/external/wpa_supplicant_8/src/eap_server/ |
eap_server_identity.c | 127 wpa_hexdump_ascii(MSG_DEBUG, "EAP-Identity: Peer identity", pos, len);
|
/external/wpa_supplicant_8/wpa_supplicant/ |
driver_i.h | 674 const u8 *peer, int role, const u8 *bssid, 681 return wpa_s->driver->p2p_invite(wpa_s->drv_priv, peer, role, bssid, 700 enum tdls_oper oper, const u8 *peer) 704 return wpa_s->driver->tdls_oper(wpa_s->drv_priv, oper, peer);
|
/frameworks/base/core/java/android/net/ |
SSLCertificateSocketFactory.java | 172 * so "foo.bar.example.com" is verified if the peer has a certificate 268 * <p>This method verifies the peer's certificate hostname after connecting 329 * <p>This method verifies the peer's certificate hostname after connecting 347 * <p>This method verifies the peer's certificate hostname after connecting
|
/libcore/luni/src/main/java/java/security/ |
security.properties | 64 # The following Android-only property controls peer certificate validation.
|
/libcore/luni/src/main/java/libcore/icu/ |
RuleBasedCollatorICU.java | 44 // The address of the ICU4C native peer.
|
/system/core/include/cutils/ |
sockets.h | 99 * connected local socket (e.g. AF_LOCAL) and returns whether the peer
|
/external/ppp/pppd/ |
ipv6cp.c | 174 ipv6cp_options ipv6cp_gotoptions[NUM_PPP]; /* Options that peer ack'd */ 175 ipv6cp_options ipv6cp_allowoptions[NUM_PPP]; /* Options we allow peer to request */ 188 static int ipv6cp_ackci __P((fsm *, u_char *, int)); /* Peer ack'd our CI */ 189 static int ipv6cp_nakci __P((fsm *, u_char *, int, int));/* Peer nak'd our CI */ 190 static int ipv6cp_rejci __P((fsm *, u_char *, int)); /* Peer rej'd our CI */ 205 ipv6cp_reqci, /* Request peer's Configuration Information */ 236 "Accept peer's interface identifier for us", 1 }, 664 * ipv6cp_nakci - Peer has sent a NAK for some of our CIs. 719 * Accept the peer's idea of {our,his} interface identifier, if different 753 * There may be remaining CIs, if the peer is requesting negotiatio [all...] |
ipv6cp.h | 152 int req_ifaceid; /* Ask peer to send interface identifier? */ 153 int accept_local; /* accept peer's value for iface id? */
|
/bionic/libc/netbsd/resolv/ |
res_send.c | 399 struct sockaddr_storage peer; local 415 peerlen = sizeof(peer); 417 (struct sockaddr *)(void *)&peer, &peerlen) < 0) { 421 if (!sock_eq((struct sockaddr *)(void *)&peer, 695 struct sockaddr_storage peer; local 696 socklen_t size = sizeof peer; 699 (struct sockaddr *)(void *)&peer, &size) < 0 || 700 !sock_eq((struct sockaddr *)(void *)&peer, nsap)) {
|
/external/chromium/net/socket/ |
ssl_client_socket_nss.h | 105 // Initializes the socket peer name in SSL. Returns a net error code. 237 // True if the peer name has been initialized.
|
/external/nist-sip/java/gov/nist/javax/sip/header/extensions/ |
JoinHeader.java | 146 * request identifies the peer of the dialog. When a UA sends a request 169 * Gets the tag of FromHeader. The Tag parameter identified the Peer of the
|
/external/qemu/slirp/ |
tcp_var.h | 53 #define TF_ACKNOW 0x0001 /* ack peer immediately */ 111 u_int32_t max_sndwnd; /* largest window peer has offered */
|
tcp_output.c | 171 * If peer's buffer is tiny, then send 192 * known to peer (as advertised window less 195 * window, then want to send a window update to peer. 213 * Send if we owe peer an ACK. 304 * and our peer have sent timestamps in our SYN's.
