/third_party/node/deps/openssl/config/archs/solaris64-x86_64-gcc/asm/include/openssl/ |
H A D | cms.h | 282 X509 *cert, X509 *peer); 475 int CMS_RecipientInfo_kari_set0_pkey_and_peer(CMS_RecipientInfo *ri, EVP_PKEY *pk, X509 *peer);
|
/third_party/node/deps/openssl/config/archs/solaris64-x86_64-gcc/asm_avx2/include/openssl/ |
H A D | cms.h | 282 X509 *cert, X509 *peer); 475 int CMS_RecipientInfo_kari_set0_pkey_and_peer(CMS_RecipientInfo *ri, EVP_PKEY *pk, X509 *peer);
|
/third_party/node/deps/openssl/config/archs/solaris64-x86_64-gcc/no-asm/include/openssl/ |
H A D | cms.h | 282 X509 *cert, X509 *peer); 475 int CMS_RecipientInfo_kari_set0_pkey_and_peer(CMS_RecipientInfo *ri, EVP_PKEY *pk, X509 *peer);
|
/third_party/node/deps/openssl/config/archs/linux-ppc64le/asm/include/openssl/ |
H A D | cms.h | 282 X509 *cert, X509 *peer); 475 int CMS_RecipientInfo_kari_set0_pkey_and_peer(CMS_RecipientInfo *ri, EVP_PKEY *pk, X509 *peer);
|
/third_party/node/deps/openssl/config/archs/linux-ppc64le/no-asm/include/openssl/ |
H A D | cms.h | 282 X509 *cert, X509 *peer); 475 int CMS_RecipientInfo_kari_set0_pkey_and_peer(CMS_RecipientInfo *ri, EVP_PKEY *pk, X509 *peer);
|
/third_party/node/deps/openssl/config/archs/linux32-s390x/asm/include/openssl/ |
H A D | cms.h | 282 X509 *cert, X509 *peer); 475 int CMS_RecipientInfo_kari_set0_pkey_and_peer(CMS_RecipientInfo *ri, EVP_PKEY *pk, X509 *peer);
|
/third_party/node/deps/openssl/config/archs/linux64-riscv64/no-asm/include/openssl/ |
H A D | cms.h | 282 X509 *cert, X509 *peer); 475 int CMS_RecipientInfo_kari_set0_pkey_and_peer(CMS_RecipientInfo *ri, EVP_PKEY *pk, X509 *peer);
|
/third_party/node/deps/openssl/config/archs/solaris-x86-gcc/asm_avx2/include/openssl/ |
H A D | cms.h | 282 X509 *cert, X509 *peer); 475 int CMS_RecipientInfo_kari_set0_pkey_and_peer(CMS_RecipientInfo *ri, EVP_PKEY *pk, X509 *peer);
|
/third_party/node/deps/openssl/config/archs/solaris-x86-gcc/no-asm/include/openssl/ |
H A D | cms.h | 282 X509 *cert, X509 *peer); 475 int CMS_RecipientInfo_kari_set0_pkey_and_peer(CMS_RecipientInfo *ri, EVP_PKEY *pk, X509 *peer);
|
/third_party/node/deps/openssl/config/archs/linux64-mips64/asm_avx2/include/openssl/ |
H A D | cms.h | 282 X509 *cert, X509 *peer); 475 int CMS_RecipientInfo_kari_set0_pkey_and_peer(CMS_RecipientInfo *ri, EVP_PKEY *pk, X509 *peer);
|
/third_party/node/deps/openssl/config/archs/solaris-x86-gcc/asm/include/openssl/ |
H A D | cms.h | 282 X509 *cert, X509 *peer); 475 int CMS_RecipientInfo_kari_set0_pkey_and_peer(CMS_RecipientInfo *ri, EVP_PKEY *pk, X509 *peer);
|
/third_party/node/deps/openssl/config/archs/linux64-mips64/no-asm/include/openssl/ |
H A D | cms.h | 282 X509 *cert, X509 *peer); 475 int CMS_RecipientInfo_kari_set0_pkey_and_peer(CMS_RecipientInfo *ri, EVP_PKEY *pk, X509 *peer);
|
/third_party/node/deps/openssl/config/archs/linux64-s390x/asm/include/openssl/ |
H A D | cms.h | 282 X509 *cert, X509 *peer); 475 int CMS_RecipientInfo_kari_set0_pkey_and_peer(CMS_RecipientInfo *ri, EVP_PKEY *pk, X509 *peer);
|
/third_party/node/deps/openssl/config/archs/linux-armv4/asm_avx2/include/openssl/ |
H A D | cms.h | 282 X509 *cert, X509 *peer); 475 int CMS_RecipientInfo_kari_set0_pkey_and_peer(CMS_RecipientInfo *ri, EVP_PKEY *pk, X509 *peer);
|
/third_party/node/deps/openssl/config/archs/darwin64-x86_64-cc/asm_avx2/include/openssl/ |
H A D | cms.h | 282 X509 *cert, X509 *peer); 475 int CMS_RecipientInfo_kari_set0_pkey_and_peer(CMS_RecipientInfo *ri, EVP_PKEY *pk, X509 *peer);
|
/third_party/python/Lib/ |
H A D | ftplib.py | 853 def parse229(resp, peer): 869 host = peer[0]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/drivers/ |
H A D | driver_privsep.c | 393 os_memcpy(data.auth.peer, auth->peer, ETH_ALEN); in wpa_driver_privsep_event_auth()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/p2p/ |
