/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/rsn_supp/ |
H A D | tdls.c | 86 static void wpa_tdls_peer_free(struct wpa_sm *sm, struct wpa_tdls_peer *peer); 88 struct wpa_tdls_peer *peer); 181 static int wpa_tdls_del_key(struct wpa_sm *sm, struct wpa_tdls_peer *peer) in wpa_tdls_del_key() argument 184 if (wpa_sm_set_key(sm, -1, WPA_ALG_NONE, peer->addr, in wpa_tdls_del_key() 186 if (wpa_sm_set_key(sm, WPA_ALG_NONE, peer->addr, in wpa_tdls_del_key() 198 static int wpa_tdls_set_key(struct wpa_sm *sm, struct wpa_tdls_peer *peer) in wpa_tdls_set_key() argument 204 if (peer->tk_set) { in wpa_tdls_set_key() 212 wpa_printf(MSG_INFO, "TDLS: TPK-TK for the peer " MACSTR_SEC in wpa_tdls_set_key() 214 MAC2STR_SEC(peer->addr)); in wpa_tdls_set_key() 220 switch (peer in wpa_tdls_set_key() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/rsn_supp/ |
H A D | tdls.c | 86 static void wpa_tdls_peer_free(struct wpa_sm *sm, struct wpa_tdls_peer *peer); 88 struct wpa_tdls_peer *peer); 178 static int wpa_tdls_del_key(struct wpa_sm *sm, struct wpa_tdls_peer *peer) in wpa_tdls_del_key() argument 180 if (wpa_sm_set_key(sm, WPA_ALG_NONE, peer->addr, in wpa_tdls_del_key() 191 static int wpa_tdls_set_key(struct wpa_sm *sm, struct wpa_tdls_peer *peer) in wpa_tdls_set_key() argument 197 if (peer->tk_set) { in wpa_tdls_set_key() 205 wpa_printf(MSG_INFO, "TDLS: TPK-TK for the peer " MACSTR in wpa_tdls_set_key() 207 MAC2STR(peer->addr)); in wpa_tdls_set_key() 213 switch (peer->cipher) { in wpa_tdls_set_key() 228 wpa_printf(MSG_DEBUG, "TDLS: Configure pairwise key for peer " MACST in wpa_tdls_set_key() 256 struct wpa_tdls_peer *peer; wpa_tdls_tpk_send() local 320 wpa_tdls_do_teardown(struct wpa_sm *sm, struct wpa_tdls_peer *peer, u16 reason_code) wpa_tdls_do_teardown() argument 337 struct wpa_tdls_peer *peer = timeout_ctx; wpa_tdls_tpk_retry_timeout() local 382 wpa_tdls_tpk_retry_timeout_cancel(struct wpa_sm *sm, struct wpa_tdls_peer *peer, u8 action_code) wpa_tdls_tpk_retry_timeout_cancel() argument 408 wpa_tdls_generate_tpk(struct wpa_tdls_peer *peer, const u8 *own_addr, const u8 *bssid) wpa_tdls_generate_tpk() argument 580 wpa_supplicant_verify_tdls_mic(u8 trans_seq, struct wpa_tdls_peer *peer, const u8 *lnkid, const u8 *timeoutie, const struct wpa_tdls_ftie *ftie) wpa_supplicant_verify_tdls_mic() argument 609 wpa_supplicant_verify_tdls_mic_teardown( u8 trans_seq, u16 rcode, u8 dtoken, struct wpa_tdls_peer *peer, const u8 *lnkid, const struct wpa_tdls_ftie *ftie) wpa_supplicant_verify_tdls_mic_teardown() argument 635 struct wpa_tdls_peer *peer = timeout_ctx; wpa_tdls_tpk_timeout() local 664 wpa_tdls_peer_remove_from_list(struct wpa_sm *sm, struct wpa_tdls_peer *peer) wpa_tdls_peer_remove_from_list() argument 690 wpa_tdls_peer_clear(struct wpa_sm *sm, struct wpa_tdls_peer *peer) wpa_tdls_peer_clear() argument 723 wpa_tdls_peer_free(struct wpa_sm *sm, struct wpa_tdls_peer *peer) wpa_tdls_peer_free() argument 731 wpa_tdls_linkid(struct wpa_sm *sm, struct wpa_tdls_peer *peer, struct wpa_tdls_lnkid *lnkid) wpa_tdls_linkid() argument 750 struct wpa_tdls_peer *peer; wpa_tdls_send_teardown() local 843 struct wpa_tdls_peer *peer; wpa_tdls_teardown_link() local 869 wpa_tdls_disable_peer_link(struct wpa_sm *sm, struct wpa_tdls_peer *peer) wpa_tdls_disable_peer_link() argument 879 struct wpa_tdls_peer *peer; wpa_tdls_disable_unreachable_link() local 912 struct wpa_tdls_peer *peer; wpa_tdls_get_link_status() local 935 struct wpa_tdls_peer *peer = NULL; wpa_tdls_recv_teardown() local 1035 struct wpa_tdls_peer *peer; wpa_tdls_add_peer() local 1062 wpa_tdls_send_tpk_m1(struct wpa_sm *sm, struct wpa_tdls_peer *peer) wpa_tdls_send_tpk_m1() argument 1243 wpa_tdls_send_tpk_m2(struct wpa_sm *sm, const unsigned char *src_addr, u8 dtoken, struct wpa_tdls_lnkid *lnkid, const struct wpa_tdls_peer *peer) wpa_tdls_send_tpk_m2() argument 1334 wpa_tdls_send_tpk_m3(struct wpa_sm *sm, const unsigned char *src_addr, u8 dtoken, struct wpa_tdls_lnkid *lnkid, const struct wpa_tdls_peer *peer) wpa_tdls_send_tpk_m3() argument 1432 wpa_tdls_send_discovery_response(struct wpa_sm *sm, struct wpa_tdls_peer *peer, u8 dialog_token) wpa_tdls_send_discovery_response() argument 1524 struct wpa_tdls_peer *peer; wpa_tdls_process_discovery_request() local 1586 copy_supp_rates(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) copy_supp_rates() argument 1602 copy_peer_ht_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) copy_peer_ht_capab() argument 1628 copy_peer_vht_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) copy_peer_vht_capab() argument 1654 copy_peer_ext_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) copy_peer_ext_capab() argument 1678 copy_peer_wmm_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) copy_peer_wmm_capab() argument 1703 copy_peer_supp_channels(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) copy_peer_supp_channels() argument 1729 copy_peer_supp_oper_classes(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) copy_peer_supp_oper_classes() argument 1755 wpa_tdls_addset_peer(struct wpa_sm *sm, struct wpa_tdls_peer *peer, int add) wpa_tdls_addset_peer() argument 1788 struct wpa_tdls_peer *peer; wpa_tdls_process_tpk_m1() local 2146 wpa_tdls_enable_link(struct wpa_sm *sm, struct wpa_tdls_peer *peer) wpa_tdls_enable_link() argument 2184 struct wpa_tdls_peer *peer; wpa_tdls_process_tpk_m2() local 2473 struct wpa_tdls_peer *peer; wpa_tdls_process_tpk_m3() local 2654 struct wpa_tdls_peer *peer; wpa_tdls_start() local 2706 struct wpa_tdls_peer *peer; wpa_tdls_remove() local 2844 struct wpa_tdls_peer *peer, *tmp; wpa_tdls_teardown_peers() local 2869 struct wpa_tdls_peer *peer, *tmp; wpa_tdls_remove_peers() local 2995 struct wpa_tdls_peer *peer; wpa_tdls_enable_chan_switch() local 3042 struct wpa_tdls_peer *peer; wpa_tdls_disable_chan_switch() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
H A D | ibss_rsn.c | 30 struct ibss_rsn_peer *peer; in ibss_rsn_get_peer() local 32 for (peer = ibss_rsn->peers; peer; peer = peer->next) in ibss_rsn_get_peer() 33 if (os_memcmp(addr, peer->addr, ETH_ALEN) == 0) in ibss_rsn_get_peer() 35 return peer; in ibss_rsn_get_peer() 39 static void ibss_rsn_free(struct ibss_rsn_peer *peer) in ibss_rsn_free() argument 41 eloop_cancel_timeout(ibss_rsn_auth_timeout, peer, NULL); in ibss_rsn_free() 42 wpa_auth_sta_deinit(peer in ibss_rsn_free() 50 struct ibss_rsn_peer *peer = ctx; supp_set_state() local 57 struct ibss_rsn_peer *peer = ctx; supp_get_state() local 65 struct ibss_rsn_peer *peer = ctx; supp_ether_send() local 116 struct ibss_rsn_peer *peer = ctx; supp_get_beacon_ie() local 130 ibss_check_rsn_completed(struct ibss_rsn_peer *peer) ibss_check_rsn_completed() argument 154 struct ibss_rsn_peer *peer = ctx; supp_set_key() local 190 struct ibss_rsn_peer *peer = ctx; supp_get_network_ctx() local 223 ibss_rsn_supp_init(struct ibss_rsn_peer *peer, const u8 *own_addr, const u8 *psk) ibss_rsn_supp_init() argument 344 struct ibss_rsn_peer *peer; auth_set_key() local 384 struct ibss_rsn_peer *peer; auth_for_each_sta() local 397 ibss_set_sta_authorized(struct ibss_rsn *ibss_rsn, struct ibss_rsn_peer *peer, int authorized) ibss_set_sta_authorized() argument 427 struct ibss_rsn_peer *peer = ibss_rsn_get_peer(ibss_rsn, addr); auth_set_eapol() local 483 ibss_rsn_auth_init(struct ibss_rsn *ibss_rsn, struct ibss_rsn_peer *peer) ibss_rsn_auth_init() argument 539 ibss_rsn_is_auth_started(struct ibss_rsn_peer * peer) ibss_rsn_is_auth_started() argument 549 struct ibss_rsn_peer *peer; ibss_rsn_peer_init() local 588 struct ibss_rsn_peer *peer = eloop_ctx; ibss_rsn_auth_timeout() local 605 struct ibss_rsn_peer *peer; ibss_rsn_start() local 638 ibss_rsn_peer_authenticated(struct ibss_rsn *ibss_rsn, struct ibss_rsn_peer *peer, int reason) ibss_rsn_peer_authenticated() argument 664 struct ibss_rsn_peer *peer, *prev; ibss_rsn_stop() local 723 struct ibss_rsn_peer *peer, *prev; ibss_rsn_deinit() local 785 ibss_rsn_process_rx_eapol(struct ibss_rsn *ibss_rsn, struct ibss_rsn_peer *peer, const u8 *buf, size_t len) ibss_rsn_process_rx_eapol() argument 826 struct ibss_rsn_peer *peer; ibss_rsn_rx_eapol() local 865 ibss_rsn_handle_auth_1_of_2(struct ibss_rsn *ibss_rsn, struct ibss_rsn_peer *peer, const u8* addr) ibss_rsn_handle_auth_1_of_2() argument 934 struct ibss_rsn_peer *peer; ibss_rsn_handle_auth() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
