/dragonfly/contrib/wpa_supplicant/src/rsn_supp/ |
H A D | tdls.c | 278 for (peer = sm->tdls; peer; peer = peer->next) { in wpa_tdls_tpk_send() 761 for (peer = sm->tdls; peer; peer = peer->next) { in wpa_tdls_send_teardown() 848 for (peer = sm->tdls; peer; peer = peer->next) { in wpa_tdls_teardown_link() 881 for (peer = sm->tdls; peer; peer = peer->next) { in wpa_tdls_disable_unreachable_link() 917 for (peer = sm->tdls; peer; peer = peer->next) { in wpa_tdls_get_link_status() 944 for (peer = sm->tdls; peer; peer = peer->next) { in wpa_tdls_recv_teardown() 1039 for (peer = sm->tdls; peer; peer = peer->next) { in wpa_tdls_add_peer() 2200 for (peer = sm->tdls; peer; peer = peer->next) { in wpa_tdls_process_tpk_m2() 2486 for (peer = sm->tdls; peer; peer = peer->next) { in wpa_tdls_process_tpk_m3() 2711 for (peer = sm->tdls; peer; peer = peer->next) { in wpa_tdls_remove() [all …]
|
/dragonfly/contrib/wpa_supplicant/wpa_supplicant/ |
H A D | ibss_rsn.c | 32 for (peer = ibss_rsn->peers; peer; peer = peer->next) in ibss_rsn_get_peer() 35 return peer; in ibss_rsn_get_peer() 236 peer->supp_ie_len = sizeof(peer->supp_ie); in ibss_rsn_supp_init() 244 wpa_sm_notify_assoc(peer->supp, peer->addr); in ibss_rsn_supp_init() 357 for (peer = ibss_rsn->peers; peer; peer = peer->next) { in auth_for_each_sta() 358 if (peer->auth && cb(peer->auth, cb_ctx)) in auth_for_each_sta() 536 peer = os_zalloc(sizeof(*peer)); in ibss_rsn_peer_init() 572 ibss_rsn_auth_init(peer->ibss_rsn, peer); in ibss_rsn_auth_timeout() 648 peer = peer->next; in ibss_rsn_stop() 658 prev = peer, peer = peer->next) { in ibss_rsn_stop() [all …]
|
H A D | README-P2P | 131 Flush P2P peer table and state. 137 Send P2P provision discovery request to the specified peer. The 148 out whether the peer device is operating as a GO and if so, use 218 p2p_asp_provision <peer MAC address> <adv_id=peer adv id> 219 <adv_mac=peer MAC address> [role=2|4|1] <session=session id> 246 <session=session id> <session_mac=peer MAC address> 275 p2p_reject <peer device address> 277 Reject connection attempt from a peer (specified with a device 280 discovery of the peer. 388 sent in sequence whenever the peer is found). [all …]
|
/dragonfly/sys/net/wg/ |
H A D | if_wg.c | 588 peer = kmalloc(sizeof(*peer), M_WG, M_WAITOK | M_ZERO); in wg_peer_create() 618 TASK_INIT(&peer->p_send_task, 0, wg_deliver_out, peer); in wg_peer_create() 619 TASK_INIT(&peer->p_recv_task, 0, wg_deliver_in, peer); in wg_peer_create() 634 return (peer); in wg_peer_create() 667 taskqueue_drain(peer->p_recv_taskqueue, &peer->p_recv_task); in wg_peer_destroy() 874 peer = NULL; in wg_aip_lookup() 878 return (peer); in wg_aip_lookup() 909 if (!LIST_EMPTY(&peer->p_aips) || peer->p_aips_num != 0) in wg_aip_remove_all() 1496 peer->p_id); in wg_send_initiation() 1515 peer->p_id); in wg_send_response() [all …]
|
/dragonfly/crypto/libressl/crypto/bio/ |
