Searched refs:peer (Results 151 - 175 of 235) sorted by relevance

12345678910

/freebsd-11-stable/crypto/heimdal/lib/hx509/
H A Dcms.c1129 * default or the peer determined algorithm.
1131 * @param peer info about the peer the message to send the message to,
1150 hx509_peer_info peer,
1169 digest_alg, certs, peer, anchors, pool,
1182 hx509_peer_info peer; member in struct:sigctx
1219 sigctx->peer, &digest);
1350 _hx509_cert_private_key(cert), sigctx->peer,
1443 hx509_peer_info peer,
1464 sigctx.peer
1144 hx509_cms_create_signed_1(hx509_context context, int flags, const heim_oid *eContentType, const void *data, size_t length, const AlgorithmIdentifier *digest_alg, hx509_cert cert, hx509_peer_info peer, hx509_certs anchors, hx509_certs pool, heim_octet_string *signed_data) argument
1437 hx509_cms_create_signed(hx509_context context, int flags, const heim_oid *eContentType, const void *data, size_t length, const AlgorithmIdentifier *digest_alg, hx509_certs certs, hx509_peer_info peer, hx509_certs anchors, hx509_certs pool, heim_octet_string *signed_data) argument
[all...]
H A Dhxtool.c118 hx509_peer_info *peer,
124 ret = hx509_peer_info_alloc(contextp, peer);
135 ret = hx509_peer_info_set_cms_algs(contextp, *peer, val, s->num_strings);
360 hx509_peer_info peer = NULL; local
436 peer_strings(context, &peer, &opt->peer_alg_strings);
447 peer,
459 hx509_peer_info_free(peer);
1486 hx509_peer_info peer = NULL; local
1503 peer_strings(context, &peer, &opt->peer_cmstype_strings);
1505 ret = hx509_crypto_select(context, type, NULL, peer,
117 peer_strings(hx509_context contextp, hx509_peer_info *peer, const getarg_strings *s) argument
[all...]
/freebsd-11-stable/crypto/heimdal/lib/kadm5/
H A Dad.c126 struct tsasl_peer *peer = NULL; local
135 "ldap", host, &peer);
157 ret = tsasl_find_best_mech(peer, vals, &mech);
165 ret = tsasl_select_mech(peer, mech);
175 ret = tsasl_request(peer, &in, &out);
214 LBER_SBIOD_LEVEL_APPLICATION, peer);
217 } else if (peer != NULL)
218 tsasl_peer_free(peer);
/freebsd-11-stable/contrib/wpa/src/drivers/
H A Ddriver.h1579 /** Driver supports operating as a TDLS peer */
2092 /* TDLS peer capabilities for send_tdls_mgmt() */
2195 * @bssid: BSSID of the peer with which the authentication has to happen. Used
2273 * @addr: Address of the peer STA (BSSID of the current AP when setting
2380 * @addr: peer address (BSSID of the AP)
2928 * TDLS peer entries (even with drivers that do not support full AP
3383 * @dst: Destination (peer) MAC address
3387 * @peer_capab: TDLS peer capability (TDLS_PEER_* bitfield)
3404 * @peer: Destination (peer) MA
5125 u8 peer[ETH_ALEN]; member in struct:wpa_event_data::tdls
5176 u8 peer[ETH_ALEN]; member in struct:wpa_event_data::ibss_rsn_start
5183 u8 peer[ETH_ALEN]; member in struct:wpa_event_data::auth_info
5440 u8 peer[ETH_ALEN]; member in struct:wpa_event_data::ibss_peer_lost
5560 const u8 *peer; member in struct:wpa_event_data::mesh_peer
5641 const u8 *peer; member in struct:wpa_event_data::update_dh
[all...]
H A Ddriver_atheros.c940 os_memcpy(event.auth.peer, mgmt->sa, ETH_ALEN);
2108 static int athr_wnm_tfs(struct atheros_driver_data *drv, const u8* peer, argument
2117 drv->iface, oper, MAC2STR(peer));
2131 os_memcpy(&(tfs_ie->app_buf[0]), peer, ETH_ALEN);
2153 os_memcpy(&(tfs_ie->app_buf[0]), peer, ETH_ALEN);
2180 os_memcpy(&(tfs_ie->app_buf[0]), peer, ETH_ALEN);
2203 const u8 *peer, enum wnm_oper oper)
2211 oper, MAC2STR(peer));
2220 os_memcpy(pos, peer, ETH_ALEN);
2238 static int atheros_wnm_oper(void *priv, enum wnm_oper oper, const u8 *peer, argument
2202 atheros_wnm_sleep(struct atheros_driver_data *drv, const u8 *peer, enum wnm_oper oper) argument
[all...]
