/freebsd-11-stable/contrib/wpa/wpa_supplicant/ |
H A D | wpas_glue.c | 720 static int wpa_supplicant_tdls_oper(void *ctx, int oper, const u8 *peer) argument 723 return wpa_drv_tdls_oper(wpa_s, oper, peer); 728 void *ctx, const u8 *peer, int add, u16 aid, u16 capability, 741 params.addr = peer; 727 wpa_supplicant_tdls_peer_addset( void *ctx, const u8 *peer, int add, u16 aid, u16 capability, const u8 *supp_rates, size_t supp_rates_len, const struct ieee80211_ht_capabilities *ht_capab, const struct ieee80211_vht_capabilities *vht_capab, u8 qosinfo, int wmm, const u8 *ext_capab, size_t ext_capab_len, const u8 *supp_channels, size_t supp_channels_len, const u8 *supp_oper_classes, size_t supp_oper_classes_len) argument
|
H A D | sme.c | 1165 wpa_printf(MSG_DEBUG, "SAE: Failed to process peer " 1259 if (os_memcmp(wpa_s->pending_bssid, data->auth.peer, ETH_ALEN) != 0) { 1261 "unexpected peer " MACSTR, 1262 MAC2STR(data->auth.peer)); 1266 wpa_dbg(wpa_s, MSG_DEBUG, "SME: Authentication response: peer=" MACSTR 1268 MAC2STR(data->auth.peer), data->auth.auth_type, 1309 MAC2STR(data->auth.peer), data->auth.auth_type, 1365 data->auth.peer, 1419 sme_associate(wpa_s, ssid->mode, data->auth.peer,
|
H A D | p2p_supplicant.h | 155 void wpas_p2p_remove_client(struct wpa_supplicant *wpa_s, const u8 *peer,
|
/freebsd-11-stable/usr.sbin/nfsd/ |
H A D | nfsd.c | 152 struct sockaddr_storage peer; local 783 len = sizeof(peer); 785 (struct sockaddr *)&peer, &len)) < 0) { 798 addsockargs.name = (caddr_t)&peer;
|
/freebsd-11-stable/contrib/wpa/src/drivers/ |
H A D | driver_nl80211_event.c | 175 os_memcpy(event.auth.peer, mgmt->sa, ETH_ALEN); 1121 data.update_dh.peer = nla_data(tb[NL80211_ATTR_MAC]); 1125 wpa_printf(MSG_DEBUG, "nl80211: DH event - peer " MACSTR, 1126 MAC2STR(data.update_dh.peer)); 1321 wpa_printf(MSG_DEBUG, "nl80211: New peer candidate " MACSTR, 1325 data.mesh_peer.peer = addr; 1360 os_memcpy(data.ibss_rsn_start.peer, addr, ETH_ALEN); 1387 os_memcpy(data.ibss_peer_lost.peer, addr, ETH_ALEN); 1501 os_memcpy(data.tdls.peer, nla_data(tb[NL80211_ATTR_MAC]), ETH_ALEN); 1504 wpa_printf(MSG_DEBUG, "nl80211: TDLS setup request for peer " [all...] |
/freebsd-11-stable/sys/contrib/ngatm/netnatm/sig/ |
H A D | sig_call.c | 1940 * Enquiry peer status 4259 * Check whether the peer state is compatible with our state. 4271 state_compat(struct call *c, enum uni_callstate peer) argument 4276 (peer == UNI_CALLSTATE_N6 || 4277 peer == UNI_CALLSTATE_N7 || 4278 peer == UNI_CALLSTATE_N8 || 4279 peer == UNI_CALLSTATE_N9)) 4286 (peer == UNI_CALLSTATE_U1 || 4287 peer == UNI_CALLSTATE_U3 || 4288 peer [all...] |
/freebsd-11-stable/usr.sbin/ppp/ |
H A D | lcp.c | 797 /* Set the MTU to what we want anyway - the peer won't care! */ 1212 } else if (opt->hdr.len < sizeof p->dl->peer.enddisc.address + 3 && 1214 p->dl->peer.enddisc.class = opt->data[0]; 1215 p->dl->peer.enddisc.len = opt->hdr.len - 3; 1216 memcpy(p->dl->peer.enddisc.address, opt->data + 1, opt->hdr.len - 3); 1217 p->dl->peer.enddisc.address[opt->hdr.len - 3] = '\0'; 1218 /* XXX: If mp->active, compare and NAK with mp->peer ? */ 1226 (long)(sizeof p->dl->peer.enddisc.address - 1)); 1262 /* We *REQUIRE* that the peer requests callback */ 1287 /* Don't let the peer us [all...] |
