rsn_peer *peer, const u8 *buf, size_t len) ibss_rsn_process_rx_eapol() argument
799 struct ibss_rsn_peer *peer; ibss_rsn_rx_eapol() local
838 ibss_rsn_handle_auth_1_of_2(struct ibss_rsn *ibss_rsn, struct ibss_rsn_peer *peer, const u8* addr) ibss_rsn_handle_auth_1_of_2() argument
903 struct ibss_rsn_peer *peer; ibss_rsn_handle_auth() local
[all...]
/third_party/libwebsockets/lib/misc/
H A Dpeer-limits.c31 struct lws_peer *peer) in __lws_peer_remove_from_peer_wait_list()
36 if (*p == peer) { in __lws_peer_remove_from_peer_wait_list()
65 struct lws_peer *peer) in __lws_peer_add_to_peer_wait_list()
67 __lws_peer_remove_from_peer_wait_list(context, peer); in __lws_peer_add_to_peer_wait_list()
69 peer->peer_wait_list = context->peer_wait_list; in __lws_peer_add_to_peer_wait_list()
70 context->peer_wait_list = peer; in __lws_peer_add_to_peer_wait_list()
82 struct lws_peer *peer; in lws_get_or_create_peer() local
95 /* eg, udp doesn't have to have a peer */ in lws_get_or_create_peer()
118 lws_context_lock(context, "peer search"); /* <======================= */ in lws_get_or_create_peer()
140 lwsl_info("%s: creating new peer\ in lws_get_or_create_peer()
30 __lws_peer_remove_from_peer_wait_list(struct lws_context *context, struct lws_peer *peer) __lws_peer_remove_from_peer_wait_list() argument
64 __lws_peer_add_to_peer_wait_list(struct lws_context *context, struct lws_peer *peer) __lws_peer_add_to_peer_wait_list() argument
169 __lws_peer_destroy(struct lws_context *context, struct lws_peer *peer) __lws_peer_destroy() argument
218 lws_peer_add_wsi(struct lws_context *context, struct lws_peer *peer, struct lws *wsi) lws_peer_add_wsi() argument
236 struct lws_peer *peer; lws_peer_dump_from_wsi() local
258 lws_peer_track_wsi_close(struct lws_context *context, struct lws_peer *peer) lws_peer_track_wsi_close() argument
290 lws_peer_confirm_ah_attach_ok(struct lws_context *context, struct lws_peer *peer) lws_peer_confirm_ah_attach_ok() argument
308 lws_peer_track_ah_detach(struct lws_context *context, struct lws_peer *peer) lws_peer_track_ah_detach() argument
[all...]
/third_party/openssl/test/helpers/
H A Dhandshake.c732 static int create_peer(PEER *peer, SSL_CTX *ctx) in create_peer() argument
743 peer->ssl = ssl; in create_peer()
744 peer->write_buf = write_buf; in create_peer()
745 peer->read_buf = read_buf; in create_peer()
746 peer->write_buf_len = peer->read_buf_len = peer_buffer_size; in create_peer()
755 static void peer_free_data(PEER *peer) in peer_free_data() argument
757 SSL_free(peer->ssl); in peer_free_data()
758 OPENSSL_free(peer->write_buf); in peer_free_data()
759 OPENSSL_free(peer in peer_free_data()
766 do_handshake_step(PEER *peer) do_handshake_step() argument
797 do_app_data_step(PEER *peer) do_app_data_step() argument
860 do_reneg_setup_step(const SSL_TEST_CTX *test_ctx, PEER *peer) do_reneg_setup_step() argument
1039 do_shutdown_step(PEER *peer) do_shutdown_step() argument
