/freebsd-11-stable/crypto/heimdal/lib/hx509/ |
H A D | cms.c | 1129 * default or the peer determined algorithm. 1131 * @param peer info about the peer the message to send the message to, 1150 hx509_peer_info peer, 1169 digest_alg, certs, peer, anchors, pool, 1182 hx509_peer_info peer; member in struct:sigctx 1219 sigctx->peer, &digest); 1350 _hx509_cert_private_key(cert), sigctx->peer, 1443 hx509_peer_info peer, 1464 sigctx.peer 1144 hx509_cms_create_signed_1(hx509_context context, int flags, const heim_oid *eContentType, const void *data, size_t length, const AlgorithmIdentifier *digest_alg, hx509_cert cert, hx509_peer_info peer, hx509_certs anchors, hx509_certs pool, heim_octet_string *signed_data) argument 1437 hx509_cms_create_signed(hx509_context context, int flags, const heim_oid *eContentType, const void *data, size_t length, const AlgorithmIdentifier *digest_alg, hx509_certs certs, hx509_peer_info peer, hx509_certs anchors, hx509_certs pool, heim_octet_string *signed_data) argument [all...] |
H A D | hxtool.c | 118 hx509_peer_info *peer, 124 ret = hx509_peer_info_alloc(contextp, peer); 135 ret = hx509_peer_info_set_cms_algs(contextp, *peer, val, s->num_strings); 360 hx509_peer_info peer = NULL; local 436 peer_strings(context, &peer, &opt->peer_alg_strings); 447 peer, 459 hx509_peer_info_free(peer); 1486 hx509_peer_info peer = NULL; local 1503 peer_strings(context, &peer, &opt->peer_cmstype_strings); 1505 ret = hx509_crypto_select(context, type, NULL, peer, 117 peer_strings(hx509_context contextp, hx509_peer_info *peer, const getarg_strings *s) argument [all...] |
/freebsd-11-stable/crypto/heimdal/lib/kadm5/ |
H A D | ad.c | 126 struct tsasl_peer *peer = NULL; local 135 "ldap", host, &peer); 157 ret = tsasl_find_best_mech(peer, vals, &mech); 165 ret = tsasl_select_mech(peer, mech); 175 ret = tsasl_request(peer, &in, &out); 214 LBER_SBIOD_LEVEL_APPLICATION, peer); 217 } else if (peer != NULL) 218 tsasl_peer_free(peer);
|
/freebsd-11-stable/contrib/wpa/src/drivers/ |
H A D | driver.h | 1579 /** Driver supports operating as a TDLS peer */ 2092 /* TDLS peer capabilities for send_tdls_mgmt() */ 2195 * @bssid: BSSID of the peer with which the authentication has to happen. Used 2273 * @addr: Address of the peer STA (BSSID of the current AP when setting 2380 * @addr: peer address (BSSID of the AP) 2928 * TDLS peer entries (even with drivers that do not support full AP 3383 * @dst: Destination (peer) MAC address 3387 * @peer_capab: TDLS peer capability (TDLS_PEER_* bitfield) 3404 * @peer: Destination (peer) MA 5125 u8 peer[ETH_ALEN]; member in struct:wpa_event_data::tdls 5176 u8 peer[ETH_ALEN]; member in struct:wpa_event_data::ibss_rsn_start 5183 u8 peer[ETH_ALEN]; member in struct:wpa_event_data::auth_info 5440 u8 peer[ETH_ALEN]; member in struct:wpa_event_data::ibss_peer_lost 5560 const u8 *peer; member in struct:wpa_event_data::mesh_peer 5641 const u8 *peer; member in struct:wpa_event_data::update_dh [all...] |
