Home
last modified time | relevance | path

Searched refs:peer (Results 726 - 750 of 1112) sorted by relevance

1...<<21222324252627282930>>...45

/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/
H A Dap_drv_ops.c732 const u8 *peer, u8 *buf, u16 *buf_len) in hostapd_drv_wnm_oper()
736 return hapd->driver->wnm_oper(hapd->drv_priv, oper, peer, buf, in hostapd_drv_wnm_oper()
963 int hostapd_drv_update_dh_ie(struct hostapd_data *hapd, const u8 *peer, in hostapd_drv_update_dh_ie() argument
968 return hapd->driver->update_dh_ie(hapd->drv_priv, peer, reason_code, in hostapd_drv_update_dh_ie()
731 hostapd_drv_wnm_oper(struct hostapd_data *hapd, enum wnm_oper oper, const u8 *peer, u8 *buf, u16 *buf_len) hostapd_drv_wnm_oper() argument
/kernel/linux/linux-5.10/drivers/net/can/
H A Djanz-ican3.c311 u8 locl, peer, xord; in ican3_old_recv_msg() local
315 peer = ioread8(mod->dpm + MSYNC_PEER); in ican3_old_recv_msg()
317 xord = locl ^ peer; in ican3_old_recv_msg()
356 u8 locl, peer, xord; in ican3_old_send_msg() local
360 peer = ioread8(mod->dpm + MSYNC_PEER); in ican3_old_send_msg()
362 xord = locl ^ peer; in ican3_old_send_msg()
/kernel/linux/linux-6.6/drivers/net/can/
H A Djanz-ican3.c312 u8 locl, peer, xord; in ican3_old_recv_msg() local
316 peer = ioread8(mod->dpm + MSYNC_PEER); in ican3_old_recv_msg()
318 xord = locl ^ peer; in ican3_old_recv_msg()
357 u8 locl, peer, xord; in ican3_old_send_msg() local
361 peer = ioread8(mod->dpm + MSYNC_PEER); in ican3_old_send_msg()
363 xord = locl ^ peer; in ican3_old_send_msg()
/third_party/curl/lib/vquic/
H A Dcurl_osslq.c263 struct cf_osslq_stream remote_ctrl[3]; /* uni streams opened by the peer */
264 size_t remote_ctrl_n; /* number of peer streams opened */
283 struct ssl_peer peer; member
309 Curl_ssl_peer_cleanup(&ctx->peer); in cf_osslq_ctx_clear()
455 ctx->peer.dispname, r_port, r_ip); in cf_osslq_ssl_err()
473 return Curl_vquic_tls_verify_peer(&ctx->tls, cf, data, &ctx->peer); in cf_osslq_verify_peer()
1048 result = Curl_ssl_peer_init(&ctx->peer, cf); in cf_osslq_ctx_start()
1053 result = Curl_vquic_tls_init(&ctx->tls, cf, data, &ctx->peer, in cf_osslq_ctx_start()
1088 failf(data, "failed to set the initial peer address"); in cf_osslq_ctx_start()
1576 CURL_TRC_CF(data, cf, "peer verifie in cf_osslq_connect()
[all...]
/kernel/linux/linux-5.10/tools/testing/selftests/bpf/
H A Dtest_xdp_vlan.sh151 ip link add veth1 type veth peer name veth2
/kernel/linux/linux-5.10/tools/testing/selftests/drivers/net/mlxsw/
H A Dmirror_gre.sh54 ip link add name v1 type veth peer name v2
/kernel/linux/linux-5.10/net/sctp/
H A Dstream_sched.c236 !q->asoc->peer.intl_capable) { in sctp_sched_dequeue_done()
/kernel/linux/linux-6.6/net/sctp/
H A Dstream_sched.c238 !q->asoc->peer.intl_capable) { in sctp_sched_dequeue_done()
/kernel/linux/linux-6.6/tools/testing/selftests/net/
H A Dgre_gso.sh57 ip link add veth0 type veth peer name veth1
/kernel/linux/linux-6.6/tools/testing/selftests/netfilter/
H A Drpath.sh49 ip -net "$ns1" link add v0 type veth peer name v0 netns "$ns2"
H A Dconntrack_tcp_unreplied.sh65 ip -net $ns1 link add name veth1 type veth peer name veth2
132 echo "ERROR: $ns2 did not pick up tcp connection from peer"
/kernel/linux/linux-6.6/tools/testing/selftests/drivers/net/mlxsw/
H A Dmirror_gre.sh54 ip link add name v1 type veth peer name v2
/kernel/linux/linux-6.6/tools/testing/selftests/bpf/
H A Dtest_xdp_vlan.sh156 ip link add veth1 type veth peer name veth2
H A Dtest_xdp_redirect_multi.sh88 ip -n ${NS[$i]} link add veth0 type veth peer name veth$i netns ${NS[0]}
/kernel/liteos_a/net/lwip-2.1/porting/src/
H A Ddriverif.c329 return netif_loop_output(netif->peer, p);
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/
H A Ddpp_i.h87 int dpp_ecdh(struct crypto_ec_key *own, struct crypto_ec_key *peer,
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/pae/
H A Dieee802_1x_kay_i.h134 /* Current peer MI and SCI during MKPDU processing */
225 * @peer: array of (MI, MN) pairs
244 u8 peer[0]; member
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/drivers/