1119 do_connect_step(const SSL_TEST_CTX *test_ctx, PEER *peer, connect_phase_t phase) do_connect_step() argument
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/pae/
H A Dieee802_1x_kay.c193 mi = body->peer + i; in ieee802_1x_mka_dump_peer_body()
321 struct ieee802_1x_kay_peer *peer; in get_peer_mi() local
323 dl_list_for_each(peer, peers, struct ieee802_1x_kay_peer, list) { in get_peer_mi()
324 if (os_memcmp(peer->mi, mi, MI_LEN) == 0) in get_peer_mi()
325 return peer; in get_peer_mi()
383 struct ieee802_1x_kay_peer *peer; in ieee802_1x_kay_get_peer() local
385 peer = ieee802_1x_kay_get_live_peer(participant, mi); in ieee802_1x_kay_get_peer()
386 if (peer) in ieee802_1x_kay_get_peer()
387 return peer; in ieee802_1x_kay_get_peer()
443 struct ieee802_1x_kay_peer *peer; in ieee802_1x_kay_get_peer_sci() local
576 ieee802_1x_kay_dump_peer(struct ieee802_1x_kay_peer *peer) ieee802_1x_kay_dump_peer() argument
586 struct ieee802_1x_kay_peer *peer; ieee802_1x_kay_create_peer() local
611 struct ieee802_1x_kay_peer *peer; ieee802_1x_kay_create_live_peer() local
649 struct ieee802_1x_kay_peer *peer; ieee802_1x_kay_create_potential_peer() local
671 struct ieee802_1x_kay_peer *peer; ieee802_1x_kay_move_live_peer() local
797 struct ieee802_1x_kay_peer *peer; ieee802_1x_mka_decode_basic_body() local
928 struct ieee802_1x_kay_peer *peer; ieee802_1x_mka_get_live_peer_length() local
947 struct ieee802_1x_kay_peer *peer; ieee802_1x_mka_encode_live_peer_body() local
988 struct ieee802_1x_kay_peer *peer; ieee802_1x_mka_get_potential_peer_length() local
1007 struct ieee802_1x_kay_peer *peer; ieee802_1x_mka_encode_potential_peer_body() local
1116 struct ieee802_1x_kay_peer *peer; ieee802_1x_mka_decode_live_peer_body() local
1370 struct ieee802_1x_kay_peer *peer; ieee802_1x_mka_decode_sak_use_body() local
1648 struct ieee802_1x_kay_peer *peer; ieee802_1x_mka_decode_dist_sak_body() local
2081 struct ieee802_1x_kay_peer *peer; ieee802_1x_kay_generate_new_sak() local
2213 compare_priorities(const struct ieee802_1x_kay_peer *peer, const struct ieee802_1x_kay_peer *other) compare_priorities() argument
2232 struct ieee802_1x_kay_peer *peer; ieee802_1x_kay_elect_key_server() local
2334 struct ieee802_1x_kay_peer *peer; ieee802_1x_kay_decide_macsec_use() local
2505 struct ieee802_1x_kay_peer *peer, *pre_peer; ieee802_1x_participant_timer() local
3168 struct ieee802_1x_kay_peer *peer; ieee802_1x_kay_decode_mkpdu() local
3761 struct ieee802_1x_kay_peer *peer; ieee802_1x_kay_delete_mka() local
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/pae/
H A Dieee802_1x_kay.c193 mi = body->peer + i; in ieee802_1x_mka_dump_peer_body()
321 struct ieee802_1x_kay_peer *peer; in get_peer_mi() local
323 dl_list_for_each(peer, peers, struct ieee802_1x_kay_peer, list) { in get_peer_mi()
324 if (os_memcmp(peer->mi, mi, MI_LEN) == 0) in get_peer_mi()
325 return peer; in get_peer_mi()
383 struct ieee802_1x_kay_peer *peer; in ieee802_1x_kay_get_peer() local
