HomeSort by relevance Sort by last modified time
    Searched full:peer (Results 426 - 450 of 918) sorted by null

<<11121314151617181920>>

  /external/iproute2/man/man8/
ip.8 120 .B peer
963 .BI peer " LLADDRESS"
964 change the link layer broadcast address or the peer address when
1079 .BI peer " ADDRESS"
1084 prefix length. If a peer address is specified, the local address
1086 with the peer rather than with the local address.
    [all...]
  /external/qemu/
block.c 689 assert(!bs->peer);
707 if (bs->peer) {
710 bs->peer = qdev;
716 assert(bs->peer == qdev);
717 bs->peer = NULL;
722 return bs->peer;
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/
ctrl_iface.c 107 /* MLME-STKSTART.request(peer) */
111 u8 peer[ETH_ALEN]; local
113 if (hwaddr_aton(addr, peer)) {
115 "address '%s'", peer);
120 MAC2STR(peer));
122 return wpa_sm_stkstart(wpa_s->wpa, peer);
    [all...]
  /external/dbus/
NEWS.pre-1-0 39 - GetMachineId peer method added to the bus API
41 peer messages directly to an app
291 - The Ping message from the org.freedesktop.DBus.Peer interface is now handled
  /external/ipsec-tools/src/racoon/
handler.c 881 * send a message to the peer).
1007 * check the response has been sent to the peer. when not, simply reply
1008 * the buffered packet to the peer.
isakmp_agg.c 520 iph1->natt_flags & NAT_DETECTED_PEER ? "PEER" : "");
999 /* Has the peer announced NAT-T? */
    [all...]
isakmp_base.c 675 iph1->natt_flags & NAT_DETECTED_PEER ? "PEER" : "");
949 /* has the peer announced nat-t? */
1169 iph1->natt_flags & NAT_DETECTED_PEER ? "PEER" : "");
    [all...]
isakmp_unity.c 95 "Unity mode config request but the peer "
  /external/libnfc-nxp/src/
phFriNfc_Llcp.c 672 /* Save the local peer role (initiator/target) */
737 /* Response must be received before LTO announced by remote peer */
908 // Nothing to send, send SYMM instead to allow peer to send something
    [all...]
phFriNfc_DesfireMap.h 288 * The function checks whether the peer device is NDEF compliant.
phFriNfc_FelicaMap.h 248 * The function checks whether the peer device is NDEF compliant.
phFriNfc_LlcpTransport_Connection.h 189 * This function tries to connect to a given SAP on the remote peer. If the
phFriNfc_MifareULMap.h 256 * The function checks whether the peer device is NDEF compliant.
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_peap.c 1263 wpa_printf(MSG_INFO, "EAP-PEAP: peer did not select the forced
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_peap.c 1229 wpa_printf(MSG_INFO, "EAP-PEAP: peer did not select the forced"
1230 " version (forced=%d peer=%d) - reject",
1235 wpa_printf(MSG_DEBUG, "EAP-PEAP: peer ver=%d, own ver=%d; "
    [all...]
  /external/apache-harmony/luni/src/test/api/common/org/apache/harmony/luni/tests/internal/net/www/protocol/https/
HttpsURLConnectionTest.java 792 * actual corresponding values of remote peer.
    [all...]
  /external/apache-http/src/org/apache/http/params/
HttpConnectionParams.java 149 * acknowledgement of all data written to the peer, at which point the socket is
  /external/chromium/net/socket/
ssl_client_socket_mac.cc 190 // (Note that all errSSLPeer* codes indicate errors reported by the peer,
857 // Concatenate the hostname and peer address to use as the peer ID. To
    [all...]
  /external/chromium/net/spdy/
spdy_http_stream.cc 245 // Put the peer's IP address and port into the response.
  /external/chromium/third_party/libjingle/source/talk/p2p/base/
transport.h 221 // Called when a candidate is ready from remote peer.
  /external/dnsmasq/
COPYING-v3 288 e) Convey the object code using peer-to-peer transmission, provided
439 occurring solely as a consequence of using peer-to-peer transmission
    [all...]
  /external/kernel-headers/original/linux/
tcp.h 247 __u32 max_window; /* Maximal window ever seen from peer */
  /external/openssl/crypto/evp/
evp_locl.h 274 /* Peer key for key agreement, may be NULL */
  /external/qemu/docs/
CHAR-DEVICES.TXT 30 a "connection reset by peer" and an "operation in progress" :-(
  /external/wpa_supplicant/
eap_gpsk_common.c 2 * EAP server/peer: EAP-GPSK shared routines

Completed in 656 milliseconds

<<11121314151617181920>>