HomeSort by relevance Sort by last modified time
    Searched full:peer (Results 26 - 50 of 918) sorted by null

12 3 4 5 6 7 8 91011>>

  /external/qemu/slirp-android/
socket.h 59 * Socket state bits. (peer means the host on the Internet,
64 #define SS_ISFCONNECTING 0x002 /* Socket is connecting to peer (non-blocking connect()'s) */
65 #define SS_ISFCONNECTED 0x004 /* Socket is connected to peer */
66 #define SS_FCANTRCVMORE 0x008 /* Socket can't receive more from peer (for half-closes) */
67 #define SS_FCANTSENDMORE 0x010 /* Socket can't send more to peer (for half-closes) */
68 /* #define SS_ISFDISCONNECTED 0x020*/ /* Socket has disconnected from peer, in 2MSL state */
  /external/chromium/third_party/libjingle/source/talk/base/
opensslstreamadapter.h 43 // the peer-to-peer mode added.
155 // must specify. Empty in peer-to-peer mode.
156 // Our key and certificate, mostly useful in peer-to-peer mode.
159 // In peer-to-peer mode, the certificate that the peer must
  /external/iproute2/ip/
ifcfg 36 echo "Usage: ifcfg DEV [[add|del [ADDR[/LEN]] [PEER] | stop]" 1>&2
81 peer=$1
82 if [ "$peer" != "" ]; then
84 echo "Peer address with non-trivial netmask." 1>&2
87 pfx="$ipaddr peer $peer"
141 elif [ "$peer" != "" ]; then
142 if ping -q -c 2 -w 4 $peer ; then
143 ip ro append default via $peer dev $dev metric 30001
link_veth.c 23 "[peer <options>]\nTo get <options> type "
34 if (strcmp(argv[0], "peer") != 0) {
  /external/ppp/pppd/
pppd.8 39 peer and/or supply authentication information to the peer. PPP can be
46 peer. The string "/dev/" is prepended to \fIttyname\fR to form the
69 Pppd will ask the peer to send these characters as a 2-byte
73 so pppd will ask the peer not to escape any control characters.
77 Require the peer to authenticate itself before allowing network
80 \fInoauth\fR option is specified, pppd will only allow the peer to use
118 Add a default route to the system routing tables, using the peer as
134 (regardless of whether the peer requests them to be escaped with its
159 will ask the peer to send packets of no more than \fIn\fR bytes
    [all...]
ipxcp.h 62 bool req_node; /* Ask peer to send IPX node number? */
65 bool req_nn; /* Ask peer to send IPX network number */
71 bool accept_local; /* accept peer's value for ournode */
72 bool accept_remote; /* accept peer's value for hisnode */
82 u_char his_node[6]; /* peer's node number */
  /external/wpa_supplicant_8/src/p2p/
p2p_go_neg.c 56 wpa_hexdump_ascii(MSG_DEBUG, "P2P: Peer country", pos, 3);
59 "P2P: Mismatching country (ours=%c%c peer's=%c%c)",
71 "P2P: Invalid peer Channel List");
86 "peer reg_classes %d intersection reg_classes %d",
142 struct p2p_device *peer)
152 peer->dialog_token++;
153 if (peer->dialog_token == 0)
154 peer->dialog_token = 1;
155 p2p_buf_add_public_action_hdr(buf, P2P_GO_NEG_REQ, peer->dialog_token);
159 if (peer->flags & P2P_DEV_PREFER_PERSISTENT_GROUP
    [all...]
p2p_invitation.c 24 struct p2p_device *peer,
35 peer->dialog_token++;
36 if (peer->dialog_token == 0)
37 peer->dialog_token = 1;
39 peer->dialog_token);
56 dev_addr = peer->info.p2p_device_addr;
64 p2p_buf_add_device_info(buf, p2p, peer);
72 struct p2p_device *peer,
131 "P2P: Invitation Request from unknown peer "
146 "peer " MACSTR, MAC2STR(sa))
    [all...]
  /external/openssl/crypto/bio/
bss_bio.c 57 * of this kind, handled by the same thread (i.e. the "peer" is actually
127 BIO *peer; /* NULL if buf == NULL. member in struct:bio_bio_st
128 * If peer != NULL, then peer->ptr is also a bio_bio_st,
129 * and its "peer" member points back to us.
