HomeSort by relevance Sort by last modified time
    Searched refs:peer (Results 176 - 200 of 243) sorted by null

1 2 3 4 5 6 78 910

  /external/wpa_supplicant_8/wpa_supplicant/
wpas_glue.c 551 static int wpa_supplicant_tdls_oper(void *ctx, int oper, const u8 *peer)
554 return wpa_drv_tdls_oper(wpa_s, oper, peer);
559 void *ctx, const u8 *peer, int add, u16 aid, u16 capability,
570 params.addr = peer;
577 * qosinfo to check if the peer is WMM capable.
events.c     [all...]
sme.c 497 wpa_printf(MSG_DEBUG, "SAE: Failed to process peer "
539 if (os_memcmp(wpa_s->pending_bssid, data->auth.peer, ETH_ALEN) != 0) {
541 "unexpected peer " MACSTR,
542 MAC2STR(data->auth.peer));
546 wpa_dbg(wpa_s, MSG_DEBUG, "SME: Authentication response: peer=" MACSTR
548 MAC2STR(data->auth.peer), data->auth.auth_type,
616 os_memcpy(edata.ft_ies.target_ap, data->auth.peer, ETH_ALEN);
621 sme_associate(wpa_s, ssid->mode, data->auth.peer,
    [all...]
  /system/core/adb/
adb.h 85 /* flag: set when the socket's peer has closed
98 asocket *peer; member in struct:asocket
112 /* enqueue is called by our peer when it has data
115 ** peer->ready() when we once again are ready to
120 /* ready is called by the peer when it is ready for
125 /* close is called by the peer when it has gone away.
127 ** peer once our close method is called.
  /external/libppp/src/
lcp.c 795 /* Set the MTU to what we want anyway - the peer won't care! */
889 log_Printf(LogLCP, "Peer will only send PAP (not enabled)\n");
909 log_Printf(LogLCP, "Peer will only send MSCHAP (not available"
912 log_Printf(LogLCP, "Peer will only send MSCHAPV2 (not available"
916 log_Printf(LogLCP, "Peer will only send %s (not %s)\n",
    [all...]
command.c 592 mp_Enddisc(bundle->ncp.mp.peer.enddisc.class,
593 bundle->ncp.mp.peer.enddisc.address,
594 bundle->ncp.mp.peer.enddisc.len));
601 nargv[arg] = subst(nargv[arg], "USER", bundle->ncp.mp.peer.authname);
812 "Add iface address", "iface add addr[/bits| mask] peer", NULL},
814 "Add or change an iface address", "iface add! addr[/bits| mask] peer",
3179 struct ncpaddr peer, addr; local
    [all...]
cbcp.c 125 log_Printf(LogCBCP, "%s: Timeout waiting for peer %s\n",
319 if (*cbcp->p->dl->peer.authname == '\0' ||
320 !auth_SetPhoneList(cbcp->p->dl->peer.authname, cbcp->fsm.phone,
357 * so that we (hopefully) agree with the peer
385 * The peer has given us an address type spec - make sure we
395 /* we accept the REQ even if the peer didn't specify an addr->type */
401 log_Printf(LogPHASE, "CBCP: no number to pass to the peer !\n");
411 * This violates the spec, but if the peer has told us the
423 * If the peer's insisting on deciding the number, make sure
424 * it's one of the ones in our list. If it is, let the peer
    [all...]
  /art/runtime/
debugger.cc 1765 mirror::Object* peer = t->GetPeer(); local
1950 mirror::Object* peer = gRegistry->Get<mirror::Object*>(thread_id); local
    [all...]
thread.h 95 // Creates a new native thread corresponding to the given managed peer.
97 static void CreateNativeThread(JNIEnv* env, jobject peer, size_t stack_size, bool daemon);
99 // Attaches the calling native thread to the runtime, returning the new native peer.
189 // Wait for a debugger suspension on the thread associated with the given peer. Returns the
192 static Thread* SuspendForDebugger(jobject peer, bool request_suspension, bool* timed_out)
259 // Returns the java.lang.Thread's name, or NULL if this Thread* doesn't have a peer.
706 // Our managed peer (an instance of java.lang.Thread). The jobject version is used during thread
  /external/wpa_supplicant_8/src/ap/
ap_drv_ops.h 109 enum wnm_oper oper, const u8 *peer,
drv_callbacks.c 473 sta = ap_get_sta(hapd, rx_auth->peer);
475 sta = ap_sta_add(hapd, rx_auth->peer);
503 hostapd_sta_auth(hapd, rx_auth->peer, rx_auth->auth_transaction + 1,
ap_drv_ops.c 683 const u8 *peer, u8 *buf, u16 *buf_len)
687 return hapd->driver->wnm_oper(hapd->drv_priv, oper, peer, buf,
  /external/chromium_org/third_party/openssl/openssl/ssl/
ssl_sess.c 766 if (ss->peer != NULL) X509_free(ss->peer);
881 return s->peer;
    [all...]
s3_clnt.c     [all...]
  /external/openssl/ssl/
ssl_sess.c 766 if (ss->peer != NULL) X509_free(ss->peer);
881 return s->peer;
    [all...]
s3_clnt.c     [all...]
  /external/qemu/hw/
goldfish_pipe.c 414 void* peer = svc->funcs.init(pipe, svc->opaque, pipeArgs); local
415 if (peer == NULL) {
421 pipe->opaque = peer;
    [all...]
  /external/chromium_org/net/third_party/nss/ssl/
sslcon.c     [all...]
  /external/qemu/
block.c 689 assert(!bs->peer);
707 if (bs->peer) {
710 bs->peer = qdev;
716 assert(bs->peer == qdev);
717 bs->peer = NULL;
722 return bs->peer;
    [all...]
  /external/chromium-trace/trace-viewer/third_party/pywebsocket/src/mod_pywebsocket/
_stream_hybi.py 656 # other peer. Just forget them.
845 it sends out TCP RST packet to the other peer.
  /external/chromium_org/ipc/
ipc_sync_channel_unittest.cc     [all...]
  /external/chromium_org/tools/measure_page_load_time/ff_ext/content/
measure_page_load_time.js 169 * (host not found, connection reset by peer, etc), the onload
  /external/sepolicy/
access_vectors 811 # network peer labels
812 class peer
  /external/wpa_supplicant_8/src/p2p/
p2p_sd.c 57 return NULL; /* peer does not support SD */
64 /* Use WSD only if the peer indicates support or it */
70 os_memcmp(q->peer, dev->info.p2p_device_addr, ETH_ALEN) ==
237 p2p_dbg(p2p, "No Listen/Operating frequency known for the peer "
383 * separately for each peer to avoid having to drop old
857 os_memcpy(q->peer, dst, ETH_ALEN);
  /external/wpa_supplicant_8/src/wps/
wps_upnp.c     [all...]

Completed in 491 milliseconds

1 2 3 4 5 6 78 910