/external/wpa_supplicant_8/hostapd/ |
eap_testing.txt | 7 -) peer did not support 75 1) EAP-TLS itself worked, but peer certificate validation failed at 76 least when using the internal TLS server (peer included incorrect
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_sim_common.h | 2 * EAP peer/server: EAP-SIM/AKA/AKA' shared routines 144 #define EAP_SIM_AT_RES 3 /* only AKA, only peer->server */ 145 #define EAP_SIM_AT_AUTS 4 /* only AKA, only peer->server */
|
eap_pwd_common.c | 2 * EAP server/peer: EAP-pwd shared routines 173 * pwd-seed = H(token | peer-id | server-id | password | 292 /* then compute MK = H(k | commit-peer | commit-server) */
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_pwd.c | 340 /* peer element: x, y */ 356 /* peer scalar */ 468 wpa_printf(MSG_INFO, "EAP-pwd: peer changed parameters"); 479 wpa_hexdump_ascii(MSG_DEBUG, "EAP-PWD (server): peer sent id of", 522 wpa_printf(MSG_INFO, "EAP-PWD (server): peer data allocation " 543 wpa_printf(MSG_INFO, "EAP-PWD (server): setting peer element " 548 /* check to ensure peer's element is not in a small sub-group */ 553 "multiply peer element by order"); 557 wpa_printf(MSG_INFO, "EAP-PWD (server): peer element " 640 wpa_printf(MSG_INFO, "EAP-PWD (peer): allocation fail") [all...] |
/external/wpa_supplicant_8/src/radius/ |
radius_server.h | 82 * peer implementations. 139 * peer is allowed to connect. Note: This is only used with EAP-TTLS 140 * and EAP-FAST. If any other EAP method is enabled, the peer will be
|
/libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/ |
SSLSessionImpl.java | 121 throw new SSLPeerUnverifiedException("No peer certificate"); 137 throw new SSLPeerUnverifiedException("No peer certificate"); 152 throw new SSLPeerUnverifiedException("No peer certificate");
|
AlertProtocol.java | 156 * peer, or if warning alert occured during the processing of the 157 * message and this warning should be sent to another peer. 262 * The returned array of bytes is ready to be sent to another peer.
|
/system/core/libcutils/ |
zygote.c | 176 // The command socket is passed to the peer as close-on-exec 177 // and will close when the peer dies 178 newargv[0] = "--peer-wait";
|
/external/ppp/pppd/ |
ipcp.c | 68 ipcp_options ipcp_gotoptions[NUM_PPP]; /* Options that peer ack'd */ 69 ipcp_options ipcp_allowoptions[NUM_PPP]; /* Options we allow peer to request */ 92 static bool usepeerdns; /* Ask peer for DNS addrs */ 95 static bool ask_for_local; /* request our address from peer */ 105 static int ipcp_ackci __P((fsm *, u_char *, int)); /* Peer ack'd our CI */ 106 static int ipcp_nakci __P((fsm *, u_char *, int, int));/* Peer nak'd our CI */ 107 static int ipcp_rejci __P((fsm *, u_char *, int)); /* Peer rej'd our CI */ 122 ipcp_reqci, /* Request peer's Configuration Information */ 167 "Accept peer's address for us", 1 }, 169 "Accept peer's address for it", 1 } [all...] |
eap.c | 26 * style. In the first phase of each style, the unauthenticated peer 29 * the peer's name is presumed to be known. 40 * responding to the queries generated by the peer. EAP is an 95 "Set time limit for peer EAP authentication" }, 215 * eap_client_timeout - Give up waiting for the peer to send any 227 error("EAP: timeout waiting for Request from peer"); 233 * eap_authwithpeer - Authenticate to our peer (behave as client). 245 /* Save the peer name we're given */ 261 * Format a standard EAP Failure message and send it to the peer. 286 * Format a standard EAP Success message and send it to the peer [all...] |
lcp.c | 63 * or until seeing some input from the peer, before starting to send 192 lcp_options lcp_gotoptions[NUM_PPP]; /* Options that peer ack'd */ 193 lcp_options lcp_allowoptions[NUM_PPP]; /* Options we allow peer to request */ 208 static int lcp_ackci __P((fsm *, u_char *, int)); /* Peer ack'd our CI */ 209 static int lcp_nakci __P((fsm *, u_char *, int, int)); /* Peer nak'd our CI */ 210 static int lcp_rejci __P((fsm *, u_char *, int)); /* Peer rej'd our CI */ 211 static int lcp_reqci __P((fsm *, u_char *, int *, int)); /* Rcv peer CI */ 220 * routines to send LCP echos to peer 238 lcp_reqci, /* Request peer's Configuration Information */ 918 * lcp_nakci - Peer has sent a NAK for some of our CIs [all...] |
/external/openssl/apps/ |