130 * peer != NULL iff init != 0 in the BIO. */
132 /* This is for what we write (i.e. reading uses peer's struct): */
133 int closed; /* valid iff peer != NULL */
134 size_t len; /* valid iff buf != NULL; 0 if peer == NULL */
139 size_t request; /* valid iff peer != NULL; 0 if len != 0
    [all...]
  /external/chromium/net/socket/
ssl_server_socket.h 25 // This class is designed to work in a peer-to-peer connection and is not
  /external/openssl/apps/
s_cb.c 705 } peer; local
718 /* Read peer information */
719 (void)BIO_dgram_get_peer(SSL_get_rbio(ssl), &peer); local
721 /* Create buffer with peer's address and port */
723 switch (peer.sa.sa_family)
727 length += sizeof(peer.s4.sin_port);
732 length += sizeof(peer.s6.sin6_port);
747 switch (peer.sa.sa_family)
751 &peer.s4.sin_port,
752 sizeof(peer.s4.sin_port))
793 } peer; local
800 (void)BIO_dgram_get_peer(SSL_get_rbio(ssl), &peer); local
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/wps/
wps_upnp.h 29 void *priv, struct upnp_wps_peer *peer);
31 void *priv, struct upnp_wps_peer *peer,
  /system/core/adb/
jdwp_service.c 559 asocket* peer = s->peer; local
563 if (peer) {
564 peer->peer = NULL;
565 peer->close(peer);
575 s->peer->close(s->peer);
584 asocket* peer = jdwp->socket.peer local
646 asocket* peer = t->socket.peer; local
657 asocket* peer = s->peer; local
    [all...]
  /external/wpa_supplicant_8/src/rsn_supp/
peerkey.c 69 const u8 *peer,
80 if (peer)
102 if (peer) {
103 /* Peer MAC Address KDE */
104 pos = wpa_add_kde(pos, RSN_KEY_DATA_MAC_ADDR, peer, ETH_ALEN);
112 if (peer) {
113 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK Error (peer "
115 MAC2STR(peer), mui, error_type);
139 /* KDEs: Peer RSN IE, Initiator MAC Address, Initiator Nonce */
163 /* Peer RSN IE *
614 u8 peer[ETH_ALEN]; local
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/
peerkey.c 68 const u8 *peer,
79 if (peer)
101 if (peer) {
102 /* Peer MAC Address KDE */
103 pos = wpa_add_kde(pos, RSN_KEY_DATA_MAC_ADDR, peer, ETH_ALEN);
111 if (peer) {
112 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK Error (peer "
114 MAC2STR(peer), mui, error_type);
138 /* KDEs: Peer RSN IE, Initiator MAC Address, Initiator Nonce */
162 /* Peer RSN IE *
613 u8 peer[ETH_ALEN]; local
    [all...]
  /external/nist-sip/java/gov/nist/javax/sip/
TransactionExt.java 56 * Get the certificate(s) that were sent to the peer during handshaking.
57 *@return the certificate(s) that were sent to the peer during handshaking.
64 * @return the identity of the peer which was identified as part of defining the session.
  /external/wpa_supplicant/
eap_methods.c 2 * EAP peer: Method registration
163 * eap_peer_get_methods - Get a list of enabled EAP peer methods
165 * Returns: List of enabled EAP peer methods
272 * eap_peer_method_alloc - Allocate EAP peer method structure
273 * @version: Version of the EAP peer method interface (set to
299 * eap_peer_method_free - Free EAP peer method structure
309 * eap_peer_method_register - Register an EAP peer method
314 * Each EAP peer method needs to call this function to register itself as a
343 * eap_peer_register_methods - Register statically linked EAP peer methods
346 * This function is called at program initialization to register all EAP peer
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_methods.c 2 * EAP peer: Method registration
163 * eap_peer_get_methods - Get a list of enabled EAP peer methods
165 * Returns: List of enabled EAP peer methods
272 * eap_peer_method_alloc - Allocate EAP peer method structure
273 * @version: Version of the EAP peer method interface (set to
299 * eap_peer_method_free - Free EAP peer method structure
309 * eap_peer_method_register - Register an EAP peer method
314 * Each EAP peer method needs to call this function to register itself as a
343 * eap_peer_register_methods - Register statically linked EAP peer methods
346 * This function is called at program initialization to register all EAP peer
    [all...]
