Searched refs:peer (Results 201 - 225 of 235) sorted by relevance

12345678910

/freebsd-11-stable/contrib/wpa/wpa_supplicant/
H A Devents.c3357 wpa_tdls_remove(wpa_s->wpa, data->tdls.peer);
3359 wpa_tdls_start(wpa_s->wpa, data->tdls.peer);
3361 wpa_drv_tdls_oper(wpa_s, TDLS_SETUP, data->tdls.peer);
3365 wpa_tdls_teardown_link(wpa_s->wpa, data->tdls.peer,
3369 data->tdls.peer);
3373 data->tdls.peer);
3434 ibss_rsn_start(wpa_s->ibss_rsn, data->ibss_rsn_start.peer);
4832 ibss_rsn_stop(wpa_s->ibss_rsn, data->ibss_peer_lost.peer);
4902 wpa_mesh_notify_peer(wpa_s, data->mesh_peer.peer,
H A Dwpa_priv.c897 os_memcpy(auth->peer, data->auth.peer, ETH_ALEN);
/freebsd-11-stable/usr.bin/fstat/
H A Dfstat.c407 printf("* pipe %8lx <-> %8lx", (u_long)ps.addr, (u_long)ps.peer);
/freebsd-11-stable/contrib/ntp/scripts/
H A Dsummary.in3 # Perl version of (summary.sh, loop.awk, peer.awk):
4 # Create summaries from xntpd's loop and peer statistics.
47 $peer_dist_limit = $opts->{'peer-dist-limit'};
72 @peerfiles=sort grep /peer.*$log_date_pattern/, readdir SDIR;
102 print STDERR "Creating peer summary with limit $peer_dist_limit\n";
189 # and maximum distance for each peer
198 # peer is in initial acquisition
225 warn "ignoring peer offset $offs (file $fname, line $.)\n";
231 $i = $j; # peer found
235 if ($i == $n) { # add new peer
[all...]
/freebsd-11-stable/contrib/ntp/scripts/update-leap/
H A Dupdate-leap.in454 the peer's identity.
/freebsd-11-stable/usr.sbin/ppp/
H A Dcbcp.c127 log_Printf(LogCBCP, "%s: Timeout waiting for peer %s\n",
321 if (*cbcp->p->dl->peer.authname == '\0' ||
322 !auth_SetPhoneList(cbcp->p->dl->peer.authname, cbcp->fsm.phone,
359 * so that we (hopefully) agree with the peer
387 * The peer has given us an address type spec - make sure we
397 /* we accept the REQ even if the peer didn't specify an addr->type */
403 log_Printf(LogPHASE, "CBCP: no number to pass to the peer !\n");
413 * This violates the spec, but if the peer has told us the
425 * If the peer's insisting on deciding the number, make sure
426 * it's one of the ones in our list. If it is, let the peer
[all...]
/freebsd-11-stable/contrib/wpa/src/p2p/
H A Dp2p_sd.c58 return NULL; /* peer does not support SD */
65 /* Use WSD only if the peer indicates support or it */
82 os_memcmp(q->peer, dev->info.p2p_device_addr, ETH_ALEN) ==
282 p2p_dbg(p2p, "No Listen/Operating frequency known for the peer "
295 " due to it being the first no-ACK peer in this search iteration",
443 * separately for each peer to avoid having to drop old
882 os_memcpy(q->peer, dst, ETH_ALEN);
/freebsd-11-stable/contrib/wpa/src/drivers/
H A Ddriver_privsep.c393 os_memcpy(data.auth.peer, auth->peer, ETH_ALEN);
/freebsd-11-stable/crypto/heimdal/lib/krb5/
H A Dpkinit.c72 hx509_peer_info peer; member in struct:krb5_pk_init_ctx_data
228 hx509_peer_info peer,
243 peer,
728 ctx->peer, &sd_buf);
2387 opt->opt_private->pk_init_ctx->peer = NULL;
224 create_signature(krb5_context context, const heim_oid *eContentType, krb5_data *eContent, struct krb5_pk_identity *id, hx509_peer_info peer, krb5_data *sd_data) argument
/freebsd-11-stable/contrib/ntp/ntpd/
H A Dntp_config.c91 { "peer", NLOG_OPEER },
812 "# unknown peer family %d for:\n"
1472 "Unknown peer/server option token %s",
4108 * - multicast address for server/peer!
4248 * Note that if we're told to add the peer here, we
4487 struct peer * p;
4575 struct peer * peer; local
4594 DPRINTF(1, ("unpeer: searching for peer %s\n",
4596 peer
[all...]
/freebsd-11-stable/sbin/pfctl/
H A Dpfctl_parser.c1207 memcpy(&n->peer, &((struct sockaddr_in *)
1222 memcpy(&n->peer, &((struct sockaddr_in6 *)
1387 memcpy(&n->addr.v.a.addr, &p->peer,
1507 else if (!strcmp(p+1, "peer"))
H A Dparse.y197 struct peer {
