/prebuilts/go/linux-x86/src/net/http/ |
h2_bundle.go | 708 // frames up to 16KB are allowed without peer agreement. 983 // ErrFrameTooLarge is returned from Framer.ReadFrame when the peer 1040 // to the peer before hanging up on them. This might help others debug [all...] |
/frameworks/opt/net/wifi/tests/wifitests/src/com/android/server/wifi/p2p/ |
SupplicantP2pIfaceHalTest.java | 561 public void answer(byte[] peer, int method, String pin, boolean joinExisting, 617 public void answer(byte[] peer, int method, String pin, boolean joinExisting, 633 // Invalid peer address. 661 public void answer(byte[] peer, int method, String pin, boolean joinExisting, [all...] |
/hardware/broadcom/wlan/bcmdhd/dhdutil/include/proto/ |
802.11.h | 514 #define DOT11_TDLS_CAP_PU_BUFFER_STA 28 /* TDLS Peer U-APSD buffer STA support */ 515 #define DOT11_TDLS_CAP_PEER_PSM 20 /* TDLS Peer PSM support */ 2421 struct ether_addr peer; member in struct:dot11_rmreq_stat 2445 struct ether_addr peer; member in struct:dot11_rmreq_tx_stream 2455 struct ether_addr peer; member in struct:dot11_rmrep_tx_stream [all...] |
/external/boringssl/src/ssl/test/runner/ |
handshake_server.go | 115 return fmt.Errorf("tls: peer did not false start: %s", err) [all...] |
handshake_client.go | 346 // Test that the peer left-pads random. [all...] |
/prebuilts/go/darwin-x86/src/crypto/tls/ |
cipher_suites.go | 349 // ciphersuites and the id requested by the peer.
|
handshake_server_test.go | 630 t.Fatalf("%s: mismatch on peer cert %d", test.name, i+1) 634 t.Fatalf("%s: mismatch on peer list length: %d (wanted) != %d (got)", test.name, len(test.expectedPeerCerts), len(peerCerts)) [all...] |
tls_test.go | 216 // localhost TCP connection, the peer TCP connection can
|
/prebuilts/go/linux-x86/src/crypto/tls/ |
cipher_suites.go | 349 // ciphersuites and the id requested by the peer.
|
handshake_server_test.go | 630 t.Fatalf("%s: mismatch on peer cert %d", test.name, i+1) 634 t.Fatalf("%s: mismatch on peer list length: %d (wanted) != %d (got)", test.name, len(test.expectedPeerCerts), len(peerCerts)) [all...] |
tls_test.go | 216 // localhost TCP connection, the peer TCP connection can
|
/external/dnsmasq/src/ |
dnsmasq.h | 592 struct sockaddr_in peer; member in struct:tftp_transfer
|
/hardware/interfaces/wifi/1.0/default/ |
hidl_struct_util.cpp | [all...] |
/prebuilts/go/darwin-x86/src/net/ |
fd_windows.go | 646 // Get local and peer addr out of AcceptEx buffer.
|
/prebuilts/go/linux-x86/src/net/ |
fd_windows.go | 646 // Get local and peer addr out of AcceptEx buffer.
|
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/p2p/ |
WifiP2pServiceImpl.java | 137 // Idle time after a peer is gone when the group is torn down 145 // User accepted a peer request 147 // User rejected a peer request 206 // Track whether servcice/peer discovery is blocked in favor of other wifi actions 602 // Saved WifiP2pConfig for an ongoing peer connection. This will never be null. 1852 WifiP2pDevice peer = mPeers.get(groupOwner.deviceAddress); local [all...] |
/hardware/broadcom/wlan/bcmdhd/dhdutil/include/ |
wlioctl.h | 882 #define WL_IBSS_PEER_GROUP_KEY (1 << 6) /* Indicates a group key for a IBSS PEER */ 951 #define WPA2_AUTH_TPK 0x2000 /* TDLS Peer Key */ 4005 wl_anqpo_peer_t peer[1]; \/* max ANQPO_MAX_PEER_LIST *\/ member in struct:__anon40060 5500 struct ether_addr peer; member in struct:statreq [all...] |
/libcore/luni/src/main/native/ |
libcore_io_Linux.cpp | 888 sockaddr* peer = (javaSocketAddress != NULL) ? reinterpret_cast<sockaddr*>(&ss) : NULL; local [all...] |
/prebuilts/go/darwin-x86/src/syscall/ |
zerrors_darwin_386.go | [all...] |
zerrors_darwin_amd64.go | [all...] |
zerrors_darwin_arm.go | [all...] |
zerrors_darwin_arm64.go | [all...] |
zerrors_dragonfly_amd64.go | [all...] |
zerrors_freebsd_386.go | [all...] |
zerrors_freebsd_amd64.go | [all...] |