HomeSort by relevance Sort by last modified time
    Searched refs:peer (Results 176 - 200 of 336) sorted by null

1 2 3 4 5 6 78 91011>>

  /frameworks/opt/net/wifi/service/java/com/android/server/wifi/aware/
WifiAwareNativeApi.java 408 * @param requestorInstanceId ID of the peer to communicate with - obtained
409 * through a previous discovery (match) operation with that peer.
410 * @param dest MAC address of the peer to communicate with - obtained
589 * Initiates setting up a data-path between device and peer. Security is provided by either
594 * @param peerId ID of the peer ID to associate the data path with. A value of 0
600 * @param peer The MAC address of the peer to create a connection with.
607 int channel, byte[] peer, String interfaceName, byte[] pmk, String passphrase,
612 + ", peer=" + String.valueOf(HexEncoding.encode(peer)) + ", interfaceName=
    [all...]
WifiAwareStateManager.java 376 * Place a request to range a peer on the discovery session on the state machine queue.
470 int channelRequestType, int channel, byte[] peer, String interfaceName, byte[] pmk,
478 msg.getData().putByteArray(MESSAGE_BUNDLE_KEY_MAC_ADDRESS, peer);
796 * Place a callback request on the state machine queue: data-path request (from peer) received.
    [all...]
  /frameworks/opt/net/wifi/tests/wifitests/src/com/android/server/wifi/aware/
WifiAwareDataPathStateManagerTest.java 245 * peer ID.
254 * peer mac and non-null token.
262 * Validate the fail flow of the Initiator: using a direct network specifier with a null peer
271 * Validate the fail flow of the Initiator: using a direct network specifier with a null peer
329 * token and no peer ID (i.e. 0).
338 * token and no peer ID (i.e. 0).
347 * peer mac and non-null token.
356 * peer mac and null token.
364 * Validate the success flow of the Responder: using a direct network specifier with a null peer
373 * Validate the success flow of the Responder: using a direct network specifier with a null peer
    [all...]
  /external/boringssl/src/ssl/
ssl_test.cc 507 // providing |peer_sha256|, so |peer| is not serialized.
    [all...]
  /external/boringssl/src/ssl/test/runner/
runner.go 328 // algorithm that the peer should have used in the handshake.
415 // expectPeerCertificate, if not nil, is the certificate chain the peer
504 local, peer := "client", "server"
506 local, peer = peer, local
512 peer: peer,
628 return fmt.Errorf("expected peer to use signature algorithm %04x, but got %04x", expected, connState.PeerSignatureAlgorithm)
632 return fmt.Errorf("expected peer to use curve %04x, but got %04x", expected, connState.CurveID)
637 return fmt.Errorf("expected peer to send %d certificates, but got %d", len(connState.PeerCertificates), len(test.expectPeerCertific (…)
    [all...]
dtls.go 94 // peer sending garbage.
245 // Don't duplicate Finished to avoid the peer
key_agreement.go 230 return nil, errors.New("tls: invalid peer key")
269 return nil, errors.New("tls: invalid peer key")
380 // The peer's key must match the cipher type.
508 // Save the peer key for later.
  /external/iproute2/misc/
ss.c 2643 char *peer; local
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
events.c     [all...]
wpa_priv.c 897 os_memcpy(auth->peer, data->auth.peer, ETH_ALEN);
1088 &data->stkstart.peer, ETH_ALEN);
p2p_supplicant.h 155 void wpas_p2p_remove_client(struct wpa_supplicant *wpa_s, const u8 *peer,
  /external/syslinux/gpxe/src/net/tcp/
iscsi.c 1504 struct sockaddr *peer; local
    [all...]
  /external/wpa_supplicant_8/src/ap/
drv_callbacks.c 722 sta = ap_get_sta(hapd, rx_auth->peer);
724 sta = ap_sta_add(hapd, rx_auth->peer);
752 hostapd_sta_auth(hapd, rx_auth->peer, rx_auth->auth_transaction + 1,
    [all...]
ap_drv_ops.h 125 enum wnm_oper oper, const u8 *peer,
ap_drv_ops.c 665 const u8 *peer, u8 *buf, u16 *buf_len)
669 return hapd->driver->wnm_oper(hapd->drv_priv, oper, peer, buf,
  /external/boringssl/src/include/openssl/
evp.h 522 /* EVP_PKEY_derive_set_peer sets the peer's key to be used for key derivation
523 * by |ctx| to |peer|. It should be called after |EVP_PKEY_derive_init|. (For
524 * example, this is used to set the peer's key in (EC)DH.) It returns one on
526 OPENSSL_EXPORT int EVP_PKEY_derive_set_peer(EVP_PKEY_CTX *ctx, EVP_PKEY *peer);
    [all...]
  /external/iw/
interface.c 553 COMMAND(set, peer, "<MAC address>",
555 "Set interface WDS peer.");
  /prebuilts/go/darwin-x86/src/syscall/
tables_nacl.go 197 ECONNRESET Errno = 104 /* Connection reset by peer */
319 ECONNRESET: "Connection reset by peer",
zerrors_windows.go 175 ECONNRESET - APPLICATION_ERROR: "connection reset by peer",
  /prebuilts/go/linux-x86/src/syscall/
tables_nacl.go 197 ECONNRESET Errno = 104 /* Connection reset by peer */
319 ECONNRESET: "Connection reset by peer",
  /device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/
ftplib.py 804 def parse229(resp, peer):
821 host = peer[0]
    [all...]
  /external/wpa_supplicant_8/src/p2p/
p2p_sd.c 58 return NULL; /* peer does not support SD */
65 /* Use WSD only if the peer indicates support or it */
82 os_memcmp(q->peer, dev->info.p2p_device_addr, ETH_ALEN) ==
282 p2p_dbg(p2p, "No Listen/Operating frequency known for the peer "
295 " due to it being the first no-ACK peer in this search iteration",
443 * separately for each peer to avoid having to drop old
880 os_memcpy(q->peer, dst, ETH_ALEN);
  /hardware/interfaces/wifi/1.0/
types.hal 620 /** Invalid peer id */
1071 * Ranging is only performed if all other match criteria with the peer are met. Ranging must
1073 * flag to true. Otherwise, if either peer sets this flag to false, ranging must not be performed
    [all...]
  /prebuilts/gdb/darwin-x86/lib/python2.7/
ftplib.py 814 def parse229(resp, peer):
831 host = peer[0]
    [all...]
  /prebuilts/gdb/linux-x86/lib/python2.7/
ftplib.py 814 def parse229(resp, peer):
831 host = peer[0]
    [all...]

Completed in 1013 milliseconds

1 2 3 4 5 6 78 91011>>