HomeSort by relevance Sort by last modified time
    Searched full:peer (Results 151 - 175 of 918) sorted by null

1 2 3 4 5 67 8 91011>>

  /external/wpa_supplicant_8/hostapd/
eap_testing.txt 7 -) peer did not support
75 1) EAP-TLS itself worked, but peer certificate validation failed at
76 least when using the internal TLS server (peer included incorrect
  /external/wpa_supplicant_8/src/eap_common/
eap_sim_common.h 2 * EAP peer/server: EAP-SIM/AKA/AKA' shared routines
144 #define EAP_SIM_AT_RES 3 /* only AKA, only peer->server */
145 #define EAP_SIM_AT_AUTS 4 /* only AKA, only peer->server */
eap_pwd_common.c 2 * EAP server/peer: EAP-pwd shared routines
173 * pwd-seed = H(token | peer-id | server-id | password |
292 /* then compute MK = H(k | commit-peer | commit-server) */
  /external/wpa_supplicant_8/src/eap_server/
eap_server_pwd.c 340 /* peer element: x, y */
356 /* peer scalar */
468 wpa_printf(MSG_INFO, "EAP-pwd: peer changed parameters");
479 wpa_hexdump_ascii(MSG_DEBUG, "EAP-PWD (server): peer sent id of",
522 wpa_printf(MSG_INFO, "EAP-PWD (server): peer data allocation "
543 wpa_printf(MSG_INFO, "EAP-PWD (server): setting peer element "
548 /* check to ensure peer's element is not in a small sub-group */
553 "multiply peer element by order");
557 wpa_printf(MSG_INFO, "EAP-PWD (server): peer element "
640 wpa_printf(MSG_INFO, "EAP-PWD (peer): allocation fail")
    [all...]
  /external/wpa_supplicant_8/src/radius/
radius_server.h 82 * peer implementations.
139 * peer is allowed to connect. Note: This is only used with EAP-TTLS
140 * and EAP-FAST. If any other EAP method is enabled, the peer will be
  /libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/
SSLSessionImpl.java 121 throw new SSLPeerUnverifiedException("No peer certificate");
137 throw new SSLPeerUnverifiedException("No peer certificate");
152 throw new SSLPeerUnverifiedException("No peer certificate");
AlertProtocol.java 156 * peer, or if warning alert occured during the processing of the
157 * message and this warning should be sent to another peer.
262 * The returned array of bytes is ready to be sent to another peer.
  /system/core/libcutils/
zygote.c 176 // The command socket is passed to the peer as close-on-exec
177 // and will close when the peer dies
178 newargv[0] = "--peer-wait";
  /external/ppp/pppd/
ipcp.c 68 ipcp_options ipcp_gotoptions[NUM_PPP]; /* Options that peer ack'd */
69 ipcp_options ipcp_allowoptions[NUM_PPP]; /* Options we allow peer to request */
92 static bool usepeerdns; /* Ask peer for DNS addrs */
95 static bool ask_for_local; /* request our address from peer */
105 static int ipcp_ackci __P((fsm *, u_char *, int)); /* Peer ack'd our CI */
106 static int ipcp_nakci __P((fsm *, u_char *, int, int));/* Peer nak'd our CI */
107 static int ipcp_rejci __P((fsm *, u_char *, int)); /* Peer rej'd our CI */
122 ipcp_reqci, /* Request peer's Configuration Information */
167 "Accept peer's address for us", 1 },
169 "Accept peer's address for it", 1 }
    [all...]
eap.c 26 * style. In the first phase of each style, the unauthenticated peer
29 * the peer's name is presumed to be known.
40 * responding to the queries generated by the peer. EAP is an
95 "Set time limit for peer EAP authentication" },
215 * eap_client_timeout - Give up waiting for the peer to send any
227 error("EAP: timeout waiting for Request from peer");
233 * eap_authwithpeer - Authenticate to our peer (behave as client).
245 /* Save the peer name we're given */
261 * Format a standard EAP Failure message and send it to the peer.
286 * Format a standard EAP Success message and send it to the peer
    [all...]
lcp.c 63 * or until seeing some input from the peer, before starting to send
192 lcp_options lcp_gotoptions[NUM_PPP]; /* Options that peer ack'd */
193 lcp_options lcp_allowoptions[NUM_PPP]; /* Options we allow peer to request */
208 static int lcp_ackci __P((fsm *, u_char *, int)); /* Peer ack'd our CI */
209 static int lcp_nakci __P((fsm *, u_char *, int, int)); /* Peer nak'd our CI */
210 static int lcp_rejci __P((fsm *, u_char *, int)); /* Peer rej'd our CI */
211 static int lcp_reqci __P((fsm *, u_char *, int *, int)); /* Rcv peer CI */
220 * routines to send LCP echos to peer
238 lcp_reqci, /* Request peer's Configuration Information */
918 * lcp_nakci - Peer has sent a NAK for some of our CIs
    [all...]
  /external/openssl/apps/
sess_id.c 234 if (x->peer == NULL)
