/external/wpa_supplicant_8/wpa_supplicant/ |
wpas_glue.c | 551 static int wpa_supplicant_tdls_oper(void *ctx, int oper, const u8 *peer) 554 return wpa_drv_tdls_oper(wpa_s, oper, peer); 559 void *ctx, const u8 *peer, int add, u16 aid, u16 capability, 570 params.addr = peer; 577 * qosinfo to check if the peer is WMM capable.
|
events.c | [all...] |
sme.c | 497 wpa_printf(MSG_DEBUG, "SAE: Failed to process peer " 539 if (os_memcmp(wpa_s->pending_bssid, data->auth.peer, ETH_ALEN) != 0) { 541 "unexpected peer " MACSTR, 542 MAC2STR(data->auth.peer)); 546 wpa_dbg(wpa_s, MSG_DEBUG, "SME: Authentication response: peer=" MACSTR 548 MAC2STR(data->auth.peer), data->auth.auth_type, 616 os_memcpy(edata.ft_ies.target_ap, data->auth.peer, ETH_ALEN); 621 sme_associate(wpa_s, ssid->mode, data->auth.peer, [all...] |
/system/core/adb/ |
adb.h | 85 /* flag: set when the socket's peer has closed 98 asocket *peer; member in struct:asocket 112 /* enqueue is called by our peer when it has data 115 ** peer->ready() when we once again are ready to 120 /* ready is called by the peer when it is ready for 125 /* close is called by the peer when it has gone away. 127 ** peer once our close method is called.
|
/external/libppp/src/ |
lcp.c | 795 /* Set the MTU to what we want anyway - the peer won't care! */ 889 log_Printf(LogLCP, "Peer will only send PAP (not enabled)\n"); 909 log_Printf(LogLCP, "Peer will only send MSCHAP (not available" 912 log_Printf(LogLCP, "Peer will only send MSCHAPV2 (not available" 916 log_Printf(LogLCP, "Peer will only send %s (not %s)\n", [all...] |
command.c | 592 mp_Enddisc(bundle->ncp.mp.peer.enddisc.class, 593 bundle->ncp.mp.peer.enddisc.address, 594 bundle->ncp.mp.peer.enddisc.len)); 601 nargv[arg] = subst(nargv[arg], "USER", bundle->ncp.mp.peer.authname); 812 "Add iface address", "iface add addr[/bits| mask] peer", NULL}, 814 "Add or change an iface address", "iface add! addr[/bits| mask] peer", 3179 struct ncpaddr peer, addr; local [all...] |
cbcp.c | 125 log_Printf(LogCBCP, "%s: Timeout waiting for peer %s\n", 319 if (*cbcp->p->dl->peer.authname == '\0' || 320 !auth_SetPhoneList(cbcp->p->dl->peer.authname, cbcp->fsm.phone, 357 * so that we (hopefully) agree with the peer 385 * The peer has given us an address type spec - make sure we 395 /* we accept the REQ even if the peer didn't specify an addr->type */ 401 log_Printf(LogPHASE, "CBCP: no number to pass to the peer !\n"); 411 * This violates the spec, but if the peer has told us the 423 * If the peer's insisting on deciding the number, make sure 424 * it's one of the ones in our list. If it is, let the peer [all...] |
/art/runtime/ |
debugger.cc | 1765 mirror::Object* peer = t->GetPeer(); local 1950 mirror::Object* peer = gRegistry->Get<mirror::Object*>(thread_id); local [all...] |
thread.h | 95 // Creates a new native thread corresponding to the given managed peer. 97 static void CreateNativeThread(JNIEnv* env, jobject peer, size_t stack_size, bool daemon); 99 // Attaches the calling native thread to the runtime, returning the new native peer. 189 // Wait for a debugger suspension on the thread associated with the given peer. Returns the 192 static Thread* SuspendForDebugger(jobject peer, bool request_suspension, bool* timed_out) 259 // Returns the java.lang.Thread's name, or NULL if this Thread* doesn't have a peer. 706 // Our managed peer (an instance of java.lang.Thread). The jobject version is used during thread
|
/external/wpa_supplicant_8/src/ap/ |
ap_drv_ops.h | 109 enum wnm_oper oper, const u8 *peer,
|
drv_callbacks.c | 473 sta = ap_get_sta(hapd, rx_auth->peer); 475 sta = ap_sta_add(hapd, rx_auth->peer); 503 hostapd_sta_auth(hapd, rx_auth->peer, rx_auth->auth_transaction + 1,
|
ap_drv_ops.c | 683 const u8 *peer, u8 *buf, u16 *buf_len) 687 return hapd->driver->wnm_oper(hapd->drv_priv, oper, peer, buf,
|
/external/chromium_org/third_party/openssl/openssl/ssl/ |
ssl_sess.c | 766 if (ss->peer != NULL) X509_free(ss->peer); 881 return s->peer; [all...] |
s3_clnt.c | [all...] |
/external/openssl/ssl/ |
ssl_sess.c | 766 if (ss->peer != NULL) X509_free(ss->peer); 881 return s->peer; [all...] |
s3_clnt.c | [all...] |
/external/qemu/hw/ |
goldfish_pipe.c | 414 void* peer = svc->funcs.init(pipe, svc->opaque, pipeArgs); local 415 if (peer == NULL) { 421 pipe->opaque = peer; [all...] |
/external/chromium_org/net/third_party/nss/ssl/ |
sslcon.c | [all...] |
/external/qemu/ |
block.c | 689 assert(!bs->peer); 707 if (bs->peer) { 710 bs->peer = qdev; 716 assert(bs->peer == qdev); 717 bs->peer = NULL; 722 return bs->peer; [all...] |
/external/chromium-trace/trace-viewer/third_party/pywebsocket/src/mod_pywebsocket/ |
_stream_hybi.py | 656 # other peer. Just forget them. 845 it sends out TCP RST packet to the other peer.
|
/external/chromium_org/ipc/ |
ipc_sync_channel_unittest.cc | [all...] |
/external/chromium_org/tools/measure_page_load_time/ff_ext/content/ |
measure_page_load_time.js | 169 * (host not found, connection reset by peer, etc), the onload
|
/external/sepolicy/ |
access_vectors | 811 # network peer labels 812 class peer
|
/external/wpa_supplicant_8/src/p2p/ |
p2p_sd.c | 57 return NULL; /* peer does not support SD */ 64 /* Use WSD only if the peer indicates support or it */ 70 os_memcmp(q->peer, dev->info.p2p_device_addr, ETH_ALEN) == 237 p2p_dbg(p2p, "No Listen/Operating frequency known for the peer " 383 * separately for each peer to avoid having to drop old 857 os_memcpy(q->peer, dst, ETH_ALEN);
|
/external/wpa_supplicant_8/src/wps/ |
wps_upnp.c | [all...] |