H A D | command.c | 597 mp_Enddisc(bundle->ncp.mp.peer.enddisc.class, 598 bundle->ncp.mp.peer.enddisc.address, 599 bundle->ncp.mp.peer.enddisc.len)); 606 nargv[arg] = subst(nargv[arg], "USER", bundle->ncp.mp.peer.authname); 817 "Add iface address", "iface add addr[/bits| mask] peer", NULL}, 819 "Add or change an iface address", "iface add! addr[/bits| mask] peer", 1351 fp->open_mode = OPEN_PASSIVE; /* Wait for the peer to start */ 3203 struct ncpaddr peer, addr; local 3211 ncpaddr_init(&peer); 3233 if (!ncpaddr_aton(&peer, NUL [all...] |
/freebsd-11-stable/sys/netinet/ |
H A D | sctp_auth.c | 726 * find the best HMAC id to use for the peer based on local support 729 sctp_negotiate_hmacid(sctp_hmaclist_t *peer, sctp_hmaclist_t *local) argument 733 if ((local == NULL) || (peer == NULL)) 736 for (i = 0; i < peer->num_algo; i++) { 738 if (peer->hmac[i] == local->hmac[j]) { 741 "SCTP: negotiated peer HMAC id %u\n", 742 peer->hmac[i]); 743 return (peer->hmac[i]); 1529 /* negotiate what HMAC to use for the peer */ 1919 * peer support [all...] |
/freebsd-11-stable/crypto/openssl/ssl/ |
H A D | s3_srvr.c | 634 if (!s->session->peer) 2430 EVP_PKEY *clkey = X509_get_pubkey(s->session->peer); 2716 if (((clnt_pub_pkey = X509_get_pubkey(s->session->peer)) 2963 client_pub_pkey = X509_get_pubkey(s->session->peer); 3035 X509 *peer; local 3042 * a Certificate from the client. If so then |s->session->peer| will be non 3044 * if the peer has sent a Certificate (e.g. such as in the case of static 3048 if (s->session->peer == NULL) { 3062 peer = s->session->peer; [all...] |
H A D | d1_srvr.c | 547 ((s->session->peer != NULL) && 687 if (!s->session->peer)
|
/freebsd-11-stable/contrib/wpa/src/ap/ |
H A D | ap_drv_ops.h | 133 int hostapd_drv_update_dh_ie(struct hostapd_data *hapd, const u8 *peer, 140 enum wnm_oper oper, const u8 *peer,
|
H A D | ieee802_11.h | 169 u16 owe_validate_request(struct hostapd_data *hapd, const u8 *peer,
|
/freebsd-11-stable/contrib/ntp/ntpd/ |
H A D | ntp_request.c | 672 const struct peer * pp; 707 * list_peers_sum - return extended peer list 717 const struct peer * pp; 720 DPRINTF(3, ("wants peer list summary\n")); 808 struct peer * pp; 952 struct peer * pp; 1076 is->peer = NSRCADR(&sys_peer->srcadr); 1085 is->peer = 0; 1283 * do_conf - add a peer to the configuration list 1353 * a magic number. So we use the highest possible peer [all...] |
/freebsd-11-stable/usr.sbin/ypserv/common/ |
H A D | yplib_host.c | 329 *outname = strdup(yprm.peer);
|
/freebsd-11-stable/usr.sbin/bsnmpd/modules/snmp_netgraph/ |
H A D | snmp_netgraph.c | 632 ng_connect2_id(ng_ID_t id, ng_ID_t peer, const char *ourhook, argument 640 snprintf(conn.path, NG_PATHSIZ, "[%x]:", peer); 648 ng_connect2_tee_id(ng_ID_t id, ng_ID_t peer, const char *ourhook, argument 660 snprintf(conn.path, NG_PATHSIZ, "[%x]:", peer); 859 * Get the peer hook of a hook on a given node. Skip any tee nodes in between
|
/freebsd-11-stable/kerberos5/lib/libhx509/ |