H A D | ibss_rsn.c | 30 struct ibss_rsn_peer *peer; in ibss_rsn_get_peer() local 32 for (peer = ibss_rsn->peers; peer; peer = peer->next) in ibss_rsn_get_peer() 33 if (os_memcmp(addr, peer->addr, ETH_ALEN) == 0) in ibss_rsn_get_peer() 35 return peer; in ibss_rsn_get_peer() 39 static void ibss_rsn_free(struct ibss_rsn_peer *peer) in ibss_rsn_free() argument 41 eloop_cancel_timeout(ibss_rsn_auth_timeout, peer, NULL); in ibss_rsn_free() 42 wpa_auth_sta_deinit(peer in ibss_rsn_free() 50 struct ibss_rsn_peer *peer = ctx; supp_set_state() local 57 struct ibss_rsn_peer *peer = ctx; supp_get_state() local 65 struct ibss_rsn_peer *peer = ctx; supp_ether_send() local 110 struct ibss_rsn_peer *peer = ctx; supp_get_beacon_ie() local 123 ibss_check_rsn_completed(struct ibss_rsn_peer *peer) ibss_check_rsn_completed() argument 144 struct ibss_rsn_peer *peer = ctx; supp_set_key() local 175 struct ibss_rsn_peer *peer = ctx; supp_get_network_ctx() local 202 ibss_rsn_supp_init(struct ibss_rsn_peer *peer, const u8 *own_addr, const u8 *psk) ibss_rsn_supp_init() argument 317 struct ibss_rsn_peer *peer; auth_set_key() local 353 struct ibss_rsn_peer *peer; auth_for_each_sta() local 366 ibss_set_sta_authorized(struct ibss_rsn *ibss_rsn, struct ibss_rsn_peer *peer, int authorized) ibss_set_sta_authorized() argument 396 struct ibss_rsn_peer *peer = ibss_rsn_get_peer(ibss_rsn, addr); auth_set_eapol() local 452 ibss_rsn_auth_init(struct ibss_rsn *ibss_rsn, struct ibss_rsn_peer *peer) ibss_rsn_auth_init() argument 512 ibss_rsn_is_auth_started(struct ibss_rsn_peer * peer) ibss_rsn_is_auth_started() argument 522 struct ibss_rsn_peer *peer; ibss_rsn_peer_init() local 561 struct ibss_rsn_peer *peer = eloop_ctx; ibss_rsn_auth_timeout() local 578 struct ibss_rsn_peer *peer; ibss_rsn_start() local 611 ibss_rsn_peer_authenticated(struct ibss_rsn *ibss_rsn, struct ibss_rsn_peer *peer, int reason) ibss_rsn_peer_authenticated() argument 637 struct ibss_rsn_peer *peer, *prev; ibss_rsn_stop() local 696 struct ibss_rsn_peer *peer, *prev; ibss_rsn_deinit() local 758 ibss_rsn_process_rx_eapol(struct ibss_rsn *ibss_rsn, struct ibss_rsn_peer *peer, const u8 *buf, size_t len) ibss_rsn_process_rx_eapol() argument 799 struct ibss_rsn_peer *peer; ibss_rsn_rx_eapol() local 838 ibss_rsn_handle_auth_1_of_2(struct ibss_rsn *ibss_rsn, struct ibss_rsn_peer *peer, const u8* addr) ibss_rsn_handle_auth_1_of_2() argument 903 struct ibss_rsn_peer *peer; ibss_rsn_handle_auth() local [all...] |
/third_party/libwebsockets/lib/misc/ |
H A D | peer-limits.c | 31 struct lws_peer *peer) in __lws_peer_remove_from_peer_wait_list() 36 if (*p == peer) { in __lws_peer_remove_from_peer_wait_list() 65 struct lws_peer *peer) in __lws_peer_add_to_peer_wait_list() 67 __lws_peer_remove_from_peer_wait_list(context, peer); in __lws_peer_add_to_peer_wait_list() 69 peer->peer_wait_list = context->peer_wait_list; in __lws_peer_add_to_peer_wait_list() 70 context->peer_wait_list = peer; in __lws_peer_add_to_peer_wait_list() 82 struct lws_peer *peer; in lws_get_or_create_peer() local 95 /* eg, udp doesn't have to have a peer */ in lws_get_or_create_peer() 118 lws_context_lock(context, "peer search"); /* <======================= */ in lws_get_or_create_peer() 140 lwsl_info("%s: creating new peer\ in lws_get_or_create_peer() 30 __lws_peer_remove_from_peer_wait_list(struct lws_context *context, struct lws_peer *peer) __lws_peer_remove_from_peer_wait_list() argument 64 __lws_peer_add_to_peer_wait_list(struct lws_context *context, struct lws_peer *peer) __lws_peer_add_to_peer_wait_list() argument 169 __lws_peer_destroy(struct lws_context *context, struct lws_peer *peer) __lws_peer_destroy() argument 218 lws_peer_add_wsi(struct lws_context *context, struct lws_peer *peer, struct lws *wsi) lws_peer_add_wsi() argument 236 struct lws_peer *peer; lws_peer_dump_from_wsi() local 258 lws_peer_track_wsi_close(struct lws_context *context, struct lws_peer *peer) lws_peer_track_wsi_close() argument 290 lws_peer_confirm_ah_attach_ok(struct lws_context *context, struct lws_peer *peer) lws_peer_confirm_ah_attach_ok() argument 308 lws_peer_track_ah_detach(struct lws_context *context, struct lws_peer *peer) lws_peer_track_ah_detach() argument [all...] |