385 peer = ieee802_1x_kay_get_live_peer(participant, mi); in ieee802_1x_kay_get_peer()
386 if (peer) in ieee802_1x_kay_get_peer()
387 return peer; in ieee802_1x_kay_get_peer()
443 struct ieee802_1x_kay_peer *peer; in ieee802_1x_kay_get_peer_sci() local
576 ieee802_1x_kay_dump_peer(struct ieee802_1x_kay_peer *peer) ieee802_1x_kay_dump_peer() argument
586 struct ieee802_1x_kay_peer *peer; ieee802_1x_kay_create_peer() local
611 struct ieee802_1x_kay_peer *peer; ieee802_1x_kay_create_live_peer() local
649 struct ieee802_1x_kay_peer *peer; ieee802_1x_kay_create_potential_peer() local
671 struct ieee802_1x_kay_peer *peer; ieee802_1x_kay_move_live_peer() local
797 struct ieee802_1x_kay_peer *peer; ieee802_1x_mka_decode_basic_body() local
928 struct ieee802_1x_kay_peer *peer; ieee802_1x_mka_get_live_peer_length() local
947 struct ieee802_1x_kay_peer *peer; ieee802_1x_mka_encode_live_peer_body() local
988 struct ieee802_1x_kay_peer *peer; ieee802_1x_mka_get_potential_peer_length() local
1007 struct ieee802_1x_kay_peer *peer; ieee802_1x_mka_encode_potential_peer_body() local
1116 struct ieee802_1x_kay_peer *peer; ieee802_1x_mka_decode_live_peer_body() local
1383 struct ieee802_1x_kay_peer *peer; ieee802_1x_mka_decode_sak_use_body() local
1685 struct ieee802_1x_kay_peer *peer; ieee802_1x_mka_decode_dist_sak_body() local
2118 struct ieee802_1x_kay_peer *peer; ieee802_1x_kay_generate_new_sak() local
2250 compare_priorities(const struct ieee802_1x_kay_peer *peer, const struct ieee802_1x_kay_peer *other) compare_priorities() argument
2269 struct ieee802_1x_kay_peer *peer; ieee802_1x_kay_elect_key_server() local
2371 struct ieee802_1x_kay_peer *peer; ieee802_1x_kay_decide_macsec_use() local
2542 struct ieee802_1x_kay_peer *peer, *pre_peer; ieee802_1x_participant_timer() local
3205 struct ieee802_1x_kay_peer *peer; ieee802_1x_kay_decode_mkpdu() local
3798 struct ieee802_1x_kay_peer *peer; ieee802_1x_kay_delete_mka() local
[all...]
/third_party/node/deps/openssl/openssl/crypto/bio/
H A Dbss_bio.c12 * kind, handled by the same thread (i.e. the "peer" is actually ourselves,
59 BIO *peer; /* NULL if buf == NULL. If peer != NULL, then member
60 * peer->ptr is also a bio_bio_st, and its
61 * "peer" member points back to us. peer !=
63 /* This is for what we write (i.e. reading uses peer's struct): */
64 int closed; /* valid iff peer != NULL */
65 size_t len; /* valid iff buf != NULL; 0 if peer == NULL */
69 size_t request; /* valid iff peer !
[all...]
/third_party/openssl/crypto/bio/
H A Dbss_bio.c12 * kind, handled by the same thread (i.e. the "peer" is actually ourselves,
59 BIO *peer; /* NULL if buf == NULL. If peer != NULL, then member
60 * peer->ptr is also a bio_bio_st, and its
61 * "peer" member points back to us. peer !=
63 /* This is for what we write (i.e. reading uses peer's struct): */
64 int closed; /* valid iff peer != NULL */
65 size_t len; /* valid iff buf != NULL; 0 if peer == NULL */
69 size_t request; /* valid iff peer !
[all...]
