/external/chromium/third_party/libjingle/source/ |
README | 81 relay server may be used to relay traffic when a direct peer-to-peer connection
|
/external/libnfc-nxp/src/ |
phHciNfc_Pipe.h | 100 /* Pipes for Peer to Peer Communication */
|
/external/openssl/crypto/bio/ |
bio.h | 534 #define BIO_ctrl_dgram_connect(b,peer) \ 535 (int)BIO_ctrl(b,BIO_CTRL_DGRAM_CONNECT,0, (char *)peer) 536 #define BIO_ctrl_set_connected(b, state, peer) \ 537 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_CONNECTED, state, (char *)peer) 542 #define BIO_dgram_get_peer(b,peer) \ 543 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_GET_PEER, 0, (char *)peer) 544 #define BIO_dgram_set_peer(b,peer) \ 545 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_PEER, 0, (char *)peer)
|
/external/openssl/include/openssl/ |
bio.h | 534 #define BIO_ctrl_dgram_connect(b,peer) \ 535 (int)BIO_ctrl(b,BIO_CTRL_DGRAM_CONNECT,0, (char *)peer) 536 #define BIO_ctrl_set_connected(b, state, peer) \ 537 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_CONNECTED, state, (char *)peer) 542 #define BIO_dgram_get_peer(b,peer) \ 543 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_GET_PEER, 0, (char *)peer) 544 #define BIO_dgram_set_peer(b,peer) \ 545 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_PEER, 0, (char *)peer)
|
/external/openssl/ssl/ |
ssl_asn1.c | 286 if (in->peer != NULL) 287 M_ASN1_I2D_len_EXP_opt(in->peer,i2d_X509,3,v3); 328 if (in->peer != NULL) 329 M_ASN1_I2D_put_EXP_opt(in->peer,i2d_X509,3,v3); 486 if (ret->peer != NULL) 488 X509_free(ret->peer); 489 ret->peer=NULL; 491 M_ASN1_D2I_get_EXP_opt(ret->peer,d2i_X509,3);
|
ssl_err.c | 417 {ERR_REASON(SSL_R_NO_GOST_CERTIFICATE_SENT_BY_PEER),"Peer haven't sent GOST certificate, required for selected ciphersuite"}, 436 {ERR_REASON(SSL_R_PEER_DID_NOT_RETURN_A_CERTIFICATE),"peer did not return a certificate"}, 437 {ERR_REASON(SSL_R_PEER_ERROR) ,"peer error"}, 438 {ERR_REASON(SSL_R_PEER_ERROR_CERTIFICATE),"peer error certificate"}, 439 {ERR_REASON(SSL_R_PEER_ERROR_NO_CERTIFICATE),"peer error no certificate"}, 440 {ERR_REASON(SSL_R_PEER_ERROR_NO_CIPHER) ,"peer error no cipher"}, 441 {ERR_REASON(SSL_R_PEER_ERROR_UNSUPPORTED_CERTIFICATE_TYPE),"peer error unsupported certificate type"}, [all...] |
/external/ppp/pppd/ |
ecp.c | 119 ecp_options ecp_wantoptions[NUM_PPP]; /* what to request the peer to use */ 120 ecp_options ecp_gotoptions[NUM_PPP]; /* what the peer agreed to do */
|
pppd.h | 224 extern char peer_authname[];/* Authenticated name of peer */ 262 extern struct notifier *auth_up_notifier; /* peer has authenticated */ 293 extern bool auth_required; /* Peer is required to authenticate */ 297 extern char remote_name[MAXNAMELEN]; /* Peer's name for authentication */ 537 /* peer failed to authenticate itself */ 539 /* peer successfully authenticated itself */ 548 /* Check peer-supplied username/password */ 648 /* Add proxy ARP entry for peer */ 650 /* Delete proxy ARP entry for peer */ [all...] |
/external/wpa_supplicant/ |
wpa.h | 141 int wpa_sm_stkstart(struct wpa_sm *sm, const u8 *peer); 259 static inline int wpa_sm_stkstart(struct wpa_sm *sm, const u8 *peer)
|
wpa.c | 875 * STK = PRF-X(SMK, "Peer key expansion", 1033 * @peer: MAC address of the peer STA 1037 * handshake with the peer. 1039 int wpa_sm_stkstart(struct wpa_sm *sm, const u8 *peer) 1081 os_memcpy(peerkey->addr, peer, ETH_ALEN); 2651 u8 peer[ETH_ALEN]; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
wpa.h | 264 int wpa_sm_stkstart(struct wpa_sm *sm, const u8 *peer); 266 static inline int wpa_sm_stkstart(struct wpa_sm *sm, const u8 *peer)
|
/external/wpa_supplicant_6/wpa_supplicant/src/wps/ |
wps_upnp_i.h | 156 /* FIX: maintain separate structures for each UPnP peer */ 157 struct upnp_wps_peer peer; member in struct:upnp_wps_device_sm
|
/external/wpa_supplicant_8/src/wps/ |
wps_upnp_i.h | 112 /* FIX: maintain separate structures for each UPnP peer */ 113 struct upnp_wps_peer peer; member in struct:upnp_wps_device_interface
|
