/external/openssl/apps/ |
s_server.c | 331 BIO_printf(bio_err," -verify arg - turn on peer certificate verification\n"); 332 BIO_printf(bio_err," -Verify arg - turn on peer certificate verification, must have a cert.\n"); 335 BIO_printf(bio_err," -crl_check - check the peer certificate has not been revoked by its CA.\n" \ 337 BIO_printf(bio_err," -crl_check_all - check the peer certificate has not been revoked by its CA\n" \ 1980 X509 *peer; local 2212 X509 *peer; local [all...] |
/external/iproute2/misc/ |
ss.c | 1845 int peer; member in struct:unixstat 1875 char *peer; local [all...] |
/frameworks/base/awt/java/awt/ |
MenuComponent.java | 22 import java.awt.peer.MenuComponentPeer; 301 * Gets the peer of the MenuComponent; an application must not use this 430 * Removes the peer of the MenuComponent.
|
ToolkitImpl.java | 24 import java.awt.peer.*;
|
/frameworks/base/awt/org/apache/harmony/awt/gl/font/ |
AndroidGlyphVector.java | 62 FontPeerImpl peer; field in class:AndroidGlyphVector
|
CommonGlyphVector.java | 71 FontPeerImpl peer; field in class:CommonGlyphVector 106 this.peer = (FontPeerImpl) fnt.getPeer(); 125 //LineMetricsImpl lmImpl = (LineMetricsImpl)peer.getLineMetrics(); 140 this.vector = peer.getGlyphs(vector); 143 this.vector = peer.getGlyphs(chars);
|
FontPeerImpl.java | 31 import java.awt.peer.FontPeer; 43 * Abstract class for platform dependent peer implementation of the Font class. 47 // ascent of this font peer (in pixels) 50 // descent of this font peer (in pixels) 53 // leading of this font peer (in pixels) 56 // logical maximum advance of this font peer (in pixels) 59 // the height of this font peer 62 // the style of this font peer 65 // the point size of this font peer (in pixels) 68 // the logical hight of this font peer (in pixels [all...] |
/external/openssl/ssl/ |
s3_srvr.c | 407 ((s->session->peer != NULL) && 2334 X509 *peer; local [all...] |
s2_clnt.c | 511 if (s->session->peer != NULL) /* can't happen*/ 518 s->session->peer = s->session->sess_cert->peer_key->x509; 520 CRYPTO_add(&s->session->peer->references, 1, CRYPTO_LOCK_X509); 524 || s->session->peer != s->session->sess_cert->peer_key->x509)
|
s2_srvr.c | 301 ((s->session->peer != NULL) && 1088 if (s->session->peer != NULL) 1089 X509_free(s->session->peer); 1090 s->session->peer=x509;
|
ssl_sess.c | 599 if (ss->peer != NULL) X509_free(ss->peer);
|
s3_clnt.c | 1041 /* Inconsistency alert: cert_chain does include the peer's 1091 if (s->session->peer != NULL) 1092 X509_free(s->session->peer); 1094 s->session->peer=x; 1101 if (s->session->peer != NULL) 1102 X509_free(s->session->peer); 1103 s->session->peer=NULL; [all...] |
ssl.h | 202 * Version 1 - added the optional peer certificate 412 * Peer [ 3 ] EXPLICIT X509, -- optional Peer Certificate 414 * Verify_result [ 5 ] EXPLICIT INTEGER -- X509_V_... code for `Peer' 453 X509 *peer; member in struct:ssl_session_st 454 /* when app_verify_callback accepts a session where the peer's certificate [all...] |
/external/iproute2/lib/ |
libnetlink.c | 273 int rtnl_talk(struct rtnl_handle *rtnl, struct nlmsghdr *n, pid_t peer, 296 nladdr.nl_pid = peer; 348 if (nladdr.nl_pid != peer ||
|
/frameworks/base/core/java/com/android/internal/os/ |
ZygoteInit.java | 91 * If true, zygote forks for each peer. If false, a select loop is used 635 * Runs the zygote in accept-and-fork mode. In this mode, each peer 644 ZygoteConnection peer = acceptCommandPeer(); local 651 // The child process should handle the peer requests 662 peer.run(); 665 peer.closeSocket();
|
/system/core/adb/ |
adb.h | 82 /* flag: set when the socket's peer has closed 90 asocket *peer; member in struct:asocket 104 /* enqueue is called by our peer when it has data 107 ** peer->ready() when we once again are ready to 112 /* ready is called by the peer when it is ready for 117 /* close is called by the peer when it has gone away. 119 ** peer once our close method is called.
|
/external/wpa_supplicant/ |
ctrl_iface.c | 102 /* MLME-STKSTART.request(peer) */ 106 u8 peer[ETH_ALEN]; local 108 if (hwaddr_aton(addr, peer)) { 110 "address '%s'", peer); 115 MAC2STR(peer)); 117 return wpa_sm_stkstart(wpa_s->wpa, peer); [all...] |
wpa.c | 875 * STK = PRF-X(SMK, "Peer key expansion", 1033 * @peer: MAC address of the peer STA 1037 * handshake with the peer. 1039 int wpa_sm_stkstart(struct wpa_sm *sm, const u8 *peer) 1081 os_memcpy(peerkey->addr, peer, ETH_ALEN); 2651 u8 peer[ETH_ALEN]; local [all...] |
events.c | 848 wpa_sm_stkstart(wpa_s->wpa, data->stkstart.peer);
|
/external/wpa_supplicant_6/wpa_supplicant/src/wps/ |
wps_upnp.c | [all...] |
/external/ipsec-tools/ |
setup.c | 352 const vchar_t *peer, int remoteid)
|
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
driver.h | 446 * @addr: address of the peer STA or ff:ff:ff:ff:ff:ff for 597 * @addr: peer address (BSSID of the AP) 608 * @addr: peer address (BSSID of the AP) 1273 u8 peer[ETH_ALEN]; member in struct:wpa_event_data::stkstart [all...] |
/external/wpa_supplicant_6/wpa_supplicant/ |
ctrl_iface.c | 107 /* MLME-STKSTART.request(peer) */ 111 u8 peer[ETH_ALEN]; local 113 if (hwaddr_aton(addr, peer)) { 115 "address '%s'", peer); 120 MAC2STR(peer)); 122 return wpa_sm_stkstart(wpa_s->wpa, peer); [all...] |
/external/iproute2/doc/ |
ip-cref.tex | 285 \item \verb|broadcast LLADDRESS|, \verb|brd LLADDRESS| or \verb|peer LLADDRESS| 287 --- change the link layer broadcast address or the peer address when 406 attached to each end. All packets sent to this link will reach the peer 407 and all packets received by us came from this single peer. 464 (or the peer address for pointopoint links) is a 471 NBMA links have no well-defined broadcast or peer address, 584 \item \verb|peer ADDRESS| 588 encoding the network prefix length. If a peer address is specified, 590 with the peer rather than with the local address. [all...] |
/external/openssl/include/openssl/ |
ssl.h | 202 * Version 1 - added the optional peer certificate 412 * Peer [ 3 ] EXPLICIT X509, -- optional Peer Certificate 414 * Verify_result [ 5 ] EXPLICIT INTEGER -- X509_V_... code for `Peer' 453 X509 *peer; member in struct:ssl_session_st 454 /* when app_verify_callback accepts a session where the peer's certificate [all...] |