/freebsd-11-stable/contrib/ntp/scripts/lib/NTP/ |
H A D | Util.pm | 32 my ($peer, $vars, $host) = @_; 38 my $cmd = "$ntpq_path -n -c 'rv $peer ".(join ',', @$vars)."'";
|
/freebsd-11-stable/usr.sbin/ntp/doc/pic/ |
H A D | Makefile | 18 panda.gif pd_om006.gif pd_om011.gif peer.gif pogo.gif pogo1a.gif \
|
/freebsd-11-stable/usr.sbin/ypserv/ |
H A D | yp_server.c | 364 argp->map_parms.peer, 385 "-h", mres->peer, 393 "-h", mres->peer, 581 result.peer = ""; 614 result.peer = ypvalbuf; 616 result.peer = ""; 921 result.ypresponse_u.yp_resp_map_parmstype.peer = ""; 945 result.ypresponse_u.yp_resp_map_parmstype.peer = 946 v2_result1->peer;
|
/freebsd-11-stable/lib/libc/resolv/ |
H A D | res_send.c | 340 struct sockaddr_storage peer; local 356 peerlen = sizeof(peer); 358 (struct sockaddr *)&peer, &peerlen) < 0) { 362 if (!sock_eq((struct sockaddr *)&peer, 646 struct sockaddr_storage peer; local 647 ISC_SOCKLEN_T size = sizeof peer; 650 (struct sockaddr *)&peer, &size) < 0 || 651 !sock_eq((struct sockaddr *)&peer, nsap)) {
|
/freebsd-11-stable/crypto/openssh/ |
H A D | kexecdhc.c | 183 sshbuf_ptr(kex->peer), sshbuf_len(kex->peer),
|
H A D | kexgexs.c | 200 sshbuf_ptr(kex->peer), sshbuf_len(kex->peer),
|
H A D | kexgexc.c | 228 sshbuf_ptr(kex->peer), sshbuf_len(kex->peer),
|
H A D | kexdhs.c | 171 sshbuf_ptr(kex->peer), sshbuf_len(kex->peer),
|
H A D | kexdhc.c | 178 sshbuf_ptr(kex->peer), sshbuf_len(kex->peer),
|
H A D | kex.h | 145 struct sshbuf *peer; member in struct:kex
|
/freebsd-11-stable/sys/net/ |
H A D | ieee8023ad_lacp.h | 273 #define LACP_SYS_PRI(peer) (peer).lip_systemid.lsi_prio
|
/freebsd-11-stable/crypto/openssl/crypto/bio/ |
H A D | bio.h | 618 # define BIO_ctrl_dgram_connect(b,peer) \ 619 (int)BIO_ctrl(b,BIO_CTRL_DGRAM_CONNECT,0, (char *)peer) 620 # define BIO_ctrl_set_connected(b, state, peer) \ 621 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_CONNECTED, state, (char *)peer) 626 # define BIO_dgram_get_peer(b,peer) \ 627 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_GET_PEER, 0, (char *)peer) 628 # define BIO_dgram_set_peer(b,peer) \ 629 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_PEER, 0, (char *)peer)
|
/freebsd-11-stable/contrib/wpa/wpa_supplicant/ |
H A D | mesh_rsn.c | 401 "AUTH: started authentication with SAE peer: " MACSTR, 426 u8 *peer = sta->addr; local 438 if (os_memcmp(myaddr, peer, ETH_ALEN) < 0) { 440 addr2 = peer; 442 addr1 = peer; 460 u8 *peer = sta->addr; local 498 if (os_memcmp(myaddr, peer, ETH_ALEN) < 0) { 500 max = peer; 502 min = peer; 720 wpa_msg(wpa_s, MSG_DEBUG, "Mesh RSN: invalid peer nonc [all...] |
H A D | p2p_supplicant.c | 738 * more than one peer. 1651 wpa_printf(MSG_DEBUG, "P2P: Start WPS Enrollee for peer " MACSTR 2606 const u8 *peer, const char *params, 2610 " %08d%s", MAC2STR(peer), generated_pin, params); 2615 const u8 *peer, const char *params) 2618 "%s", MAC2STR(peer), params); 2622 static void wpas_prov_disc_req(void *ctx, const u8 *peer, u16 config_methods, argument 2670 wpa_s, peer, 0 /* response */, 2674 wpas_prov_disc_local_display(wpa_s, peer, params, 2677 wpas_prov_disc_local_keypad(wpa_s, peer, param 2605 wpas_prov_disc_local_display(struct wpa_supplicant *wpa_s, const u8 *peer, const char *params, unsigned int generated_pin) argument 2614 wpas_prov_disc_local_keypad(struct wpa_supplicant *wpa_s, const u8 *peer, const char *params) argument 2688 wpas_prov_disc_resp(void *ctx, const u8 *peer, u16 config_methods) argument 2737 wpas_prov_disc_fail(void *ctx, const u8 *peer, enum p2p_prov_disc_status status, u32 adv_id, const u8 *adv_mac, const char *deferred_session_resp) argument 3150 wpas_remove_persistent_peer(struct wpa_supplicant *wpa_s, struct wpa_ssid *ssid, const u8 *peer, int inv) argument 3191 wpas_remove_persistent_client(struct wpa_supplicant *wpa_s, const u8 *peer) argument 3209 wpas_invitation_result(void *ctx, int status, const u8 *bssid, const struct p2p_channels *channels, const u8 *peer, int neg_freq, int peer_oper_freq) argument 3945 wpas_remove_stale_groups(void *ctx, const u8 *peer, const u8 *go, const u8 *ssid, size_t ssid_len) argument 7812 const u8 *peer; local 7904 u8 peer[ETH_ALEN]; local 8291 wpas_p2p_remove_client_go(struct wpa_supplicant *wpa_s, const u8 *peer, int iface_addr) argument 8342 wpas_p2p_remove_client(struct wpa_supplicant *wpa_s, const u8 *peer, int iface_addr) argument [all...] |
/freebsd-11-stable/libexec/tftpd/ |
H A D | tftp-utils.c | 105 get_field(int peer, char *buffer, ssize_t size) argument 115 send_error(peer, EBADOP);
|
/freebsd-11-stable/contrib/serf/ |
H A D | serf_private.h | 355 (*serf__setup_request_func_t)(peer_t peer, 370 peer_t peer,
|
/freebsd-11-stable/crypto/openssl/apps/ |
H A D | s_client.c | 308 " -verify_hostname host - check peer certificate matches \"host\"\n"); 310 " -verify_email email - check peer certificate matches \"email\"\n"); 312 " -verify_ip ipaddr - check peer certificate matches \"ipaddr\"\n"); 315 " -verify arg - turn on peer certificate verification\n"); 723 struct sockaddr peer; local 724 int peerlen = sizeof(peer); 1475 if (getsockname(s, &peer, (void *)&peerlen) < 0) { 1482 (void)BIO_ctrl_set_connected(sbio, 1, &peer); 2145 X509 *peer = NULL; local 2180 peer [all...] |
/freebsd-11-stable/contrib/wpa/src/p2p/ |
H A D | p2p.h | 137 * peer_device_addr - P2P Device Address of the peer 142 * peer_interface_addr - P2P Interface Address of the peer 209 * session_mac - MAC address of the peer that started the session 214 * adv_mac - MAC address of the peer advertised the service 320 * struct p2p_peer_info - P2P peer information 324 * p2p_device_addr - P2P Device Address of the peer 402 * IE(s) from the frame that was used to discover the peer. 482 * local end may become the client. This may allow the peer to become a 622 * target peer is known or if other channels are scanned in steps). 688 * no need to wait for a response from the destination peer anymor 2338 struct p2p_peer_info *peer; member in struct:p2p_nfc_params [all...] |
H A D | p2p_build.c | 187 struct p2p_device *peer) 202 if (peer && peer->wps_method != WPS_NOT_READY) { 203 if (peer->wps_method == WPS_PBC) 205 else if (peer->wps_method == WPS_P2PS) 207 else if (peer->wps_method == WPS_PIN_DISPLAY || 208 peer->wps_method == WPS_PIN_KEYPAD) 186 p2p_buf_add_device_info(struct wpabuf *buf, struct p2p_data *p2p, struct p2p_device *peer) argument
|
