HomeSort by relevance Sort by last modified time
    Searched full:peer (Results 251 - 275 of 918) sorted by null

<<11121314151617181920>>

  /external/wpa_supplicant_8/src/eap_server/
eap_server_identity.c 127 wpa_hexdump_ascii(MSG_DEBUG, "EAP-Identity: Peer identity", pos, len);
  /external/wpa_supplicant_8/wpa_supplicant/
driver_i.h 674 const u8 *peer, int role, const u8 *bssid,
681 return wpa_s->driver->p2p_invite(wpa_s->drv_priv, peer, role, bssid,
700 enum tdls_oper oper, const u8 *peer)
704 return wpa_s->driver->tdls_oper(wpa_s->drv_priv, oper, peer);
  /frameworks/base/core/java/android/net/
SSLCertificateSocketFactory.java 172 * so "foo.bar.example.com" is verified if the peer has a certificate
268 * <p>This method verifies the peer's certificate hostname after connecting
329 * <p>This method verifies the peer's certificate hostname after connecting
347 * <p>This method verifies the peer's certificate hostname after connecting
  /libcore/luni/src/main/java/java/security/
security.properties 64 # The following Android-only property controls peer certificate validation.
  /libcore/luni/src/main/java/libcore/icu/
RuleBasedCollatorICU.java 44 // The address of the ICU4C native peer.
  /system/core/include/cutils/
sockets.h 99 * connected local socket (e.g. AF_LOCAL) and returns whether the peer
  /external/ppp/pppd/
ipv6cp.c 174 ipv6cp_options ipv6cp_gotoptions[NUM_PPP]; /* Options that peer ack'd */
175 ipv6cp_options ipv6cp_allowoptions[NUM_PPP]; /* Options we allow peer to request */
188 static int ipv6cp_ackci __P((fsm *, u_char *, int)); /* Peer ack'd our CI */
189 static int ipv6cp_nakci __P((fsm *, u_char *, int, int));/* Peer nak'd our CI */
190 static int ipv6cp_rejci __P((fsm *, u_char *, int)); /* Peer rej'd our CI */
205 ipv6cp_reqci, /* Request peer's Configuration Information */
236 "Accept peer's interface identifier for us", 1 },
664 * ipv6cp_nakci - Peer has sent a NAK for some of our CIs.
719 * Accept the peer's idea of {our,his} interface identifier, if different
753 * There may be remaining CIs, if the peer is requesting negotiatio
    [all...]
ipv6cp.h 152 int req_ifaceid; /* Ask peer to send interface identifier? */
153 int accept_local; /* accept peer's value for iface id? */
  /bionic/libc/netbsd/resolv/
res_send.c 399 struct sockaddr_storage peer; local
415 peerlen = sizeof(peer);
417 (struct sockaddr *)(void *)&peer, &peerlen) < 0) {
421 if (!sock_eq((struct sockaddr *)(void *)&peer,
695 struct sockaddr_storage peer; local
696 socklen_t size = sizeof peer;
699 (struct sockaddr *)(void *)&peer, &size) < 0 ||
700 !sock_eq((struct sockaddr *)(void *)&peer, nsap)) {
  /external/chromium/net/socket/
ssl_client_socket_nss.h 105 // Initializes the socket peer name in SSL. Returns a net error code.
237 // True if the peer name has been initialized.
  /external/nist-sip/java/gov/nist/javax/sip/header/extensions/
JoinHeader.java 146 * request identifies the peer of the dialog. When a UA sends a request
169 * Gets the tag of FromHeader. The Tag parameter identified the Peer of the
  /external/qemu/slirp/
tcp_var.h 53 #define TF_ACKNOW 0x0001 /* ack peer immediately */
111 u_int32_t max_sndwnd; /* largest window peer has offered */
tcp_output.c 171 * If peer's buffer is tiny, then send
192 * known to peer (as advertised window less
195 * window, then want to send a window update to peer.
213 * Send if we owe peer an ACK.
304 * and our peer have sent timestamps in our SYN's.
  /external/wpa_supplicant/
