Searched refs:peer (Results 176 - 200 of 235) sorted by relevance

12345678910

/freebsd-11-stable/contrib/wpa/wpa_supplicant/
H A Dwpas_glue.c720 static int wpa_supplicant_tdls_oper(void *ctx, int oper, const u8 *peer) argument
723 return wpa_drv_tdls_oper(wpa_s, oper, peer);
728 void *ctx, const u8 *peer, int add, u16 aid, u16 capability,
741 params.addr = peer;
727 wpa_supplicant_tdls_peer_addset( void *ctx, const u8 *peer, int add, u16 aid, u16 capability, const u8 *supp_rates, size_t supp_rates_len, const struct ieee80211_ht_capabilities *ht_capab, const struct ieee80211_vht_capabilities *vht_capab, u8 qosinfo, int wmm, const u8 *ext_capab, size_t ext_capab_len, const u8 *supp_channels, size_t supp_channels_len, const u8 *supp_oper_classes, size_t supp_oper_classes_len) argument
H A Dsme.c1165 wpa_printf(MSG_DEBUG, "SAE: Failed to process peer "
1259 if (os_memcmp(wpa_s->pending_bssid, data->auth.peer, ETH_ALEN) != 0) {
1261 "unexpected peer " MACSTR,
1262 MAC2STR(data->auth.peer));
1266 wpa_dbg(wpa_s, MSG_DEBUG, "SME: Authentication response: peer=" MACSTR
1268 MAC2STR(data->auth.peer), data->auth.auth_type,
1309 MAC2STR(data->auth.peer), data->auth.auth_type,
1365 data->auth.peer,
1419 sme_associate(wpa_s, ssid->mode, data->auth.peer,
H A Dp2p_supplicant.h155 void wpas_p2p_remove_client(struct wpa_supplicant *wpa_s, const u8 *peer,
/freebsd-11-stable/usr.sbin/nfsd/
H A Dnfsd.c152 struct sockaddr_storage peer; local
783 len = sizeof(peer);
785 (struct sockaddr *)&peer, &len)) < 0) {
798 addsockargs.name = (caddr_t)&peer;
/freebsd-11-stable/contrib/wpa/src/drivers/
H A Ddriver_nl80211_event.c175 os_memcpy(event.auth.peer, mgmt->sa, ETH_ALEN);
1121 data.update_dh.peer = nla_data(tb[NL80211_ATTR_MAC]);
1125 wpa_printf(MSG_DEBUG, "nl80211: DH event - peer " MACSTR,
1126 MAC2STR(data.update_dh.peer));
1321 wpa_printf(MSG_DEBUG, "nl80211: New peer candidate " MACSTR,
1325 data.mesh_peer.peer = addr;
1360 os_memcpy(data.ibss_rsn_start.peer, addr, ETH_ALEN);
1387 os_memcpy(data.ibss_peer_lost.peer, addr, ETH_ALEN);
1501 os_memcpy(data.tdls.peer, nla_data(tb[NL80211_ATTR_MAC]), ETH_ALEN);
1504 wpa_printf(MSG_DEBUG, "nl80211: TDLS setup request for peer "
[all...]
/freebsd-11-stable/sys/contrib/ngatm/netnatm/sig/
H A Dsig_call.c1940 * Enquiry peer status
4259 * Check whether the peer state is compatible with our state.
4271 state_compat(struct call *c, enum uni_callstate peer) argument
4276 (peer == UNI_CALLSTATE_N6 ||
4277 peer == UNI_CALLSTATE_N7 ||
4278 peer == UNI_CALLSTATE_N8 ||
4279 peer == UNI_CALLSTATE_N9))
4286 (peer == UNI_CALLSTATE_U1 ||
4287 peer == UNI_CALLSTATE_U3 ||
4288 peer
[all...]
/freebsd-11-stable/usr.sbin/ppp/
H A Dlcp.c797 /* Set the MTU to what we want anyway - the peer won't care! */
1212 } else if (opt->hdr.len < sizeof p->dl->peer.enddisc.address + 3 &&
1214 p->dl->peer.enddisc.class = opt->data[0];
1215 p->dl->peer.enddisc.len = opt->hdr.len - 3;
1216 memcpy(p->dl->peer.enddisc.address, opt->data + 1, opt->hdr.len - 3);
1217 p->dl->peer.enddisc.address[opt->hdr.len - 3] = '\0';
1218 /* XXX: If mp->active, compare and NAK with mp->peer ? */
1226 (long)(sizeof p->dl->peer.enddisc.address - 1));
1262 /* We *REQUIRE* that the peer requests callback */
1287 /* Don't let the peer us
[all...]
