/external/qemu/slirp-android/ |
socket.h | 59 * Socket state bits. (peer means the host on the Internet, 64 #define SS_ISFCONNECTING 0x002 /* Socket is connecting to peer (non-blocking connect()'s) */ 65 #define SS_ISFCONNECTED 0x004 /* Socket is connected to peer */ 66 #define SS_FCANTRCVMORE 0x008 /* Socket can't receive more from peer (for half-closes) */ 67 #define SS_FCANTSENDMORE 0x010 /* Socket can't send more to peer (for half-closes) */ 68 /* #define SS_ISFDISCONNECTED 0x020*/ /* Socket has disconnected from peer, in 2MSL state */
|
/external/chromium/third_party/libjingle/source/talk/base/ |
opensslstreamadapter.h | 43 // the peer-to-peer mode added. 155 // must specify. Empty in peer-to-peer mode. 156 // Our key and certificate, mostly useful in peer-to-peer mode. 159 // In peer-to-peer mode, the certificate that the peer must
|
/external/iproute2/ip/ |
ifcfg | 36 echo "Usage: ifcfg DEV [[add|del [ADDR[/LEN]] [PEER] | stop]" 1>&2 81 peer=$1 82 if [ "$peer" != "" ]; then 84 echo "Peer address with non-trivial netmask." 1>&2 87 pfx="$ipaddr peer $peer" 141 elif [ "$peer" != "" ]; then 142 if ping -q -c 2 -w 4 $peer ; then 143 ip ro append default via $peer dev $dev metric 30001
|
link_veth.c | 23 "[peer <options>]\nTo get <options> type " 34 if (strcmp(argv[0], "peer") != 0) {
|
/external/ppp/pppd/ |
pppd.8 | 39 peer and/or supply authentication information to the peer. PPP can be 46 peer. The string "/dev/" is prepended to \fIttyname\fR to form the 69 Pppd will ask the peer to send these characters as a 2-byte 73 so pppd will ask the peer not to escape any control characters. 77 Require the peer to authenticate itself before allowing network 80 \fInoauth\fR option is specified, pppd will only allow the peer to use 118 Add a default route to the system routing tables, using the peer as 134 (regardless of whether the peer requests them to be escaped with its 159 will ask the peer to send packets of no more than \fIn\fR bytes [all...] |
ipxcp.h | 62 bool req_node; /* Ask peer to send IPX node number? */ 65 bool req_nn; /* Ask peer to send IPX network number */ 71 bool accept_local; /* accept peer's value for ournode */ 72 bool accept_remote; /* accept peer's value for hisnode */ 82 u_char his_node[6]; /* peer's node number */
|
/external/wpa_supplicant_8/src/p2p/ |
p2p_go_neg.c | 56 wpa_hexdump_ascii(MSG_DEBUG, "P2P: Peer country", pos, 3); 59 "P2P: Mismatching country (ours=%c%c peer's=%c%c)", 71 "P2P: Invalid peer Channel List"); 86 "peer reg_classes %d intersection reg_classes %d", 142 struct p2p_device *peer) 152 peer->dialog_token++; 153 if (peer->dialog_token == 0) 154 peer->dialog_token = 1; 155 p2p_buf_add_public_action_hdr(buf, P2P_GO_NEG_REQ, peer->dialog_token); 159 if (peer->flags & P2P_DEV_PREFER_PERSISTENT_GROUP [all...] |
p2p_invitation.c | 24 struct p2p_device *peer, 35 peer->dialog_token++; 36 if (peer->dialog_token == 0) 37 peer->dialog_token = 1; 39 peer->dialog_token); 56 dev_addr = peer->info.p2p_device_addr; 64 p2p_buf_add_device_info(buf, p2p, peer); 72 struct p2p_device *peer, 131 "P2P: Invitation Request from unknown peer " 146 "peer " MACSTR, MAC2STR(sa)) [all...] |
