Home
last modified time | relevance | path

Searched refs:peers (Results 1 - 23 of 23) sorted by relevance

/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/
H A Dibss_rsn.c32 for (peer = ibss_rsn->peers; peer; peer = peer->next) in ibss_rsn_get_peer()
357 for (peer = ibss_rsn->peers; peer; peer = peer->next) { in auth_for_each_sta()
552 peer->next = ibss_rsn->peers; in ibss_rsn_peer_init()
553 ibss_rsn->peers = peer; in ibss_rsn_peer_init()
643 /* remove all peers */ in ibss_rsn_stop()
644 wpa_printf(MSG_DEBUG, "%s: Remove all peers", __func__); in ibss_rsn_stop()
645 peer = ibss_rsn->peers; in ibss_rsn_stop()
650 ibss_rsn->peers = peer; in ibss_rsn_stop()
657 for (prev = NULL, peer = ibss_rsn->peers; peer != NULL; in ibss_rsn_stop()
661 ibss_rsn->peers in ibss_rsn_stop()
[all...]
H A Dibss_rsn.h49 struct ibss_rsn_peer *peers; member
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/
H A Dibss_rsn.c32 for (peer = ibss_rsn->peers; peer; peer = peer->next) in ibss_rsn_get_peer()
388 for (peer = ibss_rsn->peers; peer; peer = peer->next) { in auth_for_each_sta()
579 peer->next = ibss_rsn->peers; in ibss_rsn_peer_init()
580 ibss_rsn->peers = peer; in ibss_rsn_peer_init()
670 /* remove all peers */ in ibss_rsn_stop()
671 wpa_printf(MSG_DEBUG, "%s: Remove all peers", __func__); in ibss_rsn_stop()
672 peer = ibss_rsn->peers; in ibss_rsn_stop()
677 ibss_rsn->peers = peer; in ibss_rsn_stop()
684 for (prev = NULL, peer = ibss_rsn->peers; peer != NULL; in ibss_rsn_stop()
688 ibss_rsn->peers in ibss_rsn_stop()
[all...]
H A Dibss_rsn.h49 struct ibss_rsn_peer *peers; member
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/wpa_gui-qt4/
H A Dwpagui.cpp128 peers = NULL; in WpaGui()
207 if (peers) { in ~WpaGui()
208 peers->close(); in ~WpaGui()
209 delete peers; in ~WpaGui()
210 peers = NULL; in ~WpaGui()
938 if (peers) in processMsg()
939 peers->event_notify(wm); in processMsg()
1588 if (peers) { in closeEvent()
1589 peers->close(); in closeEvent()
1590 delete peers; in closeEvent()
[all...]
H A Dpeers.cpp16 #include "peers.h"
85 peers->setModel(&model); in Peers()
86 peers->setResizeMode(QListView::Adjust); in Peers()
87 peers->setDragEnabled(false); in Peers()
88 peers->setSelectionMode(QAbstractItemView::NoSelection); in Peers()
90 peers->setContextMenuPolicy(Qt::CustomContextMenu); in Peers()
91 connect(peers, SIGNAL(customContextMenuRequested(const QPoint &)), in Peers()
179 QModelIndex idx = peers->indexAt(pos); in context_menu()
299 menu->exec(peers->mapToGlobal(pos)); in context_menu()
H A Dwpagui.h124 Peers *peers; member in WpaGui
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/wpa_gui-qt4/
H A Dwpagui.cpp130 peers = NULL; in WpaGui()
209 if (peers) { in ~WpaGui()
210 peers->close(); in ~WpaGui()
211 delete peers; in ~WpaGui()
212 peers = NULL; in ~WpaGui()
953 if (peers) in processMsg()
954 peers->event_notify(wm); in processMsg()
1603 if (peers) { in closeEvent()
1604 peers->close(); in closeEvent()
1605 delete peers; in closeEvent()
[all...]
H A Dpeers.cpp16 #include "peers.h"
85 peers->setModel(&model); in Peers()
86 peers->setResizeMode(QListView::Adjust); in Peers()
87 peers->setDragEnabled(false); in Peers()
88 peers->setSelectionMode(QAbstractItemView::NoSelection); in Peers()
90 peers->setContextMenuPolicy(Qt::CustomContextMenu); in Peers()
91 connect(peers, SIGNAL(customContextMenuRequested(const QPoint &)), in Peers()
179 QModelIndex idx = peers->indexAt(pos); in context_menu()
299 menu->exec(peers->mapToGlobal(pos)); in context_menu()
H A Dwpagui.h124 Peers *peers; member in WpaGui
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/wps/
H A Dwps_upnp_web.c471 if (dl_list_len(&iface->peers) > 3) { in web_process_get_device_info()
474 old = dl_list_first(&iface->peers, struct upnp_wps_peer, list); in web_process_get_device_info()
480 dl_list_add_tail(&iface->peers, &peer->list); in web_process_get_device_info()
525 dl_list_for_each(tmp, &iface->peers, struct upnp_wps_peer, list) { in web_process_put_message()
549 peer = dl_list_first(&iface->peers, struct upnp_wps_peer, list); in web_process_put_message()
H A Dwps_upnp_i.h112 struct dl_list peers; /* active UPnP peer sessions */ member
H A Dwps_upnp.c1106 while ((peer = dl_list_first(&iface->peers, struct upnp_wps_peer, in upnp_wps_device_deinit()
