/external/wpa_supplicant_8/src/ap/ |
drv_callbacks.c | 468 sta = ap_get_sta(hapd, rx_auth->peer); 470 sta = ap_sta_add(hapd, rx_auth->peer); 498 hostapd_sta_auth(hapd, rx_auth->peer, rx_auth->auth_transaction + 1,
|
ap_drv_ops.c | 683 const u8 *peer, u8 *buf, u16 *buf_len) 687 return hapd->driver->wnm_oper(hapd->drv_priv, oper, peer, buf,
|
/external/openssl/ssl/ |
s3_clnt.c | [all...] |
ssl.h | 175 * Version 1 - added the optional peer certificate 455 * Peer [ 3 ] EXPLICIT X509, -- optional Peer Certificate 457 * Verify_result [ 5 ] EXPLICIT INTEGER, -- X509_V_... code for `Peer' 508 X509 *peer; member in struct:ssl_session_st 509 /* when app_verify_callback accepts a session where the peer's certificate 535 unsigned char *tlsext_ecpointformatlist; /* peer's list */ 537 unsigned char *tlsext_ellipticcurvelist; /* peer's list */ [all...] |
/external/qemu/ |
block.c | 689 assert(!bs->peer); 707 if (bs->peer) { 710 bs->peer = qdev; 716 assert(bs->peer == qdev); 717 bs->peer = NULL; 722 return bs->peer; [all...] |
/external/chromium-trace/trace-viewer/third_party/pywebsocket/src/mod_pywebsocket/ |
_stream_hybi.py | 656 # other peer. Just forget them. 845 it sends out TCP RST packet to the other peer.
|
/external/libppp/src/ |
command.c | 592 mp_Enddisc(bundle->ncp.mp.peer.enddisc.class, 593 bundle->ncp.mp.peer.enddisc.address, 594 bundle->ncp.mp.peer.enddisc.len)); 601 nargv[arg] = subst(nargv[arg], "USER", bundle->ncp.mp.peer.authname); 812 "Add iface address", "iface add addr[/bits| mask] peer", NULL}, 814 "Add or change an iface address", "iface add! addr[/bits| mask] peer", 3179 struct ncpaddr peer, addr; local [all...] |
cbcp.c | 125 log_Printf(LogCBCP, "%s: Timeout waiting for peer %s\n", 319 if (*cbcp->p->dl->peer.authname == '\0' || 320 !auth_SetPhoneList(cbcp->p->dl->peer.authname, cbcp->fsm.phone, 357 * so that we (hopefully) agree with the peer 385 * The peer has given us an address type spec - make sure we 395 /* we accept the REQ even if the peer didn't specify an addr->type */ 401 log_Printf(LogPHASE, "CBCP: no number to pass to the peer !\n"); 411 * This violates the spec, but if the peer has told us the 423 * If the peer's insisting on deciding the number, make sure 424 * it's one of the ones in our list. If it is, let the peer [all...] |
/external/sepolicy/ |
access_vectors | 811 # network peer labels 812 class peer
|
/external/wpa_supplicant_8/src/p2p/ |
p2p_sd.c | 57 return NULL; /* peer does not support SD */ 64 /* Use WSD only if the peer indicates support or it */ 70 os_memcmp(q->peer, dev->info.p2p_device_addr, ETH_ALEN) == 240 "peer " MACSTR " to send SD Request", 398 * separately for each peer to avoid having to drop old 926 os_memcpy(q->peer, dst, ETH_ALEN);
|
/external/wpa_supplicant_8/src/wps/ |
wps_upnp.c | [all...] |
/external/iproute2/doc/ |
ip-cref.tex | 285 \item \verb|broadcast LLADDRESS|, \verb|brd LLADDRESS| or \verb|peer LLADDRESS| 287 --- change the link layer broadcast address or the peer address when 406 attached to each end. All packets sent to this link will reach the peer 407 and all packets received by us came from this single peer. 464 (or the peer address for pointopoint links) is a 471 NBMA links have no well-defined broadcast or peer address, 584 \item \verb|peer ADDRESS| 588 encoding the network prefix length. If a peer address is specified, 590 with the peer rather than with the local address. [all...] |
/external/ipsec-tools/ |
setup.c | 648 const vchar_t *peer, int remoteid)
|
/external/wpa_supplicant_8/src/drivers/ |
driver_privsep.c | 394 os_memcpy(data.stkstart.peer, buf, ETH_ALEN);
|
driver_test.c | [all...] |
/external/openssh/ |
monitor_wrap.c | 589 buffer_put_string(m, buffer_ptr(&kex->peer), buffer_len(&kex->peer)); [all...] |
monitor.c | [all...] |
/frameworks/base/core/java/android/app/ |
ActivityThread.java | 1569 ResourcesKey peer = (ResourcesKey) obj; local [all...] |
/external/openssl/include/openssl/ |
ssl.h | 175 * Version 1 - added the optional peer certificate 455 * Peer [ 3 ] EXPLICIT X509, -- optional Peer Certificate 457 * Verify_result [ 5 ] EXPLICIT INTEGER, -- X509_V_... code for `Peer' 508 X509 *peer; member in struct:ssl_session_st 509 /* when app_verify_callback accepts a session where the peer's certificate 535 unsigned char *tlsext_ecpointformatlist; /* peer's list */ 537 unsigned char *tlsext_ellipticcurvelist; /* peer's list */ [all...] |
/frameworks/base/wifi/java/android/net/wifi/p2p/ |
WifiP2pService.java | 130 /* Idle time after a peer is gone when the group is torn down */ 138 /* User accepted a peer request */ 140 /* User rejected a peer request */ 195 /* Track whether servcice/peer discovery is blocked in favor of other wifi actions 436 // Saved WifiP2pConfig for an ongoing peer connection. This will never be null. 1432 WifiP2pDevice peer = mPeers.get(groupOwner.deviceAddress); local [all...] |
/hardware/broadcom/wlan/bcmdhd/dhdutil/include/proto/ |
802.11.h | 514 #define DOT11_TDLS_CAP_PU_BUFFER_STA 28 /* TDLS Peer U-APSD buffer STA support */ 515 #define DOT11_TDLS_CAP_PEER_PSM 20 /* TDLS Peer PSM support */ 2421 struct ether_addr peer; member in struct:dot11_rmreq_stat 2445 struct ether_addr peer; member in struct:dot11_rmreq_tx_stream 2455 struct ether_addr peer; member in struct:dot11_rmrep_tx_stream [all...] |
/external/dnsmasq/src/ |
dnsmasq.h | 590 struct sockaddr_in peer; member in struct:tftp_transfer
|
/external/wpa_supplicant_8/wpa_supplicant/ |
wpa_priv.c | 872 &data->stkstart.peer, ETH_ALEN);
|
/external/chromium/net/http/ |
http_network_transaction_unittest.cc | [all...] |
/external/netperf/ |
nettest_sctp.c | 2640 struct sockaddr_storage peer; local 3693 struct sockaddr_storage peer; local [all...] |