/external/openssl/crypto/bio/ |
bss_bio.c | 57 * of this kind, handled by the same thread (i.e. the "peer" is actually 127 BIO *peer; /* NULL if buf == NULL. member in struct:bio_bio_st 128 * If peer != NULL, then peer->ptr is also a bio_bio_st, 129 * and its "peer" member points back to us. 130 * peer != NULL iff init != 0 in the BIO. */ 132 /* This is for what we write (i.e. reading uses peer's struct): */ 133 int closed; /* valid iff peer != NULL */ 134 size_t len; /* valid iff buf != NULL; 0 if peer == NULL */ 139 size_t request; /* valid iff peer != NULL; 0 if len != 0 [all...] |
/external/chromium/net/socket/ |
ssl_server_socket.h | 25 // This class is designed to work in a peer-to-peer connection and is not
|
/external/openssl/apps/ |
s_cb.c | 705 } peer; local 718 /* Read peer information */ 719 (void)BIO_dgram_get_peer(SSL_get_rbio(ssl), &peer); local 721 /* Create buffer with peer's address and port */ 723 switch (peer.sa.sa_family) 727 length += sizeof(peer.s4.sin_port); 732 length += sizeof(peer.s6.sin6_port); 747 switch (peer.sa.sa_family) 751 &peer.s4.sin_port, 752 sizeof(peer.s4.sin_port)) 793 } peer; local 800 (void)BIO_dgram_get_peer(SSL_get_rbio(ssl), &peer); local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/wps/ |
wps_upnp.h | 29 void *priv, struct upnp_wps_peer *peer); 31 void *priv, struct upnp_wps_peer *peer,
|
/system/core/adb/ |
jdwp_service.c | 559 asocket* peer = s->peer; local 563 if (peer) { 564 peer->peer = NULL; 565 peer->close(peer); 575 s->peer->close(s->peer); 584 asocket* peer = jdwp->socket.peer local 646 asocket* peer = t->socket.peer; local 657 asocket* peer = s->peer; local [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
peerkey.c | 69 const u8 *peer, 80 if (peer) 102 if (peer) { 103 /* Peer MAC Address KDE */ 104 pos = wpa_add_kde(pos, RSN_KEY_DATA_MAC_ADDR, peer, ETH_ALEN); 112 if (peer) { 113 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK Error (peer " 115 MAC2STR(peer), mui, error_type); 139 /* KDEs: Peer RSN IE, Initiator MAC Address, Initiator Nonce */ 163 /* Peer RSN IE * 614 u8 peer[ETH_ALEN]; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
peerkey.c | 68 const u8 *peer, 79 if (peer) 101 if (peer) { 102 /* Peer MAC Address KDE */ 103 pos = wpa_add_kde(pos, RSN_KEY_DATA_MAC_ADDR, peer, ETH_ALEN); 111 if (peer) { 112 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK Error (peer " 114 MAC2STR(peer), mui, error_type); 138 /* KDEs: Peer RSN IE, Initiator MAC Address, Initiator Nonce */ 162 /* Peer RSN IE * 613 u8 peer[ETH_ALEN]; local [all...] |
/external/nist-sip/java/gov/nist/javax/sip/ |
TransactionExt.java | 56 * Get the certificate(s) that were sent to the peer during handshaking. 57 *@return the certificate(s) that were sent to the peer during handshaking. 64 * @return the identity of the peer which was identified as part of defining the session.