H A D | bss_dgram.c | 108 } peer; member 262 } peer; in dgram_read() member 269 memset(&sa.peer, 0, sizeof(sa.peer)); in dgram_read() 387 memcpy(&data->peer, to, sizeof(data->peer.sa_in)); in dgram_ctrl() 390 memcpy(&data->peer, to, sizeof(data->peer.sa_in6)); in dgram_ctrl() 393 memcpy(&data->peer, to, sizeof(data->peer.sa)); in dgram_ctrl() 510 memcpy(&data->peer, to, sizeof(data->peer.sa_in)); in dgram_ctrl() 516 memcpy(&data->peer, to, sizeof(data->peer.sa)); in dgram_ctrl() 521 memset(&(data->peer), 0, sizeof(data->peer)); in dgram_ctrl() 544 memcpy(&data->peer, to, sizeof(data->peer.sa_in)); in dgram_ctrl() [all …]
|
/dragonfly/contrib/wpa_supplicant/src/pae/ |
H A D | ieee802_1x_kay.c | 386 if (peer) in ieee802_1x_kay_get_peer() 579 mi_txt(peer->mi), peer->mn, sci_txt(&peer->sci)); in ieee802_1x_kay_dump_peer() 588 peer = os_zalloc(sizeof(*peer)); in ieee802_1x_kay_create_peer() 589 if (!peer) { in ieee802_1x_kay_create_peer() 600 return peer; in ieee802_1x_kay_create_peer() 615 if (!peer) in ieee802_1x_kay_create_live_peer() 638 return peer; in ieee802_1x_kay_create_live_peer() 652 if (!peer) in ieee802_1x_kay_create_potential_peer() 660 return peer; in ieee802_1x_kay_create_potential_peer() 675 if (!peer) in ieee802_1x_kay_move_live_peer() [all …]
|
/dragonfly/crypto/libressl/apps/openssl/ |
H A D | s_cb.c | 807 } peer; in generate_cookie_callback() local 819 switch (peer.sa.sa_family) { in generate_cookie_callback() 822 length += sizeof(peer.s4.sin_port); in generate_cookie_callback() 838 switch (peer.sa.sa_family) { in generate_cookie_callback() 840 memcpy(buffer, &peer.s4.sin_port, sizeof(peer.s4.sin_port)); in generate_cookie_callback() 845 memcpy(buffer, &peer.s6.sin6_port, sizeof(peer.s6.sin6_port)); in generate_cookie_callback() 875 } peer; in verify_cookie_callback() local 886 switch (peer.sa.sa_family) { in verify_cookie_callback() 905 switch (peer.sa.sa_family) { in verify_cookie_callback() 907 memcpy(buffer, &peer.s4.sin_port, sizeof(peer.s4.sin_port)); in verify_cookie_callback() [all …]
|
H A D | sess_id.c | 157 X509 *peer = NULL; in sess_id_main() local 182 peer = SSL_SESSION_get0_peer(x); in sess_id_main() 214 if (peer == NULL) in sess_id_main() 217 X509_print(out, peer); in sess_id_main() 234 } else if (!sess_id_config.noout && (peer != NULL)) { in sess_id_main() 237 i = (int) i2d_X509_bio(out, peer); in sess_id_main() 239 i = PEM_write_bio_X509(out, peer); in sess_id_main()
|
/dragonfly/usr.sbin/ppp/ |
H A D | iface.c | 191 ncpaddr_init(&addr->peer); in iface_Create() 214 ncpaddr_getsa(&addr->peer, &sspeer); in iface_addr_Zap() 254 if (ncpaddr_family(&addr->peer) == AF_UNSPEC) in iface_addr_Zap() 274 if (ncpaddr_family(&addr->peer) == AF_UNSPEC) in iface_addr_Zap() 299 ncpaddr_getsa(&addr->peer, &sspeer); in iface_addr_Add() 338 if (ncpaddr_family(&addr->peer) == AF_UNSPEC) in iface_addr_Add() 432 const struct ncpaddr *peer, int how) in iface_Add() argument 448 ncpaddr_equal(&iface->addr[n].peer, peer)) { in iface_Add() 456 ncpaddr_equal(&iface->addr[n].peer, peer)) { in iface_Add() 465 ncpaddr_copy(&iface->addr[n].peer, peer); in iface_Add() [all …]
|