sess_id.c | 234 if (x->peer == NULL) 237 X509_print(out,x->peer); 256 else if (!noout && (x->peer != NULL)) /* just print the certificate */ 259 i=(int)i2d_X509_bio(out,x->peer); 261 i=PEM_write_bio_X509(out,x->peer);
|
pkeyutl.c | 516 EVP_PKEY *peer = NULL; local 524 peer = load_pubkey(bio_err, file, peerform, 0, NULL, NULL, "Peer Key"); 526 if (!peer) 528 BIO_printf(bio_err, "Error reading peer key %s\n", file); 533 ret = EVP_PKEY_derive_set_peer(ctx, peer); 535 EVP_PKEY_free(peer);
|
/frameworks/base/wifi/java/android/net/wifi/ |
WifiNative.java | 263 /* p2p_connect <peer device address> <pbc|pin|PIN#> [label|display|keypad] 327 /* Invite a peer to a group */ 332 return doBooleanCommand("P2P_INVITE peer=" + deviceAddress); 335 + " peer=" + deviceAddress + " go_dev_addr=" + group.getOwner().deviceAddress); 343 return doBooleanCommand("P2P_INVITE persistent=" + netId + " peer=" + deviceAddress);
|
/system/core/adb/ |
transport.c | 417 asocket* peer = socket->peer; local 420 if (peer) { 421 peer->peer = NULL; 422 peer->close(peer); 443 asocket* peer = tracker->socket.peer; local 447 return peer->enqueue( peer, p ) [all...] |
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
dbus_new.c | 823 /* Check if this is a known peer */ 1089 * Method to emit a signal for a peer joining the group. 1094 * @member_addr: addr (p2p i/f) of the peer joining the group 1143 * Method to emit a signal for a peer disconnecting the group. 1148 * @member_addr: addr (p2p i/f) of the peer joining the group 1203 * @sa: station addr (p2p i/f) of the peer [all...] |
/external/iproute2/ip/ |
ipaddress.c | 69 fprintf(stderr, "IFADDR := PREFIX | ADDR peer PREFIX\n"); 300 fprintf(fp, " peer "); 551 fprintf(fp, " peer %s/%d ", 995 inet_prefix peer; local 1013 if (strcmp(*argv, "peer") == 0 || 1018 duparg("peer", *argv); 1019 get_prefix(&peer, *argv, req.ifa.ifa_family); 1020 peer_len = peer.bytelen; 1022 req.ifa.ifa_family = peer.family; 1023 addattr_l(&req.n, sizeof(req), IFA_ADDRESS, &peer.data, peer.bytelen) [all...] |
/development/tools/jdwpspy/ |
Net.cpp | 33 typedef struct Peer { 41 } Peer; 55 Peer dbg; 56 Peer vm; 416 static bool haveFullPacket(Peer* pPeer) 436 static void consumeBytes(Peer* pPeer, int count) 522 static bool handlePacket(Peer* pDst, Peer* pSrc) 551 static bool handleIncoming(Peer* pWritePeer, Peer* pReadPeer [all...] |
/external/chromium/third_party/libjingle/source/talk/session/tunnel/ |
securetunnelsessionclient.cc | 91 // The name on the certificate does not matter: the peer will 229 // have a certificate for our peer. 327 // certificate to allow for our peer. If we are the initiator, we do 328 // not have the peer's certificate yet: we will obtain it from the 332 // on the streem so we can configure the peer certificate later. 345 // connect the tunnel. First we must set the peer certificate.
|
/external/ipsec-tools/src/racoon/ |
TODO | 86 - limited session per peer 108 o IKE daemon should handle situations where peer does not run IKE daemon 116 o Reboot recovery (peer reboot losing it's security associations)
|
/external/nist-sip/java/gov/nist/javax/sip/stack/ |
SIPTransaction.java | 192 // Port of peer 195 // Address of peer 198 // Address of peer as a string 201 // Protocol of peer 205 // Source port extracted from peer packet 723 * Process the message through the transaction and sends it to the SIP peer. 726 * Message to send to the SIP peer. 729 // Use the peer address, port and transport 743 * and send it to the SIP peer. This is just a placeholder method -- calling 749 * Address of the target peer [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa.h | 62 int (*tdls_oper)(void *ctx, int oper, const u8 *peer); 283 int wpa_sm_stkstart(struct wpa_sm *sm, const u8 *peer); 285 static inline int wpa_sm_stkstart(struct wpa_sm *sm, const u8 *peer)
|
wpa_i.h | 48 u8 preauth_bssid[ETH_ALEN]; /* current RSN pre-auth peer or 261 const u8 *peer) 264 return sm->ctx->tdls_oper(sm->ctx->ctx, oper, peer);
|
/external/wpa_supplicant_8/src/wps/ |
wps_upnp_web.c | 420 struct upnp_wps_peer *peer; local 424 peer = &iface->peer; 439 if (peer->wps) 440 wps_deinit(peer->wps); 446 peer->wps = wps_init(&cfg); 447 if (peer->wps) { 449 *reply = wps_get_msg(peer->wps, &op_code); 451 wps_deinit(peer->wps); 452 peer->wps = NULL [all...] |
/external/chromium/base/ |
sync_socket.h | 43 // Sends the message to the remote peer of the SyncSocket.
|