HomeSort by relevance Sort by last modified time
    Searched refs:peer (Results 76 - 100 of 116) sorted by null

1 2 34 5

  /external/openssl/apps/
s_server.c 331 BIO_printf(bio_err," -verify arg - turn on peer certificate verification\n");
332 BIO_printf(bio_err," -Verify arg - turn on peer certificate verification, must have a cert.\n");
335 BIO_printf(bio_err," -crl_check - check the peer certificate has not been revoked by its CA.\n" \
337 BIO_printf(bio_err," -crl_check_all - check the peer certificate has not been revoked by its CA\n" \
1980 X509 *peer; local
2212 X509 *peer; local
    [all...]
  /external/iproute2/misc/
ss.c 1845 int peer; member in struct:unixstat
1875 char *peer; local
    [all...]
  /frameworks/base/awt/java/awt/
MenuComponent.java 22 import java.awt.peer.MenuComponentPeer;
301 * Gets the peer of the MenuComponent; an application must not use this
430 * Removes the peer of the MenuComponent.
ToolkitImpl.java 24 import java.awt.peer.*;
  /frameworks/base/awt/org/apache/harmony/awt/gl/font/
AndroidGlyphVector.java 62 FontPeerImpl peer; field in class:AndroidGlyphVector
CommonGlyphVector.java 71 FontPeerImpl peer; field in class:CommonGlyphVector
106 this.peer = (FontPeerImpl) fnt.getPeer();
125 //LineMetricsImpl lmImpl = (LineMetricsImpl)peer.getLineMetrics();
140 this.vector = peer.getGlyphs(vector);
143 this.vector = peer.getGlyphs(chars);
FontPeerImpl.java 31 import java.awt.peer.FontPeer;
43 * Abstract class for platform dependent peer implementation of the Font class.
47 // ascent of this font peer (in pixels)
50 // descent of this font peer (in pixels)
53 // leading of this font peer (in pixels)
56 // logical maximum advance of this font peer (in pixels)
59 // the height of this font peer
62 // the style of this font peer
65 // the point size of this font peer (in pixels)
68 // the logical hight of this font peer (in pixels
    [all...]
  /external/openssl/ssl/
s3_srvr.c 407 ((s->session->peer != NULL) &&
2334 X509 *peer; local
    [all...]
s2_clnt.c 511 if (s->session->peer != NULL) /* can't happen*/
518 s->session->peer = s->session->sess_cert->peer_key->x509;
520 CRYPTO_add(&s->session->peer->references, 1, CRYPTO_LOCK_X509);
524 || s->session->peer != s->session->sess_cert->peer_key->x509)
s2_srvr.c 301 ((s->session->peer != NULL) &&
1088 if (s->session->peer != NULL)
1089 X509_free(s->session->peer);
1090 s->session->peer=x509;
ssl_sess.c 599 if (ss->peer != NULL) X509_free(ss->peer);
s3_clnt.c 1041 /* Inconsistency alert: cert_chain does include the peer's
1091 if (s->session->peer != NULL)
1092 X509_free(s->session->peer);
1094 s->session->peer=x;
1101 if (s->session->peer != NULL)
1102 X509_free(s->session->peer);
1103 s->session->peer=NULL;
    [all...]
ssl.h 202 * Version 1 - added the optional peer certificate
412 * Peer [ 3 ] EXPLICIT X509, -- optional Peer Certificate
414 * Verify_result [ 5 ] EXPLICIT INTEGER -- X509_V_... code for `Peer'
453 X509 *peer; member in struct:ssl_session_st
454 /* when app_verify_callback accepts a session where the peer's certificate
    [all...]
  /external/iproute2/lib/
libnetlink.c 273 int rtnl_talk(struct rtnl_handle *rtnl, struct nlmsghdr *n, pid_t peer,
296 nladdr.nl_pid = peer;
348 if (nladdr.nl_pid != peer ||
  /frameworks/base/core/java/com/android/internal/os/
ZygoteInit.java 91 * If true, zygote forks for each peer. If false, a select loop is used
635 * Runs the zygote in accept-and-fork mode. In this mode, each peer
644 ZygoteConnection peer = acceptCommandPeer(); local
651 // The child process should handle the peer requests
662 peer.run();
665 peer.closeSocket();
  /system/core/adb/
adb.h 82 /* flag: set when the socket's peer has closed
90 asocket *peer; member in struct:asocket
104 /* enqueue is called by our peer when it has data
107 ** peer->ready() when we once again are ready to
112 /* ready is called by the peer when it is ready for
117 /* close is called by the peer when it has gone away.
119 ** peer once our close method is called.
  /external/wpa_supplicant/
ctrl_iface.c 102 /* MLME-STKSTART.request(peer) */
106 u8 peer[ETH_ALEN]; local
108 if (hwaddr_aton(addr, peer)) {
110 "address '%s'", peer);
115 MAC2STR(peer));
117 return wpa_sm_stkstart(wpa_s->wpa, peer);
    [all...]
wpa.c 875 * STK = PRF-X(SMK, "Peer key expansion",
1033 * @peer: MAC address of the peer STA
1037 * handshake with the peer.
1039 int wpa_sm_stkstart(struct wpa_sm *sm, const u8 *peer)
1081 os_memcpy(peerkey->addr, peer, ETH_ALEN);
2651 u8 peer[ETH_ALEN]; local
    [all...]
events.c 848 wpa_sm_stkstart(wpa_s->wpa, data->stkstart.peer);
  /external/wpa_supplicant_6/wpa_supplicant/src/wps/
wps_upnp.c     [all...]
  /external/ipsec-tools/
setup.c 352 const vchar_t *peer, int remoteid)
  /external/wpa_supplicant_6/wpa_supplicant/src/drivers/
driver.h 446 * @addr: address of the peer STA or ff:ff:ff:ff:ff:ff for
597 * @addr: peer address (BSSID of the AP)
608 * @addr: peer address (BSSID of the AP)
1273 u8 peer[ETH_ALEN]; member in struct:wpa_event_data::stkstart
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/
ctrl_iface.c 107 /* MLME-STKSTART.request(peer) */
111 u8 peer[ETH_ALEN]; local
113 if (hwaddr_aton(addr, peer)) {
115 "address '%s'", peer);
120 MAC2STR(peer));
122 return wpa_sm_stkstart(wpa_s->wpa, peer);
    [all...]
  /external/iproute2/doc/
ip-cref.tex 285 \item \verb|broadcast LLADDRESS|, \verb|brd LLADDRESS| or \verb|peer LLADDRESS|
287 --- change the link layer broadcast address or the peer address when
406 attached to each end. All packets sent to this link will reach the peer
407 and all packets received by us came from this single peer.
464 (or the peer address for pointopoint links) is a
471 NBMA links have no well-defined broadcast or peer address,
584 \item \verb|peer ADDRESS|
588 encoding the network prefix length. If a peer address is specified,
590 with the peer rather than with the local address.
    [all...]
  /external/openssl/include/openssl/
ssl.h 202 * Version 1 - added the optional peer certificate
412 * Peer [ 3 ] EXPLICIT X509, -- optional Peer Certificate
414 * Verify_result [ 5 ] EXPLICIT INTEGER -- X509_V_... code for `Peer'
453 X509 *peer; member in struct:ssl_session_st
454 /* when app_verify_callback accepts a session where the peer's certificate
    [all...]

Completed in 898 milliseconds

1 2 34 5