/external/wpa_supplicant_8/wpa_supplicant/ |
p2p_supplicant.h | 72 void wpas_prov_disc_req(void *ctx, const u8 *peer, u16 config_methods, 76 void wpas_prov_disc_resp(void *ctx, const u8 *peer, u16 config_methods);
|
ctrl_iface.c | 186 /* MLME-STKSTART.request(peer) */ 190 u8 peer[ETH_ALEN]; local 192 if (hwaddr_aton(addr, peer)) { 199 MAC2STR(peer)); 201 return wpa_sm_stkstart(wpa_s->wpa, peer); 211 u8 peer[ETH_ALEN]; local 213 if (hwaddr_aton(addr, peer)) { 220 MAC2STR(peer)); 222 return wpa_drv_tdls_oper(wpa_s, TDLS_DISCOVERY_REQ, peer); 229 u8 peer[ETH_ALEN] local 251 u8 peer[ETH_ALEN]; local 686 u8 peer[ETH_ALEN]; local 2684 u8 peer[ETH_ALEN]; local 2708 u8 peer[ETH_ALEN], go_dev_addr[ETH_ALEN], *go_dev = NULL; local [all...] |
sme.c | 289 if (os_memcmp(wpa_s->pending_bssid, data->auth.peer, ETH_ALEN) != 0) { 291 "unexpected peer " MACSTR, 292 MAC2STR(data->auth.peer)); 296 wpa_dbg(wpa_s, MSG_DEBUG, "SME: Authentication response: peer=" MACSTR 298 MAC2STR(data->auth.peer), data->auth.auth_type, 345 os_memcpy(edata.ft_ies.target_ap, data->auth.peer, ETH_ALEN); 350 sme_associate(wpa_s, ssid->mode, data->auth.peer,
|
/frameworks/base/core/java/android/net/http/ |
CertificateChainValidator.java | 88 // retrieve the chain of the server peer certificates 94 sslSocket, "failed to retrieve peer certificates");
|
/libcore/luni/src/main/java/java/net/ |
DatagramSocket.java | 468 * Connects this datagram socket to the address and port specified by {@code peer}. 474 public void connect(SocketAddress peer) throws SocketException { 475 if (peer == null) { 476 throw new IllegalArgumentException("peer == null"); 479 if (!(peer instanceof InetSocketAddress)) { 480 throw new IllegalArgumentException("peer not an InetSocketAddress: " + peer.getClass()); 483 InetSocketAddress isa = (InetSocketAddress) peer;
|
/prebuilt/linux-x86/toolchain/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/rpcsvc/ |
yp.x | 88 peername peer; 134 peername peer;
|
/libcore/luni/src/main/java/javax/net/ssl/ |
SSLEngine.java | 56 * Returns the name of the peer host. 58 * @return the name of the peer host, or {@code null} if none is available. 65 * Returns the port number of the peer host. 67 * @return the port number of the peer host, or {@code -1} is none is 95 * close notification message from the peer.
|
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/ |
peers.cpp | 229 /* Peer has Keypad */ 235 /* Peer has Label or Display */ [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_mschapv2.c | 2 * EAP peer method: EAP-MSCHAPV2 (draft-kamath-pppext-eap-mschapv2-00.txt) 14 * This file implements EAP peer part of EAP-MSCHAPV2 method (EAP type 26). 185 * in its own packets, but it seemed to expect the peer to 561 /* Peer-Challenge */ 836 * peer MS-MPPE-Send-Key | MS-MPPE-Recv-Key */ 850 * eap_peer_mschapv2_register - Register EAP-MSCHAPv2 peer method 853 * This function is used to register EAP-MSCHAPv2 peer method into the EAP
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_mschapv2.c | 2 * EAP peer method: EAP-MSCHAPV2 (draft-kamath-pppext-eap-mschapv2-00.txt) 14 * This file implements EAP peer part of EAP-MSCHAPV2 method (EAP type 26). 186 * in its own packets, but it seemed to expect the peer to 567 /* Peer-Challenge */ 842 * peer MS-MPPE-Send-Key | MS-MPPE-Recv-Key */ 856 * eap_peer_mschapv2_register - Register EAP-MSCHAPv2 peer method 859 * This function is used to register EAP-MSCHAPv2 peer method into the EAP
|
/libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/ |
SSLEngineImpl.java | 37 // indicates if peer mode was set 45 // indicates if close_notify alert had been sent to another peer 47 // indicates if close_notify alert had been received from another peer 71 // peer configuration parameters 543 // to another peer (by wrap method) 552 // to another peer (by wrap method) 727 // to another peer (by wrap method)
|
/external/kernel-headers/original/linux/ |
net.h | 141 int *sockaddr_len, int peer); 251 int *addr_len, int peer), (sock, uaddr, addr_len, peer)) \
|