H A D | mppe.c | 540 u_int32_t mval, peer; in MPPESetOptsOutput() local 542 ua_ntohl(o->data, &peer); in MPPESetOptsOutput() 579 u_int32_t mval, peer; in MPPESetOptsInput() local 582 ua_ntohl(o->data, &peer); in MPPESetOptsInput() 584 if (peer != 0) { in MPPESetOptsInput() 585 peer = 0; in MPPESetOptsInput() 586 ua_htonl(&peer, o->data); in MPPESetOptsInput() 594 if (peer & ~MPPE_OPT_MASK) in MPPESetOptsInput() 632 if (peer & MPPE_OPT_128BIT) in MPPESetOptsInput() 634 else if (peer & MPPE_OPT_56BIT) in MPPESetOptsInput() [all …]
|
H A D | mp.c | 95 peer->enddisc.class = 0; in peerid_Init() 97 peer->enddisc.len = 0; in peerid_Init() 98 *peer->authname = '\0'; in peerid_Init() 246 peerid_Init(&mp->peer); in mp_Init() 304 if (!peerid_Equal(&dl->peer, &mp->peer)) { in mp_Up() 307 mp_Enddisc(mp->peer.enddisc.class, mp->peer.enddisc.address, in mp_Up() 310 mp_Enddisc(dl->peer.enddisc.class, dl->peer.enddisc.address, in mp_Up() 330 mp->peer = dl->peer; in mp_Up() 403 peerid_Init(&mp->peer); in mp_Down() 878 mp_Enddisc(mp->peer.enddisc.class, mp->peer.enddisc.address, in mp_ShowStatus() [all …]
|
H A D | route.c | 546 const struct ncpaddr *me, const struct ncpaddr *peer) in route_Change() argument 557 ncpaddr_copy(&r->gw, peer); in route_Change() 560 ncprange_sethost(&r->dst, peer); in route_Change() 562 ncpaddr_copy(&r->gw, peer); in route_Change() 568 ncpaddr_copy(&r->gw, peer); in route_Change() 574 ncpaddr_copy(&r->gw, peer); in route_Change() 576 ncpaddr_copy(&r->gw, peer); in route_Change() 583 ncpaddr_copy(&r->gw, peer); in route_Change() 586 ncprange_sethost(&r->dst, peer); in route_Change() 588 ncpaddr_copy(&r->gw, peer); in route_Change() [all …]
|
H A D | lqr.c | 229 lastLQR = p->hdlc.lqm.lqr.peer.PeerInLQRs; in lqr_Input() 231 lqr_ChangeOrder(lqr, &p->hdlc.lqm.lqr.peer); in lqr_Input() 232 lqr_Dump(l->name, "Input", &p->hdlc.lqm.lqr.peer); in lqr_Input() 243 (lastLQR && lastLQR == p->hdlc.lqm.lqr.peer.PeerInLQRs) || in lqr_Input() 266 memset(&physical->hdlc.lqm.lqr.peer, '\0', in lqr_Setup() 267 sizeof physical->hdlc.lqm.lqr.peer); in lqr_Setup() 404 lqr.LastOutLQRs = p->hdlc.lqm.lqr.peer.PeerOutLQRs; in lqr_LayerPush() 405 lqr.LastOutPackets = p->hdlc.lqm.lqr.peer.PeerOutPackets; in lqr_LayerPush() 406 lqr.LastOutOctets = p->hdlc.lqm.lqr.peer.PeerOutOctets; in lqr_LayerPush() 414 if (p->hdlc.lqm.lqr.peer.LastOutLQRs == p->hdlc.lqm.lqr.OutLQRs) { in lqr_LayerPush()
|
H A D | datalink.c | 606 strncpy(dl->peer.authname, name, sizeof dl->peer.authname - 1); in datalink_GotAuthname() 607 dl->peer.authname[sizeof dl->peer.authname - 1] = '\0'; in datalink_GotAuthname() 642 dl->bundle->ncp.mp.peer = dl->peer; in datalink_NCPUp() 644 auth_Select(dl->bundle, dl->peer.authname); in datalink_NCPUp() 700 dl->peer.authname); in datalink_AuthOk() 756 peerid_Init(&dl->peer); in datalink_LayerDown() 843 peerid_Init(&dl->peer); in datalink_Create() 899 peerid_Init(&dl->peer); in datalink_Clone() 1006 peerid_Init(&dl->peer); in datalink_Close() 1032 peerid_Init(&dl->peer); in datalink_Down() [all …]
|
/dragonfly/usr.bin/tftp/ |
