/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
H A D | ap_drv_ops.c | 732 const u8 *peer, u8 *buf, u16 *buf_len) in hostapd_drv_wnm_oper() 736 return hapd->driver->wnm_oper(hapd->drv_priv, oper, peer, buf, in hostapd_drv_wnm_oper() 963 int hostapd_drv_update_dh_ie(struct hostapd_data *hapd, const u8 *peer, in hostapd_drv_update_dh_ie() argument 968 return hapd->driver->update_dh_ie(hapd->drv_priv, peer, reason_code, in hostapd_drv_update_dh_ie() 731 hostapd_drv_wnm_oper(struct hostapd_data *hapd, enum wnm_oper oper, const u8 *peer, u8 *buf, u16 *buf_len) hostapd_drv_wnm_oper() argument
|
/kernel/linux/linux-5.10/drivers/net/can/ |
H A D | janz-ican3.c | 311 u8 locl, peer, xord; in ican3_old_recv_msg() local 315 peer = ioread8(mod->dpm + MSYNC_PEER); in ican3_old_recv_msg() 317 xord = locl ^ peer; in ican3_old_recv_msg() 356 u8 locl, peer, xord; in ican3_old_send_msg() local 360 peer = ioread8(mod->dpm + MSYNC_PEER); in ican3_old_send_msg() 362 xord = locl ^ peer; in ican3_old_send_msg()
|
/kernel/linux/linux-6.6/drivers/net/can/ |
H A D | janz-ican3.c | 312 u8 locl, peer, xord; in ican3_old_recv_msg() local 316 peer = ioread8(mod->dpm + MSYNC_PEER); in ican3_old_recv_msg() 318 xord = locl ^ peer; in ican3_old_recv_msg() 357 u8 locl, peer, xord; in ican3_old_send_msg() local 361 peer = ioread8(mod->dpm + MSYNC_PEER); in ican3_old_send_msg() 363 xord = locl ^ peer; in ican3_old_send_msg()
|
/third_party/curl/lib/vquic/ |
H A D | curl_osslq.c | 263 struct cf_osslq_stream remote_ctrl[3]; /* uni streams opened by the peer */ 264 size_t remote_ctrl_n; /* number of peer streams opened */ 283 struct ssl_peer peer; member 309 Curl_ssl_peer_cleanup(&ctx->peer); in cf_osslq_ctx_clear() 455 ctx->peer.dispname, r_port, r_ip); in cf_osslq_ssl_err() 473 return Curl_vquic_tls_verify_peer(&ctx->tls, cf, data, &ctx->peer); in cf_osslq_verify_peer() 1048 result = Curl_ssl_peer_init(&ctx->peer, cf); in cf_osslq_ctx_start() 1053 result = Curl_vquic_tls_init(&ctx->tls, cf, data, &ctx->peer, in cf_osslq_ctx_start() 1088 failf(data, "failed to set the initial peer address"); in cf_osslq_ctx_start() 1576 CURL_TRC_CF(data, cf, "peer verifie in cf_osslq_connect() [all...] |
/kernel/linux/linux-5.10/tools/testing/selftests/bpf/ |
H A D | test_xdp_vlan.sh | 151 ip link add veth1 type veth peer name veth2
|
/kernel/linux/linux-5.10/tools/testing/selftests/drivers/net/mlxsw/ |
H A D | mirror_gre.sh | 54 ip link add name v1 type veth peer name v2
|
/kernel/linux/linux-5.10/net/sctp/ |
H A D | stream_sched.c | 236 !q->asoc->peer.intl_capable) { in sctp_sched_dequeue_done()
|
/kernel/linux/linux-6.6/net/sctp/ |
H A D | stream_sched.c | 238 !q->asoc->peer.intl_capable) { in sctp_sched_dequeue_done()
|
/kernel/linux/linux-6.6/tools/testing/selftests/net/ |
H A D | gre_gso.sh | 57 ip link add veth0 type veth peer name veth1
|
/kernel/linux/linux-6.6/tools/testing/selftests/netfilter/ |
H A D | rpath.sh | 49 ip -net "$ns1" link add v0 type veth peer name v0 netns "$ns2"
|
H A D | conntrack_tcp_unreplied.sh | 65 ip -net $ns1 link add name veth1 type veth peer name veth2 132 echo "ERROR: $ns2 did not pick up tcp connection from peer"
|
/kernel/linux/linux-6.6/tools/testing/selftests/drivers/net/mlxsw/ |
H A D | mirror_gre.sh | 54 ip link add name v1 type veth peer name v2
|
/kernel/linux/linux-6.6/tools/testing/selftests/bpf/ |
H A D | test_xdp_vlan.sh | 156 ip link add veth1 type veth peer name veth2
|
H A D | test_xdp_redirect_multi.sh | 88 ip -n ${NS[$i]} link add veth0 type veth peer name veth$i netns ${NS[0]}
|
/kernel/liteos_a/net/lwip-2.1/porting/src/ |
H A D | driverif.c | 329 return netif_loop_output(netif->peer, p);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/ |
H A D | dpp_i.h | 87 int dpp_ecdh(struct crypto_ec_key *own, struct crypto_ec_key *peer,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/pae/ |
H A D | ieee802_1x_kay_i.h | 134 /* Current peer MI and SCI during MKPDU processing */ 225 * @peer: array of (MI, MN) pairs 244 u8 peer[0]; member
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/drivers/ |