/third_party/curl/lib/vquic/
H A Dvquic-tls.c150 /* OpenSSL always tries to verify the peer, this only says whether it should in curl_ossl_init_ctx()
214 struct ssl_peer *peer, in curl_ossl_init_ssl()
230 if(peer->sni) { in curl_ossl_init_ssl()
231 if(!SSL_set_tlsext_host_name(ctx->ssl, peer->sni)) { in curl_ossl_init_ssl()
260 struct ssl_peer *peer, in curl_gtls_init_ctx()
282 peer, ctx->gtls, pverifyresult); in curl_gtls_init_ctx()
428 /* verifying the peer without any CA certificates won't work so in curl_wssl_init_ctx()
463 struct ssl_peer *peer, in curl_wssl_init_ssl()
480 if(peer->sni) { in curl_wssl_init_ssl()
482 peer in curl_wssl_init_ssl()
212 curl_ossl_init_ssl(struct quic_tls_ctx *ctx, struct Curl_easy *data, struct ssl_peer *peer, const char *alpn, size_t alpn_len, void *user_data) curl_ossl_init_ssl() argument
257 curl_gtls_init_ctx(struct quic_tls_ctx *ctx, struct Curl_cfilter *cf, struct Curl_easy *data, struct ssl_peer *peer, const char *alpn, size_t alpn_len, Curl_vquic_tls_ctx_setup *ctx_setup, void *user_data) curl_gtls_init_ctx() argument
461 curl_wssl_init_ssl(struct quic_tls_ctx *ctx, struct Curl_easy *data, struct ssl_peer *peer, const char *alpn, size_t alpn_len, void *user_data) curl_wssl_init_ssl() argument
489 Curl_vquic_tls_init(struct quic_tls_ctx *ctx, struct Curl_cfilter *cf, struct Curl_easy *data, struct ssl_peer *peer, const char *alpn, size_t alpn_len, Curl_vquic_tls_ctx_setup *ctx_setup, void *user_data) Curl_vquic_tls_init() argument
566 Curl_vquic_tls_verify_peer(struct quic_tls_ctx *ctx, struct Curl_cfilter *cf, struct Curl_easy *data, struct ssl_peer *peer) Curl_vquic_tls_verify_peer() argument
[all...]
/third_party/node/deps/npm/node_modules/@npmcli/arborist/lib/
H A Dplace-dep.js3 // peer dependencies.
23 const peerEntrySets = require('./peer-entry-sets.js')
64 // where the dep is not a peer dep.
79 // Then we check under b, and can't, because of the optional peer dep.
83 if (!target.isTop && targetEdge && targetEdge.peer) {
92 // children. This way, we can know that it's a peer dep, and
109 // We place (a), and get a peer of (c) along with it.
111 // of the conflicting peer from (b)->(d)->(c@2). In that case, we
119 // we found a place this can go, along with all its peer friends.
172 // now we have a target, a tree of CanPlaceDep results for the peer grou
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/wps/
H A Dwps_upnp_web.c413 static void wps_upnp_peer_del(struct upnp_wps_peer *peer) in wps_upnp_peer_del() argument
415 dl_list_del(&peer->list); in wps_upnp_peer_del()
416 if (peer->wps) in wps_upnp_peer_del()
417 wps_deinit(peer->wps); in wps_upnp_peer_del()
418 os_free(peer); in wps_upnp_peer_del()
429 struct upnp_wps_peer *peer; in web_process_get_device_info() local
439 peer = os_zalloc(sizeof(*peer)); in web_process_get_device_info()
440 if (!peer) in web_process_get_device_info()
455 peer in web_process_get_device_info()
499 struct upnp_wps_peer *tmp, *peer; web_process_put_message() local
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/wps/
H A Dwps_upnp_web.c413 static void wps_upnp_peer_del(struct upnp_wps_peer *peer) in wps_upnp_peer_del() argument
415 dl_list_del(&peer->list); in wps_upnp_peer_del()
416 if (peer->wps) in wps_upnp_peer_del()
417 wps_deinit(peer->wps); in wps_upnp_peer_del()
418 os_free(peer); in wps_upnp_peer_del()
429 struct upnp_wps_peer *peer; in web_process_get_device_info() local
439 peer = os_zalloc(sizeof(*peer)); in web_process_get_device_info()
440 if (!peer) in web_process_get_device_info()
455 peer in web_process_get_device_info()
499 struct upnp_wps_peer *tmp, *peer; web_process_put_message() local
[all...]
