HomeSort by relevance Sort by last modified time
    Searched full:peer (Results 301 - 325 of 918) sorted by null

<<11121314151617181920>>

  /external/iproute2/misc/
ss.c 1902 int peer; member in struct:unixstat
1932 char *peer; local
    [all...]
  /external/openssl/apps/
s_server.c 411 BIO_printf(bio_err," -verify arg - turn on peer certificate verification\n");
412 BIO_printf(bio_err," -Verify arg - turn on peer certificate verification, must have a cert.\n");
415 BIO_printf(bio_err," -crl_check - check the peer certificate has not been revoked by its CA.\n" \
417 BIO_printf(bio_err," -crl_check_all - check the peer certificate has not been revoked by its CA\n" \
2210 X509 *peer; local
2452 X509 *peer; local
    [all...]
  /external/libnfc-nxp/src/
phLibNfc.h     [all...]
  /cts/apps/CtsVerifier/res/values/
strings.xml 196 <string name="nfc_test_info">The Peer-to-Peer Data Exchange tests require two devices with
209 <string name="nfc_pee_2_pee">Peer-to-Peer Data Exchange</string>
  /external/bluetooth/bluez/tools/
hcitool.1 101 (allow role switch, become slave if the peer asks to become master). Default is
  /external/chromium/base/threading/
worker_pool_posix_unittest.cc 18 // Peer class to provide passthrough access to PosixDynamicThreadPool internals.
  /external/chromium/chrome/browser/tab_contents/
background_contents.h 29 // This class is a peer of TabContents. It can host a renderer, but does not
  /external/chromium/net/base/
net_error_list.h 152 // The peer sent an SSL no_renegotiation alert message.
159 // An SSL peer sent us a fatal decompression_failure alert. This typically
160 // occurs when a peer selects DEFLATE compression in the mistaken belief that
164 // An SSL peer sent us a fatal bad_record_mac alert. This has been observed
  /external/chromium/net/socket/
client_socket.h 61 // Copies the peer address to |address| and returns a network error code.
  /external/chromium/third_party/libjingle/source/talk/session/tunnel/
securetunnelsessionclient.h 156 // on it so we can setup the peer certificate when we receive it
  /external/dbus/dbus/
dbus-shared.h 94 #define DBUS_INTERFACE_PEER "org.freedesktop.DBus.Peer"
  /external/iproute2/man/man3/
libnetlink.3 28 int rtnl_talk(struct rtnl_handle *rtnl, struct nlmsghdr *n, pid_t peer,
  /external/ipsec-tools/src/racoon/
plainrsa-gen.8 114 that should be stored in the other peer's configuration in this format:
  /external/kernel-headers/original/asm-generic/
errno.h 77 #define ECONNRESET 104 /* Connection reset by peer */
  /external/nist-sip/java/gov/nist/javax/sip/stack/
TCPMessageChannel.java 279 * Return a formatted message to the client. We try to re-connect with the peer on the other
442 // the peer address and tag it appropriately.
725 * Get the port of the peer to whom we are sending messages.
727 * @return the peer port.
TLSMessageChannel.java 279 * Return a formatted message to the client. We try to re-connect with the peer on the other
412 // the peer address and tag it appropriately.
704 * Get the port of the peer to whom we are sending messages.
706 * @return the peer port.
  /external/openssl/ssl/
s3_srvr.c 440 ((s->session->peer != NULL) &&
2740 X509 *peer; local
    [all...]
  /external/ppp/pppd/
lcp.h 117 /* Default number of times we receive our magic number from the peer
  /external/qemu/
block_int.h 159 DeviceState *peer; member in struct:BlockDriverState
  /external/srec/portable/include/
ESR_ReturnCode.h 163 * A connection was forcibly closed by a peer. This normally results from
  /external/tcpdump/
sctpHeader.h 146 struct sctpInitiation initAckISent; /* the INIT-ACK that I sent to my peer */
  /external/wpa_supplicant/
eap_pax_common.c 2 * EAP server/peer: EAP-PAX shared routines
eap_tls.c 2 * EAP peer method: EAP-TLS (RFC 2716)
eap_tlv.c 2 * EAP peer method: EAP-TLV (draft-josefsson-pppext-eap-tls-eap-07.txt)
eap_vendor_test.c 2 * EAP peer method: Test method for vendor specific (expanded) EAP type

Completed in 838 milliseconds

<<11121314151617181920>>