/external/iproute2/doc/ |
ss.sgml | 68 see write/read queues and peer address of connected UNIX sockets, 477 and its peer address, if the socket is connected.
|
/external/libnfc-nxp/src/ |
phFriNfc_NdefReg.h | 375 * The entry point for NDEF \b PACKETS retrieved from the Peer (Remote) Device: 405 * The entry point for NDEF \b RECORDS retrieved from the Peer (Remote) Device:
|
phFriNfc_TopazMap.h | 354 * The function checks whether the peer device is NDEF compliant. 570 * The function checks whether the peer device is NDEF compliant.
|
phHciNfc_Generic.h | 669 /** \internal HCI NFC-IP1 Peer to Peer Information */ [all...] |
/external/openssl/ssl/ |
s3_clnt.c | 1148 /* Inconsistency alert: cert_chain does include the peer's 1198 if (s->session->peer != NULL) 1199 X509_free(s->session->peer); 1201 s->session->peer=x; 1208 if (s->session->peer != NULL) 1209 X509_free(s->session->peer); 1210 s->session->peer=NULL; [all...] |
s3_pkt.c | 919 * This function must handle any surprises the peer may have for us, such as [all...] |
/external/wpa_supplicant/ |
config_ssid.h | 760 * 1 = IBSS (ad-hoc, peer-to-peer)
|
eap.c | 2 * EAP peer state machines (RFC 4137) 14 * This file implements the Peer State Machine as defined in RFC 4137. The used 526 * RFC 4137 - Appendix A.1: EAP Peer State Machine - State transitions 541 * peer and server in a loop (e.g., TLS ACK frame in both [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_config.h | 2 * EAP peer configuration data 19 * struct eap_peer_config - EAP peer configuration/credentials
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_sim.c | 461 wpa_printf(MSG_DEBUG, "EAP-SIM: Peer selected unsupported " 482 "authentication triplets for the peer");
|
eap_sim_db.c | [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_config.h | 2 * EAP peer configuration data 19 * struct eap_peer_config - EAP peer configuration/credentials
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_sim.c | 462 wpa_printf(MSG_DEBUG, "EAP-SIM: Peer selected unsupported " 483 "authentication triplets for the peer");
|
eap_sim_db.c | [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
wpas_glue.c | 552 static int wpa_supplicant_tdls_oper(void *ctx, int oper, const u8 *peer) 555 return wpa_drv_tdls_oper(wpa_s, oper, peer);
|
/frameworks/base/docs/html/sdk/ |
android-2.3-highlights.jd | 346 set up peer-to-peer connections with other NFC devices.</p>
|
android-2.3.3.jd | 142 <p>The platform also provides a limited peer-to-peer communication protocol
|
/libcore/luni/src/main/java/java/lang/ |
Object.java | 203 * for a class that has a native peer and needs to call a native method to destroy that peer.
|
/libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/ |
OpenSSLSocketImpl.java | 359 // setup peer certificate verification 585 throw new SSLException("Peer sent no certificate"); [all...] |
SSLSocketImpl.java | 672 * handshake message from handshake protocol and sends it to another peer. 674 * message from another peer. Each of this stages (wrap/unwrap) change
|
/libcore/luni/src/main/native/ |
org_apache_harmony_xnet_provider_jsse_NativeCrypto.cpp | [all...] |
/external/tcpdump/ |
print-ppp.c | 270 { BACPOPT_FPEER, "Favored-Peer" }, 924 peerid_len = *p; /* Peer-ID Length */ 928 printf(", Peer "); [all...] |
/external/wpa_supplicant_6/wpa_supplicant/ |
wpa_supplicant.conf.orig | 244 # 1 = IBSS (ad-hoc, peer-to-peer) 690 # EAP-IKEv2 using shared secrets for both server and peer authentication
|
/external/wpa_supplicant_8/hostapd/ |
ChangeLog | 135 * fixed EAP-FAST PAC-Opaque padding (0.6.4 broke this for some peer 153 16-octet len binary value for better interoperability with some peer 160 * added peer identity into EAP-FAST PAC-Opaque and skip Phase 2 [all...] |
/external/wpa_supplicant_8/src/radius/ |
radius_server.c | 161 * peer implementations. 218 * peer is allowed to connect. Note: This is only used with EAP-TTLS 219 * and EAP-FAST. If any other EAP method is enabled, the peer will be [all...] |