H A Ddriver_nl80211_event.c233 os_memcpy(event.auth.peer, mgmt->sa, ETH_ALEN); in mlme_event_auth()
1678 data.update_dh.peer = nla_data(tb[NL80211_ATTR_MAC]);
1682 wpa_printf(MSG_DEBUG, "nl80211: DH event - peer " MACSTR_SEC,
1683 MAC2STR_SEC(data.update_dh.peer));
1885 wpa_printf(MSG_DEBUG, "nl80211: New peer candidate " MACSTR_SEC,
1889 data.mesh_peer.peer = addr;
1929 os_memcpy(data.ibss_rsn_start.peer, addr, ETH_ALEN);
1962 os_memcpy(data.ibss_peer_lost.peer, addr, ETH_ALEN);
2076 os_memcpy(data.tdls.peer, nla_data(tb[NL80211_ATTR_MAC]), ETH_ALEN);
2079 wpa_printf(MSG_DEBUG, "nl80211: TDLS setup request for peer "
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/
H A Dsme.c1895 wpa_printf(MSG_DEBUG, "SAE: Failed to process peer "
2054 if (os_memcmp(wpa_s->pending_bssid, data->auth.peer, ETH_ALEN) != 0
2056 && !(wpa_s->valid_links && os_memcmp(wpa_s->ap_mld_addr, data->auth.peer, ETH_ALEN) == 0)
2060 "unexpected peer " MACSTR,
2061 MAC2STR(data->auth.peer));
2063 "unexpected peer " MACSTR_SEC,
2064 MAC2STR_SEC(data->auth.peer));
2068 wpa_msg_only_for_cb(wpa_s, MSG_DEBUG, "SME: Authentication response: peer=" MACSTR
2070 MAC2STR(data->auth.peer), data->auth.auth_type,
2072 wpa_printf(MSG_DEBUG, "SME: Authentication response: peer
[all...]
/third_party/ffmpeg/libavformat/
H A Drtsp.c68 { "filter_src", "only receive packets from the negotiated peer IP", 0, AV_OPT_TYPE_CONST, {.i64 = RTSP_FLAG_FILTER_SRC}, 0, 0, DEC, "rtsp_flags" }
1643 const char *peer = host; in ff_rtsp_make_setup_request() local
1649 peer = reply->transports[0].source; in ff_rtsp_make_setup_request()
1650 ff_url_join(url, sizeof(url), "rtp", NULL, peer, in ff_rtsp_make_setup_request()
1730 struct sockaddr_storage peer; in ff_rtsp_connect() local
1731 socklen_t peer_len = sizeof(peer); in ff_rtsp_connect()
1909 if (!getpeername(tcp_fd, (struct sockaddr*) &peer, &peer_len)) { in ff_rtsp_connect()
1910 getnameinfo((struct sockaddr*) &peer, peer_len, host, sizeof(host), in ff_rtsp_connect()
/third_party/curl/lib/vtls/
H A Dsectransp.c1932 /* SSL always tries to verify the peer, this only says whether it should
2001 char *server = connssl->peer.sni?
2002 connssl->peer.sni : connssl->peer.hostname;
2011 if(connssl->peer.is_ip_address) {
2069 verifypeer, conn_config->verifyhost, connssl->peer.hostname,
2347 failf(data, "SSL: peer not verified: RecoverableTrustFailure");
2350 failf(data, "SSL: peer not verified: Deny");
2640 failf(data, "SSL peer handshake failed, the server most likely "
2652 failf(data, "SSL certificate peer verificatio
[all...]
/third_party/libwebsockets/lib/roles/http/server/
H A Dserver.c2176 lwsl_notice("%s: vh %s, peer: %s, role %s, " in lws_http_to_fallback()
2453 /* convert the peer's HTTP-Settings */ in lws_handshake_server()
2591 char peer[64]; in lws_http_transaction_completed() local
2594 lws_get_peer_simple(wsi, peer, sizeof(peer) - 1); in lws_http_transaction_completed()
2596 peer[0] = '\0'; in lws_http_transaction_completed()
2598 peer[sizeof(peer) - 1] = '\0'; in lws_http_transaction_completed()
2600 __func__, peer); in lws_http_transaction_completed()
3126 * max h2 frame size the peer indicate in lws_serve_http_file_fragment()
[all...]
/kernel/linux/linux-5.10/net/phonet/
H A Dsocket.c316 int peer) in pn_socket_getname()
323 if (!peer) /* Race with bind() here is userland's problem. */ in pn_socket_getname()
315 pn_socket_getname(struct socket *sock, struct sockaddr *addr, int peer) pn_socket_getname() argument
/kernel/linux/linux-5.10/net/atm/
H A Dsvc.c422 int peer) in svc_getname()
427 memcpy(addr, peer ? &ATM_SD(sock)->remote : &ATM_SD(sock)->local, in svc_getname()
421 svc_getname(struct socket *sock, struct sockaddr *sockaddr, int peer) svc_getname() argument
/kernel/linux/linux-5.10/net/l2tp/
H A Dl2tp_ip6.c419 int peer) in l2tp_ip6_getname()
430 if (peer) { in l2tp_ip6_getname()
418 l2tp_ip6_getname(struct socket *sock, struct sockaddr *uaddr, int peer) l2tp_ip6_getname() argument

Completed in 33 milliseconds

1...<<21222324252627282930>>...45