H A D | p2p.c | 45 * P2P_PEER_EXPIRATION_AGE - Number of seconds after which inactive peer 66 * GO Negotiation is in progress with the peer, so 67 * don't expire the peer entry until GO Negotiation 78 * peer is the GO, so do not expire the peer entry. 91 * The peer is connected as a client in a group where 92 * we are the GO, so do not expire the peer entry. 98 p2p_dbg(p2p, "Expiring old peer entry " MACSTR, 223 struct p2p_device *peer = p2p->go_neg_peer; local 225 if (!peer) 1782 p2p_go_complete(struct p2p_data *p2p, struct p2p_device *peer) argument 2605 struct p2p_device *peer; local 5218 p2p_loop_on_known_peers(struct p2p_data *p2p, void (*peer_callback)(struct p2p_peer_info *peer, void *user_data), void *user_data) argument [all...] |
/freebsd-11-stable/contrib/wpa/wpa_supplicant/dbus/ |
H A D | dbus_new_handlers.c | 2220 * wpas_dbus_handler_tdls_discover - Discover TDLS peer 2230 u8 peer[ETH_ALEN]; local 2234 if (get_peer_hwaddr_helper(message, __func__, peer, &error_reply) < 0) 2237 wpa_printf(MSG_DEBUG, "DBUS TDLS_DISCOVER " MACSTR, MAC2STR(peer)); 2240 ret = wpa_tdls_send_discovery_request(wpa_s->wpa, peer); 2242 ret = wpa_drv_tdls_oper(wpa_s, TDLS_DISCOVERY_REQ, peer); 2264 u8 peer[ETH_ALEN]; local 2268 if (get_peer_hwaddr_helper(message, __func__, peer, &error_reply) < 0) 2271 wpa_printf(MSG_DEBUG, "DBUS TDLS_SETUP " MACSTR, MAC2STR(peer)); 2273 wpa_tdls_remove(wpa_s->wpa, peer); 2299 u8 peer[ETH_ALEN]; local 2328 u8 peer[ETH_ALEN]; local 2366 u8 peer[ETH_ALEN]; local 2484 u8 peer[ETH_ALEN]; local [all...] |
/freebsd-11-stable/sys/netgraph/ |
H A D | ng_base.c | 1147 * from each other first. We reconnect the peer hook to the 'dead' 1149 * send the peer its own destroy message. This ensures that we only 1150 * interact with the peer's structures when it is locked processing that 1151 * message. We hold a reference to the peer hook so we are guaranteed that 1152 * the peer hook and node are still going to exist until 1154 * We run this same code again on the peer hook, but that time it is already 1163 hook_p peer; local 1179 peer = NG_HOOK_PEER(hook); 1182 if (peer && (peer ! 1389 hook_p peer; local 3583 hook_p peer; local [all...] |
/freebsd-11-stable/libexec/ypxfr/ |
H A D | ypxfr_misc.c | 186 snprintf(mastername, sizeof(mastername), "%s", resp->peer);
|
/freebsd-11-stable/usr.sbin/syslogd/ |
H A D | syslogd.c | 180 struct peer { struct 184 STAILQ_ENTRY(peer) next; 186 static STAILQ_HEAD(, peer) pqueue = STAILQ_HEAD_INITIALIZER(pqueue); 191 struct peer *sl_peer; 410 static int addpeer(struct peer *); 433 static int socksetup(struct peer *); 499 addpeer(struct peer *pe0) 501 struct peer *pe; 534 struct peer *pe; 577 addpeer(&(struct peer){ [all...] |
/freebsd-11-stable/contrib/wpa/src/ap/ |
H A D | drv_callbacks.c | 1083 sta = ap_get_sta(hapd, rx_auth->peer); 1085 sta = ap_sta_add(hapd, rx_auth->peer); 1125 hostapd_sta_auth(hapd, rx_auth->peer, rx_auth->auth_transaction + 1, 1594 const u8 *peer, const u8 *ie, 1605 if (!peer) { 1616 MACSTR, MAC2STR(peer)); 1620 status = owe_validate_request(hapd, peer, elems.rsn_ie, 1626 sta = ap_get_sta(hapd, peer); 1637 sta = ap_sta_add(hapd, peer); 1653 hostapd_drv_update_dh_ie(hapd, peer, statu 1593 hostapd_notif_update_dh_ie(struct hostapd_data *hapd, const u8 *peer, const u8 *ie, size_t ie_len) argument [all...] |