/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
H A D | ibss_rsn.c | 32 for (peer = ibss_rsn->peers; peer; peer = peer->next) in ibss_rsn_get_peer() 357 for (peer = ibss_rsn->peers; peer; peer = peer->next) { in auth_for_each_sta() 552 peer->next = ibss_rsn->peers; in ibss_rsn_peer_init() 553 ibss_rsn->peers = peer; in ibss_rsn_peer_init() 643 /* remove all peers */ in ibss_rsn_stop() 644 wpa_printf(MSG_DEBUG, "%s: Remove all peers", __func__); in ibss_rsn_stop() 645 peer = ibss_rsn->peers; in ibss_rsn_stop() 650 ibss_rsn->peers = peer; in ibss_rsn_stop() 657 for (prev = NULL, peer = ibss_rsn->peers; peer != NULL; in ibss_rsn_stop() 661 ibss_rsn->peers in ibss_rsn_stop() [all...] |
H A D | ibss_rsn.h | 49 struct ibss_rsn_peer *peers; member
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
H A D | ibss_rsn.c | 32 for (peer = ibss_rsn->peers; peer; peer = peer->next) in ibss_rsn_get_peer() 388 for (peer = ibss_rsn->peers; peer; peer = peer->next) { in auth_for_each_sta() 579 peer->next = ibss_rsn->peers; in ibss_rsn_peer_init() 580 ibss_rsn->peers = peer; in ibss_rsn_peer_init() 670 /* remove all peers */ in ibss_rsn_stop() 671 wpa_printf(MSG_DEBUG, "%s: Remove all peers", __func__); in ibss_rsn_stop() 672 peer = ibss_rsn->peers; in ibss_rsn_stop() 677 ibss_rsn->peers = peer; in ibss_rsn_stop() 684 for (prev = NULL, peer = ibss_rsn->peers; peer != NULL; in ibss_rsn_stop() 688 ibss_rsn->peers in ibss_rsn_stop() [all...] |
H A D | ibss_rsn.h | 49 struct ibss_rsn_peer *peers; member
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/wpa_gui-qt4/ |
H A D | wpagui.cpp | 128 peers = NULL; in WpaGui() 207 if (peers) { in ~WpaGui() 208 peers->close(); in ~WpaGui() 209 delete peers; in ~WpaGui() 210 peers = NULL; in ~WpaGui() 938 if (peers) in processMsg() 939 peers->event_notify(wm); in processMsg() 1588 if (peers) { in closeEvent() 1589 peers->close(); in closeEvent() 1590 delete peers; in closeEvent() [all...] |
H A D | peers.cpp | 16 #include "peers.h" 85 peers->setModel(&model); in Peers() 86 peers->setResizeMode(QListView::Adjust); in Peers() 87 peers->setDragEnabled(false); in Peers() 88 peers->setSelectionMode(QAbstractItemView::NoSelection); in Peers() 90 peers->setContextMenuPolicy(Qt::CustomContextMenu); in Peers() 91 connect(peers, SIGNAL(customContextMenuRequested(const QPoint &)), in Peers() 179 QModelIndex idx = peers->indexAt(pos); in context_menu() 299 menu->exec(peers->mapToGlobal(pos)); in context_menu()
|
H A D | wpagui.h | 124 Peers *peers; member in WpaGui
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/wpa_gui-qt4/ |
H A D | wpagui.cpp | 130 peers = NULL; in WpaGui() 209 if (peers) { in ~WpaGui() 210 peers->close(); in ~WpaGui() 211 delete peers; in ~WpaGui() 212 peers = NULL; in ~WpaGui() 953 if (peers) in processMsg() 954 peers->event_notify(wm); in processMsg() 1603 if (peers) { in closeEvent() 1604 peers->close(); in closeEvent() 1605 delete peers; in closeEvent() [all...] |
H A D | peers.cpp | 16 #include "peers.h" 85 peers->setModel(&model); in Peers() 86 peers->setResizeMode(QListView::Adjust); in Peers() 87 peers->setDragEnabled(false); in Peers() 88 peers->setSelectionMode(QAbstractItemView::NoSelection); in Peers() 90 peers->setContextMenuPolicy(Qt::CustomContextMenu); in Peers() 91 connect(peers, SIGNAL(customContextMenuRequested(const QPoint &)), in Peers() 179 QModelIndex idx = peers->indexAt(pos); in context_menu() 299 menu->exec(peers->mapToGlobal(pos)); in context_menu()
|
H A D | wpagui.h | 124 Peers *peers; member in WpaGui
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/wps/ |
H A D | wps_upnp_web.c | 471 if (dl_list_len(&iface->peers) > 3) { in web_process_get_device_info() 474 old = dl_list_first(&iface->peers, struct upnp_wps_peer, list); in web_process_get_device_info() 480 dl_list_add_tail(&iface->peers, &peer->list); in web_process_get_device_info() 525 dl_list_for_each(tmp, &iface->peers, struct upnp_wps_peer, list) { in web_process_put_message() 549 peer = dl_list_first(&iface->peers, struct upnp_wps_peer, list); in web_process_put_message()
|
H A D | wps_upnp_i.h | 112 struct dl_list peers; /* active UPnP peer sessions */ member
|
H A D | wps_upnp.c | 1106 while ((peer = dl_list_first(&iface->peers, struct upnp_wps_peer, in upnp_wps_device_deinit() 1150 dl_list_init(&iface->peers); in upnp_wps_device_init()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/wps/ |
