/frameworks/opt/net/wifi/service/java/com/android/server/wifi/aware/ |
WifiAwareNativeApi.java | 408 * @param requestorInstanceId ID of the peer to communicate with - obtained 409 * through a previous discovery (match) operation with that peer. 410 * @param dest MAC address of the peer to communicate with - obtained 589 * Initiates setting up a data-path between device and peer. Security is provided by either 594 * @param peerId ID of the peer ID to associate the data path with. A value of 0 600 * @param peer The MAC address of the peer to create a connection with. 607 int channel, byte[] peer, String interfaceName, byte[] pmk, String passphrase, 612 + ", peer=" + String.valueOf(HexEncoding.encode(peer)) + ", interfaceName= [all...] |
WifiAwareStateManager.java | 376 * Place a request to range a peer on the discovery session on the state machine queue. 470 int channelRequestType, int channel, byte[] peer, String interfaceName, byte[] pmk, 478 msg.getData().putByteArray(MESSAGE_BUNDLE_KEY_MAC_ADDRESS, peer); 796 * Place a callback request on the state machine queue: data-path request (from peer) received. [all...] |
/frameworks/opt/net/wifi/tests/wifitests/src/com/android/server/wifi/aware/ |
WifiAwareDataPathStateManagerTest.java | 245 * peer ID. 254 * peer mac and non-null token. 262 * Validate the fail flow of the Initiator: using a direct network specifier with a null peer 271 * Validate the fail flow of the Initiator: using a direct network specifier with a null peer 329 * token and no peer ID (i.e. 0). 338 * token and no peer ID (i.e. 0). 347 * peer mac and non-null token. 356 * peer mac and null token. 364 * Validate the success flow of the Responder: using a direct network specifier with a null peer 373 * Validate the success flow of the Responder: using a direct network specifier with a null peer [all...] |
/external/boringssl/src/ssl/ |
ssl_test.cc | 507 // providing |peer_sha256|, so |peer| is not serialized. [all...] |
/external/boringssl/src/ssl/test/runner/ |
runner.go | 328 // algorithm that the peer should have used in the handshake. 415 // expectPeerCertificate, if not nil, is the certificate chain the peer 504 local, peer := "client", "server" 506 local, peer = peer, local 512 peer: peer, 628 return fmt.Errorf("expected peer to use signature algorithm %04x, but got %04x", expected, connState.PeerSignatureAlgorithm) 632 return fmt.Errorf("expected peer to use curve %04x, but got %04x", expected, connState.CurveID) 637 return fmt.Errorf("expected peer to send %d certificates, but got %d", len(connState.PeerCertificates), len(test.expectPeerCertific (…) [all...] |
dtls.go | 94 // peer sending garbage. 245 // Don't duplicate Finished to avoid the peer
|
key_agreement.go | 230 return nil, errors.New("tls: invalid peer key") 269 return nil, errors.New("tls: invalid peer key") 380 // The peer's key must match the cipher type. 508 // Save the peer key for later.
|
/external/iproute2/misc/ |
ss.c | 2643 char *peer; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
events.c | [all...] |
wpa_priv.c | 897 os_memcpy(auth->peer, data->auth.peer, ETH_ALEN); 1088 &data->stkstart.peer, ETH_ALEN);
|
p2p_supplicant.h | 155 void wpas_p2p_remove_client(struct wpa_supplicant *wpa_s, const u8 *peer,
|
/external/syslinux/gpxe/src/net/tcp/ |
iscsi.c | 1504 struct sockaddr *peer; local [all...] |
/external/wpa_supplicant_8/src/ap/ |
drv_callbacks.c | 722 sta = ap_get_sta(hapd, rx_auth->peer); 724 sta = ap_sta_add(hapd, rx_auth->peer); 752 hostapd_sta_auth(hapd, rx_auth->peer, rx_auth->auth_transaction + 1, [all...] |
ap_drv_ops.h | 125 enum wnm_oper oper, const u8 *peer,
|
ap_drv_ops.c | 665 const u8 *peer, u8 *buf, u16 *buf_len) 669 return hapd->driver->wnm_oper(hapd->drv_priv, oper, peer, buf,
|
/external/boringssl/src/include/openssl/ |
evp.h | 522 /* EVP_PKEY_derive_set_peer sets the peer's key to be used for key derivation 523 * by |ctx| to |peer|. It should be called after |EVP_PKEY_derive_init|. (For 524 * example, this is used to set the peer's key in (EC)DH.) It returns one on 526 OPENSSL_EXPORT int EVP_PKEY_derive_set_peer(EVP_PKEY_CTX *ctx, EVP_PKEY *peer); [all...] |
/external/iw/ |
interface.c | 553 COMMAND(set, peer, "<MAC address>", 555 "Set interface WDS peer.");
|
/prebuilts/go/darwin-x86/src/syscall/ |
tables_nacl.go | 197 ECONNRESET Errno = 104 /* Connection reset by peer */ 319 ECONNRESET: "Connection reset by peer",
|
zerrors_windows.go | 175 ECONNRESET - APPLICATION_ERROR: "connection reset by peer",
|
/prebuilts/go/linux-x86/src/syscall/ |
tables_nacl.go | 197 ECONNRESET Errno = 104 /* Connection reset by peer */ 319 ECONNRESET: "Connection reset by peer",
|
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/ |
ftplib.py | 804 def parse229(resp, peer):
821 host = peer[0]
[all...] |
/external/wpa_supplicant_8/src/p2p/ |
p2p_sd.c | 58 return NULL; /* peer does not support SD */ 65 /* Use WSD only if the peer indicates support or it */ 82 os_memcmp(q->peer, dev->info.p2p_device_addr, ETH_ALEN) == 282 p2p_dbg(p2p, "No Listen/Operating frequency known for the peer " 295 " due to it being the first no-ACK peer in this search iteration", 443 * separately for each peer to avoid having to drop old 880 os_memcpy(q->peer, dst, ETH_ALEN);
|
/hardware/interfaces/wifi/1.0/ |
types.hal | 620 /** Invalid peer id */ 1071 * Ranging is only performed if all other match criteria with the peer are met. Ranging must 1073 * flag to true. Otherwise, if either peer sets this flag to false, ranging must not be performed [all...] |
/prebuilts/gdb/darwin-x86/lib/python2.7/ |
ftplib.py | 814 def parse229(resp, peer): 831 host = peer[0] [all...] |
/prebuilts/gdb/linux-x86/lib/python2.7/ |
ftplib.py | 814 def parse229(resp, peer): 831 host = peer[0] [all...] |