394 struct peer peer;
396 struct peer src, dst;
488 %type <v.peer> ipportspec from to
3167 else if (!strcmp(p+1, "peer"))
/freebsd-11-stable/crypto/openssh/
H A Dpacket.c2503 (r = sshbuf_put_stringb(m, kex->peer)) != 0 ||
2694 (kex->peer = sshbuf_new()) == NULL) {
2703 (r = sshbuf_get_stringb(m, kex->peer)) != 0 ||
2715 sshbuf_free(kex->peer);
/freebsd-11-stable/contrib/wpa/src/common/
H A Ddpp.h505 dpp_pkex_finish(struct dpp_global *dpp, struct dpp_pkex *pkex, const u8 *peer,
/freebsd-11-stable/contrib/wpa/src/rsn_supp/
H A Dwpa.h64 int (*tdls_oper)(void *ctx, int oper, const u8 *peer);
/freebsd-11-stable/usr.sbin/ypldap/
H A Dyp.c593 res.peer = (peername)master;
/freebsd-11-stable/contrib/ntp/include/
H A Dntp_request.h75 * 4 - no data available (e.g. request for details on unknown peer)
260 #define REQ_PEER_INFO 2 /* get standard information on peer */
261 #define REQ_PEER_STATS 3 /* get statistics for peer */
265 #define REQ_MEM_STATS 7 /* stats related to peer list maint */
268 #define REQ_CONFIG 10 /* configure a new peer */
269 #define REQ_UNCONFIG 11 /* unconfigure an existing peer */
280 #define REQ_RESET_PEER 22 /* reset peer stat counters */
308 * Flags in the peer information returns
338 u_int32 addr; /* address of peer */
339 u_short port; /* port number of peer */
477 u_int32 peer; /* system peer address (v4) */ member in struct:info_sys
[all...]
/freebsd-11-stable/crypto/heimdal/lib/hx509/
H A DMakefile.am83 peer.c \
H A Dtest_cms.in390 --peer-alg=1.2.840.113549.1.1.1 \
/freebsd-11-stable/crypto/openssl/ssl/
H A Ds3_clnt.c1284 * Inconsistency alert: cert_chain does include the peer's certificate,
1346 if (s->session->peer != NULL)
1347 X509_free(s->session->peer);
1349 s->session->peer = x;
1354 if (s->session->peer != NULL)
1355 X509_free(s->session->peer);
1356 s->session->peer = NULL;
H A Dssl.h176 * Version 1 - added the optional peer certificate
538 X509 *peer; member in struct:ssl_session_st
540 * when app_verify_callback accepts a session where the peer's
562 unsigned char *tlsext_ecpointformatlist; /* peer's list */
564 unsigned char *tlsext_ellipticcurvelist; /* peer's list */
1765 * -- that we expected from peer (SSL_get_peer_finished).
1988 # define DTLSv1_listen(ssl, peer) \
1989 SSL_ctrl(ssl,DTLS_CTRL_LISTEN,0, (void *)peer)
/freebsd-11-stable/sys/dev/mwl/
H A Dmwlhal.c1685 const MWL_HAL_PEERINFO *peer, int isQosSta, int wmeInfo)
1696 if (peer != NULL) {
1698 cvtPeerInfo(&pCmd->PeerInfo, peer);
1683 mwl_hal_newstation(struct mwl_hal_vap *vap, const uint8_t addr[IEEE80211_ADDR_LEN], uint16_t aid, uint16_t sid, const MWL_HAL_PEERINFO *peer, int isQosSta, int wmeInfo) argument
/freebsd-11-stable/usr.sbin/ntp/ntpdc/
H A Dnl.c298 printf("offsetof(peer) = %d\n",
299 (int) offsetof(struct info_sys, peer));
/freebsd-11-stable/lib/libc/yp/
H A Dyplib.c1095 *outname = (char *)strdup(yprm.peer);
/freebsd-11-stable/contrib/wpa/src/ap/
H A Dieee802_11.c383 wpa_printf(MSG_DEBUG, "SAE: State %s -> %s for peer " MACSTR " (%s)",
1031 "SAE: Cancel use of mesh PMKSA caching because peer starts SAE authentication");
1210 "SAE: Silently ignore unexpected Confirm from peer "
1212 " (peer-send-confirm=%u Rc=%u)",
1269 * @sta: the peer to which commit authentication frame is sent
1351 * queue entry with the new one. This avoids issues with a peer that
2218 * be a queued commit message from the same peer. This is needed
2244 wpa_printf(MSG_DEBUG, "Mesh peer " MACSTR
2253 /* if the mesh peer is not available, we don't do auth.
2255 wpa_printf(MSG_DEBUG, "Mesh peer " MACST
2800 owe_validate_request(struct hostapd_data *hapd, const u8 *peer, const u8 *rsn_ie, size_t rsn_ie_len, const u8 *owe_dh, size_t owe_dh_len) argument
[all...]

Completed in 485 milliseconds

12345678910