HomeSort by relevance Sort by last modified time
    Searched full:peer (Results 376 - 400 of 918) sorted by null

<<11121314151617181920>>

  /external/dropbear/
session.h 94 unsigned char *remotehost; /* the peer hostname */
  /external/iproute2/include/linux/
xfrm.h 428 * SA negotiation with the peer */
  /external/ipsec-tools/
NEWS 84 o Dead Peer Detection (DPD) support.
  /external/ipsec-tools/src/libipsec/
ipsec_set_policy.3 203 .Pq peer .
  /external/ipsec-tools/src/racoon/doc/
README.plainrsa 101 remote peer's public key.
  /external/ipsec-tools/src/racoon/
main.c 103 "- Dead Peer Detection\n"
proposal.h 86 vchar_t *keymat_p; /* peer's KEYMAT */
  /external/jsilver/src/com/google/clearsilver/jsilver/data/
Data.java 41 * can have a value, a child, and a next peer.
  /external/libnfc-nxp/src/
phFriNfc_ISO15693Map.h 146 * The function checks whether the peer device is NDEF compliant.
  /external/openssl/ssl/
s2_clnt.c 511 if (s->session->peer != NULL) /* can't happen*/
518 s->session->peer = s->session->sess_cert->peer_key->x509;
520 CRYPTO_add(&s->session->peer->references, 1, CRYPTO_LOCK_X509);
524 || s->session->peer != s->session->sess_cert->peer_key->x509)
s2_srvr.c 301 ((s->session->peer != NULL) &&
1087 if (s->session->peer != NULL)
1088 X509_free(s->session->peer);
1089 s->session->peer=x509;
  /external/ppp/pppd/plugins/rp-pppoe/
pppoe.h 256 unsigned char peerEth[ETH_ALEN]; /* Peer's MAC address */
  /external/tcpdump/
print-cnfp.c 78 struct in_addr peer_nexthop; /* v6: IP address of the nexthop within the peer (FIB)*/
  /external/wpa_supplicant/
todo.txt 119 - make it clearer that EAP server/peer can be used as a separate library
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_aka.c 230 wpa_printf(MSG_DEBUG, "EAP-AKA: Checkcode from peer "
242 wpa_printf(MSG_DEBUG, "EAP-AKA: Checkcode from peer indicates "
720 "authentication data for the peer");
817 wpa_printf(MSG_WARNING, "EAP-AKA': Peer selected "
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/wps/
wps.c 129 * WSC_NACK, WSC_MSG, and WSC_Done. The caller (e.g., EAP server/peer) is
wps_common.c 79 wpa_printf(MSG_DEBUG, "WPS: Peer DH public key not available");
  /external/wpa_supplicant_8/src/eap_server/
eap_server_aka.c 230 wpa_printf(MSG_DEBUG, "EAP-AKA: Checkcode from peer "
242 wpa_printf(MSG_DEBUG, "EAP-AKA: Checkcode from peer indicates "
720 "authentication data for the peer");
817 wpa_printf(MSG_WARNING, "EAP-AKA': Peer selected "
    [all...]
  /external/wpa_supplicant_8/src/wps/
wps_i.h 23 * This data is stored at the EAP-WSC server/peer method and it is kept for a
  /external/wpa_supplicant_8/wpa_supplicant/dbus/
dbus_new.h 84 #define WPAS_DBUS_NEW_IFACE_P2P_PEER WPAS_DBUS_NEW_INTERFACE ".Peer"
  /frameworks/base/obex/javax/obex/
Operation.java 44 * packets as they are built. If during the operation the peer in the operation
  /frameworks/base/telephony/java/com/android/internal/telephony/
Connection.java 42 NUMBER_UNREACHABLE, /* cannot reach the peer */
  /frameworks/base/voip/java/android/net/sip/
SipAudioCall.java 129 * Called when the peer is busy during session initialization.
317 * Gets the peer's SIP profile.
319 * @return the peer's SIP profile
    [all...]
  /libcore/luni/src/test/java/org/apache/harmony/luni/tests/internal/net/www/protocol/https/
HttpsURLConnectionTest.java 632 * them with actual corresponding values of remote peer.
    [all...]
  /ndk/sources/host-tools/sed-4.2.1/lib/
strerror.c 110 msg = "Connection reset by peer";

Completed in 328 milliseconds

<<11121314151617181920>>