/third_party/curl/tests/server/
H A Dtftpd.c199 static curl_socket_t peer = CURL_SOCKET_BAD; variable
791 peer = socket(AF_INET, SOCK_DGRAM, 0); in main()
792 if(CURL_SOCKET_BAD == peer) { in main()
797 if(connect(peer, &from.sa, sizeof(from.sa4)) < 0) { in main()
806 peer = socket(AF_INET6, SOCK_DGRAM, 0); in main()
807 if(CURL_SOCKET_BAD == peer) { in main()
812 if(connect(peer, &from.sa, sizeof(from.sa6)) < 0) { in main()
830 sclose(peer); in main()
831 peer = CURL_SOCKET_BAD; in main()
850 if((peer ! in main()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/p2p/
H A Dp2p_go_neg.c54 p2p_info(p2p, "Mismatching country (ours=%c%c peer's=%c%c)", in p2p_peer_channels_check()
66 p2p_info(p2p, "Invalid peer Channel List"); in p2p_peer_channels_check()
79 p2p_dbg(p2p, "Own reg_classes %d peer reg_classes %d intersection reg_classes %d", in p2p_peer_channels_check()
138 struct p2p_device *peer) in p2p_build_go_neg_req()
158 p2p_buf_add_public_action_hdr(buf, P2P_GO_NEG_REQ, peer->dialog_token); in p2p_build_go_neg_req()
162 if (peer->flags & P2P_DEV_PREFER_PERSISTENT_GROUP) { in p2p_build_go_neg_req()
164 if (peer->flags & P2P_DEV_PREFER_PERSISTENT_RECONN) in p2p_build_go_neg_req()
174 p2p_buf_add_go_intent(buf, (p2p->go_intent << 1) | peer->tie_breaker); in p2p_build_go_neg_req()
183 p2p_buf_add_device_info(buf, p2p, peer); in p2p_build_go_neg_req()
192 pw_id = p2p_wps_method_pw_id(peer in p2p_build_go_neg_req()
137 p2p_build_go_neg_req(struct p2p_data *p2p, struct p2p_device *peer) p2p_build_go_neg_req() argument
271 p2p_build_go_neg_resp(struct p2p_data *p2p, struct p2p_device *peer, u8 dialog_token, u8 status, u8 tie_breaker) p2p_build_go_neg_resp() argument
1069 p2p_build_go_neg_conf(struct p2p_data *p2p, struct p2p_device *peer, u8 dialog_token, u8 status, const u8 *resp_chan, int go) p2p_build_go_neg_conf() argument
[all...]
H A Dp2p_invitation.c19 struct p2p_device *peer, in p2p_build_invitation_req()
56 peer->dialog_token++; in p2p_build_invitation_req()
57 if (peer->dialog_token == 0) in p2p_build_invitation_req()
58 peer->dialog_token = 1; in p2p_build_invitation_req()
60 peer->dialog_token); in p2p_build_invitation_req()
71 !(peer->flags & P2P_DEV_NO_PREF_CHAN)) in p2p_build_invitation_req()
81 dev_addr = peer->info.p2p_device_addr; in p2p_build_invitation_req()
85 p2p_buf_add_device_info(buf, p2p, peer); in p2p_build_invitation_req()
109 struct p2p_device *peer, in p2p_build_invitation_resp()
199 p2p_dbg(p2p, "Invitation Request from unknown peer " MACST in p2p_process_invitation_req()
18 p2p_build_invitation_req(struct p2p_data *p2p, struct p2p_device *peer, const u8 *go_dev_addr, int dev_pw_id) p2p_build_invitation_req() argument
108 p2p_build_invitation_resp(struct p2p_data *p2p, struct p2p_device *peer, u8 dialog_token, u8 status, const u8 *group_bssid, u8 reg_class, u8 channel, struct p2p_channels *channels) p2p_build_invitation_resp() argument
648 p2p_invite(struct p2p_data *p2p, const u8 *peer, enum p2p_invite_role role, const u8 *bssid, const u8 *ssid, size_t ssid_len, unsigned int force_freq, const u8 *go_dev_addr, int persistent_group, unsigned int pref_freq, int dev_pw_id) p2p_invite() argument
[all...]
