HomeSort by relevance Sort by last modified time
    Searched full:peer (Results 201 - 225 of 918) sorted by null

1 2 3 4 5 6 7 891011>>

  /external/chromium/third_party/libjingle/source/
README 81 relay server may be used to relay traffic when a direct peer-to-peer connection
  /external/libnfc-nxp/src/
phHciNfc_Pipe.h 100 /* Pipes for Peer to Peer Communication */
  /external/openssl/crypto/bio/
bio.h 534 #define BIO_ctrl_dgram_connect(b,peer) \
535 (int)BIO_ctrl(b,BIO_CTRL_DGRAM_CONNECT,0, (char *)peer)
536 #define BIO_ctrl_set_connected(b, state, peer) \
537 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_CONNECTED, state, (char *)peer)
542 #define BIO_dgram_get_peer(b,peer) \
543 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_GET_PEER, 0, (char *)peer)
544 #define BIO_dgram_set_peer(b,peer) \
545 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_PEER, 0, (char *)peer)
  /external/openssl/include/openssl/
bio.h 534 #define BIO_ctrl_dgram_connect(b,peer) \
535 (int)BIO_ctrl(b,BIO_CTRL_DGRAM_CONNECT,0, (char *)peer)
536 #define BIO_ctrl_set_connected(b, state, peer) \
537 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_CONNECTED, state, (char *)peer)
542 #define BIO_dgram_get_peer(b,peer) \
543 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_GET_PEER, 0, (char *)peer)
544 #define BIO_dgram_set_peer(b,peer) \
545 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_PEER, 0, (char *)peer)
  /external/openssl/ssl/
ssl_asn1.c 286 if (in->peer != NULL)
287 M_ASN1_I2D_len_EXP_opt(in->peer,i2d_X509,3,v3);
328 if (in->peer != NULL)
329 M_ASN1_I2D_put_EXP_opt(in->peer,i2d_X509,3,v3);
486 if (ret->peer != NULL)
488 X509_free(ret->peer);
489 ret->peer=NULL;
491 M_ASN1_D2I_get_EXP_opt(ret->peer,d2i_X509,3);
ssl_err.c 417 {ERR_REASON(SSL_R_NO_GOST_CERTIFICATE_SENT_BY_PEER),"Peer haven't sent GOST certificate, required for selected ciphersuite"},
436 {ERR_REASON(SSL_R_PEER_DID_NOT_RETURN_A_CERTIFICATE),"peer did not return a certificate"},
437 {ERR_REASON(SSL_R_PEER_ERROR) ,"peer error"},
438 {ERR_REASON(SSL_R_PEER_ERROR_CERTIFICATE),"peer error certificate"},
439 {ERR_REASON(SSL_R_PEER_ERROR_NO_CERTIFICATE),"peer error no certificate"},
440 {ERR_REASON(SSL_R_PEER_ERROR_NO_CIPHER) ,"peer error no cipher"},
441 {ERR_REASON(SSL_R_PEER_ERROR_UNSUPPORTED_CERTIFICATE_TYPE),"peer error unsupported certificate type"},
    [all...]
  /external/ppp/pppd/
ecp.c 119 ecp_options ecp_wantoptions[NUM_PPP]; /* what to request the peer to use */
120 ecp_options ecp_gotoptions[NUM_PPP]; /* what the peer agreed to do */
pppd.h 224 extern char peer_authname[];/* Authenticated name of peer */
262 extern struct notifier *auth_up_notifier; /* peer has authenticated */
293 extern bool auth_required; /* Peer is required to authenticate */
297 extern char remote_name[MAXNAMELEN]; /* Peer's name for authentication */
537 /* peer failed to authenticate itself */
539 /* peer successfully authenticated itself */
548 /* Check peer-supplied username/password */
648 /* Add proxy ARP entry for peer */
650 /* Delete proxy ARP entry for peer */
    [all...]
  /external/wpa_supplicant/
wpa.h 141 int wpa_sm_stkstart(struct wpa_sm *sm, const u8 *peer);
259 static inline int wpa_sm_stkstart(struct wpa_sm *sm, const u8 *peer)
wpa.c 875 * STK = PRF-X(SMK, "Peer key expansion",
1033 * @peer: MAC address of the peer STA
1037 * handshake with the peer.
1039 int wpa_sm_stkstart(struct wpa_sm *sm, const u8 *peer)
1081 os_memcpy(peerkey->addr, peer, ETH_ALEN);
2651 u8 peer[ETH_ALEN]; local
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/
wpa.h 264 int wpa_sm_stkstart(struct wpa_sm *sm, const u8 *peer);
266 static inline int wpa_sm_stkstart(struct wpa_sm *sm, const u8 *peer)
  /external/wpa_supplicant_6/wpa_supplicant/src/wps/
wps_upnp_i.h 156 /* FIX: maintain separate structures for each UPnP peer */
157 struct upnp_wps_peer peer; member in struct:upnp_wps_device_sm
  /external/wpa_supplicant_8/src/wps/
wps_upnp_i.h 112 /* FIX: maintain separate structures for each UPnP peer */
113 struct upnp_wps_peer peer; member in struct:upnp_wps_device_interface
