/external/wpa_supplicant_8/src/eap_common/ |
eap_common.h | 2 * EAP common peer/server definitions
|
eap_sake_common.h | 2 * EAP server/peer: EAP-SAKE shared routines 97 int peer, const u8 *eap, size_t eap_len,
|
/packages/apps/Nfc/src/com/android/nfc/ |
DeviceHost.java | 94 * Peer-to-Peer Target 98 * Peer-to-Peer Initiator
|
/external/wpa_supplicant/ |
eap_i.h | 2 * EAP peer state machines internal structures (RFC 4137) 20 /* RFC 4137 - EAP Peer state machine */ 33 * These structure contains OUT variables for the interface between peer state 231 * version - Version of the EAP peer method interface 233 * The EAP peer method implementation should set this variable to 304 Boolean allowNotifications; /* peer state machine <-> methods */ 305 u8 *eapRespData; /* peer to lower layer */ 306 size_t eapRespDataLen; /* peer to lower layer */ 307 Boolean eapKeyAvailable; /* peer to lower layer */ 308 u8 *eapKeyData; /* peer to lower layer * [all...] |
eap_sake_common.h | 2 * EAP server/peer: EAP-SAKE shared routines 101 int peer, const u8 *eap, size_t eap_len,
|
/external/ipsec-tools/src/racoon/ |
proposal.c | 186 * pp1: peer's proposal. 228 "my:%d peer:%d\n", 235 "my:%d peer:%d\n", 246 "my:%d peer:%d\n", 262 "my:%d peer:%d\n", 272 "my:%d peer:%d\n", 284 "my:%d peer:%d\n", 292 "my:%d peer:%d\n", 299 "my:%d peer:%d\n", 327 "Peer is missing security context\n") [all...] |
sainfo.c | 77 * First pass is for sainfo from a specified peer, second for others. 80 getsainfo(loc, rmt, peer, client, remoteid) 81 const vchar_t *loc, *rmt, *peer, *client; 102 if (peer == NULL) 105 dpeer = ipsecdoi_id2str(peer); 113 "getsainfo params: loc=\'%s\' rmt=\'%s\' peer=\'%s\' client=\'%s\' id=%u\n", 136 if (ipsecdoi_chkcmpids(peer, s->id_i, 0)) 386 snprintf(buf, 255, "loc=\'%s\', rmt=\'%s\', peer=\'%s\', id=%u",
|
/external/kernel-headers/original/linux/netfilter_ipv4/ |
ip_queue.h | 67 #define IPQM_MODE (IPQM_BASE + 1) /* Mode request from peer */ 68 #define IPQM_VERDICT (IPQM_BASE + 2) /* Verdict from peer */
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_sake_common.h | 2 * EAP server/peer: EAP-SAKE shared routines 97 int peer, const u8 *eap, size_t eap_len,
|
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
peerkey.h | 24 u8 pnonce[WPA_NONCE_LEN]; /* Peer Nonce */ 27 u8 rsnie_p[PEERKEY_MAX_IE_LEN]; /* Peer RSN IE */
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_methods.h | 2 * EAP peer: Method registration 91 /* EAP peer method registration calls for statically linked in methods */
|
eap_i.h | 2 * EAP peer state machines internal structures (RFC 4137) 22 /* RFC 4137 - EAP Peer state machine */ 35 * These structure contains OUT variables for the interface between peer state 230 * version - Version of the EAP peer method interface 232 * The EAP peer method implementation should set this variable to 302 Boolean allowNotifications; /* peer state machine <-> methods */ 303 struct wpabuf *eapRespData; /* peer to lower layer */ 304 Boolean eapKeyAvailable; /* peer to lower layer */ 305 u8 *eapKeyData; /* peer to lower layer */ 306 size_t eapKeyDataLen; /* peer to lower layer * [all...] |
eap_methods.c | 2 * EAP peer: Method registration 163 * eap_peer_get_methods - Get a list of enabled EAP peer methods 165 * Returns: List of enabled EAP peer methods 272 * eap_peer_method_alloc - Allocate EAP peer method structure 273 * @version: Version of the EAP peer method interface (set to 299 * eap_peer_method_free - Free EAP peer method structure 309 * eap_peer_method_register - Register an EAP peer method 314 * Each EAP peer method needs to call this function to register itself as a 343 * eap_peer_unregister_methods - Unregister EAP peer methods 345 * This function is called at program termination to unregister all EAP peer [all...] |
eap.h | 2 * EAP peer state machine functions (RFC 4137) 36 * These variables are used in the interface between EAP peer state machine and 109 * These variables are used in the interface between EAP peer state machine and 116 * EAPOL_idleWhile - Outside time for EAP peer timeout 226 * notify_cert - Notification of a peer certificate 229 * @subject: Subject of the peer certificate 231 * @cert: Peer certificate
|
/external/wpa_supplicant_8/src/rsn_supp/ |
peerkey.h | 24 u8 pnonce[WPA_NONCE_LEN]; /* Peer Nonce */ 27 u8 rsnie_p[PEERKEY_MAX_IE_LEN]; /* Peer RSN IE */
|
/prebuilt/linux-x86/toolchain/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/netfilter_ipv4/ |
ip_queue.h | 59 #define IPQM_MODE (IPQM_BASE + 1) /* Mode request from peer */ 60 #define IPQM_VERDICT (IPQM_BASE + 2) /* Verdict from peer */