H A D | Makefile | 198 peer.c \
|
/freebsd-11-stable/usr.sbin/yppush/ |
H A D | yppush_main.c | 313 req.map_parms.peer = yppush_master;
|
/freebsd-11-stable/contrib/wpa/src/p2p/ |
H A D | p2p_i.h | 52 * If the peer was discovered based on an interface address (e.g., GO 58 * address of the peer. 155 u8 peer[ETH_ALEN]; member in struct:p2p_sd_query 208 * P2P_WAIT_PEER_CONNECT - Waiting peer in List for GO Neg 213 * P2P_WAIT_PEER_IDLE - Waiting peer idle for GO Neg 264 * go_neg_peer - Pointer to GO Negotiation peer 269 * invite_peer - Pointer to Invite peer 274 * last_p2p_find_oper - Pointer to last pre-find operation peer 286 * sd_peer - Pointer to Service Discovery peer 302 * sd_query_no_ack - The first peer (De [all...] |
/freebsd-11-stable/sys/kern/ |
H A D | sys_pipe.c | 382 struct pipe *peer; local 386 peer = (dpipe->pipe_state & PIPE_NAMED) != 0 ? dpipe->pipe_peer : NULL; 389 if (peer != NULL) { 390 funsetown(&peer->pipe_sigio); 391 pipeclose(peer); 1686 * Disconnect from peer, if any.
|
/freebsd-11-stable/crypto/heimdal/lib/hx509/ |
H A D | Makefile.in | 139 libhx509_la-name.lo libhx509_la-peer.lo libhx509_la-print.lo \ 545 peer.c \ 955 @AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/libhx509_la-peer.Plo@am__quote@ 1142 libhx509_la-peer.lo: peer.c 1143 @am__fastdepCC_TRUE@ $(LIBTOOL) --tag=CC $(AM_LIBTOOLFLAGS) $(LIBTOOLFLAGS) --mode=compile $(CC) $(DEFS) $(DEFAULT_INCLUDES) $(INCLUDES) $(libhx509_la_CPPFLAGS) $(CPPFLAGS) $(AM_CFLAGS) $(CFLAGS) -MT libhx509_la-peer.lo -MD -MP -MF $(DEPDIR)/libhx509_la-peer.Tpo -c -o libhx509_la-peer.lo `test -f 'peer.c' || echo '$(srcdir)/'`peer [all...] |
H A D | crypto.c | 3038 hx509_peer_info peer, 3055 /* XXX depend on `source�� and `peer�� */ 3069 if (peer) { 3074 for (i = 0; i < peer->len; i++) { 3079 &peer->val[i].algorithm) != 0) 3086 ret = copy_AlgorithmIdentifier(&peer->val[i], selected); 3094 cipher = find_cipher_by_oid(&peer->val[i].algorithm); 3035 hx509_crypto_select(const hx509_context context, int type, const hx509_private_key source, hx509_peer_info peer, AlgorithmIdentifier *selected) argument
|
/freebsd-11-stable/contrib/bsnmp/snmpd/ |
H A D | main.c | 1050 * In case of AF_INET{6} peer, do hosts_access(5) check. 1052 if (pi->peer->sa_family != AF_LOCAL && 1053 inet_ntop(pi->peer->sa_family, 1054 &((const struct sockaddr_in *)(const void *)pi->peer)->sin_addr, 1062 } else if (pi->peer->sa_family != AF_LOCAL) 1107 &tport->index, pi->peer, pi->peerlen, ierr, vi, 1188 pi->peer, pi->peerlen);
|
/freebsd-11-stable/lib/libtacplus/ |
H A D | taclib.c | 260 struct sockaddr peer; local 284 peerlen = sizeof peer; 285 if (getpeername(h->fd, &peer, &peerlen) == 0)
|
/freebsd-11-stable/sys/net/ |
H A D | ieee8023ad_lacp.c | 1371 /* If we haven't heard from our peer, skip this step. */ 2050 lacp_format_partner(const struct lacp_peerinfo *peer, char *buf, size_t buflen) argument 2056 lacp_format_systemid(&peer->lip_systemid, sysid, sizeof(sysid)), 2057 ntohs(peer->lip_key), 2058 lacp_format_portid(&peer->lip_portid, portid, sizeof(portid))); 2072 * there's a convention to display small numbered peer
|