/third_party/openssl/test/helpers/ |
H A D | handshake.c | 732 static int create_peer(PEER *peer, SSL_CTX *ctx) in create_peer() argument 743 peer->ssl = ssl; in create_peer() 744 peer->write_buf = write_buf; in create_peer() 745 peer->read_buf = read_buf; in create_peer() 746 peer->write_buf_len = peer->read_buf_len = peer_buffer_size; in create_peer() 755 static void peer_free_data(PEER *peer) in peer_free_data() argument 757 SSL_free(peer->ssl); in peer_free_data() 758 OPENSSL_free(peer->write_buf); in peer_free_data() 759 OPENSSL_free(peer in peer_free_data() 766 do_handshake_step(PEER *peer) do_handshake_step() argument 797 do_app_data_step(PEER *peer) do_app_data_step() argument 860 do_reneg_setup_step(const SSL_TEST_CTX *test_ctx, PEER *peer) do_reneg_setup_step() argument 1039 do_shutdown_step(PEER *peer) do_shutdown_step() argument 1119 do_connect_step(const SSL_TEST_CTX *test_ctx, PEER *peer, connect_phase_t phase) do_connect_step() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/pae/ |
H A D | ieee802_1x_kay.c | 193 mi = body->peer + i; in ieee802_1x_mka_dump_peer_body() 321 struct ieee802_1x_kay_peer *peer; in get_peer_mi() local 323 dl_list_for_each(peer, peers, struct ieee802_1x_kay_peer, list) { in get_peer_mi() 324 if (os_memcmp(peer->mi, mi, MI_LEN) == 0) in get_peer_mi() 325 return peer; in get_peer_mi() 383 struct ieee802_1x_kay_peer *peer; in ieee802_1x_kay_get_peer() local 385 peer = ieee802_1x_kay_get_live_peer(participant, mi); in ieee802_1x_kay_get_peer() 386 if (peer) in ieee802_1x_kay_get_peer() 387 return peer; in ieee802_1x_kay_get_peer() 443 struct ieee802_1x_kay_peer *peer; in ieee802_1x_kay_get_peer_sci() local 576 ieee802_1x_kay_dump_peer(struct ieee802_1x_kay_peer *peer) ieee802_1x_kay_dump_peer() argument 586 struct ieee802_1x_kay_peer *peer; ieee802_1x_kay_create_peer() local 611 struct ieee802_1x_kay_peer *peer; ieee802_1x_kay_create_live_peer() local 649 struct ieee802_1x_kay_peer *peer; ieee802_1x_kay_create_potential_peer() local 671 struct ieee802_1x_kay_peer *peer; ieee802_1x_kay_move_live_peer() local 797 struct ieee802_1x_kay_peer *peer; ieee802_1x_mka_decode_basic_body() local 928 struct ieee802_1x_kay_peer *peer; ieee802_1x_mka_get_live_peer_length() local 947 struct ieee802_1x_kay_peer *peer; ieee802_1x_mka_encode_live_peer_body() local 988 struct ieee802_1x_kay_peer *peer; ieee802_1x_mka_get_potential_peer_length() local 1007 struct ieee802_1x_kay_peer *peer; ieee802_1x_mka_encode_potential_peer_body() local 1116 struct ieee802_1x_kay_peer *peer; ieee802_1x_mka_decode_live_peer_body() local 1370 struct ieee802_1x_kay_peer *peer; ieee802_1x_mka_decode_sak_use_body() local 1648 struct ieee802_1x_kay_peer *peer; ieee802_1x_mka_decode_dist_sak_body() local 2081 struct ieee802_1x_kay_peer *peer; ieee802_1x_kay_generate_new_sak() local 2213 compare_priorities(const struct ieee802_1x_kay_peer *peer, const struct ieee802_1x_kay_peer *other) compare_priorities() argument 2232 struct ieee802_1x_kay_peer *peer; ieee802_1x_kay_elect_key_server() local 2334 struct ieee802_1x_kay_peer *peer; ieee802_1x_kay_decide_macsec_use() local 2505 struct ieee802_1x_kay_peer *peer, *pre_peer; ieee802_1x_participant_timer() local 3168 struct ieee802_1x_kay_peer *peer; ieee802_1x_kay_decode_mkpdu() local 3761 struct ieee802_1x_kay_peer *peer; ieee802_1x_kay_delete_mka() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/pae/ |
