Searched refs:peer (Results 101 - 125 of 235) sorted by relevance

12345678910

/freebsd-11-stable/contrib/ntp/ntpd/
H A Dntp_control.c77 static void ctl_putpeer (int, struct peer *);
349 { CS_PEERID, RO, "peer" }, /* 9 */
702 * the reference clock driver doesn't set peer->sstclktype to something
1330 * ctlpeerstatus - return a status word for this peer
1334 register struct peer *p
2575 * ctl_putpeer - output a peer variable
2580 struct peer *p
3205 struct peer *peer; local
3213 peer
3236 struct peer *peer; local
3294 struct peer *peer; local
4956 report_event( int err, struct peer *peer, const char *str ) argument
[all...]
H A Drefclock_oncore.c271 struct peer *peer; member in struct:instance
362 static int oncore_start (int, struct peer *);
363 static void oncore_poll (int, struct peer *);
364 static void oncore_shutdown (int, struct peer *);
593 struct peer *peer
612 pp = peer->procptr;
615 instance->peer = peer;
1434 struct peer *peer; local
1595 struct peer *peer; local
4050 struct peer * const peer = instance->peer; local
[all...]
/freebsd-11-stable/sys/dev/netmap/
H A Dnetmap_pipe.c285 * have to check for the existence of their peer at each ?xsync.
339 /* mark all peer-adapter rings as fake */
377 struct netmap_adapter *ona = &pna->peer->up;
396 /* mark the peer ring as needed */
495 struct netmap_adapter *ona = &pna->peer->up;
522 nm_prdis("%p: case 1.b, drop peer", na);
523 pna->peer->peer_ref = 0;
526 nm_prdis("%p: case 2.b, grab peer", na);
528 pna->peer->peer_ref = 1;
623 nm_prdis("%p: case 2, kept alive by peer", n
[all...]
/freebsd-11-stable/contrib/wpa/src/p2p/
H A Dp2p_invitation.c19 struct p2p_device *peer,
56 peer->dialog_token++;
57 if (peer->dialog_token == 0)
58 peer->dialog_token = 1;
60 peer->dialog_token);
71 !(peer->flags & P2P_DEV_NO_PREF_CHAN))
81 dev_addr = peer->info.p2p_device_addr;
85 p2p_buf_add_device_info(buf, p2p, peer);
109 struct p2p_device *peer,
199 p2p_dbg(p2p, "Invitation Request from unknown peer " MACST
18 p2p_build_invitation_req(struct p2p_data *p2p, struct p2p_device *peer, const u8 *go_dev_addr, int dev_pw_id) argument
108 p2p_build_invitation_resp(struct p2p_data *p2p, struct p2p_device *peer, u8 dialog_token, u8 status, const u8 *group_bssid, u8 reg_class, u8 channel, struct p2p_channels *channels) argument
648 p2p_invite(struct p2p_data *p2p, const u8 *peer, enum p2p_invite_role role, const u8 *bssid, const u8 *ssid, size_t ssid_len, unsigned int force_freq, const u8 *go_dev_addr, int persistent_group, unsigned int pref_freq, int dev_pw_id) argument
[all...]
/freebsd-11-stable/usr.bin/tftp/
H A Dmain.c85 static int peer; variable
179 peer = -1;
276 close(peer);
277 peer = -1;
297 peer = socket(res->ai_family, res->ai_socktype,
299 if (peer < 0) {
307 if (bind(peer, (struct sockaddr *)&peer_sock, peer_sock.ss_len) < 0) {
309 close(peer);
310 peer = -1;
317 if (peer <
[all...]
/freebsd-11-stable/contrib/serf/auth/
H A Dauth_digest.c401 serf__setup_request_digest_auth(peer_t peer, argument
414 if (peer == HOST) {
444 digest_info->header = (peer == HOST) ? "Authorization" :
466 peer_t peer,
486 if (peer == HOST)
538 if (peer == HOST) {
465 serf__validate_response_digest_auth(const serf__authn_scheme_t *scheme, peer_t peer, int code, serf_connection_t *conn, serf_request_t *request, serf_bucket_t *response, apr_pool_t *pool) argument
H A Dauth_basic.c156 serf__setup_request_basic_auth(peer_t peer, argument
168 if (peer == HOST) {
H A Dauth.c32 peer_t peer,
453 const char *serf__construct_realm(peer_t peer, argument
458 if (peer == HOST) {
31 default_auth_response_handler(const serf__authn_scheme_t *scheme, peer_t peer, int code, serf_connection_t *conn, serf_request_t *request, serf_bucket_t *response, apr_pool_t *pool) argument
/freebsd-11-stable/crypto/openssh/
H A Dkexc25519c.c136 sshbuf_ptr(kex->peer), sshbuf_len(kex->peer),
H A Dkexc25519s.c116 sshbuf_ptr(kex->peer), sshbuf_len(kex->peer),
H A Dkexecdhs.c151 sshbuf_ptr(kex->peer), sshbuf_len(kex->peer),
/freebsd-11-stable/crypto/openssl/ssl/
H A Dssl_asn1.c289 if (in->peer != NULL)
290 M_ASN1_I2D_len_EXP_opt(in->peer, i2d_X509, 3, v3);
342 if (in->peer != NULL)
343 M_ASN1_I2D_put_EXP_opt(in->peer, i2d_X509, 3, v3);
516 if (ret->peer != NULL) {
517 X509_free(ret->peer);
518 ret->peer = NULL;
520 M_ASN1_D2I_get_EXP_opt(ret->peer, d2i_X509, 3);
/freebsd-11-stable/contrib/ntp/include/
