HomeSort by relevance Sort by last modified time
    Searched full:peer (Results 51 - 75 of 918) sorted by null

1 23 4 5 6 7 8 91011>>

  /external/wpa_supplicant_8/src/eap_common/
eap_common.h 2 * EAP common peer/server definitions
eap_sake_common.h 2 * EAP server/peer: EAP-SAKE shared routines
97 int peer, const u8 *eap, size_t eap_len,
  /packages/apps/Nfc/src/com/android/nfc/
DeviceHost.java 94 * Peer-to-Peer Target
98 * Peer-to-Peer Initiator
  /external/wpa_supplicant/
eap_i.h 2 * EAP peer state machines internal structures (RFC 4137)
20 /* RFC 4137 - EAP Peer state machine */
33 * These structure contains OUT variables for the interface between peer state
231 * version - Version of the EAP peer method interface
233 * The EAP peer method implementation should set this variable to
304 Boolean allowNotifications; /* peer state machine <-> methods */
305 u8 *eapRespData; /* peer to lower layer */
306 size_t eapRespDataLen; /* peer to lower layer */
307 Boolean eapKeyAvailable; /* peer to lower layer */
308 u8 *eapKeyData; /* peer to lower layer *
    [all...]
eap_sake_common.h 2 * EAP server/peer: EAP-SAKE shared routines
101 int peer, const u8 *eap, size_t eap_len,
  /external/ipsec-tools/src/racoon/
proposal.c 186 * pp1: peer's proposal.
228 "my:%d peer:%d\n",
235 "my:%d peer:%d\n",
246 "my:%d peer:%d\n",
262 "my:%d peer:%d\n",
272 "my:%d peer:%d\n",
284 "my:%d peer:%d\n",
292 "my:%d peer:%d\n",
299 "my:%d peer:%d\n",
327 "Peer is missing security context\n")
    [all...]
sainfo.c 77 * First pass is for sainfo from a specified peer, second for others.
80 getsainfo(loc, rmt, peer, client, remoteid)
81 const vchar_t *loc, *rmt, *peer, *client;
102 if (peer == NULL)
105 dpeer = ipsecdoi_id2str(peer);
113 "getsainfo params: loc=\'%s\' rmt=\'%s\' peer=\'%s\' client=\'%s\' id=%u\n",
136 if (ipsecdoi_chkcmpids(peer, s->id_i, 0))
386 snprintf(buf, 255, "loc=\'%s\', rmt=\'%s\', peer=\'%s\', id=%u",
  /external/kernel-headers/original/linux/netfilter_ipv4/
ip_queue.h 67 #define IPQM_MODE (IPQM_BASE + 1) /* Mode request from peer */
68 #define IPQM_VERDICT (IPQM_BASE + 2) /* Verdict from peer */
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
eap_sake_common.h 2 * EAP server/peer: EAP-SAKE shared routines
97 int peer, const u8 *eap, size_t eap_len,
  /external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/
peerkey.h 24 u8 pnonce[WPA_NONCE_LEN]; /* Peer Nonce */
27 u8 rsnie_p[PEERKEY_MAX_IE_LEN]; /* Peer RSN IE */
  /external/wpa_supplicant_8/src/eap_peer/
eap_methods.h 2 * EAP peer: Method registration
91 /* EAP peer method registration calls for statically linked in methods */
eap_i.h 2 * EAP peer state machines internal structures (RFC 4137)
22 /* RFC 4137 - EAP Peer state machine */
35 * These structure contains OUT variables for the interface between peer state
230 * version - Version of the EAP peer method interface
232 * The EAP peer method implementation should set this variable to
302 Boolean allowNotifications; /* peer state machine <-> methods */
303 struct wpabuf *eapRespData; /* peer to lower layer */
304 Boolean eapKeyAvailable; /* peer to lower layer */
305 u8 *eapKeyData; /* peer to lower layer */
306 size_t eapKeyDataLen; /* peer to lower layer *
    [all...]
eap_methods.c 2 * EAP peer: Method registration
163 * eap_peer_get_methods - Get a list of enabled EAP peer methods
165 * Returns: List of enabled EAP peer methods
272 * eap_peer_method_alloc - Allocate EAP peer method structure
273 * @version: Version of the EAP peer method interface (set to
299 * eap_peer_method_free - Free EAP peer method structure
309 * eap_peer_method_register - Register an EAP peer method
314 * Each EAP peer method needs to call this function to register itself as a
343 * eap_peer_unregister_methods - Unregister EAP peer methods
345 * This function is called at program termination to unregister all EAP peer
    [all...]
eap.h 2 * EAP peer state machine functions (RFC 4137)
36 * These variables are used in the interface between EAP peer state machine and
109 * These variables are used in the interface between EAP peer state machine and
116 * EAPOL_idleWhile - Outside time for EAP peer timeout
226 * notify_cert - Notification of a peer certificate
229 * @subject: Subject of the peer certificate
231 * @cert: Peer certificate
  /external/wpa_supplicant_8/src/rsn_supp/
peerkey.h 24 u8 pnonce[WPA_NONCE_LEN]; /* Peer Nonce */
27 u8 rsnie_p[PEERKEY_MAX_IE_LEN]; /* Peer RSN IE */
  /prebuilt/linux-x86/toolchain/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/netfilter_ipv4/
ip_queue.h 59 #define IPQM_MODE (IPQM_BASE + 1) /* Mode request from peer */
60 #define IPQM_VERDICT (IPQM_BASE + 2) /* Verdict from peer */