H A D | tftp.c | 97 struct sockaddr_storage peer; in xmitfile() local 107 memcpy(&peer, &peeraddr, peeraddr.ss_len); in xmitfile() 130 (struct sockaddr *)&peer, peer.ss_len); in xmitfile() 155 peer = from; in xmitfile() 213 struct sockaddr_storage peer; in recvfile() local 224 memcpy(&peer, &peeraddr, peeraddr.ss_len); in recvfile() 244 peer.ss_len) != size) { in recvfile() 269 peer = from; in recvfile() 311 peer.ss_len); in recvfile() 357 nak(int error, struct sockaddr *peer) in nak() argument [all …]
|
/dragonfly/sys/net/wg/selftest/ |
H A D | allowedips.c | 62 struct wg_peer *peer; in test_aip_peer_new() local 64 peer = kmalloc(sizeof(*peer), M_WG, M_NOWAIT | M_ZERO); in test_aip_peer_new() 65 if (peer == NULL) in test_aip_peer_new() 68 peer->p_sc = sc; in test_aip_peer_new() 69 LIST_INIT(&peer->p_aips); in test_aip_peer_new() 70 peer->p_aips_num = 0; in test_aip_peer_new() 78 peer->p_remote = (struct noise_remote *)peer; in test_aip_peer_new() 80 return (peer); in test_aip_peer_new() 297 struct wg_peer **peers, *peer; in wg_allowedips_randomized_test() local 361 peer)) { in wg_allowedips_randomized_test() [all …]
|
/dragonfly/usr.sbin/ngctl/ |
H A D | show.c | 116 struct nodeinfo *const peer = &hlist->link[k].nodeinfo; in ShowCmd() local 119 if (!*peer->name) { in ShowCmd() 120 snprintf(peer->name, sizeof(peer->name), in ShowCmd() 123 snprintf(idbuf, sizeof(idbuf), "%08x", peer->id); in ShowCmd() 124 printf(FMT, sc_link->ourhook, peer->name, in ShowCmd() 125 peer->type, idbuf, sc_link->peerhook); in ShowCmd()
|
/dragonfly/contrib/wpa_supplicant/src/wps/ |
H A D | wps_upnp_web.c | 416 if (peer->wps) in wps_upnp_peer_del() 418 os_free(peer); in wps_upnp_peer_del() 439 peer = os_zalloc(sizeof(*peer)); in web_process_get_device_info() 440 if (!peer) in web_process_get_device_info() 456 if (peer->wps) { in web_process_get_device_info() 461 peer->wps = NULL; in web_process_get_device_info() 467 os_free(peer); in web_process_get_device_info() 524 peer = NULL; in web_process_put_message() 539 peer = tmp; in web_process_put_message() 542 if (!peer) { in web_process_put_message() [all …]
|
/dragonfly/contrib/smbfs/lib/smb/ |
H A D | nb_name.c | 76 nb_sockaddr(struct sockaddr *peer, struct nb_name *np, in nb_sockaddr() argument 83 if (peer && (peer->sa_family != AF_INET && peer->sa_family != AF_IPX)) in nb_sockaddr() 93 if (peer) in nb_sockaddr() 94 memcpy(&snb->snb_tran, peer, peer->sa_len); in nb_sockaddr()
|
/dragonfly/libexec/tftpd/ |
H A D | tftpd.c | 70 static int peer; variable 287 peer = socket(from.ss_family, SOCK_DGRAM, 0); in main() 288 if (peer < 0) { in main() 635 (void) synchnet(peer); in xmitfile() 676 if (send(peer, ackbuf, 4, 0) != 4) { in recvfile() 683 n = recv(peer, dp, PKTSIZE, 0); in recvfile() 698 (void) synchnet(peer); in recvfile() 716 (void) send(peer, ackbuf, 4, 0); in recvfile() 789 if (send(peer, buf, length, 0) != length) in nak() 846 if (send(peer, buf, size, 0) != size) { in oack() [all …]
|
/dragonfly/contrib/wpa_supplicant/src/p2p/ |