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_i.h | 2 * EAP peer state machines internal structures (RFC 4137) 22 /* RFC 4137 - EAP Peer state machine */ 35 * These structure contains OUT variables for the interface between peer state 230 * version - Version of the EAP peer method interface 232 * The EAP peer method implementation should set this variable to 302 Boolean allowNotifications; /* peer state machine <-> methods */ 303 struct wpabuf *eapRespData; /* peer to lower layer */ 304 Boolean eapKeyAvailable; /* peer to lower layer */ 305 u8 *eapKeyData; /* peer to lower layer */ 306 size_t eapKeyDataLen; /* peer to lower layer * [all...] |
/external/ppp/pppd/ |
auth.c | 128 /* The name by which the peer authenticated itself to us. */ 140 /* List of addresses which the peer may use. */ 143 /* Wordlist giving addresses which the peer may use 153 /* Extra options to apply, from the secrets file entry for the peer. */ 171 /* Hook for a plugin to say whether we can possibly authenticate any peer */ 185 /* Hook for a plugin to say if we can possibly authenticate a peer using CHAP */ 191 /* Hook for a plugin to say whether it is OK if the peer 198 /* A notifier for when the peer has authenticated itself, 218 static int used_login; /* peer authenticated against login database */ 236 bool auth_required = 0; /* Always require authentication from peer */ [all...] |
/libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/ |
OpenSSLSessionImpl.java | 190 * Returns the certificate(s) of the peer in this SSL session 194 * @return an array of X509 certificates (the peer's one first and then 199 * peer could not be verified. 239 * Return the identity of the peer in this SSL session 241 * @return an array of X509 certificates (the peer's one first and then 245 * certificate was used (i.e. Kerberos certificates) or the peer 258 throw new SSLPeerUnverifiedException("No peer certificates"); 263 * The identity of the principal that was used by the peer during the SSL 269 * peer does not exist. 278 * The peer's host name used in this SSL session is returned. It is the hos [all...] |
/external/qemu/ |
qemu-sockets.c | 289 /* connect to peer */ 311 struct addrinfo ai, *peer = NULL, *local = NULL; local 318 /* lookup peer addr */ 339 if (0 != (rc = getaddrinfo(addr, port, &ai, &peer))) { 345 fprintf(stderr, "%s: peer (%s:%s)\n", __FUNCTION__, addr, port); 346 inet_print_addrinfo(__FUNCTION__, peer); 352 ai.ai_family = peer->ai_family; 374 sock = qemu_socket(peer->ai_family, peer->ai_socktype, peer->ai_protocol) [all...] |
/external/openssl/crypto/evp/ |
pmeth_fn.c | 285 int EVP_PKEY_derive_set_peer(EVP_PKEY_CTX *ctx, EVP_PKEY *peer) 301 ret = ctx->pmeth->ctrl(ctx, EVP_PKEY_CTRL_PEER_KEY, 0, peer); 315 if (ctx->pkey->type != peer->type) 322 /* ran@cryptocom.ru: For clarity. The error is if parameters in peer are 327 if (!EVP_PKEY_missing_parameters(peer) && 328 !EVP_PKEY_cmp_parameters(ctx->pkey, peer)) 337 ctx->peerkey = peer; 339 ret = ctx->pmeth->ctrl(ctx, EVP_PKEY_CTRL_PEER_KEY, 1, peer); 347 CRYPTO_add(&peer->references,1,CRYPTO_LOCK_EVP_PKEY);
|
/external/wpa_supplicant_8/src/p2p/ |
p2p_pd.c | 26 * state in case the peer is not listening. 118 "unknown peer " MACSTR, MAC2STR(sa)); 138 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Peer " MACSTR 143 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Peer " MACSTR 240 * If the response is from the peer to whom a user initiated request 248 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Peer rejected " 261 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Peer " MACSTR 265 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Peer " MACSTR 304 "peer " MACSTR " to send Provision Discovery Request",
|
/external/qemu/slirp/ |
tcp_timer.h | 64 * into the peer's window to force him to update our window information. 68 * a window update from the peer. 75 * the connection. We force the peer to send us a segment by sending: 78 * an ack segment in response from the peer. If, despite the TCPT_KEEP 79 * initiated segments we cannot elicit a response from a peer in TCPT_MAXIDLE
|
/external/qemu/slirp-android/ |
tcp_timer.h | 64 * into the peer's window to force him to update our window information. 68 * a window update from the peer. 75 * the connection. We force the peer to send us a segment by sending: 78 * an ack segment in response from the peer. If, despite the TCPT_KEEP 79 * initiated segments we cannot elicit a response from a peer in TCPT_MAXIDLE
|
/libcore/luni/src/main/native/ |
libcore_icu_NativeBreakIterator.cpp | 146 BreakIteratorPeer* peer = BreakIteratorPeer::fromAddress(address); local 147 peer->close(env); 148 delete peer; 156 BreakIteratorPeer* peer = BreakIteratorPeer::fromAddress(address); local 157 peer->setText(env, javaText);
|