H A D | p2p_sd.c | 58 return NULL; /* peer does not support SD */ in p2p_pending_sd_req() 65 /* Use WSD only if the peer indicates support or it */ in p2p_pending_sd_req() 82 os_memcmp(q->peer, dev->info.p2p_device_addr, ETH_ALEN) == in p2p_pending_sd_req() 282 p2p_dbg(p2p, "No Listen/Operating frequency known for the peer " in p2p_start_sd() 295 " due to it being the first no-ACK peer in this search iteration", in p2p_start_sd() 443 * separately for each peer to avoid having to drop old in p2p_sd_response() 882 os_memcpy(q->peer, dst, ETH_ALEN); in p2p_sd_request()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/drivers/ |
H A D | driver_privsep.c | 399 os_memcpy(data.auth.peer, auth->peer, ETH_ALEN); in wpa_driver_privsep_event_auth()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/p2p/ |
H A D | p2p_sd.c | 58 return NULL; /* peer does not support SD */ in p2p_pending_sd_req() 65 /* Use WSD only if the peer indicates support or it */ in p2p_pending_sd_req() 82 os_memcmp(q->peer, dev->info.p2p_device_addr, ETH_ALEN) == in p2p_pending_sd_req() 282 p2p_dbg(p2p, "No Listen/Operating frequency known for the peer " in p2p_start_sd() 295 " due to it being the first no-ACK peer in this search iteration", in p2p_start_sd() 443 * separately for each peer to avoid having to drop old in p2p_sd_response() 882 os_memcpy(q->peer, dst, ETH_ALEN); in p2p_sd_request()
|
/third_party/python/Modules/ |
H A D | _ssl.c | 1569 PyObject *peer; in _decode_certificate() local 1585 peer = _create_tuple_for_X509_NAME( in _decode_certificate() 1588 if (peer == NULL) in _decode_certificate() 1590 if (PyDict_SetItemString(retval, (const char *) "subject", peer) < 0) { in _decode_certificate() 1591 Py_DECREF(peer); in _decode_certificate() 1594 Py_DECREF(peer); in _decode_certificate() 1807 Returns the certificate for the peer. 1811 returns a dict containing information about the peer certificate. 1814 peer certificate, or None if no certificate was provided. This will 1886 /* OpenSSL does not include peer cer in _ssl__SSLSocket_get_unverified_chain_impl() 1889 X509 *peer = SSL_get_peer_certificate(self->ssl); _ssl__SSLSocket_get_unverified_chain_impl() local [all...] |
/third_party/node/deps/openssl/openssl/ssl/statem/ |
H A D | statem_lib.c | 428 X509 *peer; in tls_process_cert_verify() local 441 peer = s->session->peer; in tls_process_cert_verify() 442 pkey = X509_get0_pubkey(peer); in tls_process_cert_verify()
|
/third_party/openssl/ssl/statem/ |
H A D | statem_lib.c | 407 X509 *peer; in tls_process_cert_verify() local 420 peer = s->session->peer; in tls_process_cert_verify() 421 pkey = X509_get0_pubkey(peer); in tls_process_cert_verify()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
H A D | sta_info.c | 1288 struct hm_p2p_pvt_peer *peer = NULL; in ap_sta_set_authorized() local 1350 peer = hm_p2p_find_peer(dev_addr); in ap_sta_set_authorized() 1351 if (peer != NULL) { in ap_sta_set_authorized() 1352 peer->go_req_cnt = 0; in ap_sta_set_authorized()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
H A D | events.c | 3363 wpa_tdls_remove(wpa_s->wpa, data->tdls.peer); in wpa_supplicant_event_tdls() 3365 wpa_tdls_start(wpa_s->wpa, data->tdls.peer); in wpa_supplicant_event_tdls() 3367 wpa_drv_tdls_oper(wpa_s, TDLS_SETUP, data->tdls.peer); in wpa_supplicant_event_tdls() 3371 wpa_tdls_teardown_link(wpa_s->wpa, data->tdls.peer, in wpa_supplicant_event_tdls() 3375 data->tdls.peer); in wpa_supplicant_event_tdls() 3379 data->tdls.peer); in wpa_supplicant_event_tdls() 3440 ibss_rsn_start(wpa_s->ibss_rsn, data->ibss_rsn_start.peer); in wpa_supplicant_event_ibss_rsn_start() 4855 ibss_rsn_stop(wpa_s->ibss_rsn, data->ibss_peer_lost.peer); in wpa_supplicant_event() 4925 wpa_mesh_notify_peer(wpa_s, data->mesh_peer.peer, in wpa_supplicant_event()
|