H A D | p2p_go_neg.c | 138 struct p2p_device *peer) in p2p_build_go_neg_req() argument 193 if (peer->oob_pw_id) in p2p_build_go_neg_req() 194 pw_id = peer->oob_pw_id; in p2p_build_go_neg_req() 272 struct p2p_device *peer, in p2p_build_go_neg_resp() argument 301 if (peer && peer->go_state == LOCAL_GO) { in p2p_build_go_neg_resp() 323 } else if (peer && peer->go_state == REMOTE_GO && !p2p->num_pref_freq) { in p2p_build_go_neg_resp() 331 if (status || peer == NULL) { in p2p_build_go_neg_resp() 344 if (peer && peer->go_state == LOCAL_GO) { in p2p_build_go_neg_resp() 351 pw_id = p2p_wps_method_pw_id(peer ? peer->wps_method : WPS_NOT_READY); in p2p_build_go_neg_resp() 352 if (peer && peer->oob_pw_id) in p2p_build_go_neg_resp() [all …]
|
H A D | p2p_invitation.c | 19 struct p2p_device *peer, in p2p_build_invitation_req() argument 56 peer->dialog_token++; in p2p_build_invitation_req() 57 if (peer->dialog_token == 0) in p2p_build_invitation_req() 58 peer->dialog_token = 1; in p2p_build_invitation_req() 60 peer->dialog_token); in p2p_build_invitation_req() 81 dev_addr = peer->info.p2p_device_addr; in p2p_build_invitation_req() 85 p2p_buf_add_device_info(buf, p2p, peer); in p2p_build_invitation_req() 109 struct p2p_device *peer, in p2p_build_invitation_resp() argument 678 dev = p2p_get_device(p2p, peer); in p2p_invite() 682 MAC2STR(peer)); in p2p_invite() [all …]
|
/dragonfly/crypto/openssh/ |
H A D | kex.c | 542 sshbuf_reset(kex->peer); in kex_input_newkeys() 714 sshbuf_free(kex->peer); in kex_free() 895 my[*idx], peer[*idx]); in proposals_match() 920 char **my = NULL, **peer = NULL; in kex_choose_conf() local 930 if ((r = kex_buf2prop(kex->peer, &first_kex_follows, &peer)) != 0) in kex_choose_conf() 934 cprop=peer; in kex_choose_conf() 938 sprop=peer; in kex_choose_conf() 987 peer[nenc] = NULL; in kex_choose_conf() 996 peer[nmac] = NULL; in kex_choose_conf() 1002 peer[ncomp] = NULL; in kex_choose_conf() [all …]
|
/dragonfly/sys/netgraph/netgraph/ |
H A D | ng_base.c | 764 hook1->peer = hook2; in ng_connect() 765 hook2->peer = hook1; in ng_connect() 817 hook_p peer = hook->peer; in ng_destroy_hook() local 820 if (peer) { in ng_destroy_hook() 822 hook->peer = NULL; in ng_destroy_hook() 823 peer->peer = NULL; in ng_destroy_hook() 870 hook1->peer->peer = hook2->peer; in ng_bypass() 871 hook2->peer->peer = hook1->peer; in ng_bypass() 874 hook1->peer = NULL; in ng_bypass() 875 hook2->peer = NULL; in ng_bypass() [all …]
|
/dragonfly/crypto/libressl/crypto/evp/ |
H A D | pmeth_fn.c | 272 EVP_PKEY_derive_set_peer(EVP_PKEY_CTX *ctx, EVP_PKEY *peer) in EVP_PKEY_derive_set_peer() argument 289 ret = ctx->pmeth->ctrl(ctx, EVP_PKEY_CTRL_PEER_KEY, 0, peer); in EVP_PKEY_derive_set_peer() 302 if (ctx->pkey->type != peer->type) { in EVP_PKEY_derive_set_peer() 312 if (!EVP_PKEY_missing_parameters(peer) && in EVP_PKEY_derive_set_peer() 313 !EVP_PKEY_cmp_parameters(ctx->pkey, peer)) { in EVP_PKEY_derive_set_peer() 319 ctx->peerkey = peer; in EVP_PKEY_derive_set_peer() 321 ret = ctx->pmeth->ctrl(ctx, EVP_PKEY_CTRL_PEER_KEY, 1, peer); in EVP_PKEY_derive_set_peer() 328 CRYPTO_add(&peer->references, 1, CRYPTO_LOCK_EVP_PKEY); in EVP_PKEY_derive_set_peer()
|