/external/iproute2/misc/ |
ss.c | 1902 int peer; member in struct:unixstat 1932 char *peer; local [all...] |
/external/openssl/apps/ |
s_server.c | 411 BIO_printf(bio_err," -verify arg - turn on peer certificate verification\n"); 412 BIO_printf(bio_err," -Verify arg - turn on peer certificate verification, must have a cert.\n"); 415 BIO_printf(bio_err," -crl_check - check the peer certificate has not been revoked by its CA.\n" \ 417 BIO_printf(bio_err," -crl_check_all - check the peer certificate has not been revoked by its CA\n" \ 2210 X509 *peer; local 2452 X509 *peer; local [all...] |
/external/libnfc-nxp/src/ |
phLibNfc.h | [all...] |
/cts/apps/CtsVerifier/res/values/ |
strings.xml | 196 <string name="nfc_test_info">The Peer-to-Peer Data Exchange tests require two devices with 209 <string name="nfc_pee_2_pee">Peer-to-Peer Data Exchange</string>
|
/external/bluetooth/bluez/tools/ |
hcitool.1 | 101 (allow role switch, become slave if the peer asks to become master). Default is
|
/external/chromium/base/threading/ |
worker_pool_posix_unittest.cc | 18 // Peer class to provide passthrough access to PosixDynamicThreadPool internals.
|
/external/chromium/chrome/browser/tab_contents/ |
background_contents.h | 29 // This class is a peer of TabContents. It can host a renderer, but does not
|
/external/chromium/net/base/ |
net_error_list.h | 152 // The peer sent an SSL no_renegotiation alert message. 159 // An SSL peer sent us a fatal decompression_failure alert. This typically 160 // occurs when a peer selects DEFLATE compression in the mistaken belief that 164 // An SSL peer sent us a fatal bad_record_mac alert. This has been observed
|
/external/chromium/net/socket/ |
client_socket.h | 61 // Copies the peer address to |address| and returns a network error code.
|
/external/chromium/third_party/libjingle/source/talk/session/tunnel/ |
securetunnelsessionclient.h | 156 // on it so we can setup the peer certificate when we receive it
|
/external/dbus/dbus/ |
dbus-shared.h | 94 #define DBUS_INTERFACE_PEER "org.freedesktop.DBus.Peer"
|
/external/iproute2/man/man3/ |
libnetlink.3 | 28 int rtnl_talk(struct rtnl_handle *rtnl, struct nlmsghdr *n, pid_t peer,
|
/external/ipsec-tools/src/racoon/ |
plainrsa-gen.8 | 114 that should be stored in the other peer's configuration in this format:
|
/external/kernel-headers/original/asm-generic/ |
errno.h | 77 #define ECONNRESET 104 /* Connection reset by peer */
|
/external/nist-sip/java/gov/nist/javax/sip/stack/ |
TCPMessageChannel.java | 279 * Return a formatted message to the client. We try to re-connect with the peer on the other 442 // the peer address and tag it appropriately. 725 * Get the port of the peer to whom we are sending messages. 727 * @return the peer port.
|
TLSMessageChannel.java | 279 * Return a formatted message to the client. We try to re-connect with the peer on the other 412 // the peer address and tag it appropriately. 704 * Get the port of the peer to whom we are sending messages. 706 * @return the peer port.
|
/external/openssl/ssl/ |
s3_srvr.c | 440 ((s->session->peer != NULL) && 2740 X509 *peer; local [all...] |
/external/ppp/pppd/ |
lcp.h | 117 /* Default number of times we receive our magic number from the peer
|
/external/qemu/ |
block_int.h | 159 DeviceState *peer; member in struct:BlockDriverState
|
/external/srec/portable/include/ |
ESR_ReturnCode.h | 163 * A connection was forcibly closed by a peer. This normally results from
|
/external/tcpdump/ |
sctpHeader.h | 146 struct sctpInitiation initAckISent; /* the INIT-ACK that I sent to my peer */
|
/external/wpa_supplicant/ |
eap_pax_common.c | 2 * EAP server/peer: EAP-PAX shared routines
|
eap_tls.c | 2 * EAP peer method: EAP-TLS (RFC 2716)
|
eap_tlv.c | 2 * EAP peer method: EAP-TLV (draft-josefsson-pppext-eap-tls-eap-07.txt)
|
eap_vendor_test.c | 2 * EAP peer method: Test method for vendor specific (expanded) EAP type
|