H A Dcommand.c597 mp_Enddisc(bundle->ncp.mp.peer.enddisc.class,
598 bundle->ncp.mp.peer.enddisc.address,
599 bundle->ncp.mp.peer.enddisc.len));
606 nargv[arg] = subst(nargv[arg], "USER", bundle->ncp.mp.peer.authname);
817 "Add iface address", "iface add addr[/bits| mask] peer", NULL},
819 "Add or change an iface address", "iface add! addr[/bits| mask] peer",
1351 fp->open_mode = OPEN_PASSIVE; /* Wait for the peer to start */
3203 struct ncpaddr peer, addr; local
3211 ncpaddr_init(&peer);
3233 if (!ncpaddr_aton(&peer, NUL
[all...]
/freebsd-11-stable/sys/netinet/
H A Dsctp_auth.c726 * find the best HMAC id to use for the peer based on local support
729 sctp_negotiate_hmacid(sctp_hmaclist_t *peer, sctp_hmaclist_t *local) argument
733 if ((local == NULL) || (peer == NULL))
736 for (i = 0; i < peer->num_algo; i++) {
738 if (peer->hmac[i] == local->hmac[j]) {
741 "SCTP: negotiated peer HMAC id %u\n",
742 peer->hmac[i]);
743 return (peer->hmac[i]);
1529 /* negotiate what HMAC to use for the peer */
1919 * peer support
[all...]
/freebsd-11-stable/crypto/openssl/ssl/
H A Ds3_srvr.c634 if (!s->session->peer)
2430 EVP_PKEY *clkey = X509_get_pubkey(s->session->peer);
2716 if (((clnt_pub_pkey = X509_get_pubkey(s->session->peer))
2963 client_pub_pkey = X509_get_pubkey(s->session->peer);
3035 X509 *peer; local
3042 * a Certificate from the client. If so then |s->session->peer| will be non
3044 * if the peer has sent a Certificate (e.g. such as in the case of static
3048 if (s->session->peer == NULL) {
3062 peer = s->session->peer;
[all...]
H A Dd1_srvr.c547 ((s->session->peer != NULL) &&
687 if (!s->session->peer)
/freebsd-11-stable/contrib/wpa/src/ap/
H A Dap_drv_ops.h133 int hostapd_drv_update_dh_ie(struct hostapd_data *hapd, const u8 *peer,
140 enum wnm_oper oper, const u8 *peer,
H A Dieee802_11.h169 u16 owe_validate_request(struct hostapd_data *hapd, const u8 *peer,
/freebsd-11-stable/contrib/ntp/ntpd/
H A Dntp_request.c672 const struct peer * pp;
707 * list_peers_sum - return extended peer list
717 const struct peer * pp;
720 DPRINTF(3, ("wants peer list summary\n"));
808 struct peer * pp;
952 struct peer * pp;
1076 is->peer = NSRCADR(&sys_peer->srcadr);
1085 is->peer = 0;
1283 * do_conf - add a peer to the configuration list
1353 * a magic number. So we use the highest possible peer
[all...]
/freebsd-11-stable/usr.sbin/ypserv/common/
H A Dyplib_host.c329 *outname = strdup(yprm.peer);
/freebsd-11-stable/usr.sbin/bsnmpd/modules/snmp_netgraph/
H A Dsnmp_netgraph.c632 ng_connect2_id(ng_ID_t id, ng_ID_t peer, const char *ourhook, argument
640 snprintf(conn.path, NG_PATHSIZ, "[%x]:", peer);
648 ng_connect2_tee_id(ng_ID_t id, ng_ID_t peer, const char *ourhook, argument
660 snprintf(conn.path, NG_PATHSIZ, "[%x]:", peer);
859 * Get the peer hook of a hook on a given node. Skip any tee nodes in between
/freebsd-11-stable/kerberos5/lib/libhx509/
H A DMakefile198 peer.c \
/freebsd-11-stable/usr.sbin/yppush/
H A Dyppush_main.c313 req.map_parms.peer = yppush_master;
/freebsd-11-stable/contrib/wpa/src/p2p/
H A Dp2p_i.h52 * If the peer was discovered based on an interface address (e.g., GO
58 * address of the peer.