/freebsd-11-stable/contrib/wpa/src/wps/
H A Dwps_upnp.c1128 struct upnp_wps_peer *peer; local
1149 while ((peer = dl_list_first(&iface->peers, struct upnp_wps_peer,
1151 if (peer->wps)
1152 wps_deinit(peer->wps);
1153 dl_list_del(&peer->list);
1154 os_free(peer);
/freebsd-11-stable/crypto/heimdal/kdc/
H A Dpkinit.c67 hx509_peer_info peer; member in struct:pk_client_params
195 if (cp->peer)
196 hx509_peer_info_free(cp->peer);
847 &cp->peer);
855 cp->peer,
864 hx509_peer_info_add_cms_alg(context->hx509ctx, cp->peer,
866 hx509_peer_info_add_cms_alg(context->hx509ctx, cp->peer,
868 hx509_peer_info_add_cms_alg(context->hx509ctx, cp->peer,
1042 cp->peer,
1198 cp->peer,
[all...]
/freebsd-11-stable/sys/net/altq/
H A Daltq_rmclass.c196 struct rm_class *peer; local
322 if ((peer = ifd->active_[pri]) != NULL) {
324 cl->peer_ = peer;
325 while (peer->peer_ != ifd->active_[pri])
326 peer = peer->peer_;
327 peer->peer_ = cl;
601 * Delete class from class priority peer list.
/freebsd-11-stable/usr.sbin/inetd/
H A Dinetd.c55 * to their peer, freeing up the original socket for inetd
346 struct sockaddr_storage peer; local
664 sl = sizeof(peer);
666 &peer, &sl)) {
667 sl = sizeof(peer);
670 (struct sockaddr *)&peer,
672 getnameinfo((struct sockaddr *)&peer,
673 peer.ss_len,
678 getnameinfo((struct sockaddr *)&peer,
679 peer
[all...]
/freebsd-11-stable/crypto/openssl/ssl/
H A Dssl_sess.c274 if (src->peer != NULL)
275 CRYPTO_add(&src->peer->references, 1, CRYPTO_LOCK_X509);
878 if (ss->peer != NULL)
879 X509_free(ss->peer);
999 return s->peer;
H A Ds2_srvr.c311 ((s->session->peer != NULL) &&
1118 if (s->session->peer != NULL)
1119 X509_free(s->session->peer);
1120 s->session->peer = x509;
H A Ds2_clnt.c505 if (s->session->peer != NULL) { /* can't happen */
511 s->session->peer = s->session->sess_cert->peer_key->x509;
513 CRYPTO_add(&s->session->peer->references, 1, CRYPTO_LOCK_X509);
517 || s->session->peer != s->session->sess_cert->peer_key->x509)
/freebsd-11-stable/crypto/openssl/apps/
H A Ds_server.c496 " -verify_hostname host - check peer certificate matches \"host\"\n");
498 " -verify_email email - check peer certificate matches \"email\"\n");
500 " -verify_ip ipaddr - check peer certificate matches \"ipaddr\"\n");
503 " -verify arg - turn on peer certificate verification\n");
505 " -Verify arg - turn on peer certificate verification, must have a cert.\n");
521 " -crl_check - check the peer certificate has not been revoked by its CA.\n"
524 " -crl_check_all - check the peer certificate has not been revoked by its CA\n"
2614 X509 *peer; local
2676 peer = SSL_get_peer_certificate(con);
2677 if (peer !
2957 X509 *peer; local
[all...]