|
/external/wpa_supplicant/ |
eap_methods.c | 2 * EAP peer: Method registration 163 * eap_peer_get_methods - Get a list of enabled EAP peer methods 165 * Returns: List of enabled EAP peer methods 272 * eap_peer_method_alloc - Allocate EAP peer method structure 273 * @version: Version of the EAP peer method interface (set to 299 * eap_peer_method_free - Free EAP peer method structure 309 * eap_peer_method_register - Register an EAP peer method 314 * Each EAP peer method needs to call this function to register itself as a 343 * eap_peer_register_methods - Register statically linked EAP peer methods 346 * This function is called at program initialization to register all EAP peer [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_methods.c | 2 * EAP peer: Method registration 163 * eap_peer_get_methods - Get a list of enabled EAP peer methods 165 * Returns: List of enabled EAP peer methods 272 * eap_peer_method_alloc - Allocate EAP peer method structure 273 * @version: Version of the EAP peer method interface (set to 299 * eap_peer_method_free - Free EAP peer method structure 309 * eap_peer_method_register - Register an EAP peer method 314 * Each EAP peer method needs to call this function to register itself as a 343 * eap_peer_register_methods - Register statically linked EAP peer methods 346 * This function is called at program initialization to register all EAP peer [all...] |
/external/wpa_supplicant_8/src/ap/ |
peerkey_auth.c | 57 struct wpa_state_machine *sm, const u8 *peer, 70 if (peer) { 71 pos = wpa_add_kde(pos, RSN_KEY_DATA_MAC_ADDR, peer, ETH_ALEN, 108 /* Initiator = sm->addr; Peer = kde.mac_addr */ 208 const u8 *smk, const u8 *peer) 229 /* Peer RSN IE */ 233 /* Peer MAC Address */ 234 pos = wpa_add_kde(pos, RSN_KEY_DATA_MAC_ADDR, peer, ETH_ALEN, NULL, 0); 282 /* Peer = sm->addr; Initiator = kde.mac_addr; 283 * Peer Nonce = key->key_nonce; Initiator Nonce = kde.nonce * [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_pwd.c | 2 * EAP peer method: EAP-pwd (RFC 5931) 204 wpa_printf(MSG_DEBUG, "EAP-PWD (peer): server said group %d", 214 wpa_hexdump_ascii(MSG_INFO, "EAP-PWD (peer): server sent id of", 230 wpa_printf(MSG_INFO, "EAP-PWD (peer): unable to compute PWE"); 234 wpa_printf(MSG_INFO, "EAP-PWD (peer): computed %d bit PWE...", 274 wpa_printf(MSG_INFO, "EAP-PWD (peer): scalar allocation fail"); 279 wpa_printf(MSG_INFO, "EAP-pwd (peer): unable to get cofactor " 292 wpa_printf(MSG_INFO, "EAP-PWD (peer): element allocation " 300 wpa_printf(MSG_INFO, "EAP-PWD (peer): element inversion fail"); 307 wpa_printf(MSG_INFO, "EAP-PWD (peer): point allocation fail") [all...] |
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
dbus_new_handlers_p2p.h | 116 * P2P Peer properties. 120 struct peer_handler_args *peer); 124 struct peer_handler_args *peer);
|
/libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/ |
SSLParametersImpl.java | 74 // if the peer with this parameters tuned to work in client mode 76 // if the peer with this parameters tuned to require client authentication 78 // if the peer with this parameters tuned to request client authentication 80 // if the peer with this parameters allowed to cteate new SSL session 278 * Tunes the peer holding this parameters to work in client mode. 279 * @param mode if the peer is configured to work in client mode 294 * Tunes the peer holding this parameters to require client authentication 303 * Returns the value indicating if the peer with this parameters tuned 311 * Tunes the peer holding this parameters to request client authentication 320 * Returns the value indicating if the peer with this parameter [all...] |
/external/bluetooth/bluez/src/ |
storage.c | 288 int write_remote_class(bdaddr_t *local, bdaddr_t *peer, uint32_t class) 296 ba2str(peer, addr); 302 int read_remote_class(bdaddr_t *local, bdaddr_t *peer, uint32_t *class) 308 ba2str(peer, addr); 324 int write_device_name(bdaddr_t *local, bdaddr_t *peer, char *name) 340 ba2str(peer, addr); 365 int write_remote_eir(bdaddr_t *local, bdaddr_t *peer, uint8_t *data) 378 ba2str(peer, addr); 382 int read_remote_eir(bdaddr_t *local, bdaddr_t *peer, uint8_t *data) 389 ba2str(peer, addr) [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
README-P2P | 100 Flush P2P peer table and state. 104 p2p_prov_disc <peer device address> <display|keypad|pbc> 106 Send P2P provision discovery request to the specified peer. The 107 parameters for this command are the P2P device address of the peer and 109 02:01:02:03:04:05 display" would request the peer to display a PIN for 110 us and "p2p_prov_disc 02:01:02:03:04:05 keypad" would request the peer 113 p2p_connect <peer device address> <pbc|pin|PIN#> [label|display|keypad] 116 Start P2P group formation with a discovered P2P peer. This includes 127 keypad=PIN entered from peer device label or display). "persistent" 135 "auth" indicates that the WPS parameters are authorized for the peer [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_common.h | 2 * EAP common peer/server definitions
|