H A D | ieee802_1x_kay.c | 193 mi = body->peer + i; in ieee802_1x_mka_dump_peer_body() 321 struct ieee802_1x_kay_peer *peer; in get_peer_mi() local 323 dl_list_for_each(peer, peers, struct ieee802_1x_kay_peer, list) { in get_peer_mi() 324 if (os_memcmp(peer->mi, mi, MI_LEN) == 0) in get_peer_mi() 325 return peer; in get_peer_mi() 383 struct ieee802_1x_kay_peer *peer; in ieee802_1x_kay_get_peer() local 385 peer = ieee802_1x_kay_get_live_peer(participant, mi); in ieee802_1x_kay_get_peer() 386 if (peer) in ieee802_1x_kay_get_peer() 387 return peer; in ieee802_1x_kay_get_peer() 443 struct ieee802_1x_kay_peer *peer; in ieee802_1x_kay_get_peer_sci() local 576 ieee802_1x_kay_dump_peer(struct ieee802_1x_kay_peer *peer) ieee802_1x_kay_dump_peer() argument 586 struct ieee802_1x_kay_peer *peer; ieee802_1x_kay_create_peer() local 611 struct ieee802_1x_kay_peer *peer; ieee802_1x_kay_create_live_peer() local 649 struct ieee802_1x_kay_peer *peer; ieee802_1x_kay_create_potential_peer() local 671 struct ieee802_1x_kay_peer *peer; ieee802_1x_kay_move_live_peer() local 797 struct ieee802_1x_kay_peer *peer; ieee802_1x_mka_decode_basic_body() local 928 struct ieee802_1x_kay_peer *peer; ieee802_1x_mka_get_live_peer_length() local 947 struct ieee802_1x_kay_peer *peer; ieee802_1x_mka_encode_live_peer_body() local 988 struct ieee802_1x_kay_peer *peer; ieee802_1x_mka_get_potential_peer_length() local 1007 struct ieee802_1x_kay_peer *peer; ieee802_1x_mka_encode_potential_peer_body() local 1116 struct ieee802_1x_kay_peer *peer; ieee802_1x_mka_decode_live_peer_body() local 1383 struct ieee802_1x_kay_peer *peer; ieee802_1x_mka_decode_sak_use_body() local 1685 struct ieee802_1x_kay_peer *peer; ieee802_1x_mka_decode_dist_sak_body() local 2118 struct ieee802_1x_kay_peer *peer; ieee802_1x_kay_generate_new_sak() local 2250 compare_priorities(const struct ieee802_1x_kay_peer *peer, const struct ieee802_1x_kay_peer *other) compare_priorities() argument 2269 struct ieee802_1x_kay_peer *peer; ieee802_1x_kay_elect_key_server() local 2371 struct ieee802_1x_kay_peer *peer; ieee802_1x_kay_decide_macsec_use() local 2542 struct ieee802_1x_kay_peer *peer, *pre_peer; ieee802_1x_participant_timer() local 3205 struct ieee802_1x_kay_peer *peer; ieee802_1x_kay_decode_mkpdu() local 3798 struct ieee802_1x_kay_peer *peer; ieee802_1x_kay_delete_mka() local [all...] |
/third_party/node/deps/openssl/openssl/crypto/bio/ |
H A D | bss_bio.c | 12 * kind, handled by the same thread (i.e. the "peer" is actually ourselves, 59 BIO *peer; /* NULL if buf == NULL. If peer != NULL, then member 60 * peer->ptr is also a bio_bio_st, and its 61 * "peer" member points back to us. peer != 63 /* This is for what we write (i.e. reading uses peer's struct): */ 64 int closed; /* valid iff peer != NULL */ 65 size_t len; /* valid iff buf != NULL; 0 if peer == NULL */ 69 size_t request; /* valid iff peer ! [all...] |
/third_party/openssl/crypto/bio/ |
H A D | bss_bio.c | 12 * kind, handled by the same thread (i.e. the "peer" is actually ourselves, 59 BIO *peer; /* NULL if buf == NULL. If peer != NULL, then member 60 * peer->ptr is also a bio_bio_st, and its 61 * "peer" member points back to us. peer != 63 /* This is for what we write (i.e. reading uses peer's struct): */ 64 int closed; /* valid iff peer != NULL */ 65 size_t len; /* valid iff buf != NULL; 0 if peer == NULL */ 69 size_t request; /* valid iff peer ! [all...] |
/third_party/curl/lib/vquic/ |
H A D | vquic-tls.c | 150 /* OpenSSL always tries to verify the peer, this only says whether it should in curl_ossl_init_ctx() 214 struct ssl_peer *peer, in curl_ossl_init_ssl() 230 if(peer->sni) { in curl_ossl_init_ssl() 231 if(!SSL_set_tlsext_host_name(ctx->ssl, peer->sni)) { in curl_ossl_init_ssl() 260 struct ssl_peer *peer, in curl_gtls_init_ctx() 282 peer, ctx->gtls, pverifyresult); in curl_gtls_init_ctx() 428 /* verifying the peer without any CA certificates won't work so in curl_wssl_init_ctx() 463 struct ssl_peer *peer, in curl_wssl_init_ssl() 480 if(peer->sni) { in curl_wssl_init_ssl() 482 peer in curl_wssl_init_ssl() 212 curl_ossl_init_ssl(struct quic_tls_ctx *ctx, struct Curl_easy *data, struct ssl_peer *peer, const char *alpn, size_t alpn_len, void *user_data) curl_ossl_init_ssl() argument 257 curl_gtls_init_ctx(struct quic_tls_ctx *ctx, struct Curl_cfilter *cf, struct Curl_easy *data, struct ssl_peer *peer, const char *alpn, size_t alpn_len, Curl_vquic_tls_ctx_setup *ctx_setup, void *user_data) curl_gtls_init_ctx() argument 461 curl_wssl_init_ssl(struct quic_tls_ctx *ctx, struct Curl_easy *data, struct ssl_peer *peer, const char *alpn, size_t alpn_len, void *user_data) curl_wssl_init_ssl() argument 489 Curl_vquic_tls_init(struct quic_tls_ctx *ctx, struct Curl_cfilter *cf, struct Curl_easy *data, struct ssl_peer *peer, const char *alpn, size_t alpn_len, Curl_vquic_tls_ctx_setup *ctx_setup, void *user_data) Curl_vquic_tls_init() argument 566 Curl_vquic_tls_verify_peer(struct quic_tls_ctx *ctx, struct Curl_cfilter *cf, struct Curl_easy *data, struct ssl_peer *peer) Curl_vquic_tls_verify_peer() argument [all...] |