237 X509_print(out,x->peer);
256 else if (!noout && (x->peer != NULL)) /* just print the certificate */
259 i=(int)i2d_X509_bio(out,x->peer);
261 i=PEM_write_bio_X509(out,x->peer);
pkeyutl.c 516 EVP_PKEY *peer = NULL; local
524 peer = load_pubkey(bio_err, file, peerform, 0, NULL, NULL, "Peer Key");
526 if (!peer)
528 BIO_printf(bio_err, "Error reading peer key %s\n", file);
533 ret = EVP_PKEY_derive_set_peer(ctx, peer);
535 EVP_PKEY_free(peer);
  /frameworks/base/wifi/java/android/net/wifi/
WifiNative.java 263 /* p2p_connect <peer device address> <pbc|pin|PIN#> [label|display|keypad]
327 /* Invite a peer to a group */
332 return doBooleanCommand("P2P_INVITE peer=" + deviceAddress);
335 + " peer=" + deviceAddress + " go_dev_addr=" + group.getOwner().deviceAddress);
343 return doBooleanCommand("P2P_INVITE persistent=" + netId + " peer=" + deviceAddress);
  /system/core/adb/
transport.c 417 asocket* peer = socket->peer; local
420 if (peer) {
421 peer->peer = NULL;
422 peer->close(peer);
443 asocket* peer = tracker->socket.peer; local
447 return peer->enqueue( peer, p )
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/dbus/
dbus_new.c 823 /* Check if this is a known peer */
1089 * Method to emit a signal for a peer joining the group.
1094 * @member_addr: addr (p2p i/f) of the peer joining the group
1143 * Method to emit a signal for a peer disconnecting the group.
1148 * @member_addr: addr (p2p i/f) of the peer joining the group
1203 * @sa: station addr (p2p i/f) of the peer
    [all...]
  /external/iproute2/ip/
ipaddress.c 69 fprintf(stderr, "IFADDR := PREFIX | ADDR peer PREFIX\n");
300 fprintf(fp, " peer ");
551 fprintf(fp, " peer %s/%d ",
995 inet_prefix peer; local
1013 if (strcmp(*argv, "peer") == 0 ||
1018 duparg("peer", *argv);
1019 get_prefix(&peer, *argv, req.ifa.ifa_family);
1020 peer_len = peer.bytelen;
1022 req.ifa.ifa_family = peer.family;
1023 addattr_l(&req.n, sizeof(req), IFA_ADDRESS, &peer.data, peer.bytelen)
    [all...]
  /development/tools/jdwpspy/
Net.cpp 33 typedef struct Peer {
41 } Peer;
55 Peer dbg;
56 Peer vm;
416 static bool haveFullPacket(Peer* pPeer)
436 static void consumeBytes(Peer* pPeer, int count)
522 static bool handlePacket(Peer* pDst, Peer* pSrc)
551 static bool handleIncoming(Peer* pWritePeer, Peer* pReadPeer
    [all...]
  /external/chromium/third_party/libjingle/source/talk/session/tunnel/
securetunnelsessionclient.cc 91 // The name on the certificate does not matter: the peer will
229 // have a certificate for our peer.
327 // certificate to allow for our peer. If we are the initiator, we do
328 // not have the peer's certificate yet: we will obtain it from the
332 // on the streem so we can configure the peer certificate later.
345 // connect the tunnel. First we must set the peer certificate.
  /external/ipsec-tools/src/racoon/
TODO 86 - limited session per peer
108 o IKE daemon should handle situations where peer does not run IKE daemon
116 o Reboot recovery (peer reboot losing it's security associations)
  /external/nist-sip/java/gov/nist/javax/sip/stack/
SIPTransaction.java 192 // Port of peer
195 // Address of peer
198 // Address of peer as a string
201 // Protocol of peer
205 // Source port extracted from peer packet
723 * Process the message through the transaction and sends it to the SIP peer.
726 * Message to send to the SIP peer.
729 // Use the peer address, port and transport
743 * and send it to the SIP peer. This is just a placeholder method -- calling
749 * Address of the target peer
    [all...]
  /external/wpa_supplicant_8/src/rsn_supp/
wpa.h 62 int (*tdls_oper)(void *ctx, int oper, const u8 *peer);
283 int wpa_sm_stkstart(struct wpa_sm *sm, const u8 *peer);
285 static inline int wpa_sm_stkstart(struct wpa_sm *sm, const u8 *peer)
wpa_i.h 48 u8 preauth_bssid[ETH_ALEN]; /* current RSN pre-auth peer or
261 const u8 *peer)
264 return sm->ctx->tdls_oper(sm->ctx->ctx, oper, peer);
  /external/wpa_supplicant_8/src/wps/
wps_upnp_web.c 420 struct upnp_wps_peer *peer; local
424 peer = &iface->peer;
439 if (peer->wps)
440 wps_deinit(peer->wps);
446 peer->wps = wps_init(&cfg);
447 if (peer->wps) {
449 *reply = wps_get_msg(peer->wps, &op_code);
451 wps_deinit(peer->wps);
452 peer->wps = NULL
    [all...]
  /external/chromium/base/
sync_socket.h 43 // Sends the message to the remote peer of the SyncSocket.

Completed in 632 milliseconds

1 2 3 4 5 67 8 91011>>