1150 dl_list_init(&iface->peers); in upnp_wps_device_init()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/wps/
H A Dwps_upnp_web.c471 if (dl_list_len(&iface->peers) > 3) { in web_process_get_device_info()
474 old = dl_list_first(&iface->peers, struct upnp_wps_peer, list); in web_process_get_device_info()
480 dl_list_add_tail(&iface->peers, &peer->list); in web_process_get_device_info()
525 dl_list_for_each(tmp, &iface->peers, struct upnp_wps_peer, list) { in web_process_put_message()
549 peer = dl_list_first(&iface->peers, struct upnp_wps_peer, list); in web_process_put_message()
H A Dwps_upnp_i.h112 struct dl_list peers; /* active UPnP peer sessions */ member
H A Dwps_upnp.c1146 while ((peer = dl_list_first(&iface->peers, struct upnp_wps_peer, in upnp_wps_device_deinit()
1190 dl_list_init(&iface->peers); in upnp_wps_device_init()
/third_party/ltp/utils/sctp/testlib/
H A Dsctputil.c369 int test_peer_addr(int sk, sctp_assoc_t asoc, sockaddr_storage_t *peers, int count) in test_peer_addr() argument
412 &peers[j]) == 0) { in test_peer_addr()
H A Dsctputil.h363 int test_peer_addr(int sk, sctp_assoc_t asoc, sockaddr_storage_t *peers, int count);
/third_party/libuv/src/unix/
H A Dudp.c152 struct sockaddr_in6 peers[20]; in uv__udp_recvmmsg() local
153 struct iovec iov[ARRAY_SIZE(peers)]; in uv__udp_recvmmsg()
154 struct mmsghdr msgs[ARRAY_SIZE(peers)]; in uv__udp_recvmmsg()
171 msgs[k].msg_hdr.msg_name = peers + k; in uv__udp_recvmmsg()
172 msgs[k].msg_hdr.msg_namelen = sizeof(peers[0]); in uv__udp_recvmmsg()
/third_party/node/deps/uv/src/unix/
H A Dudp.c188 struct sockaddr_in6 peers[UV__MMSG_MAXWIDTH]; in uv__udp_recvmmsg() local
207 msgs[k].msg_hdr.msg_name = peers + k; in uv__udp_recvmmsg()
208 msgs[k].msg_hdr.msg_namelen = sizeof(peers[0]); in uv__udp_recvmmsg()
/third_party/mbedtls/tests/
H A Dcompat.sh114 printf " -p|--peers\tWhich peers to use (Default: '%s')\n" "$PEERS"
172 -p|--peers)
296 # Ciphersuites that can be used with all peers.
297 # Since we currently have three possible peers, each ciphersuite should appear
1072 echo "Unknown peers: $PEER" >&2
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/pae/
H A Dieee802_1x_kay.c318 static struct ieee802_1x_kay_peer * get_peer_mi(struct dl_list *peers, in get_peer_mi() argument
323 dl_list_for_each(peer, peers, struct ieee802_1x_kay_peer, list) { in get_peer_mi()
1687 "KaY: The key server is not in my live peers list"); in ieee802_1x_mka_decode_dist_sak_body()
2096 "KaY: Live peers list must not be empty when generating fresh SAK"); in ieee802_1x_kay_generate_new_sak()
2227 * when to elect: whenever the live peers list changes
2245 /* elect the key server among the peers */ in ieee802_1x_kay_elect_key_server()
2326 * protectFrames will be advised if the key server and one of its live peers are
2352 /* at least one of peers is MACsec-desired and requesting MACsec */ in ieee802_1x_kay_decide_macsec_use()
2520 /* should delete MKA instance if there are not live peers in ieee802_1x_participant_timer()
3345 * 802.1X-2010, 9.4.3, potential peers nee in ieee802_1x_kay_decode_mkpdu()
4033 mka_mib_peer(struct dl_list *peers, Boolean live, char *buf, char *end) mka_mib_peer() argument
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/pae/
H A Dieee802_1x_kay.c318 static struct ieee802_1x_kay_peer * get_peer_mi(struct dl_list *peers, in get_peer_mi() argument
323 dl_list_for_each(peer, peers, struct ieee802_1x_kay_peer, list) { in get_peer_mi()
1482 /* The key server must check that all peers are using the most recent in ieee802_1x_mka_decode_sak_use_body()
1724 "KaY: The key server is not in my live peers list"); in ieee802_1x_mka_decode_dist_sak_body()
2133 "KaY: Live peers list must not be empty when generating fresh SAK"); in ieee802_1x_kay_generate_new_sak()
2264 * when to elect: whenever the live peers list changes
2282 /* elect the key server among the peers */ in ieee802_1x_kay_elect_key_server()
2363 * protectFrames will be advised if the key server and one of its live peers are
2389 /* at least one of peers is MACsec-desired and requesting MACsec */ in ieee802_1x_kay_decide_macsec_use()
2557 /* should delete MKA instance if there are not live peers in ieee802_1x_participant_timer()
4069 mka_mib_peer(struct dl_list *peers, bool live, char *buf, char *end) mka_mib_peer() argument
[all...]

Completed in 30 milliseconds