/external/iproute2/man/man8/ |
ip.8 | 120 .B peer 963 .BI peer " LLADDRESS" 964 change the link layer broadcast address or the peer address when 1079 .BI peer " ADDRESS" 1084 prefix length. If a peer address is specified, the local address 1086 with the peer rather than with the local address. [all...] |
/external/qemu/ |
block.c | 689 assert(!bs->peer); 707 if (bs->peer) { 710 bs->peer = qdev; 716 assert(bs->peer == qdev); 717 bs->peer = NULL; 722 return bs->peer; [all...] |
/external/wpa_supplicant_6/wpa_supplicant/ |
ctrl_iface.c | 107 /* MLME-STKSTART.request(peer) */ 111 u8 peer[ETH_ALEN]; local 113 if (hwaddr_aton(addr, peer)) { 115 "address '%s'", peer); 120 MAC2STR(peer)); 122 return wpa_sm_stkstart(wpa_s->wpa, peer); [all...] |
/external/dbus/ |
NEWS.pre-1-0 | 39 - GetMachineId peer method added to the bus API 41 peer messages directly to an app 291 - The Ping message from the org.freedesktop.DBus.Peer interface is now handled
|
/external/ipsec-tools/src/racoon/ |
handler.c | 881 * send a message to the peer). 1007 * check the response has been sent to the peer. when not, simply reply 1008 * the buffered packet to the peer.
|
isakmp_agg.c | 520 iph1->natt_flags & NAT_DETECTED_PEER ? "PEER" : ""); 999 /* Has the peer announced NAT-T? */ [all...] |
isakmp_base.c | 675 iph1->natt_flags & NAT_DETECTED_PEER ? "PEER" : ""); 949 /* has the peer announced nat-t? */ 1169 iph1->natt_flags & NAT_DETECTED_PEER ? "PEER" : ""); [all...] |
isakmp_unity.c | 95 "Unity mode config request but the peer "
|
/external/libnfc-nxp/src/ |
phFriNfc_Llcp.c | 672 /* Save the local peer role (initiator/target) */ 737 /* Response must be received before LTO announced by remote peer */ 908 // Nothing to send, send SYMM instead to allow peer to send something [all...] |
phFriNfc_DesfireMap.h | 288 * The function checks whether the peer device is NDEF compliant.
|
phFriNfc_FelicaMap.h | 248 * The function checks whether the peer device is NDEF compliant.
|
phFriNfc_LlcpTransport_Connection.h | 189 * This function tries to connect to a given SAP on the remote peer. If the
|
phFriNfc_MifareULMap.h | 256 * The function checks whether the peer device is NDEF compliant.
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_peap.c | 1263 wpa_printf(MSG_INFO, "EAP-PEAP: peer did not select the forced [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_peap.c | 1229 wpa_printf(MSG_INFO, "EAP-PEAP: peer did not select the forced" 1230 " version (forced=%d peer=%d) - reject", 1235 wpa_printf(MSG_DEBUG, "EAP-PEAP: peer ver=%d, own ver=%d; " [all...] |
/external/apache-harmony/luni/src/test/api/common/org/apache/harmony/luni/tests/internal/net/www/protocol/https/ |
HttpsURLConnectionTest.java | 792 * actual corresponding values of remote peer. [all...] |
/external/apache-http/src/org/apache/http/params/ |
HttpConnectionParams.java | 149 * acknowledgement of all data written to the peer, at which point the socket is
|
/external/chromium/net/socket/ |
ssl_client_socket_mac.cc | 190 // (Note that all errSSLPeer* codes indicate errors reported by the peer, 857 // Concatenate the hostname and peer address to use as the peer ID. To [all...] |
/external/chromium/net/spdy/ |
spdy_http_stream.cc | 245 // Put the peer's IP address and port into the response.
|
/external/chromium/third_party/libjingle/source/talk/p2p/base/ |
transport.h | 221 // Called when a candidate is ready from remote peer.
|
/external/dnsmasq/ |
COPYING-v3 | 288 e) Convey the object code using peer-to-peer transmission, provided 439 occurring solely as a consequence of using peer-to-peer transmission [all...] |
/external/kernel-headers/original/linux/ |
tcp.h | 247 __u32 max_window; /* Maximal window ever seen from peer */
|
/external/openssl/crypto/evp/ |
evp_locl.h | 274 /* Peer key for key agreement, may be NULL */
|
/external/qemu/docs/ |
CHAR-DEVICES.TXT | 30 a "connection reset by peer" and an "operation in progress" :-(
|
/external/wpa_supplicant/ |
eap_gpsk_common.c | 2 * EAP server/peer: EAP-GPSK shared routines
|