/external/boringssl/src/ssl/test/runner/ |
common.go | 217 PeerCertificates []*x509.Certificate // certificate chain presented by remote peer 223 PeerSignatureAlgorithm signatureAlgorithm // algorithm used by the peer in the handshake 628 // peer. 636 // expect the peer to False Start; the server Finished message 638 // from the peer. 644 // Start test to determine whether the peer processed the alert (and 693 // RequireExtendedMasterSecret, if true, requires that the peer support 744 // the peer must still send none. 807 // timeouts for before each handshake leg from the peer. 858 // and record body split across multiple packets. The peer shoul [all...] |
/external/webrtc/webrtc/tools/rtcbot/bot/browser/ |
bot.js | 29 console.log("Creating peer connection");
|
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa_i.h | 44 u8 preauth_bssid[ETH_ALEN]; /* current RSN pre-auth peer or 308 const u8 *peer) 311 return sm->ctx->tdls_oper(sm->ctx->ctx, oper, peer);
|
/art/runtime/ |
thread_list.h | 76 // Suspend a thread using a peer, typically used by the debugger. Returns the thread on success, 77 // else null. The peer is used to identify the thread to avoid races with the thread terminating. 81 Thread* SuspendThreadByPeer(jobject peer, bool request_suspension, bool debug_suspension,
|
/external/autotest/client/common_lib/cros/ |
virtual_ethernet_pair.py | 14 peer_interface_name="peer", 61 interface will be called |interface_name|, and the peer end 105 logging.error('Failed to create peer test interface.') 152 """@return string name of the peer interface.""" 164 """@return string IPv4 address of the peer interface.""" 182 """@return string IPv4 subnet mask of the peer interface.""" 194 """@return string MAC address of the peer interface.""" 245 'type veth peer name %s >/dev/null 2>&1' %
|
/external/iproute2/include/ |
libnetlink.h | 18 struct sockaddr_nl peer; member in struct:rtnl_handle
|
/external/libvncserver/libvncserver/ |
main.c | 572 struct sockaddr_storage peer; local 593 len = sizeof (peer); 595 client_fd = accept(screen->listenSock, (struct sockaddr*)&peer, &len); 597 client_fd = accept(screen->listen6Sock, (struct sockaddr*)&peer, &len);
|
/external/webrtc/webrtc/p2p/base/ |
dtlstransportchannel_unittest.cc | 111 void Negotiate(DtlsTestClient* peer, cricket::ContentAction action, 114 Negotiate(certificate_, certificate_ ? peer->certificate_ : nullptr, action, 189 bool Connect(DtlsTestClient* peer) { 191 transport_->SetDestination(peer->transport_.get()); [all...] |
turnserver.h | 119 const rtc::SocketAddress& peer);
|
/external/wpa_supplicant_8/src/pae/ |
ieee802_1x_kay_i.h | 218 * struct ieee802_1x_mka_peer_body - Live Peer List and Potential Peer List 223 * @peer: array of (MI, MN) pairs 241 u8 peer[0]; member in struct:ieee802_1x_mka_peer_body
|
/external/wpa_supplicant_8/wpa_supplicant/ |
driver_i.h | 556 enum tdls_oper oper, const u8 *peer) 560 return wpa_s->driver->tdls_oper(wpa_s->drv_priv, oper, peer); 640 enum wnm_oper oper, const u8 *peer, 645 return wpa_s->driver->wnm_oper(wpa_s->drv_priv, oper, peer, buf,
|
wpas_glue.c | 679 static int wpa_supplicant_tdls_oper(void *ctx, int oper, const u8 *peer) 682 return wpa_drv_tdls_oper(wpa_s, oper, peer); 687 void *ctx, const u8 *peer, int add, u16 aid, u16 capability, 700 params.addr = peer; [all...] |
sme.c | 803 wpa_printf(MSG_DEBUG, "SAE: Failed to process peer " 845 if (os_memcmp(wpa_s->pending_bssid, data->auth.peer, ETH_ALEN) != 0) { 847 "unexpected peer " MACSTR, 848 MAC2STR(data->auth.peer)); 852 wpa_dbg(wpa_s, MSG_DEBUG, "SME: Authentication response: peer=" MACSTR 854 MAC2STR(data->auth.peer), data->auth.auth_type, 895 MAC2STR(data->auth.peer), data->auth.auth_type, 945 data->auth.peer, 979 sme_associate(wpa_s, ssid->mode, data->auth.peer, [all...] |
/external/iproute2/ip/ |
ipaddress.c | 80 fprintf(stderr, "IFADDR := PREFIX | ADDR peer PREFIX\n"); 848 fprintf(fp, " peer "); 1062 fprintf(fp, " peer %s/%d ", 1772 inet_prefix peer; local [all...] |
/prebuilts/tools/common/m2/repository/net/java/dev/jna/jna/3.4.0/ |
jna-3.4.0.jar | |
/prebuilts/go/darwin-x86/src/crypto/tls/ |
key_agreement.go | 118 return nil, crypto.Hash(0), errors.New("tls: unsupported hash function used by peer") 184 // publicKey is used to store the peer's public value when X25519 is 187 // x and y are used to store the peer's public value when one of the
|
/prebuilts/go/linux-x86/src/crypto/tls/ |
key_agreement.go | 118 return nil, crypto.Hash(0), errors.New("tls: unsupported hash function used by peer") 184 // publicKey is used to store the peer's public value when X25519 is 187 // x and y are used to store the peer's public value when one of the
|
/external/webrtc/talk/media/sctp/ |
sctpdataengine_unittest.cc | 190 cricket::SctpDataMediaChannel* peer) 191 : channel_(channel), peer_(peer) {}
|
/external/wpa_supplicant_8/src/drivers/ |
driver_nl80211_event.c | 169 os_memcpy(event.auth.peer, mgmt->sa, ETH_ALEN); [all...] |
driver_privsep.c | 394 os_memcpy(data.auth.peer, auth->peer, ETH_ALEN); 495 os_memcpy(data.stkstart.peer, buf, ETH_ALEN);
|
/prebuilts/go/darwin-x86/src/runtime/ |
os2_nacl.go | 113 _ECONNRESET = 104 /* Connection reset by peer */
|
/prebuilts/go/linux-x86/src/runtime/ |
os2_nacl.go | 113 _ECONNRESET = 104 /* Connection reset by peer */
|
/system/sepolicy/private/ |
access_vectors | 491 # network peer labels 492 class peer
|
/external/clang/test/Analysis/ |
malloc.c | [all...] |
/external/wpa_supplicant_8/src/p2p/ |
p2p_i.h | 52 * If the peer was discovered based on an interface address (e.g., GO 58 * address of the peer. 155 u8 peer[ETH_ALEN]; member in struct:p2p_sd_query 218 * P2P_WAIT_PEER_CONNECT - Waiting peer in List for GO Neg 223 * P2P_WAIT_PEER_IDLE - Waiting peer idle for GO Neg 274 * go_neg_peer - Pointer to GO Negotiation peer 279 * invite_peer - Pointer to Invite peer 284 * last_p2p_find_oper - Pointer to last pre-find operation peer 296 * sd_peer - Pointer to Service Discovery peer 312 * sd_query_no_ack - The first peer (Dev Addr) that did not ACK SD Quer [all...] |