wpa_supplicant.h 132 * STAKey negotiation. The caller will need to set peer address for the
244 u8 peer[ETH_ALEN]; member in struct:wpa_event_data::stkstart
eap_mschapv2.c 2 * EAP peer method: EAP-MSCHAPV2 (draft-kamath-pppext-eap-mschapv2-00.txt)
14 * This file implements EAP peer part of EAP-MSCHAPV2 method (EAP type 26).
256 * in its own packets, but it seemed to expect the peer to
612 /* Peer-Challenge */
917 * eap_peer_mschapv2_register - Register EAP-MSCHAPv2 peer method
920 * This function is used to register EAP-MSCHAPv2 peer method into the EAP
  /libcore/luni/src/main/java/java/nio/charset/
CharsetEncoderICU.java 68 // constructor, or call to updateCallback throw, we still free the native peer.
97 // Our native peer needs to know what just happened...
  /prebuilt/linux-x86/toolchain/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/
i2o-dev.h 339 * Rest of 0x092 - 0x09f reserved for peer-to-peer classes
  /prebuilt/linux-x86/toolchain/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/rpcsvc/
yp.h 94 peername peer; member in struct:ypmap_parms
144 peername peer; member in struct:ypresp_master
  /system/core/adb/
adb.c 346 s->peer = create_remote_socket(p->msg.arg0, t);
347 s->peer->peer = s;
348 send_ready(s->id, s->peer->id, t);
357 if(s->peer == 0) {
358 s->peer = create_remote_socket(p->msg.arg0, t);
359 s->peer->peer = s;
    [all...]
  /external/chromium/third_party/libjingle/source/talk/p2p/base/
session.h 54 // remote peer. We add "type" to the errors because it's needed for
209 // Invoked when we notice that there is no matching channel on our peer.
260 // Returns the JID of the other peer in this session.
263 // Set the JID of the other peer in this session.
265 // However, sometimes (e.g when a proxy is used) the peer name is
433 // Called when we notice that one of our local channels has no peer, so it
  /frameworks/base/core/java/com/android/internal/os/
ZygoteInit.java 89 * If true, zygote forks for each peer. If false, a select loop is used
560 * Runs the zygote in accept-and-fork mode. In this mode, each peer
569 ZygoteConnection peer = acceptCommandPeer(); local
576 // The child process should handle the peer requests
587 peer.run();
590 peer.closeSocket();
  /external/wpa_supplicant_6/wpa_supplicant/src/common/
nl80211_copy.h 240 * FREQ attribute (for the initial frequency if no peer can be found)
440 * @NL80211_ATTR_PLINK_ACTION: action to perform on the mesh peer link.
574 * sent by peer, for ROAM and successful CONNECT events.
    [all...]
  /external/ppp/pppd/plugins/radius/
radius.c 202 * Tells pppd that we will try to authenticate the peer, and not to
231 * user -- user-name of peer
232 * passwd -- password supplied by peer
234 * paddrs -- set to a list of possible peer IP addresses
318 * user -- name of the peer
323 * response -- the response (hash) the peer sent back (length in 1st byte)
324 * message -- space for a message to be returned to the peer
    [all...]
  /external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/
SSLEngineImplTest.java 747 // choose which peer will start handshake negotiation
749 // can be initiated by any peer)
768 // so another peer produced
782 // handshake data was fully read by another peer,
818 // unwrap it by another peer
    [all...]
  /external/ppp/pppd/plugins/radius/etc/
dictionary.ascend 110 ATTRIBUTE Ascend-IPX-Peer-Mode 216 integer
174 VALUE Ascend-IPX-Peer-Mode IPX-Peer-Router 0
175 VALUE Ascend-IPX-Peer-Mode IPX-Peer-Dialin 1

Completed in 651 milliseconds

<<11121314151617181920>>