H A D | driver_atheros.c | 940 os_memcpy(event.auth.peer, mgmt->sa, ETH_ALEN); 2108 static int athr_wnm_tfs(struct atheros_driver_data *drv, const u8* peer, argument 2117 drv->iface, oper, MAC2STR(peer)); 2131 os_memcpy(&(tfs_ie->app_buf[0]), peer, ETH_ALEN); 2153 os_memcpy(&(tfs_ie->app_buf[0]), peer, ETH_ALEN); 2180 os_memcpy(&(tfs_ie->app_buf[0]), peer, ETH_ALEN); 2203 const u8 *peer, enum wnm_oper oper) 2211 oper, MAC2STR(peer)); 2220 os_memcpy(pos, peer, ETH_ALEN); 2238 static int atheros_wnm_oper(void *priv, enum wnm_oper oper, const u8 *peer, argument 2202 atheros_wnm_sleep(struct atheros_driver_data *drv, const u8 *peer, enum wnm_oper oper) argument [all...] |
/freebsd-11-stable/contrib/wpa/src/wps/ |
H A D | wps_upnp.c | 1128 struct upnp_wps_peer *peer; local 1149 while ((peer = dl_list_first(&iface->peers, struct upnp_wps_peer, 1151 if (peer->wps) 1152 wps_deinit(peer->wps); 1153 dl_list_del(&peer->list); 1154 os_free(peer);
|
/freebsd-11-stable/crypto/heimdal/kdc/ |
H A D | pkinit.c | 67 hx509_peer_info peer; member in struct:pk_client_params 195 if (cp->peer) 196 hx509_peer_info_free(cp->peer); 847 &cp->peer); 855 cp->peer, 864 hx509_peer_info_add_cms_alg(context->hx509ctx, cp->peer, 866 hx509_peer_info_add_cms_alg(context->hx509ctx, cp->peer, 868 hx509_peer_info_add_cms_alg(context->hx509ctx, cp->peer, 1042 cp->peer, 1198 cp->peer, [all...] |
/freebsd-11-stable/sys/net/altq/ |
H A D | altq_rmclass.c | 196 struct rm_class *peer; local 322 if ((peer = ifd->active_[pri]) != NULL) { 324 cl->peer_ = peer; 325 while (peer->peer_ != ifd->active_[pri]) 326 peer = peer->peer_; 327 peer->peer_ = cl; 601 * Delete class from class priority peer list.
|
/freebsd-11-stable/usr.sbin/inetd/ |
H A D | inetd.c | 55 * to their peer, freeing up the original socket for inetd 346 struct sockaddr_storage peer; local 664 sl = sizeof(peer); 666 &peer, &sl)) { 667 sl = sizeof(peer); 670 (struct sockaddr *)&peer, 672 getnameinfo((struct sockaddr *)&peer, 673 peer.ss_len, 678 getnameinfo((struct sockaddr *)&peer, 679 peer [all...] |
/freebsd-11-stable/crypto/openssl/ssl/ |
H A D | ssl_sess.c | 274 if (src->peer != NULL) 275 CRYPTO_add(&src->peer->references, 1, CRYPTO_LOCK_X509); 878 if (ss->peer != NULL) 879 X509_free(ss->peer); 999 return s->peer;
|
H A D | s2_srvr.c | 311 ((s->session->peer != NULL) && 1118 if (s->session->peer != NULL) 1119 X509_free(s->session->peer); 1120 s->session->peer = x509;
|
H A D | s2_clnt.c | 505 if (s->session->peer != NULL) { /* can't happen */ 511 s->session->peer = s->session->sess_cert->peer_key->x509; 513 CRYPTO_add(&s->session->peer->references, 1, CRYPTO_LOCK_X509); 517 || s->session->peer != s->session->sess_cert->peer_key->x509)
|
/freebsd-11-stable/crypto/openssl/apps/ |
H A D | s_server.c | 496 " -verify_hostname host - check peer certificate matches \"host\"\n"); 498 " -verify_email email - check peer certificate matches \"email\"\n"); 500 " -verify_ip ipaddr - check peer certificate matches \"ipaddr\"\n"); 503 " -verify arg - turn on peer certificate verification\n"); 505 " -Verify arg - turn on peer certificate verification, must have a cert.\n"); 521 " -crl_check - check the peer certificate has not been revoked by its CA.\n" 524 " -crl_check_all - check the peer certificate has not been revoked by its CA\n" 2614 X509 *peer; local 2676 peer = SSL_get_peer_certificate(con); 2677 if (peer ! 2957 X509 *peer; local [all...] |
/freebsd-11-stable/contrib/bsnmp/snmpd/ |
H A D | trans_udp.c | 188 port->input.peer = (struct sockaddr *)&port->ret; 296 msg.msg_name = pi->peer;