H A D | driver_nl80211_event.c | 233 os_memcpy(event.auth.peer, mgmt->sa, ETH_ALEN); in mlme_event_auth() 1678 data.update_dh.peer = nla_data(tb[NL80211_ATTR_MAC]); 1682 wpa_printf(MSG_DEBUG, "nl80211: DH event - peer " MACSTR_SEC, 1683 MAC2STR_SEC(data.update_dh.peer)); 1885 wpa_printf(MSG_DEBUG, "nl80211: New peer candidate " MACSTR_SEC, 1889 data.mesh_peer.peer = addr; 1929 os_memcpy(data.ibss_rsn_start.peer, addr, ETH_ALEN); 1962 os_memcpy(data.ibss_peer_lost.peer, addr, ETH_ALEN); 2076 os_memcpy(data.tdls.peer, nla_data(tb[NL80211_ATTR_MAC]), ETH_ALEN); 2079 wpa_printf(MSG_DEBUG, "nl80211: TDLS setup request for peer " [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
H A D | sme.c | 1895 wpa_printf(MSG_DEBUG, "SAE: Failed to process peer " 2054 if (os_memcmp(wpa_s->pending_bssid, data->auth.peer, ETH_ALEN) != 0 2056 && !(wpa_s->valid_links && os_memcmp(wpa_s->ap_mld_addr, data->auth.peer, ETH_ALEN) == 0) 2060 "unexpected peer " MACSTR, 2061 MAC2STR(data->auth.peer)); 2063 "unexpected peer " MACSTR_SEC, 2064 MAC2STR_SEC(data->auth.peer)); 2068 wpa_msg_only_for_cb(wpa_s, MSG_DEBUG, "SME: Authentication response: peer=" MACSTR 2070 MAC2STR(data->auth.peer), data->auth.auth_type, 2072 wpa_printf(MSG_DEBUG, "SME: Authentication response: peer [all...] |
/third_party/ffmpeg/libavformat/ |
H A D | rtsp.c | 68 { "filter_src", "only receive packets from the negotiated peer IP", 0, AV_OPT_TYPE_CONST, {.i64 = RTSP_FLAG_FILTER_SRC}, 0, 0, DEC, "rtsp_flags" } 1643 const char *peer = host; in ff_rtsp_make_setup_request() local 1649 peer = reply->transports[0].source; in ff_rtsp_make_setup_request() 1650 ff_url_join(url, sizeof(url), "rtp", NULL, peer, in ff_rtsp_make_setup_request() 1730 struct sockaddr_storage peer; in ff_rtsp_connect() local 1731 socklen_t peer_len = sizeof(peer); in ff_rtsp_connect() 1909 if (!getpeername(tcp_fd, (struct sockaddr*) &peer, &peer_len)) { in ff_rtsp_connect() 1910 getnameinfo((struct sockaddr*) &peer, peer_len, host, sizeof(host), in ff_rtsp_connect()
|
/third_party/curl/lib/vtls/ |
H A D | sectransp.c | 1932 /* SSL always tries to verify the peer, this only says whether it should 2001 char *server = connssl->peer.sni? 2002 connssl->peer.sni : connssl->peer.hostname; 2011 if(connssl->peer.is_ip_address) { 2069 verifypeer, conn_config->verifyhost, connssl->peer.hostname, 2347 failf(data, "SSL: peer not verified: RecoverableTrustFailure"); 2350 failf(data, "SSL: peer not verified: Deny"); 2640 failf(data, "SSL peer handshake failed, the server most likely " 2652 failf(data, "SSL certificate peer verificatio [all...] |
/third_party/libwebsockets/lib/roles/http/server/ |
H A D | server.c | 2176 lwsl_notice("%s: vh %s, peer: %s, role %s, " in lws_http_to_fallback() 2453 /* convert the peer's HTTP-Settings */ in lws_handshake_server() 2591 char peer[64]; in lws_http_transaction_completed() local 2594 lws_get_peer_simple(wsi, peer, sizeof(peer) - 1); in lws_http_transaction_completed() 2596 peer[0] = '\0'; in lws_http_transaction_completed() 2598 peer[sizeof(peer) - 1] = '\0'; in lws_http_transaction_completed() 2600 __func__, peer); in lws_http_transaction_completed() 3126 * max h2 frame size the peer indicate in lws_serve_http_file_fragment() [all...] |
/kernel/linux/linux-5.10/net/phonet/ |
H A D | socket.c | 316 int peer) in pn_socket_getname() 323 if (!peer) /* Race with bind() here is userland's problem. */ in pn_socket_getname() 315 pn_socket_getname(struct socket *sock, struct sockaddr *addr, int peer) pn_socket_getname() argument
|
/kernel/linux/linux-5.10/net/atm/ |
H A D | svc.c | 422 int peer) in svc_getname() 427 memcpy(addr, peer ? &ATM_SD(sock)->remote : &ATM_SD(sock)->local, in svc_getname() 421 svc_getname(struct socket *sock, struct sockaddr *sockaddr, int peer) svc_getname() argument
|
/kernel/linux/linux-5.10/net/l2tp/ |
H A D | l2tp_ip6.c | 419 int peer) in l2tp_ip6_getname() 430 if (peer) { in l2tp_ip6_getname() 418 l2tp_ip6_getname(struct socket *sock, struct sockaddr *uaddr, int peer) l2tp_ip6_getname() argument
|