/third_party/node/deps/npm/node_modules/@npmcli/arborist/lib/ |
H A D | place-dep.js | 3 // peer dependencies. 23 const peerEntrySets = require('./peer-entry-sets.js') 64 // where the dep is not a peer dep. 79 // Then we check under b, and can't, because of the optional peer dep. 83 if (!target.isTop && targetEdge && targetEdge.peer) { 92 // children. This way, we can know that it's a peer dep, and 109 // We place (a), and get a peer of (c) along with it. 111 // of the conflicting peer from (b)->(d)->(c@2). In that case, we 119 // we found a place this can go, along with all its peer friends. 172 // now we have a target, a tree of CanPlaceDep results for the peer grou [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/wps/ |
H A D | wps_upnp_web.c | 413 static void wps_upnp_peer_del(struct upnp_wps_peer *peer) in wps_upnp_peer_del() argument 415 dl_list_del(&peer->list); in wps_upnp_peer_del() 416 if (peer->wps) in wps_upnp_peer_del() 417 wps_deinit(peer->wps); in wps_upnp_peer_del() 418 os_free(peer); in wps_upnp_peer_del() 429 struct upnp_wps_peer *peer; in web_process_get_device_info() local 439 peer = os_zalloc(sizeof(*peer)); in web_process_get_device_info() 440 if (!peer) in web_process_get_device_info() 455 peer in web_process_get_device_info() 499 struct upnp_wps_peer *tmp, *peer; web_process_put_message() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/wps/ |
H A D | wps_upnp_web.c | 413 static void wps_upnp_peer_del(struct upnp_wps_peer *peer) in wps_upnp_peer_del() argument 415 dl_list_del(&peer->list); in wps_upnp_peer_del() 416 if (peer->wps) in wps_upnp_peer_del() 417 wps_deinit(peer->wps); in wps_upnp_peer_del() 418 os_free(peer); in wps_upnp_peer_del() 429 struct upnp_wps_peer *peer; in web_process_get_device_info() local 439 peer = os_zalloc(sizeof(*peer)); in web_process_get_device_info() 440 if (!peer) in web_process_get_device_info() 455 peer in web_process_get_device_info() 499 struct upnp_wps_peer *tmp, *peer; web_process_put_message() local [all...] |
/third_party/curl/tests/server/ |
H A D | tftpd.c | 199 static curl_socket_t peer = CURL_SOCKET_BAD; variable 791 peer = socket(AF_INET, SOCK_DGRAM, 0); in main() 792 if(CURL_SOCKET_BAD == peer) { in main() 797 if(connect(peer, &from.sa, sizeof(from.sa4)) < 0) { in main() 806 peer = socket(AF_INET6, SOCK_DGRAM, 0); in main() 807 if(CURL_SOCKET_BAD == peer) { in main() 812 if(connect(peer, &from.sa, sizeof(from.sa6)) < 0) { in main() 830 sclose(peer); in main() 831 peer = CURL_SOCKET_BAD; in main() 850 if((peer ! in main() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/p2p/ |
H A D | p2p_go_neg.c | 54 p2p_info(p2p, "Mismatching country (ours=%c%c peer's=%c%c)", in p2p_peer_channels_check() 66 p2p_info(p2p, "Invalid peer Channel List"); in p2p_peer_channels_check() 79 p2p_dbg(p2p, "Own reg_classes %d peer reg_classes %d intersection reg_classes %d", in p2p_peer_channels_check() 138 struct p2p_device *peer) in p2p_build_go_neg_req() 158 p2p_buf_add_public_action_hdr(buf, P2P_GO_NEG_REQ, peer->dialog_token); in p2p_build_go_neg_req() 162 if (peer->flags & P2P_DEV_PREFER_PERSISTENT_GROUP) { in p2p_build_go_neg_req() 164 if (peer->flags & P2P_DEV_PREFER_PERSISTENT_RECONN) in p2p_build_go_neg_req() 174 p2p_buf_add_go_intent(buf, (p2p->go_intent << 1) | peer->tie_breaker); in p2p_build_go_neg_req() 183 p2p_buf_add_device_info(buf, p2p, peer); in p2p_build_go_neg_req() 192 pw_id = p2p_wps_method_pw_id(peer in p2p_build_go_neg_req() 137 p2p_build_go_neg_req(struct p2p_data *p2p, struct p2p_device *peer) p2p_build_go_neg_req() argument 271 p2p_build_go_neg_resp(struct p2p_data *p2p, struct p2p_device *peer, u8 dialog_token, u8 status, u8 tie_breaker) p2p_build_go_neg_resp() argument 1069 p2p_build_go_neg_conf(struct p2p_data *p2p, struct p2p_device *peer, u8 dialog_token, u8 status, const u8 *resp_chan, int go) p2p_build_go_neg_conf() argument [all...] |