155 u8 peer[ETH_ALEN]; member in struct:p2p_sd_query
208 * P2P_WAIT_PEER_CONNECT - Waiting peer in List for GO Neg
213 * P2P_WAIT_PEER_IDLE - Waiting peer idle for GO Neg
264 * go_neg_peer - Pointer to GO Negotiation peer
269 * invite_peer - Pointer to Invite peer
274 * last_p2p_find_oper - Pointer to last pre-find operation peer
286 * sd_peer - Pointer to Service Discovery peer
302 * sd_query_no_ack - The first peer (De
[all...]
/freebsd-11-stable/sys/kern/
H A Dsys_pipe.c382 struct pipe *peer; local
386 peer = (dpipe->pipe_state & PIPE_NAMED) != 0 ? dpipe->pipe_peer : NULL;
389 if (peer != NULL) {
390 funsetown(&peer->pipe_sigio);
391 pipeclose(peer);
1686 * Disconnect from peer, if any.
/freebsd-11-stable/crypto/heimdal/lib/hx509/
H A DMakefile.in139 libhx509_la-name.lo libhx509_la-peer.lo libhx509_la-print.lo \
545 peer.c \
955 @AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/libhx509_la-peer.Plo@am__quote@
1142 libhx509_la-peer.lo: peer.c
1143 @am__fastdepCC_TRUE@ $(LIBTOOL) --tag=CC $(AM_LIBTOOLFLAGS) $(LIBTOOLFLAGS) --mode=compile $(CC) $(DEFS) $(DEFAULT_INCLUDES) $(INCLUDES) $(libhx509_la_CPPFLAGS) $(CPPFLAGS) $(AM_CFLAGS) $(CFLAGS) -MT libhx509_la-peer.lo -MD -MP -MF $(DEPDIR)/libhx509_la-peer.Tpo -c -o libhx509_la-peer.lo `test -f 'peer.c' || echo '$(srcdir)/'`peer
[all...]
H A Dcrypto.c3038 hx509_peer_info peer,
3055 /* XXX depend on `source�� and `peer�� */
3069 if (peer) {
3074 for (i = 0; i < peer->len; i++) {
3079 &peer->val[i].algorithm) != 0)
3086 ret = copy_AlgorithmIdentifier(&peer->val[i], selected);
3094 cipher = find_cipher_by_oid(&peer->val[i].algorithm);
3035 hx509_crypto_select(const hx509_context context, int type, const hx509_private_key source, hx509_peer_info peer, AlgorithmIdentifier *selected) argument
/freebsd-11-stable/contrib/bsnmp/snmpd/
H A Dmain.c1050 * In case of AF_INET{6} peer, do hosts_access(5) check.
1052 if (pi->peer->sa_family != AF_LOCAL &&
1053 inet_ntop(pi->peer->sa_family,
1054 &((const struct sockaddr_in *)(const void *)pi->peer)->sin_addr,
1062 } else if (pi->peer->sa_family != AF_LOCAL)
1107 &tport->index, pi->peer, pi->peerlen, ierr, vi,
1188 pi->peer, pi->peerlen);
/freebsd-11-stable/lib/libtacplus/
H A Dtaclib.c260 struct sockaddr peer; local
284 peerlen = sizeof peer;
285 if (getpeername(h->fd, &peer, &peerlen) == 0)
/freebsd-11-stable/sys/net/
H A Dieee8023ad_lacp.c1371 /* If we haven't heard from our peer, skip this step. */
2050 lacp_format_partner(const struct lacp_peerinfo *peer, char *buf, size_t buflen) argument
2056 lacp_format_systemid(&peer->lip_systemid, sysid, sizeof(sysid)),
2057 ntohs(peer->lip_key),
2058 lacp_format_portid(&peer->lip_portid, portid, sizeof(portid)));
2072 * there's a convention to display small numbered peer

Completed in 417 milliseconds

12345678910