Searched
full:peer (Results
376 -
400 of
918) sorted by null
<<11121314151617181920>>
/external/dropbear/ |
session.h | 94 unsigned char *remotehost; /* the peer hostname */
|
/external/iproute2/include/linux/ |
xfrm.h | 428 * SA negotiation with the peer */
|
/external/ipsec-tools/ |
NEWS | 84 o Dead Peer Detection (DPD) support.
|
/external/ipsec-tools/src/libipsec/ |
ipsec_set_policy.3 | 203 .Pq peer .
|
/external/ipsec-tools/src/racoon/doc/ |
README.plainrsa | 101 remote peer's public key.
|
/external/ipsec-tools/src/racoon/ |
main.c | 103 "- Dead Peer Detection\n"
|
proposal.h | 86 vchar_t *keymat_p; /* peer's KEYMAT */
|
/external/jsilver/src/com/google/clearsilver/jsilver/data/ |
Data.java | 41 * can have a value, a child, and a next peer.
|
/external/libnfc-nxp/src/ |
phFriNfc_ISO15693Map.h | 146 * The function checks whether the peer device is NDEF compliant.
|
/external/openssl/ssl/ |
s2_clnt.c | 511 if (s->session->peer != NULL) /* can't happen*/ 518 s->session->peer = s->session->sess_cert->peer_key->x509; 520 CRYPTO_add(&s->session->peer->references, 1, CRYPTO_LOCK_X509); 524 || s->session->peer != s->session->sess_cert->peer_key->x509)
|
s2_srvr.c | 301 ((s->session->peer != NULL) && 1087 if (s->session->peer != NULL) 1088 X509_free(s->session->peer); 1089 s->session->peer=x509;
|
/external/ppp/pppd/plugins/rp-pppoe/ |
pppoe.h | 256 unsigned char peerEth[ETH_ALEN]; /* Peer's MAC address */
|
/external/tcpdump/ |
print-cnfp.c | 78 struct in_addr peer_nexthop; /* v6: IP address of the nexthop within the peer (FIB)*/
|
/external/wpa_supplicant/ |
todo.txt | 119 - make it clearer that EAP server/peer can be used as a separate library
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_aka.c | 230 wpa_printf(MSG_DEBUG, "EAP-AKA: Checkcode from peer " 242 wpa_printf(MSG_DEBUG, "EAP-AKA: Checkcode from peer indicates " 720 "authentication data for the peer"); 817 wpa_printf(MSG_WARNING, "EAP-AKA': Peer selected " [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/wps/ |
wps.c | 129 * WSC_NACK, WSC_MSG, and WSC_Done. The caller (e.g., EAP server/peer) is
|
wps_common.c | 79 wpa_printf(MSG_DEBUG, "WPS: Peer DH public key not available");
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_aka.c | 230 wpa_printf(MSG_DEBUG, "EAP-AKA: Checkcode from peer " 242 wpa_printf(MSG_DEBUG, "EAP-AKA: Checkcode from peer indicates " 720 "authentication data for the peer"); 817 wpa_printf(MSG_WARNING, "EAP-AKA': Peer selected " [all...] |
/external/wpa_supplicant_8/src/wps/ |
wps_i.h | 23 * This data is stored at the EAP-WSC server/peer method and it is kept for a
|
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
dbus_new.h | 84 #define WPAS_DBUS_NEW_IFACE_P2P_PEER WPAS_DBUS_NEW_INTERFACE ".Peer"
|
/frameworks/base/obex/javax/obex/ |
Operation.java | 44 * packets as they are built. If during the operation the peer in the operation
|
/frameworks/base/telephony/java/com/android/internal/telephony/ |
Connection.java | 42 NUMBER_UNREACHABLE, /* cannot reach the peer */
|
/frameworks/base/voip/java/android/net/sip/ |
SipAudioCall.java | 129 * Called when the peer is busy during session initialization. 317 * Gets the peer's SIP profile. 319 * @return the peer's SIP profile [all...] |
/libcore/luni/src/test/java/org/apache/harmony/luni/tests/internal/net/www/protocol/https/ |
HttpsURLConnectionTest.java | 632 * them with actual corresponding values of remote peer. [all...] |
/ndk/sources/host-tools/sed-4.2.1/lib/ |
strerror.c | 110 msg = "Connection reset by peer";
|
Completed in 328 milliseconds
<<11121314151617181920>>