H A D | p2p_invitation.c | 19 struct p2p_device *peer, in p2p_build_invitation_req() 56 peer->dialog_token++; in p2p_build_invitation_req() 57 if (peer->dialog_token == 0) in p2p_build_invitation_req() 58 peer->dialog_token = 1; in p2p_build_invitation_req() 60 peer->dialog_token); in p2p_build_invitation_req() 71 !(peer->flags & P2P_DEV_NO_PREF_CHAN)) in p2p_build_invitation_req() 81 dev_addr = peer->info.p2p_device_addr; in p2p_build_invitation_req() 85 p2p_buf_add_device_info(buf, p2p, peer); in p2p_build_invitation_req() 109 struct p2p_device *peer, in p2p_build_invitation_resp() 199 p2p_dbg(p2p, "Invitation Request from unknown peer " MACST in p2p_process_invitation_req() 18 p2p_build_invitation_req(struct p2p_data *p2p, struct p2p_device *peer, const u8 *go_dev_addr, int dev_pw_id) p2p_build_invitation_req() argument 108 p2p_build_invitation_resp(struct p2p_data *p2p, struct p2p_device *peer, u8 dialog_token, u8 status, const u8 *group_bssid, u8 reg_class, u8 channel, struct p2p_channels *channels) p2p_build_invitation_resp() argument 648 p2p_invite(struct p2p_data *p2p, const u8 *peer, enum p2p_invite_role role, const u8 *bssid, const u8 *ssid, size_t ssid_len, unsigned int force_freq, const u8 *go_dev_addr, int persistent_group, unsigned int pref_freq, int dev_pw_id) p2p_invite() argument [all...] |
/third_party/node/deps/openssl/openssl/apps/ |
H A D | sess_id.c | 51 X509 *peer = NULL; in sess_id_main() local 109 peer = SSL_SESSION_get0_peer(x); in sess_id_main() 134 if (peer == NULL) in sess_id_main() 137 X509_print(out, peer); in sess_id_main() 156 } else if (!noout && (peer != NULL)) { /* just print the certificate */ in sess_id_main() 158 i = (int)i2d_X509_bio(out, peer); in sess_id_main() 160 i = PEM_write_bio_X509(out, peer); in sess_id_main()
|
/third_party/openssl/apps/ |
H A D | sess_id.c | 51 X509 *peer = NULL; in sess_id_main() local 109 peer = SSL_SESSION_get0_peer(x); in sess_id_main() 134 if (peer == NULL) in sess_id_main() 137 X509_print(out, peer); in sess_id_main() 156 } else if (!noout && (peer != NULL)) { /* just print the certificate */ in sess_id_main() 158 i = (int)i2d_X509_bio(out, peer); in sess_id_main() 160 i = PEM_write_bio_X509(out, peer); in sess_id_main()
|
/third_party/curl/lib/vtls/ |
H A D | vtls.c | 570 if(strcasecompare(connssl->peer.hostname, check->name) && in Curl_ssl_getsessionid() 594 cf->conn->handler->scheme, connssl->peer.hostname, in Curl_ssl_getsessionid() 671 clone_host = strdup(connssl->peer.hostname); in Curl_ssl_addsessionid() 1508 void Curl_ssl_peer_cleanup(struct ssl_peer *peer) in Curl_ssl_peer_cleanup() argument 1510 if(peer->dispname != peer->hostname) in Curl_ssl_peer_cleanup() 1511 free(peer->dispname); in Curl_ssl_peer_cleanup() 1512 free(peer->sni); in Curl_ssl_peer_cleanup() 1513 free(peer->hostname); in Curl_ssl_peer_cleanup() 1514 peer in Curl_ssl_peer_cleanup() 1543 Curl_ssl_peer_init(struct ssl_peer *peer, struct Curl_cfilter *cf) Curl_ssl_peer_init() argument [all...] |
/third_party/node/deps/openssl/openssl/crypto/evp/ |
H A D | exchange.c | 377 int EVP_PKEY_derive_set_peer_ex(EVP_PKEY_CTX *ctx, EVP_PKEY *peer, in EVP_PKEY_derive_set_peer_ex() argument 399 check_ctx = EVP_PKEY_CTX_new_from_pkey(ctx->libctx, peer, ctx->propquery); in EVP_PKEY_derive_set_peer_ex() 409 * Ensure that the |peer| is provided, either natively, or as a cached in EVP_PKEY_derive_set_peer_ex() 413 * With the keymgmt we found (if we did), we try to export |peer| in EVP_PKEY_derive_set_peer_ex() 415 * export it if |tmp_keymgmt| is different from |peer|'s keymgmt) in EVP_PKEY_derive_set_peer_ex() 423 provkey = evp_pkey_export_to_provider(peer, ctx->libctx, in EVP_PKEY_derive_set_peer_ex() 454 ret = ctx->pmeth->ctrl(ctx, EVP_PKEY_CTRL_PEER_KEY, 0, peer); in EVP_PKEY_derive_set_peer_ex() 467 if (ctx->pkey->type != peer->type) { in EVP_PKEY_derive_set_peer_ex() 473 * For clarity. The error is if parameters in peer are in EVP_PKEY_derive_set_peer_ex() 479 if (!EVP_PKEY_missing_parameters(peer) in EVP_PKEY_derive_set_peer_ex() 500 EVP_PKEY_derive_set_peer(EVP_PKEY_CTX *ctx, EVP_PKEY *peer) EVP_PKEY_derive_set_peer() argument [all...] |
