/external/wpa_supplicant_8/wpa_supplicant/ |
events.c | [all...] |
wpa_cli.c | 546 "(Peer STA MAC address)\n"); 960 "(Peer STA MAC address)\n"); [all...] |
/external/ipsec-tools/src/racoon/ |
isakmp_ident.c | 522 iph1->natt_flags & NAT_DETECTED_PEER ? "PEER" : ""); 777 plog(LLV_DEBUG, LOCATION, iph1->remote, "peer's ID:"); 903 * We don't send information to the peer even 1023 /* Has the peer announced NAT-T? */ 1208 iph1->natt_flags & NAT_DETECTED_PEER ? "PEER" : ""); [all...] |
/external/qemu/slirp/ |
tcp_subr.c | 219 * then send a RST to peer. 319 * if never received SYN, just forget it. If got a SYN from peer, 320 * but haven't sent FIN, then go to FIN_WAIT_1 state to send peer a FIN. 321 * If already got a FIN from peer, then almost done; go to LAST_ACK 322 * state. In all other cases, have already sent FIN to peer (e.g. 324 * for peer to send FIN or not respond to keep-alives, etc. [all...] |
/external/qemu/slirp-android/ |
tcp_subr.c | 221 * then send a RST to peer. 321 * if never received SYN, just forget it. If got a SYN from peer, 322 * but haven't sent FIN, then go to FIN_WAIT_1 state to send peer a FIN. 323 * If already got a FIN from peer, then almost done; go to LAST_ACK 324 * state. In all other cases, have already sent FIN to peer (e.g. 326 * for peer to send FIN or not respond to keep-alives, etc.
|
/external/wpa_supplicant/ |
ctrl_iface.c | 102 /* MLME-STKSTART.request(peer) */ 106 u8 peer[ETH_ALEN]; local 108 if (hwaddr_aton(addr, peer)) { 110 "address '%s'", peer); 115 MAC2STR(peer)); 117 return wpa_sm_stkstart(wpa_s->wpa, peer); [all...] |
eap_sake.c | 2 * EAP peer method: EAP-SAKE (RFC 4763) 240 wpa_hexdump(MSG_MSGDUMP, "EAP-SAKE: RAND_P (peer rand)",
|
/external/chromium/net/socket/ |
ssl_server_socket_nss.cc | 110 // Set peer address. TODO(hclam): This should be in a separate method. 650 // Peer certificate is retrieved in HandshakeCallback() later, which is called
|
/external/chromium/third_party/libjingle/ |
mods-since-v0_4_0.diff | 7 < Talk's peer-to-peer and voice capabilities. This package will create several
47 > Talk's peer-to-peer and voice capabilities. This package will create several
88 < when a direct peer-to-peer connection could not be established. The relay
106 > when a direct peer-to-peer connection could not be established. The relay
[all...] |
/external/libnfc-nxp/src/ |
phLibNfc_llcp.c | 97 /* Check if previous callback is pending or if remote peer is not LLCP compliant */ 329 /* Remote peer is LLCP compliant */
|
/external/qemu/proxy/ |
proxy_common.c | 137 PROXY_LOG("%s: connection reset by peer (send)", 171 PROXY_LOG("%s: connection reset by peer (receive)",
|
/external/tcpdump/ |
sctpConstants.h | 389 /* amount peer is obligated to have in rwnd or 470 * to the peer, this will probably be followed
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap.c | 2 * EAP peer state machines (RFC 4137) 14 * This file implements the Peer State Machine as defined in RFC 4137. The used 542 * RFC 4137 - Appendix A.1: EAP Peer State Machine - State transitions 716 * peer and server in a loop (e.g., TLS ACK frame in both 1158 * eap_peer_sm_init - Allocate and initialize EAP peer state machine [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_tnc.c | 313 wpa_printf(MSG_DEBUG, "EAP-TNC: Peer used Start flag"); 424 wpa_printf(MSG_DEBUG, "EAP-TNC: Peer acknowledged the last "
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap.c | 2 * EAP peer state machines (RFC 4137) 14 * This file implements the Peer State Machine as defined in RFC 4137. The used 551 * RFC 4137 - Appendix A.1: EAP Peer State Machine - State transitions 725 * peer and server in a loop (e.g., TLS ACK frame in both [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_tnc.c | 359 wpa_printf(MSG_DEBUG, "EAP-TNC: Peer used Start flag"); 470 wpa_printf(MSG_DEBUG, "EAP-TNC: Peer acknowledged the last "
|
/external/wpa_supplicant_8/src/wps/ |
wps_common.c | 81 wpa_printf(MSG_DEBUG, "WPS: Peer DH public key not available"); 86 wpa_hexdump_buf(MSG_DEBUG, "WPS: DH peer Public Key", pubkey);
|
/packages/apps/Nfc/jni/ |
com_android_nfc_NativeNfcSecureElement.cpp | 221 /* Check if NFC device is already connected to a tag or P2P peer */ 224 LOGD("Unable to open SE connection, device already connected to a P2P peer or a Tag");
|
/bionic/libc/include/sys/ |
_errdefs.h | 141 __BIONIC_ERRDEF( ECONNRESET , 104, "Connection reset by peer" )
|
/development/ndk/platforms/android-3/include/sys/ |
_errdefs.h | 140 __BIONIC_ERRDEF( ECONNRESET , 104, "Connection reset by peer" )
|
/external/bluetooth/bluez/tools/ |
l2ping.c | 201 printf("Peer doesn't support Echo packets\n");
|
/external/chromium/chrome/browser/prerender/ |
prerender_contents.h | 40 // This class is a peer of TabContents. It can host a renderer, but does not
|
/external/chromium/chrome/common/extensions/ |
extension_localization_peer_unittest.cc | 55 : public webkit_glue::ResourceLoaderBridge::Peer {
|
/external/chromium/third_party/libjingle/source/talk/base/ |
socketpool.cc | 231 // If the peer sent data, we can't process it, so drop the connection.
|
/external/dbus/dbus/ |
dbus-misc.c | 61 * method GetMachineId from interface org.freedesktop.DBus.Peer.
|