HomeSort by relevance Sort by last modified time
    Searched full:peer (Results 176 - 200 of 918) sorted by null

1 2 3 4 5 6 78 91011>>

  /external/chromium/third_party/libjingle/source/talk/base/
sslidentity.cc 28 // Handling of certificates and keypairs for SSLStreamAdapter's peer mode.
  /external/grub/netboot/
tulip.txt 33 lets the card choose the fastest speed it can negotiate with the peer
  /external/libnl-headers/netlink/
handlers.h 46 * @arg nla netlink address of the peer
  /external/mtpd/
pptp.c 119 uint16_t peer; member in struct:packet::__anon8796::__anon8797::__anon8799::__anon8802
309 if (state == OCRQ && incoming.ocrp.peer == local) {
367 outgoing.icrp.peer = incoming.icrq.call;
376 outgoing.ocrp.peer = incoming.ocrq.call;
  /external/ppp/pppd/
fsm.c 229 * to the peer, but we're not going to wait for a reply.
291 * We've waited for an ack long enough. Peer probably heard us.
439 /* Negotiation started by our peer */
457 /* send the Ack, Nak or Rej to the peer */
625 info("%s terminated by peer (%0.*v)", PROTO_NAME(f), len, p);
627 info("%s terminated by peer", PROTO_NAME(f));
700 * fsm_protreject - Peer doesn't speak this protocol.
781 /* send the request to our peer */
793 * Used for all packets sent to our peer by this module.
  /external/wpa_supplicant/
eap_defs.h 2 * EAP server/peer: Shared EAP definitions
eap_otp.c 2 * EAP peer method: EAP-OTP (RFC 3748)
eap_psk_common.h 2 * EAP server/peer: EAP-PSK shared routines
tls_gnutls.c 401 /* Shutdown previous TLS connection without notifying the peer
572 * to force peer validation(?) */
853 wpa_printf(MSG_INFO, "TLS: Failed to verify peer "
859 wpa_printf(MSG_INFO, "TLS: Peer certificate not trusted");
864 wpa_printf(MSG_INFO, "TLS: Peer certificate does not have a "
870 wpa_printf(MSG_INFO, "TLS: Peer certificate has been revoked");
878 wpa_printf(MSG_INFO, "TLS: No peer certificate chain "
894 wpa_printf(MSG_INFO, "TLS: Could not parse peer "
907 wpa_printf(MSG_DEBUG, "TLS: Peer cert chain %d/%d: %s",
918 wpa_printf(MSG_INFO, "TLS: Peer certificate %d/%d is
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
eap_defs.h 2 * EAP server/peer: Shared EAP definitions
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_md5.c 2 * EAP peer method: EAP-MD5 (RFC 3748 and RFC 1994)
eap_otp.c 2 * EAP peer method: EAP-OTP (RFC 3748)
  /external/wpa_supplicant_8/src/eap_common/
eap_defs.h 2 * EAP server/peer: Shared EAP definitions
  /external/wpa_supplicant_8/src/eap_peer/
eap_md5.c 2 * EAP peer method: EAP-MD5 (RFC 3748 and RFC 1994)
eap_otp.c 2 * EAP peer method: EAP-OTP (RFC 3748)
eap_tls_common.h 2 * EAP peer: EAP-TLS/PEAP/TTLS/FAST common functions
  /frameworks/base/core/java/android/net/
LocalSocketImpl.java 427 * Enqueues a set of file descriptors to send to the peer. The queue
442 * Retrieves a set of file descriptors that a peer has sent through
461 * Retrieves the credentials of this socket's peer. Only valid on
464 * @return non-null; peer credentials
  /frameworks/base/voip/java/android/net/sip/
SipErrorCode.java 48 /** When the peer is not reachable. */
package.html 16 {@link android.net.sip.SipProfile} objects, representing the local device and the peer
  /prebuilt/linux-x86/toolchain/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/sys/
socket.h 118 /* Open a connection on socket FD to peer at ADDR (which LEN bytes long).
127 /* Put the address of the peer connected to socket FD into *ADDR
146 /* Send N bytes of BUF on socket FD to peer at address ADDR (which is
205 peer and *ADDR_LEN to the address's actual length, and return the
  /system/core/libnl_2/
socket.c 57 /* Create peer socket */
  /external/ipsec-tools/src/racoon/
racoon.conf.5 439 Defines the IP address of the peer.
505 Specifies the peer's identifier to be received.
508 will not verify the peer's identifier in ID payload transmitted from the peer.
527 Alternative acceptable peer identifiers may be specified by repeating the
532 If you want to verify the peer's identifier,
536 is not the same as the peer's identifier in the ID payload,
586 will ignore the CERT payload from the peer,
587 and try to get the peer's certificate from DNS instead.
592 will ignore the CERT payload from the peer,
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/crypto/
tls_gnutls.c 406 /* Shutdown previous TLS connection without notifying the peer
577 * to force peer validation(?) */
882 wpa_printf(MSG_INFO, "TLS: Failed to verify peer "
889 wpa_printf(MSG_INFO, "TLS: Peer certificate not trusted");
908 wpa_printf(MSG_INFO, "TLS: Peer certificate does not have a "
915 wpa_printf(MSG_INFO, "TLS: Peer certificate has been revoked");
924 wpa_printf(MSG_INFO, "TLS: No peer certificate chain "
942 wpa_printf(MSG_INFO, "TLS: Could not parse peer "
956 wpa_printf(MSG_DEBUG, "TLS: Peer cert chain %d/%d: %s",
967 wpa_printf(MSG_INFO, "TLS: Peer certificate %d/%d is
    [all...]
  /external/wpa_supplicant_8/src/crypto/
tls_gnutls.c 403 /* Shutdown previous TLS connection without notifying the peer
573 * to force peer validation(?) */
878 wpa_printf(MSG_INFO, "TLS: Failed to verify peer "
885 wpa_printf(MSG_INFO, "TLS: Peer certificate not trusted");
904 wpa_printf(MSG_INFO, "TLS: Peer certificate does not have a "
911 wpa_printf(MSG_INFO, "TLS: Peer certificate has been revoked");
920 wpa_printf(MSG_INFO, "TLS: No peer certificate chain "
938 wpa_printf(MSG_INFO, "TLS: Could not parse peer "
952 wpa_printf(MSG_DEBUG, "TLS: Peer cert chain %d/%d: %s",
963 wpa_printf(MSG_INFO, "TLS: Peer certificate %d/%d is
    [all...]
  /development/samples/WiFiDirectDemo/src/com/example/android/wifidirect/
DeviceListFragment.java 71 Log.d(WiFiDirectActivity.TAG, "Peer status :" + deviceStatus);
90 * Initiate a connection with the peer.

Completed in 560 milliseconds

1 2 3 4 5 6 78 91011>>