/third_party/openssl/crypto/evp/ |
H A D | exchange.c | 377 int EVP_PKEY_derive_set_peer_ex(EVP_PKEY_CTX *ctx, EVP_PKEY *peer, in EVP_PKEY_derive_set_peer_ex() argument 399 check_ctx = EVP_PKEY_CTX_new_from_pkey(ctx->libctx, peer, ctx->propquery); in EVP_PKEY_derive_set_peer_ex() 409 * Ensure that the |peer| is provided, either natively, or as a cached in EVP_PKEY_derive_set_peer_ex() 413 * With the keymgmt we found (if we did), we try to export |peer| in EVP_PKEY_derive_set_peer_ex() 415 * export it if |tmp_keymgmt| is different from |peer|'s keymgmt) in EVP_PKEY_derive_set_peer_ex() 423 provkey = evp_pkey_export_to_provider(peer, ctx->libctx, in EVP_PKEY_derive_set_peer_ex() 454 ret = ctx->pmeth->ctrl(ctx, EVP_PKEY_CTRL_PEER_KEY, 0, peer); in EVP_PKEY_derive_set_peer_ex() 467 if (ctx->pkey->type != peer->type) { in EVP_PKEY_derive_set_peer_ex() 473 * For clarity. The error is if parameters in peer are in EVP_PKEY_derive_set_peer_ex() 479 if (!EVP_PKEY_missing_parameters(peer) in EVP_PKEY_derive_set_peer_ex() 500 EVP_PKEY_derive_set_peer(EVP_PKEY_CTX *ctx, EVP_PKEY *peer) EVP_PKEY_derive_set_peer() argument [all...] |
/third_party/pulseaudio/src/pulsecore/ |
H A D | pipe.c | 77 struct sockaddr_in addr, peer; in pipe() local 123 len = sizeof(peer); in pipe() 124 filedes[1] = accept(listener, (struct sockaddr*)&peer, &len); in pipe() 137 if ((addr.sin_port != peer.sin_port) || (addr.sin_addr.s_addr != peer.sin_addr.s_addr)) in pipe()
|
/third_party/mbedtls/library/ |
H A D | psa_crypto_pake.c | 151 /* The only two JPAKE user/peer identifiers supported in built-in implementation. */ 160 uint8_t *peer = NULL, *user = NULL; in mbedtls_psa_pake_setup() local 196 peer = mbedtls_calloc(1, peer_len); in mbedtls_psa_pake_setup() 197 if (peer == NULL) { in mbedtls_psa_pake_setup() 214 status = psa_crypto_driver_pake_get_peer(inputs, peer, in mbedtls_psa_pake_setup() 241 memcmp(peer, jpake_server_id, actual_peer_len) == 0) { in mbedtls_psa_pake_setup() 245 memcmp(peer, jpake_client_id, actual_peer_len) == 0) { in mbedtls_psa_pake_setup() 260 /* Role has been set, release user/peer buffers. */ in mbedtls_psa_pake_setup() 261 mbedtls_free(user); mbedtls_free(peer); in mbedtls_psa_pake_setup() 272 mbedtls_free(user); mbedtls_free(peer); in mbedtls_psa_pake_setup() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/p2p/ |
H A D | p2p_go_neg.c | 66 p2p_info(p2p, "Mismatching country (ours=** peer's=**)"); in p2p_peer_channels_check() 76 p2p_info(p2p, "Invalid peer Channel List"); in p2p_peer_channels_check() 89 p2p_dbg(p2p, "Own reg_classes %d peer reg_classes %d intersection reg_classes %d", in p2p_peer_channels_check() 148 struct p2p_device *peer) in p2p_build_go_neg_req() 168 p2p_buf_add_public_action_hdr(buf, P2P_GO_NEG_REQ, peer->dialog_token); in p2p_build_go_neg_req() 172 if (peer->flags & P2P_DEV_PREFER_PERSISTENT_GROUP) { in p2p_build_go_neg_req() 174 if (peer->flags & P2P_DEV_PREFER_PERSISTENT_RECONN) in p2p_build_go_neg_req() 184 p2p_buf_add_go_intent(buf, (p2p->go_intent << 1) | peer->tie_breaker); in p2p_build_go_neg_req() 193 p2p_buf_add_device_info(buf, p2p, peer); in p2p_build_go_neg_req() 202 pw_id = p2p_wps_method_pw_id(peer in p2p_build_go_neg_req() 147 p2p_build_go_neg_req(struct p2p_data *p2p, struct p2p_device *peer) p2p_build_go_neg_req() argument 281 p2p_build_go_neg_resp(struct p2p_data *p2p, struct p2p_device *peer, u8 dialog_token, u8 status, u8 tie_breaker) p2p_build_go_neg_resp() argument 1167 p2p_build_go_neg_conf(struct p2p_data *p2p, struct p2p_device *peer, u8 dialog_token, u8 status, const u8 *resp_chan, int go) p2p_build_go_neg_conf() argument [all...] |