/third_party/node/deps/openssl/openssl/apps/
H A Dsess_id.c51 X509 *peer = NULL; in sess_id_main() local
109 peer = SSL_SESSION_get0_peer(x); in sess_id_main()
134 if (peer == NULL) in sess_id_main()
137 X509_print(out, peer); in sess_id_main()
156 } else if (!noout && (peer != NULL)) { /* just print the certificate */ in sess_id_main()
158 i = (int)i2d_X509_bio(out, peer); in sess_id_main()
160 i = PEM_write_bio_X509(out, peer); in sess_id_main()
/third_party/openssl/apps/
H A Dsess_id.c51 X509 *peer = NULL; in sess_id_main() local
109 peer = SSL_SESSION_get0_peer(x); in sess_id_main()
134 if (peer == NULL) in sess_id_main()
137 X509_print(out, peer); in sess_id_main()
156 } else if (!noout && (peer != NULL)) { /* just print the certificate */ in sess_id_main()
158 i = (int)i2d_X509_bio(out, peer); in sess_id_main()
160 i = PEM_write_bio_X509(out, peer); in sess_id_main()
/third_party/curl/lib/vtls/
H A Dvtls.c570 if(strcasecompare(connssl->peer.hostname, check->name) && in Curl_ssl_getsessionid()
594 cf->conn->handler->scheme, connssl->peer.hostname, in Curl_ssl_getsessionid()
671 clone_host = strdup(connssl->peer.hostname); in Curl_ssl_addsessionid()
1508 void Curl_ssl_peer_cleanup(struct ssl_peer *peer) in Curl_ssl_peer_cleanup() argument
1510 if(peer->dispname != peer->hostname) in Curl_ssl_peer_cleanup()
1511 free(peer->dispname); in Curl_ssl_peer_cleanup()
1512 free(peer->sni); in Curl_ssl_peer_cleanup()
1513 free(peer->hostname); in Curl_ssl_peer_cleanup()
1514 peer in Curl_ssl_peer_cleanup()
1543 Curl_ssl_peer_init(struct ssl_peer *peer, struct Curl_cfilter *cf) Curl_ssl_peer_init() argument
[all...]
/third_party/node/deps/openssl/openssl/crypto/evp/
H A Dexchange.c377 int EVP_PKEY_derive_set_peer_ex(EVP_PKEY_CTX *ctx, EVP_PKEY *peer, in EVP_PKEY_derive_set_peer_ex() argument
399 check_ctx = EVP_PKEY_CTX_new_from_pkey(ctx->libctx, peer, ctx->propquery); in EVP_PKEY_derive_set_peer_ex()
409 * Ensure that the |peer| is provided, either natively, or as a cached in EVP_PKEY_derive_set_peer_ex()
413 * With the keymgmt we found (if we did), we try to export |peer| in EVP_PKEY_derive_set_peer_ex()
415 * export it if |tmp_keymgmt| is different from |peer|'s keymgmt) in EVP_PKEY_derive_set_peer_ex()
423 provkey = evp_pkey_export_to_provider(peer, ctx->libctx, in EVP_PKEY_derive_set_peer_ex()
454 ret = ctx->pmeth->ctrl(ctx, EVP_PKEY_CTRL_PEER_KEY, 0, peer); in EVP_PKEY_derive_set_peer_ex()
467 if (ctx->pkey->type != peer->type) { in EVP_PKEY_derive_set_peer_ex()
473 * For clarity. The error is if parameters in peer are in EVP_PKEY_derive_set_peer_ex()
479 if (!EVP_PKEY_missing_parameters(peer) in EVP_PKEY_derive_set_peer_ex()
500 EVP_PKEY_derive_set_peer(EVP_PKEY_CTX *ctx, EVP_PKEY *peer) EVP_PKEY_derive_set_peer() argument
[all...]
/third_party/openssl/crypto/evp/
H A Dexchange.c377 int EVP_PKEY_derive_set_peer_ex(EVP_PKEY_CTX *ctx, EVP_PKEY *peer, in EVP_PKEY_derive_set_peer_ex() argument
399 check_ctx = EVP_PKEY_CTX_new_from_pkey(ctx->libctx, peer, ctx->propquery); in EVP_PKEY_derive_set_peer_ex()
409 * Ensure that the |peer| is provided, either natively, or as a cached in EVP_PKEY_derive_set_peer_ex()
413 * With the keymgmt we found (if we did), we try to export |peer| in EVP_PKEY_derive_set_peer_ex()
415 * export it if |tmp_keymgmt| is different from |peer|'s keymgmt) in EVP_PKEY_derive_set_peer_ex()
423 provkey = evp_pkey_export_to_provider(peer, ctx->libctx, in EVP_PKEY_derive_set_peer_ex()
454 ret = ctx->pmeth->ctrl(ctx, EVP_PKEY_CTRL_PEER_KEY, 0, peer); in EVP_PKEY_derive_set_peer_ex()
467 if (ctx->pkey->type != peer->type) { in EVP_PKEY_derive_set_peer_ex()
473 * For clarity. The error is if parameters in peer are in EVP_PKEY_derive_set_peer_ex()
479 if (!EVP_PKEY_missing_parameters(peer) in EVP_PKEY_derive_set_peer_ex()
500 EVP_PKEY_derive_set_peer(EVP_PKEY_CTX *ctx, EVP_PKEY *peer) EVP_PKEY_derive_set_peer() argument
[all...]