|
H A D | snmpd.h | 158 struct sockaddr *peer; /* last received packet */ member in struct:port_input 160 int priv : 1; /* peer is privileged */
|
/freebsd-11-stable/contrib/wpa/src/rsn_supp/ |
H A D | wpa_i.h | 48 u8 preauth_bssid[ETH_ALEN]; /* current RSN pre-auth peer or 336 const u8 *peer) 339 return sm->ctx->tdls_oper(sm->ctx->ctx, oper, peer); 335 wpa_sm_tdls_oper(struct wpa_sm *sm, int oper, const u8 *peer) argument
|
/freebsd-11-stable/contrib/ntp/ntpd/ |
H A D | ntp_timer.c | 299 struct peer * p; 300 struct peer * next_peer; 324 * careful here, since the peer structure might go away as the 356 * tiptoed home, but since we're unsync'd and have no peer, we 377 "no peer for too long, server running free now");
|
/freebsd-11-stable/contrib/wpa/wpa_supplicant/ |
H A D | ctrl_iface.c | 852 u8 peer[ETH_ALEN]; local 855 if (hwaddr_aton(addr, peer)) { 862 MAC2STR(peer)); 865 ret = wpa_tdls_send_discovery_request(wpa_s->wpa, peer); 867 ret = wpa_drv_tdls_oper(wpa_s, TDLS_DISCOVERY_REQ, peer); 876 u8 peer[ETH_ALEN]; local 879 if (hwaddr_aton(addr, peer)) { 886 MAC2STR(peer)); 890 return wpa_drv_tdls_oper(wpa_s, TDLS_SETUP, peer); 892 wpa_tdls_remove(wpa_s->wpa, peer); 906 u8 peer[ETH_ALEN]; local 959 u8 peer[ETH_ALEN]; local 1032 u8 peer[ETH_ALEN]; local 1058 u8 peer[ETH_ALEN]; local 1977 u8 peer[ETH_ALEN]; local 6301 u8 *_peer = NULL, peer[ETH_ALEN]; local 6362 u8 peer[ETH_ALEN], go_dev_addr[ETH_ALEN], *go_dev = NULL; local 6972 u8 peer[ETH_ALEN]; local [all...] |
H A D | driver_i.h | 574 enum tdls_oper oper, const u8 *peer) 578 return wpa_s->driver->tdls_oper(wpa_s->drv_priv, oper, peer); 658 enum wnm_oper oper, const u8 *peer, 663 return wpa_s->driver->wnm_oper(wpa_s->drv_priv, oper, peer, buf, 573 wpa_drv_tdls_oper(struct wpa_supplicant *wpa_s, enum tdls_oper oper, const u8 *peer) argument 657 wpa_drv_wnm_oper(struct wpa_supplicant *wpa_s, enum wnm_oper oper, const u8 *peer, u8 *buf, u16 *buf_len) argument
|
/freebsd-11-stable/sys/dev/acpica/ |
H A D | acpi_ec.c | 341 device_t peer; local 424 peer = devclass_get_device(acpi_ec_devclass, params->uid); 425 if (peer == NULL || !device_is_alive(peer))
|
/freebsd-11-stable/sbin/pfctl/ |
H A D | pfctl_parser.h | 119 struct pf_addr peer; member in struct:node_host
|
/freebsd-11-stable/lib/libprocstat/ |
H A D | libprocstat.h | 139 uint64_t peer; member in struct:pipestat
|
/freebsd-11-stable/contrib/wpa/src/ap/ |
H A D | ap_drv_ops.c | 732 const u8 *peer, u8 *buf, u16 *buf_len) 736 return hapd->driver->wnm_oper(hapd->drv_priv, oper, peer, buf, 963 int hostapd_drv_update_dh_ie(struct hostapd_data *hapd, const u8 *peer, argument 968 return hapd->driver->update_dh_ie(hapd->drv_priv, peer, reason_code, 731 hostapd_drv_wnm_oper(struct hostapd_data *hapd, enum wnm_oper oper, const u8 *peer, u8 *buf, u16 *buf_len) argument
|
/freebsd-11-stable/contrib/wpa/src/pae/ |
H A D | ieee802_1x_kay_i.h | 134 /* Current peer MI and SCI during MKPDU processing */ 225 * @peer: array of (MI, MN) pairs 244 u8 peer[0]; member in struct:ieee802_1x_mka_peer_body
|
/freebsd-11-stable/sys/netinet/ |
H A D | sctp_auth.h | 88 sctp_key_t *peer_random; /* peer's random key (concatenated) */ 163 sctp_negotiate_hmacid(sctp_hmaclist_t *peer,
|