/freebsd-11-stable/contrib/bsnmp/snmpd/
H A Dtrans_udp.c188 port->input.peer = (struct sockaddr *)&port->ret;
296 msg.msg_name = pi->peer;
H A Dsnmpd.h158 struct sockaddr *peer; /* last received packet */ member in struct:port_input
160 int priv : 1; /* peer is privileged */
/freebsd-11-stable/contrib/wpa/src/rsn_supp/
H A Dwpa_i.h48 u8 preauth_bssid[ETH_ALEN]; /* current RSN pre-auth peer or
336 const u8 *peer)
339 return sm->ctx->tdls_oper(sm->ctx->ctx, oper, peer);
335 wpa_sm_tdls_oper(struct wpa_sm *sm, int oper, const u8 *peer) argument
/freebsd-11-stable/contrib/ntp/ntpd/
H A Dntp_timer.c299 struct peer * p;
300 struct peer * next_peer;
324 * careful here, since the peer structure might go away as the
356 * tiptoed home, but since we're unsync'd and have no peer, we
377 "no peer for too long, server running free now");
/freebsd-11-stable/contrib/wpa/wpa_supplicant/
H A Dctrl_iface.c852 u8 peer[ETH_ALEN]; local
855 if (hwaddr_aton(addr, peer)) {
862 MAC2STR(peer));
865 ret = wpa_tdls_send_discovery_request(wpa_s->wpa, peer);
867 ret = wpa_drv_tdls_oper(wpa_s, TDLS_DISCOVERY_REQ, peer);
876 u8 peer[ETH_ALEN]; local
879 if (hwaddr_aton(addr, peer)) {
886 MAC2STR(peer));
890 return wpa_drv_tdls_oper(wpa_s, TDLS_SETUP, peer);
892 wpa_tdls_remove(wpa_s->wpa, peer);
906 u8 peer[ETH_ALEN]; local
959 u8 peer[ETH_ALEN]; local
1032 u8 peer[ETH_ALEN]; local
1058 u8 peer[ETH_ALEN]; local
1977 u8 peer[ETH_ALEN]; local
6301 u8 *_peer = NULL, peer[ETH_ALEN]; local
6362 u8 peer[ETH_ALEN], go_dev_addr[ETH_ALEN], *go_dev = NULL; local
6972 u8 peer[ETH_ALEN]; local
[all...]
H A Ddriver_i.h574 enum tdls_oper oper, const u8 *peer)
578 return wpa_s->driver->tdls_oper(wpa_s->drv_priv, oper, peer);
658 enum wnm_oper oper, const u8 *peer,
663 return wpa_s->driver->wnm_oper(wpa_s->drv_priv, oper, peer, buf,
573 wpa_drv_tdls_oper(struct wpa_supplicant *wpa_s, enum tdls_oper oper, const u8 *peer) argument
657 wpa_drv_wnm_oper(struct wpa_supplicant *wpa_s, enum wnm_oper oper, const u8 *peer, u8 *buf, u16 *buf_len) argument
/freebsd-11-stable/sys/dev/acpica/
H A Dacpi_ec.c341 device_t peer; local
424 peer = devclass_get_device(acpi_ec_devclass, params->uid);
425 if (peer == NULL || !device_is_alive(peer))
/freebsd-11-stable/sbin/pfctl/
H A Dpfctl_parser.h119 struct pf_addr peer; member in struct:node_host
/freebsd-11-stable/lib/libprocstat/
H A Dlibprocstat.h139 uint64_t peer; member in struct:pipestat
/freebsd-11-stable/contrib/wpa/src/ap/
H A Dap_drv_ops.c732 const u8 *peer, u8 *buf, u16 *buf_len)
736 return hapd->driver->wnm_oper(hapd->drv_priv, oper, peer, buf,
963 int hostapd_drv_update_dh_ie(struct hostapd_data *hapd, const u8 *peer, argument
968 return hapd->driver->update_dh_ie(hapd->drv_priv, peer, reason_code,
731 hostapd_drv_wnm_oper(struct hostapd_data *hapd, enum wnm_oper oper, const u8 *peer, u8 *buf, u16 *buf_len) argument
/freebsd-11-stable/contrib/wpa/src/pae/
H A Dieee802_1x_kay_i.h134 /* Current peer MI and SCI during MKPDU processing */
225 * @peer: array of (MI, MN) pairs
244 u8 peer[0]; member in struct:ieee802_1x_mka_peer_body
/freebsd-11-stable/sys/netinet/
H A Dsctp_auth.h88 sctp_key_t *peer_random; /* peer's random key (concatenated) */
163 sctp_negotiate_hmacid(sctp_hmaclist_t *peer,

Completed in 478 milliseconds

12345678910