/kernel/linux/linux-5.10/include/linux/ |
H A D | mISDNif.h | 474 struct mISDNchannel *peer; member 570 if (!ch->peer) in _queue_data() 575 if (ch->recv(ch->peer, skb)) in _queue_data()
|
/kernel/linux/linux-5.10/fs/hmdfs/ |
H A D | inode_cloud.c | 213 struct hmdfs_peer peer; variable 221 peer.device_id = CLOUD_DEVICE; in fill_inode_cloud() 223 inode = hmdfs_iget5_locked_cloud(sb, &peer, res); in fill_inode_cloud()
|
/kernel/linux/linux-6.6/fs/hmdfs/ |
H A D | inode_cloud.c | 210 struct hmdfs_peer peer; variable 218 peer.device_id = CLOUD_DEVICE; in fill_inode_cloud() 220 inode = hmdfs_iget5_locked_cloud(sb, &peer, res); in fill_inode_cloud()
|
/kernel/linux/linux-6.6/include/linux/ |
H A D | mISDNif.h | 473 struct mISDNchannel *peer; member 569 if (!ch->peer) in _queue_data() 574 if (ch->recv(ch->peer, skb)) in _queue_data()
|
/kernel/linux/linux-6.6/include/net/ |
H A D | net_namespace.h | 411 int peernet2id_alloc(struct net *net, struct net *peer, gfp_t gfp); 412 int peernet2id(const struct net *net, struct net *peer); 413 bool peernet_has_id(const struct net *net, struct net *peer);
|
/kernel/linux/linux-6.6/tools/testing/selftests/net/forwarding/ |
H A D | dual_vxlan_bridge.sh | 244 ip link add name w1 type veth peer name w2 320 ip link add name v1 type veth peer name v2 321 ip link add name v3 type veth peer name v4
|
/kernel/linux/linux-6.6/tools/testing/selftests/net/mptcp/ |
H A D | simult_flows.sh | 74 ip link add ns1eth1 netns "$ns1" type veth peer name ns2eth1 netns "$ns2" 75 ip link add ns1eth2 netns "$ns1" type veth peer name ns2eth2 netns "$ns2" 76 ip link add ns2eth3 netns "$ns2" type veth peer name ns3eth1 netns "$ns3"
|
/kernel/linux/linux-6.6/tools/testing/selftests/netfilter/ |
H A D | conntrack_icmp_related.sh | 84 ip link add $DEV netns nsclient1 type veth peer name eth1 netns nsrouter1 86 ip link add $DEV netns nsclient2 type veth peer name eth1 netns nsrouter2 89 ip link add $DEV netns nsrouter1 type veth peer name eth2 netns nsrouter2
|
/third_party/node/deps/openssl/openssl/crypto/cms/ |
H A D | cms_kari.c | 163 EVP_PKEY *pk, X509 *peer) in CMS_RecipientInfo_kari_set0_pkey_and_peer() 179 if (peer != NULL) { in CMS_RecipientInfo_kari_set0_pkey_and_peer() 180 EVP_PKEY *pub_pkey = X509_get0_pubkey(peer); in CMS_RecipientInfo_kari_set0_pkey_and_peer() 162 CMS_RecipientInfo_kari_set0_pkey_and_peer(CMS_RecipientInfo *ri, EVP_PKEY *pk, X509 *peer) CMS_RecipientInfo_kari_set0_pkey_and_peer() argument
|
/third_party/openssl/crypto/cms/ |
H A D | cms_kari.c | 163 EVP_PKEY *pk, X509 *peer) in CMS_RecipientInfo_kari_set0_pkey_and_peer() 179 if (peer != NULL) { in CMS_RecipientInfo_kari_set0_pkey_and_peer() 180 EVP_PKEY *pub_pkey = X509_get0_pubkey(peer); in CMS_RecipientInfo_kari_set0_pkey_and_peer() 162 CMS_RecipientInfo_kari_set0_pkey_and_peer(CMS_RecipientInfo *ri, EVP_PKEY *pk, X509 *peer) CMS_RecipientInfo_kari_set0_pkey_and_peer() argument
|
/kernel/linux/linux-5.10/tools/testing/selftests/net/ |
H A D | pmtu.sh | 262 # ns peer segment 510 run_cmd ${ns_a} ip link add veth_a type veth peer name veth_b || return 1 694 [ "${peer}" = "" ] && peer="${i}" && continue 698 peer_name="$(nsname ${peer})" 699 if="veth_${ns}-${peer}" 700 ifpeer="veth_${peer}-${ns}" 703 ip link add ${if} up netns ${ns_name} type veth peer name ${ifpeer} netns ${peer_name} || return 1 713 ns=""; peer=""; segment="" 729 run_cmd ${ns_c} ip link add veth_C-A type veth peer nam [all...] |