H A D | wps_upnp_web.c | 471 if (dl_list_len(&iface->peers) > 3) { in web_process_get_device_info() 474 old = dl_list_first(&iface->peers, struct upnp_wps_peer, list); in web_process_get_device_info() 480 dl_list_add_tail(&iface->peers, &peer->list); in web_process_get_device_info() 525 dl_list_for_each(tmp, &iface->peers, struct upnp_wps_peer, list) { in web_process_put_message() 549 peer = dl_list_first(&iface->peers, struct upnp_wps_peer, list); in web_process_put_message()
|
H A D | wps_upnp_i.h | 112 struct dl_list peers; /* active UPnP peer sessions */ member
|
H A D | wps_upnp.c | 1146 while ((peer = dl_list_first(&iface->peers, struct upnp_wps_peer, in upnp_wps_device_deinit() 1190 dl_list_init(&iface->peers); in upnp_wps_device_init()
|
/third_party/ltp/utils/sctp/testlib/ |
H A D | sctputil.c | 369 int test_peer_addr(int sk, sctp_assoc_t asoc, sockaddr_storage_t *peers, int count) in test_peer_addr() argument 412 &peers[j]) == 0) { in test_peer_addr()
|
H A D | sctputil.h | 363 int test_peer_addr(int sk, sctp_assoc_t asoc, sockaddr_storage_t *peers, int count);
|
/third_party/libuv/src/unix/ |
H A D | udp.c | 152 struct sockaddr_in6 peers[20]; in uv__udp_recvmmsg() local 153 struct iovec iov[ARRAY_SIZE(peers)]; in uv__udp_recvmmsg() 154 struct mmsghdr msgs[ARRAY_SIZE(peers)]; in uv__udp_recvmmsg() 171 msgs[k].msg_hdr.msg_name = peers + k; in uv__udp_recvmmsg() 172 msgs[k].msg_hdr.msg_namelen = sizeof(peers[0]); in uv__udp_recvmmsg()
|
/third_party/node/deps/uv/src/unix/ |
H A D | udp.c | 188 struct sockaddr_in6 peers[UV__MMSG_MAXWIDTH]; in uv__udp_recvmmsg() local 207 msgs[k].msg_hdr.msg_name = peers + k; in uv__udp_recvmmsg() 208 msgs[k].msg_hdr.msg_namelen = sizeof(peers[0]); in uv__udp_recvmmsg()
|
/third_party/mbedtls/tests/ |
H A D | compat.sh | 114 printf " -p|--peers\tWhich peers to use (Default: '%s')\n" "$PEERS" 172 -p|--peers) 296 # Ciphersuites that can be used with all peers. 297 # Since we currently have three possible peers, each ciphersuite should appear 1072 echo "Unknown peers: $PEER" >&2
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/pae/ |
H A D | ieee802_1x_kay.c | 318 static struct ieee802_1x_kay_peer * get_peer_mi(struct dl_list *peers, in get_peer_mi() argument 323 dl_list_for_each(peer, peers, struct ieee802_1x_kay_peer, list) { in get_peer_mi() 1687 "KaY: The key server is not in my live peers list"); in ieee802_1x_mka_decode_dist_sak_body() 2096 "KaY: Live peers list must not be empty when generating fresh SAK"); in ieee802_1x_kay_generate_new_sak() 2227 * when to elect: whenever the live peers list changes 2245 /* elect the key server among the peers */ in ieee802_1x_kay_elect_key_server() 2326 * protectFrames will be advised if the key server and one of its live peers are 2352 /* at least one of peers is MACsec-desired and requesting MACsec */ in ieee802_1x_kay_decide_macsec_use() 2520 /* should delete MKA instance if there are not live peers in ieee802_1x_participant_timer() 3345 * 802.1X-2010, 9.4.3, potential peers nee in ieee802_1x_kay_decode_mkpdu() 4033 mka_mib_peer(struct dl_list *peers, Boolean live, char *buf, char *end) mka_mib_peer() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/pae/ |
H A D | ieee802_1x_kay.c | 318 static struct ieee802_1x_kay_peer * get_peer_mi(struct dl_list *peers, in get_peer_mi() argument 323 dl_list_for_each(peer, peers, struct ieee802_1x_kay_peer, list) { in get_peer_mi() 1482 /* The key server must check that all peers are using the most recent in ieee802_1x_mka_decode_sak_use_body() 1724 "KaY: The key server is not in my live peers list"); in ieee802_1x_mka_decode_dist_sak_body() 2133 "KaY: Live peers list must not be empty when generating fresh SAK"); in ieee802_1x_kay_generate_new_sak() 2264 * when to elect: whenever the live peers list changes 2282 /* elect the key server among the peers */ in ieee802_1x_kay_elect_key_server() 2363 * protectFrames will be advised if the key server and one of its live peers are 2389 /* at least one of peers is MACsec-desired and requesting MACsec */ in ieee802_1x_kay_decide_macsec_use() 2557 /* should delete MKA instance if there are not live peers in ieee802_1x_participant_timer() 4069 mka_mib_peer(struct dl_list *peers, bool live, char *buf, char *end) mka_mib_peer() argument [all...] |