  /external/wpa_supplicant_8/wpa_supplicant/
p2p_supplicant.h 72 void wpas_prov_disc_req(void *ctx, const u8 *peer, u16 config_methods,
76 void wpas_prov_disc_resp(void *ctx, const u8 *peer, u16 config_methods);
ctrl_iface.c 186 /* MLME-STKSTART.request(peer) */
190 u8 peer[ETH_ALEN]; local
192 if (hwaddr_aton(addr, peer)) {
199 MAC2STR(peer));
201 return wpa_sm_stkstart(wpa_s->wpa, peer);
211 u8 peer[ETH_ALEN]; local
213 if (hwaddr_aton(addr, peer)) {
220 MAC2STR(peer));
222 return wpa_drv_tdls_oper(wpa_s, TDLS_DISCOVERY_REQ, peer);
229 u8 peer[ETH_ALEN] local
251 u8 peer[ETH_ALEN]; local
686 u8 peer[ETH_ALEN]; local
2684 u8 peer[ETH_ALEN]; local
2708 u8 peer[ETH_ALEN], go_dev_addr[ETH_ALEN], *go_dev = NULL; local
    [all...]
sme.c 289 if (os_memcmp(wpa_s->pending_bssid, data->auth.peer, ETH_ALEN) != 0) {
291 "unexpected peer " MACSTR,
292 MAC2STR(data->auth.peer));
296 wpa_dbg(wpa_s, MSG_DEBUG, "SME: Authentication response: peer=" MACSTR
298 MAC2STR(data->auth.peer), data->auth.auth_type,
345 os_memcpy(edata.ft_ies.target_ap, data->auth.peer, ETH_ALEN);
350 sme_associate(wpa_s, ssid->mode, data->auth.peer,
  /frameworks/base/core/java/android/net/http/
CertificateChainValidator.java 88 // retrieve the chain of the server peer certificates
94 sslSocket, "failed to retrieve peer certificates");
  /libcore/luni/src/main/java/java/net/
DatagramSocket.java 468 * Connects this datagram socket to the address and port specified by {@code peer}.
474 public void connect(SocketAddress peer) throws SocketException {
475 if (peer == null) {
476 throw new IllegalArgumentException("peer == null");
479 if (!(peer instanceof InetSocketAddress)) {
480 throw new IllegalArgumentException("peer not an InetSocketAddress: " + peer.getClass());
483 InetSocketAddress isa = (InetSocketAddress) peer;
  /prebuilt/linux-x86/toolchain/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/rpcsvc/
yp.x 88 peername peer;
134 peername peer;
  /libcore/luni/src/main/java/javax/net/ssl/
SSLEngine.java 56 * Returns the name of the peer host.
58 * @return the name of the peer host, or {@code null} if none is available.
65 * Returns the port number of the peer host.
67 * @return the port number of the peer host, or {@code -1} is none is
95 * close notification message from the peer.
  /external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/
peers.cpp 229 /* Peer has Keypad */
235 /* Peer has Label or Display */
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_mschapv2.c 2 * EAP peer method: EAP-MSCHAPV2 (draft-kamath-pppext-eap-mschapv2-00.txt)
14 * This file implements EAP peer part of EAP-MSCHAPV2 method (EAP type 26).
185 * in its own packets, but it seemed to expect the peer to
561 /* Peer-Challenge */
836 * peer MS-MPPE-Send-Key | MS-MPPE-Recv-Key */
850 * eap_peer_mschapv2_register - Register EAP-MSCHAPv2 peer method
853 * This function is used to register EAP-MSCHAPv2 peer method into the EAP
  /external/wpa_supplicant_8/src/eap_peer/
eap_mschapv2.c 2 * EAP peer method: EAP-MSCHAPV2 (draft-kamath-pppext-eap-mschapv2-00.txt)
14 * This file implements EAP peer part of EAP-MSCHAPV2 method (EAP type 26).
186 * in its own packets, but it seemed to expect the peer to
567 /* Peer-Challenge */
842 * peer MS-MPPE-Send-Key | MS-MPPE-Recv-Key */
856 * eap_peer_mschapv2_register - Register EAP-MSCHAPv2 peer method
859 * This function is used to register EAP-MSCHAPv2 peer method into the EAP
  /libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/
SSLEngineImpl.java 37 // indicates if peer mode was set
45 // indicates if close_notify alert had been sent to another peer
47 // indicates if close_notify alert had been received from another peer
71 // peer configuration parameters
543 // to another peer (by wrap method)
552 // to another peer (by wrap method)
727 // to another peer (by wrap method)
  /external/kernel-headers/original/linux/
net.h 141 int *sockaddr_len, int peer);
251 int *addr_len, int peer), (sock, uaddr, addr_len, peer)) \

Completed in 814 milliseconds

1 2 3 4 5 6 7 891011>>