H A Dntp.h198 struct peer * peers; /* list of peers using endpt */
219 * These reveal the state at the last grumble from the peer and are
221 * variable in the spec. These are recorded in the peer structure.
239 #define TEST10 0x0200 /* peer bad synch or stratum */
240 #define TEST11 0x0400 /* peer distance exceeded */
241 #define TEST12 0x0800 /* peer synchronization loop */
242 #define TEST13 0x1000 /* peer unreacable */
253 * The peer structure. Holds state information relating to the guys
257 struct peer { struct
258 struct peer *p_lin
[all...]
/freebsd-11-stable/usr.sbin/ppp/
H A Dmp.h83 struct peerid peer; /* Who are we talking to */ member in struct:mp
H A Ddatalink.h113 struct peerid peer; /* Peer identification */ member in struct:datalink
H A Ddatalink.c131 log_Printf(LogPHASE, "Call peer back on %s\n", dl->cbcp.fsm.phone);
609 strncpy(dl->peer.authname, name, sizeof dl->peer.authname - 1);
610 dl->peer.authname[sizeof dl->peer.authname - 1] = '\0';
626 auth_Select(dl->bundle, dl->peer.authname);
645 dl->bundle->ncp.mp.peer = dl->peer;
647 auth_Select(dl->bundle, dl->peer.authname);
688 log_Printf(LogPHASE, "%s: Shutdown and await peer callbac
[all...]
H A Dchap.c334 write(in[1], chap->challenge.peer + 1, *chap->challenge.peer);
363 *chap->challenge.local = *chap->challenge.peer = '\0';
378 ans = chap_BuildAnswer(name, key, chap->auth.id, chap->challenge.peer
660 /* Give the peer another shot */
681 *chap->challenge.local = *chap->challenge.peer = '\0';
755 *chap->challenge.peer = alen;
756 bp = mbuf_Read(bp, chap->challenge.peer + 1, alen);
859 chap->challenge.peer[0] = sizeof resp->PeerChallenge;
860 memcpy(chap->challenge.peer
[all...]
H A Dipcp.c527 struct in_addr peer; local
535 /* Try to give the peer a previously configured IP address */
537 if (!ncpaddr_getip4(&iface->addr[n].peer, &peer))
539 if ((pos = iplist_ip2pos(&ipcp->cfg.peer_list, peer)) != -1) {
627 struct in_addr peer, mask, ip; local
630 if (!ncpaddr_getip4(&addr->peer, &peer)) {
644 ip.s_addr = peer.s_addr & mask.s_addr;
650 if (!((ip.s_addr ^ peer
984 struct in_addr myaddr, peer; local
[all...]
H A Dradius.c544 * peer has misformatted the response.
572 * peer has misformatted the response.
1080 memcpy(&ac->peer.ip.addr, peer_ip, sizeof(ac->peer.ip.addr));
1081 memcpy(&ac->peer.ip.mask, netmask, sizeof(ac->peer.ip.mask));
1090 memcpy(&ac->peer.ipv6.ifid, ifid, sizeof(ac->peer.ipv6.ifid));
1141 strncpy(ac->user_name, dl->peer.authname, sizeof ac->user_name);
1149 dl->peer
[all...]
/freebsd-11-stable/include/rpcsvc/
H A Dyp.x95 peername peer;
136 peername peer;
/freebsd-11-stable/contrib/wpa/src/eap_common/
H A Deap_sake_common.h2 * EAP server/peer: EAP-SAKE shared routines
91 int peer, const u8 *eap, size_t eap_len,
H A Deap_sake_common.c2 * EAP server/peer: EAP-SAKE shared routines
321 * @peer: MIC calculation for 0 = Server, 1 = Peer message
332 int peer, const u8 *eap, size_t eap_len,
345 if (peer) {
381 peer ? "Peer MIC" : "Server MIC",
328 eap_sake_compute_mic(const u8 *tek_auth, const u8 *rand_s, const u8 *rand_p, const u8 *serverid, size_t serverid_len, const u8 *peerid, size_t peerid_len, int peer, const u8 *eap, size_t eap_len, const u8 *mic_pos, u8 *mic) argument
/freebsd-11-stable/crypto/openssl/apps/
H A Dpkeyutl.c228 BIO_puts(bio_err, "Error setting up peer key\n");
508 EVP_PKEY *peer = NULL; local
514 peer = load_pubkey(bio_err, file, peerform, 0, NULL, engine, "Peer Key");
516 if (!peer) {
517 BIO_printf(bio_err, "Error reading peer key %s\n", file);
522 ret = EVP_PKEY_derive_set_peer(ctx, peer);
524 EVP_PKEY_free(peer);
/freebsd-11-stable/contrib/ntp/scripts/monitoring/
H A Dntptrap376 ($peer) = ($data =~ /peer=([0-9]+)/);
377 $msg .= " peer=$peer";
395 else # peer event
397 $msg .= sprintf("peer %5d ",$associd);
445 $msg .= sprintf("peer %5d clock",$associd);
/freebsd-11-stable/contrib/bsnmp/snmp_ntp/
H A Dsnmp_ntp.c114 /* last time we've fetch the peer list */
124 struct peer { struct
127 TAILQ_ENTRY(peer) link;
154 TAILQ_HEAD(peer_list, peer);
776 "poll,peer,clock,system,processor,jitter,stability",
841 } else if (strcmp(name, "peer") == 0 ||
842 strcmp(name, "sys.peer") == 0) {
918 * Fetch the complete peer list
926 struct peer *p;
986 strcmp(name, "peer
1212 uint32_t peer; local
1348 uint32_t peer; local
1407 uint32_t peer; local
[all...]

Completed in 154 milliseconds

12345678910