/kernel/linux/linux-6.6/drivers/net/wireless/ath/ath12k/ |
H A D | dp.c | 14 #include "peer.h" 26 struct ath12k_peer *peer; in ath12k_dp_peer_cleanup() local 28 /* TODO: Any other peer specific DP cleanup */ in ath12k_dp_peer_cleanup() 31 peer = ath12k_peer_find(ab, vdev_id, addr); in ath12k_dp_peer_cleanup() 32 if (!peer) { in ath12k_dp_peer_cleanup() 33 ath12k_warn(ab, "failed to lookup peer %pM on vdev %d\n", in ath12k_dp_peer_cleanup() 39 ath12k_dp_rx_peer_tid_cleanup(ar, peer); in ath12k_dp_peer_cleanup() 40 crypto_free_shash(peer->tfm_mmic); in ath12k_dp_peer_cleanup() 41 peer->dp_setup_done = false; in ath12k_dp_peer_cleanup() 48 struct ath12k_peer *peer; in ath12k_dp_peer_setup() local [all...] |
/kernel/linux/linux-5.10/samples/bpf/ |
H A D | test_cgrp2_sock2.sh | 6 ip link add veth0 type veth peer name veth0b
|
H A D | lwt_len_hist.sh | 23 ip link add $VETH0 type veth peer name $VETH1
|
/kernel/linux/linux-5.10/include/net/ |
H A D | af_unix.h | 57 struct sock *peer; member
|
/kernel/linux/linux-6.6/drivers/net/wireless/ath/ath11k/ |
H A D | peer.h | 24 /* peer id based rhashtable list pointer */ 26 /* peer addr based rhashtable list pointer */ 59 int ath11k_peer_rhash_delete(struct ath11k_base *ab, struct ath11k_peer *peer);
|
/kernel/linux/linux-6.6/samples/bpf/ |
H A D | lwt_len_hist.sh | 23 ip link add $VETH0 type veth peer name $VETH1
|
/kernel/linux/linux-6.6/tools/testing/selftests/net/ |
H A D | icmp.sh | 46 ip -netns $NS1 link add veth0 type veth peer name veth0 netns $NS2
|
/kernel/linux/linux-6.6/tools/testing/selftests/drivers/net/bonding/ |
H A D | bond-arp-interval-causes-panic.sh | 27 ip -n client link add eth0 type veth peer name eth0 netns server
|
/kernel/liteos_a/net/lwip-2.1/porting/include/lwip/ |
H A D | netif.h | 55 struct netif *peer; \
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
H A D | eap_sake_common.h | 2 * EAP server/peer: EAP-SAKE shared routines 91 int peer, const u8 *eap, size_t eap_len,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/ |
H A D | privsep_commands.h | 103 u8 peer[ETH_ALEN]; member
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
H A D | eap_sake_common.h | 2 * EAP server/peer: EAP-SAKE shared routines 91 int peer, const u8 *eap, size_t eap_len,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/common/ |
H A D | privsep_commands.h | 102 u8 peer[ETH_ALEN]; member
|
/third_party/node/deps/openssl/openssl/apps/ |
H A D | s_server.c | 764 {"verify", OPT_VERIFY, 'n', "Turn on peer certificate verification"}, 766 "Turn on peer certificate verification, must have a cert"}, 809 "Do not treat lack of close_notify from a peer as an error"}, 2951 X509 *peer; in print_connection_info() local 2965 peer = SSL_get0_peer_certificate(con); in print_connection_info() 2966 if (peer != NULL) { in print_connection_info() 2968 PEM_write_bio_X509(bio_s_out, peer); in print_connection_info() 2969 dump_cert_text(bio_s_out, peer); in print_connection_info() 2970 peer = NULL; in print_connection_info() 3174 X509 *peer in www_body() local [all...] |