HomeSort by relevance Sort by last modified time
    Searched full:peer (Results 351 - 375 of 918) sorted by null

<<11121314151617181920>>

  /external/wpa_supplicant_8/wpa_supplicant/
events.c     [all...]
wpa_cli.c 546 "(Peer STA MAC address)\n");
960 "(Peer STA MAC address)\n");
    [all...]
  /external/ipsec-tools/src/racoon/
isakmp_ident.c 522 iph1->natt_flags & NAT_DETECTED_PEER ? "PEER" : "");
777 plog(LLV_DEBUG, LOCATION, iph1->remote, "peer's ID:");
903 * We don't send information to the peer even
1023 /* Has the peer announced NAT-T? */
1208 iph1->natt_flags & NAT_DETECTED_PEER ? "PEER" : "");
    [all...]
  /external/qemu/slirp/
tcp_subr.c 219 * then send a RST to peer.
319 * if never received SYN, just forget it. If got a SYN from peer,
320 * but haven't sent FIN, then go to FIN_WAIT_1 state to send peer a FIN.
321 * If already got a FIN from peer, then almost done; go to LAST_ACK
322 * state. In all other cases, have already sent FIN to peer (e.g.
324 * for peer to send FIN or not respond to keep-alives, etc.
    [all...]
  /external/qemu/slirp-android/
tcp_subr.c 221 * then send a RST to peer.
321 * if never received SYN, just forget it. If got a SYN from peer,
322 * but haven't sent FIN, then go to FIN_WAIT_1 state to send peer a FIN.
323 * If already got a FIN from peer, then almost done; go to LAST_ACK
324 * state. In all other cases, have already sent FIN to peer (e.g.
326 * for peer to send FIN or not respond to keep-alives, etc.
  /external/wpa_supplicant/
ctrl_iface.c 102 /* MLME-STKSTART.request(peer) */
106 u8 peer[ETH_ALEN]; local
108 if (hwaddr_aton(addr, peer)) {
110 "address '%s'", peer);
115 MAC2STR(peer));
117 return wpa_sm_stkstart(wpa_s->wpa, peer);
    [all...]
eap_sake.c 2 * EAP peer method: EAP-SAKE (RFC 4763)
240 wpa_hexdump(MSG_MSGDUMP, "EAP-SAKE: RAND_P (peer rand)",
  /external/chromium/net/socket/
ssl_server_socket_nss.cc 110 // Set peer address. TODO(hclam): This should be in a separate method.
650 // Peer certificate is retrieved in HandshakeCallback() later, which is called
  /external/chromium/third_party/libjingle/
mods-since-v0_4_0.diff 7 < Talk's peer-to-peer and voice capabilities. This package will create several
47 > Talk's peer-to-peer and voice capabilities. This package will create several
88 < when a direct peer-to-peer connection could not be established. The relay
106 > when a direct peer-to-peer connection could not be established. The relay
    [all...]
  /external/libnfc-nxp/src/
phLibNfc_llcp.c 97 /* Check if previous callback is pending or if remote peer is not LLCP compliant */
329 /* Remote peer is LLCP compliant */
  /external/qemu/proxy/
proxy_common.c 137 PROXY_LOG("%s: connection reset by peer (send)",
171 PROXY_LOG("%s: connection reset by peer (receive)",
  /external/tcpdump/
sctpConstants.h 389 /* amount peer is obligated to have in rwnd or
470 * to the peer, this will probably be followed
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap.c 2 * EAP peer state machines (RFC 4137)
14 * This file implements the Peer State Machine as defined in RFC 4137. The used
542 * RFC 4137 - Appendix A.1: EAP Peer State Machine - State transitions
716 * peer and server in a loop (e.g., TLS ACK frame in both
1158 * eap_peer_sm_init - Allocate and initialize EAP peer state machine
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_tnc.c 313 wpa_printf(MSG_DEBUG, "EAP-TNC: Peer used Start flag");
424 wpa_printf(MSG_DEBUG, "EAP-TNC: Peer acknowledged the last "
  /external/wpa_supplicant_8/src/eap_peer/
eap.c 2 * EAP peer state machines (RFC 4137)
14 * This file implements the Peer State Machine as defined in RFC 4137. The used
551 * RFC 4137 - Appendix A.1: EAP Peer State Machine - State transitions
725 * peer and server in a loop (e.g., TLS ACK frame in both
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_tnc.c 359 wpa_printf(MSG_DEBUG, "EAP-TNC: Peer used Start flag");
470 wpa_printf(MSG_DEBUG, "EAP-TNC: Peer acknowledged the last "
  /external/wpa_supplicant_8/src/wps/
wps_common.c 81 wpa_printf(MSG_DEBUG, "WPS: Peer DH public key not available");
86 wpa_hexdump_buf(MSG_DEBUG, "WPS: DH peer Public Key", pubkey);
  /packages/apps/Nfc/jni/
com_android_nfc_NativeNfcSecureElement.cpp 221 /* Check if NFC device is already connected to a tag or P2P peer */
224 LOGD("Unable to open SE connection, device already connected to a P2P peer or a Tag");
  /bionic/libc/include/sys/
_errdefs.h 141 __BIONIC_ERRDEF( ECONNRESET , 104, "Connection reset by peer" )
  /development/ndk/platforms/android-3/include/sys/
_errdefs.h 140 __BIONIC_ERRDEF( ECONNRESET , 104, "Connection reset by peer" )
  /external/bluetooth/bluez/tools/
l2ping.c 201 printf("Peer doesn't support Echo packets\n");
  /external/chromium/chrome/browser/prerender/
prerender_contents.h 40 // This class is a peer of TabContents. It can host a renderer, but does not
  /external/chromium/chrome/common/extensions/
extension_localization_peer_unittest.cc 55 : public webkit_glue::ResourceLoaderBridge::Peer {
  /external/chromium/third_party/libjingle/source/talk/base/
socketpool.cc 231 // If the peer sent data, we can't process it, so drop the connection.
  /external/dbus/dbus/
dbus-misc.c 61 * method GetMachineId from interface org.freedesktop.DBus.Peer.

Completed in 405 milliseconds

<<11121314151617181920>>