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_i.h 2 * EAP peer state machines internal structures (RFC 4137)
22 /* RFC 4137 - EAP Peer state machine */
35 * These structure contains OUT variables for the interface between peer state
230 * version - Version of the EAP peer method interface
232 * The EAP peer method implementation should set this variable to
302 Boolean allowNotifications; /* peer state machine <-> methods */
303 struct wpabuf *eapRespData; /* peer to lower layer */
304 Boolean eapKeyAvailable; /* peer to lower layer */
305 u8 *eapKeyData; /* peer to lower layer */
306 size_t eapKeyDataLen; /* peer to lower layer *
    [all...]
  /external/ppp/pppd/
auth.c 128 /* The name by which the peer authenticated itself to us. */
140 /* List of addresses which the peer may use. */
143 /* Wordlist giving addresses which the peer may use
153 /* Extra options to apply, from the secrets file entry for the peer. */
171 /* Hook for a plugin to say whether we can possibly authenticate any peer */
185 /* Hook for a plugin to say if we can possibly authenticate a peer using CHAP */
191 /* Hook for a plugin to say whether it is OK if the peer
198 /* A notifier for when the peer has authenticated itself,
218 static int used_login; /* peer authenticated against login database */
236 bool auth_required = 0; /* Always require authentication from peer */
    [all...]
  /libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/
OpenSSLSessionImpl.java 190 * Returns the certificate(s) of the peer in this SSL session
194 * @return an array of X509 certificates (the peer's one first and then
199 * peer could not be verified.
239 * Return the identity of the peer in this SSL session
241 * @return an array of X509 certificates (the peer's one first and then
245 * certificate was used (i.e. Kerberos certificates) or the peer
258 throw new SSLPeerUnverifiedException("No peer certificates");
263 * The identity of the principal that was used by the peer during the SSL
269 * peer does not exist.
278 * The peer's host name used in this SSL session is returned. It is the hos
    [all...]
  /external/qemu/
qemu-sockets.c 289 /* connect to peer */
311 struct addrinfo ai, *peer = NULL, *local = NULL; local
318 /* lookup peer addr */
339 if (0 != (rc = getaddrinfo(addr, port, &ai, &peer))) {
345 fprintf(stderr, "%s: peer (%s:%s)\n", __FUNCTION__, addr, port);
346 inet_print_addrinfo(__FUNCTION__, peer);
352 ai.ai_family = peer->ai_family;
374 sock = qemu_socket(peer->ai_family, peer->ai_socktype, peer->ai_protocol)
    [all...]
  /external/openssl/crypto/evp/
pmeth_fn.c 285 int EVP_PKEY_derive_set_peer(EVP_PKEY_CTX *ctx, EVP_PKEY *peer)
301 ret = ctx->pmeth->ctrl(ctx, EVP_PKEY_CTRL_PEER_KEY, 0, peer);
315 if (ctx->pkey->type != peer->type)
322 /* ran@cryptocom.ru: For clarity. The error is if parameters in peer are
327 if (!EVP_PKEY_missing_parameters(peer) &&
328 !EVP_PKEY_cmp_parameters(ctx->pkey, peer))
337 ctx->peerkey = peer;
339 ret = ctx->pmeth->ctrl(ctx, EVP_PKEY_CTRL_PEER_KEY, 1, peer);
347 CRYPTO_add(&peer->references,1,CRYPTO_LOCK_EVP_PKEY);
  /external/wpa_supplicant_8/src/p2p/
p2p_pd.c 26 * state in case the peer is not listening.
118 "unknown peer " MACSTR, MAC2STR(sa));
138 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Peer " MACSTR
143 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Peer " MACSTR
240 * If the response is from the peer to whom a user initiated request
248 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Peer rejected "
261 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Peer " MACSTR
265 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Peer " MACSTR
304 "peer " MACSTR " to send Provision Discovery Request",
  /external/qemu/slirp/
tcp_timer.h 64 * into the peer's window to force him to update our window information.
68 * a window update from the peer.
75 * the connection. We force the peer to send us a segment by sending:
78 * an ack segment in response from the peer. If, despite the TCPT_KEEP
79 * initiated segments we cannot elicit a response from a peer in TCPT_MAXIDLE
  /external/qemu/slirp-android/
tcp_timer.h 64 * into the peer's window to force him to update our window information.
68 * a window update from the peer.
75 * the connection. We force the peer to send us a segment by sending:
78 * an ack segment in response from the peer. If, despite the TCPT_KEEP
79 * initiated segments we cannot elicit a response from a peer in TCPT_MAXIDLE
  /libcore/luni/src/main/native/
libcore_icu_NativeBreakIterator.cpp 146 BreakIteratorPeer* peer = BreakIteratorPeer::fromAddress(address); local
147 peer->close(env);
148 delete peer;
156 BreakIteratorPeer* peer = BreakIteratorPeer::fromAddress(address); local
157 peer->setText(env, javaText);

Completed in 689 milliseconds

1 23 4 5 6 7 8 91011>>