/third_party/pulseaudio/src/pulsecore/
H A Dpipe.c77 struct sockaddr_in addr, peer; in pipe() local
123 len = sizeof(peer); in pipe()
124 filedes[1] = accept(listener, (struct sockaddr*)&peer, &len); in pipe()
137 if ((addr.sin_port != peer.sin_port) || (addr.sin_addr.s_addr != peer.sin_addr.s_addr)) in pipe()
/third_party/mbedtls/library/
H A Dpsa_crypto_pake.c151 /* The only two JPAKE user/peer identifiers supported in built-in implementation. */
160 uint8_t *peer = NULL, *user = NULL; in mbedtls_psa_pake_setup() local
196 peer = mbedtls_calloc(1, peer_len); in mbedtls_psa_pake_setup()
197 if (peer == NULL) { in mbedtls_psa_pake_setup()
214 status = psa_crypto_driver_pake_get_peer(inputs, peer, in mbedtls_psa_pake_setup()
241 memcmp(peer, jpake_server_id, actual_peer_len) == 0) { in mbedtls_psa_pake_setup()
245 memcmp(peer, jpake_client_id, actual_peer_len) == 0) { in mbedtls_psa_pake_setup()
260 /* Role has been set, release user/peer buffers. */ in mbedtls_psa_pake_setup()
261 mbedtls_free(user); mbedtls_free(peer); in mbedtls_psa_pake_setup()
272 mbedtls_free(user); mbedtls_free(peer); in mbedtls_psa_pake_setup()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/p2p/
H A Dp2p_go_neg.c66 p2p_info(p2p, "Mismatching country (ours=** peer's=**)"); in p2p_peer_channels_check()
76 p2p_info(p2p, "Invalid peer Channel List"); in p2p_peer_channels_check()
89 p2p_dbg(p2p, "Own reg_classes %d peer reg_classes %d intersection reg_classes %d", in p2p_peer_channels_check()
148 struct p2p_device *peer) in p2p_build_go_neg_req()
168 p2p_buf_add_public_action_hdr(buf, P2P_GO_NEG_REQ, peer->dialog_token); in p2p_build_go_neg_req()
172 if (peer->flags & P2P_DEV_PREFER_PERSISTENT_GROUP) { in p2p_build_go_neg_req()
174 if (peer->flags & P2P_DEV_PREFER_PERSISTENT_RECONN) in p2p_build_go_neg_req()
184 p2p_buf_add_go_intent(buf, (p2p->go_intent << 1) | peer->tie_breaker); in p2p_build_go_neg_req()
193 p2p_buf_add_device_info(buf, p2p, peer); in p2p_build_go_neg_req()
202 pw_id = p2p_wps_method_pw_id(peer in p2p_build_go_neg_req()
147 p2p_build_go_neg_req(struct p2p_data *p2p, struct p2p_device *peer) p2p_build_go_neg_req() argument
281 p2p_build_go_neg_resp(struct p2p_data *p2p, struct p2p_device *peer, u8 dialog_token, u8 status, u8 tie_breaker) p2p_build_go_neg_resp() argument
1167 p2p_build_go_neg_conf(struct p2p_data *p2p, struct p2p_device *peer, u8 dialog_token, u8 status, const u8 *resp_chan, int go) p2p_build_go_neg_conf() argument
[all...]

Completed in 24 milliseconds

12345678910>>...13