|
/external/wpa_supplicant/ |
wpa_supplicant.h | 132 * STAKey negotiation. The caller will need to set peer address for the 244 u8 peer[ETH_ALEN]; member in struct:wpa_event_data::stkstart
|
eap_mschapv2.c | 2 * EAP peer method: EAP-MSCHAPV2 (draft-kamath-pppext-eap-mschapv2-00.txt) 14 * This file implements EAP peer part of EAP-MSCHAPV2 method (EAP type 26). 256 * in its own packets, but it seemed to expect the peer to 612 /* Peer-Challenge */ 917 * eap_peer_mschapv2_register - Register EAP-MSCHAPv2 peer method 920 * This function is used to register EAP-MSCHAPv2 peer method into the EAP
|
/libcore/luni/src/main/java/java/nio/charset/ |
CharsetEncoderICU.java | 68 // constructor, or call to updateCallback throw, we still free the native peer. 97 // Our native peer needs to know what just happened...
|
/prebuilt/linux-x86/toolchain/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/ |
i2o-dev.h | 339 * Rest of 0x092 - 0x09f reserved for peer-to-peer classes
|
/prebuilt/linux-x86/toolchain/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/rpcsvc/ |
yp.h | 94 peername peer; member in struct:ypmap_parms 144 peername peer; member in struct:ypresp_master
|
/system/core/adb/ |
adb.c | 346 s->peer = create_remote_socket(p->msg.arg0, t); 347 s->peer->peer = s; 348 send_ready(s->id, s->peer->id, t); 357 if(s->peer == 0) { 358 s->peer = create_remote_socket(p->msg.arg0, t); 359 s->peer->peer = s; [all...] |
/external/chromium/third_party/libjingle/source/talk/p2p/base/ |
session.h | 54 // remote peer. We add "type" to the errors because it's needed for 209 // Invoked when we notice that there is no matching channel on our peer. 260 // Returns the JID of the other peer in this session. 263 // Set the JID of the other peer in this session. 265 // However, sometimes (e.g when a proxy is used) the peer name is 433 // Called when we notice that one of our local channels has no peer, so it
|
/frameworks/base/core/java/com/android/internal/os/ |
ZygoteInit.java | 89 * If true, zygote forks for each peer. If false, a select loop is used 560 * Runs the zygote in accept-and-fork mode. In this mode, each peer 569 ZygoteConnection peer = acceptCommandPeer(); local 576 // The child process should handle the peer requests 587 peer.run(); 590 peer.closeSocket();
|
/external/wpa_supplicant_6/wpa_supplicant/src/common/ |
nl80211_copy.h | 240 * FREQ attribute (for the initial frequency if no peer can be found) 440 * @NL80211_ATTR_PLINK_ACTION: action to perform on the mesh peer link. 574 * sent by peer, for ROAM and successful CONNECT events. [all...] |
/external/ppp/pppd/plugins/radius/ |
radius.c | 202 * Tells pppd that we will try to authenticate the peer, and not to 231 * user -- user-name of peer 232 * passwd -- password supplied by peer 234 * paddrs -- set to a list of possible peer IP addresses 318 * user -- name of the peer 323 * response -- the response (hash) the peer sent back (length in 1st byte) 324 * message -- space for a message to be returned to the peer [all...] |
/external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/ |
SSLEngineImplTest.java | 747 // choose which peer will start handshake negotiation 749 // can be initiated by any peer) 768 // so another peer produced 782 // handshake data was fully read by another peer, 818 // unwrap it by another peer [all...] |
/external/ppp/pppd/plugins/radius/etc/ |
dictionary.ascend | 110 ATTRIBUTE Ascend-IPX-Peer-Mode 216 integer 174 VALUE Ascend-IPX-Peer-Mode IPX-Peer-Router 0 175 VALUE Ascend-IPX-Peer-Mode IPX-Peer-Dialin 1
|