  /external/wpa_supplicant_8/src/ap/
peerkey_auth.c 57 struct wpa_state_machine *sm, const u8 *peer,
70 if (peer) {
71 pos = wpa_add_kde(pos, RSN_KEY_DATA_MAC_ADDR, peer, ETH_ALEN,
108 /* Initiator = sm->addr; Peer = kde.mac_addr */
208 const u8 *smk, const u8 *peer)
229 /* Peer RSN IE */
233 /* Peer MAC Address */
234 pos = wpa_add_kde(pos, RSN_KEY_DATA_MAC_ADDR, peer, ETH_ALEN, NULL, 0);
282 /* Peer = sm->addr; Initiator = kde.mac_addr;
283 * Peer Nonce = key->key_nonce; Initiator Nonce = kde.nonce *
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_pwd.c 2 * EAP peer method: EAP-pwd (RFC 5931)
204 wpa_printf(MSG_DEBUG, "EAP-PWD (peer): server said group %d",
214 wpa_hexdump_ascii(MSG_INFO, "EAP-PWD (peer): server sent id of",
230 wpa_printf(MSG_INFO, "EAP-PWD (peer): unable to compute PWE");
234 wpa_printf(MSG_INFO, "EAP-PWD (peer): computed %d bit PWE...",
274 wpa_printf(MSG_INFO, "EAP-PWD (peer): scalar allocation fail");
279 wpa_printf(MSG_INFO, "EAP-pwd (peer): unable to get cofactor "
292 wpa_printf(MSG_INFO, "EAP-PWD (peer): element allocation "
300 wpa_printf(MSG_INFO, "EAP-PWD (peer): element inversion fail");
307 wpa_printf(MSG_INFO, "EAP-PWD (peer): point allocation fail")
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/dbus/
dbus_new_handlers_p2p.h 116 * P2P Peer properties.
120 struct peer_handler_args *peer);
124 struct peer_handler_args *peer);
  /libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/
SSLParametersImpl.java 74 // if the peer with this parameters tuned to work in client mode
76 // if the peer with this parameters tuned to require client authentication
78 // if the peer with this parameters tuned to request client authentication
80 // if the peer with this parameters allowed to cteate new SSL session
278 * Tunes the peer holding this parameters to work in client mode.
279 * @param mode if the peer is configured to work in client mode
294 * Tunes the peer holding this parameters to require client authentication
303 * Returns the value indicating if the peer with this parameters tuned
311 * Tunes the peer holding this parameters to request client authentication
320 * Returns the value indicating if the peer with this parameter
    [all...]
  /external/bluetooth/bluez/src/
storage.c 288 int write_remote_class(bdaddr_t *local, bdaddr_t *peer, uint32_t class)
296 ba2str(peer, addr);
302 int read_remote_class(bdaddr_t *local, bdaddr_t *peer, uint32_t *class)
308 ba2str(peer, addr);
324 int write_device_name(bdaddr_t *local, bdaddr_t *peer, char *name)
340 ba2str(peer, addr);
365 int write_remote_eir(bdaddr_t *local, bdaddr_t *peer, uint8_t *data)
378 ba2str(peer, addr);
382 int read_remote_eir(bdaddr_t *local, bdaddr_t *peer, uint8_t *data)
389 ba2str(peer, addr)
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
README-P2P 100 Flush P2P peer table and state.
104 p2p_prov_disc <peer device address> <display|keypad|pbc>
106 Send P2P provision discovery request to the specified peer. The
107 parameters for this command are the P2P device address of the peer and
109 02:01:02:03:04:05 display" would request the peer to display a PIN for
110 us and "p2p_prov_disc 02:01:02:03:04:05 keypad" would request the peer
113 p2p_connect <peer device address> <pbc|pin|PIN#> [label|display|keypad]
116 Start P2P group formation with a discovered P2P peer. This includes
127 keypad=PIN entered from peer device label or display). "persistent"
135 "auth" indicates that the WPS parameters are authorized for the peer
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
eap_common.h 2 * EAP common peer/server definitions

Completed in 675 milliseconds

12 3 4 5 6 7 8 91011>>