/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Modules/ |
_ssl.c | 828 PyObject *peer;
local 843 peer = _create_tuple_for_X509_NAME(
845 if (peer == NULL)
847 if (PyDict_SetItemString(retval, (const char *) "subject", peer) < 0) {
848 Py_DECREF(peer);
851 Py_DECREF(peer);
1036 Returns the certificate for the peer. If no certificate was provided,\n\
1039 about the peer certificate.\n\
1042 peer certificate, or None if no certificate was provided. This will\n\
[all...] |
/device/google/cuttlefish_common/host/libs/ivserver/ |
README.md | 29 pretends to be another peer VM to comply to the ivshmem protocol.
|
/external/boringssl/src/crypto/ecdh/ |
ecdh_test.cc | 205 const EC_POINT *peer = EC_GROUP_get0_generator(b.get()); local 207 ECDH_compute_key(out, sizeof(out), peer, key.get(), nullptr));
|
/external/webrtc/webrtc/tools/rtcbot/bot/browser/ |
bot.js | 29 console.log("Creating peer connection");
|
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa_i.h | 48 u8 preauth_bssid[ETH_ALEN]; /* current RSN pre-auth peer or 327 const u8 *peer) 330 return sm->ctx->tdls_oper(sm->ctx->ctx, oper, peer);
|
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/rtt/ |
RttNative.java | 289 config.peer = halRttPeerTypeFromResponderType(responder.responderType); 298 if (config.peer == RttPeerType.NAN) {
|
/external/wpa_supplicant_8/wpa_supplicant/ |
ctrl_iface.c | 796 u8 peer[ETH_ALEN]; local 799 if (hwaddr_aton(addr, peer)) { 806 MAC2STR(peer)); 809 ret = wpa_tdls_send_discovery_request(wpa_s->wpa, peer); 811 ret = wpa_drv_tdls_oper(wpa_s, TDLS_DISCOVERY_REQ, peer); 820 u8 peer[ETH_ALEN]; local 823 if (hwaddr_aton(addr, peer)) { 830 MAC2STR(peer)); 834 return wpa_drv_tdls_oper(wpa_s, TDLS_SETUP, peer); 836 wpa_tdls_remove(wpa_s->wpa, peer); 850 u8 peer[ETH_ALEN]; local 903 u8 peer[ETH_ALEN]; local 976 u8 peer[ETH_ALEN]; local 1002 u8 peer[ETH_ALEN]; local 1907 u8 peer[ETH_ALEN]; local 6106 u8 *_peer = NULL, peer[ETH_ALEN]; local 6166 u8 peer[ETH_ALEN], go_dev_addr[ETH_ALEN], *go_dev = NULL; local 6744 u8 peer[ETH_ALEN]; local [all...] |
driver_i.h | 556 enum tdls_oper oper, const u8 *peer) 560 return wpa_s->driver->tdls_oper(wpa_s->drv_priv, oper, peer); 640 enum wnm_oper oper, const u8 *peer, 645 return wpa_s->driver->wnm_oper(wpa_s->drv_priv, oper, peer, buf,
|
wpas_glue.c | 720 static int wpa_supplicant_tdls_oper(void *ctx, int oper, const u8 *peer) 723 return wpa_drv_tdls_oper(wpa_s, oper, peer); 728 void *ctx, const u8 *peer, int add, u16 aid, u16 capability, 741 params.addr = peer; [all...] |
sme.c | 876 wpa_printf(MSG_DEBUG, "SAE: Failed to process peer " 918 if (os_memcmp(wpa_s->pending_bssid, data->auth.peer, ETH_ALEN) != 0) { 920 "unexpected peer " MACSTR, 921 MAC2STR(data->auth.peer)); 925 wpa_dbg(wpa_s, MSG_DEBUG, "SME: Authentication response: peer=" MACSTR 927 MAC2STR(data->auth.peer), data->auth.auth_type, 968 MAC2STR(data->auth.peer), data->auth.auth_type, 1018 data->auth.peer, 1072 sme_associate(wpa_s, ssid->mode, data->auth.peer, [all...] |
/art/runtime/ |
thread_list.h | 80 // Suspend a thread using a peer, typically used by the debugger. Returns the thread on success, 81 // else null. The peer is used to identify the thread to avoid races with the thread terminating. 85 Thread* SuspendThreadByPeer(jobject peer,
|
/external/autotest/client/common_lib/cros/ |
virtual_ethernet_pair.py | 14 peer_interface_name="peer", 61 interface will be called |interface_name|, and the peer end 105 logging.error('Failed to create peer test interface.') 152 """@return string name of the peer interface.""" 164 """@return string IPv4 address of the peer interface.""" 182 """@return string IPv4 subnet mask of the peer interface.""" 194 """@return string MAC address of the peer interface.""" 245 'type veth peer name %s >/dev/null 2>&1' %
|
/external/libvncserver/libvncserver/ |
main.c | 572 struct sockaddr_storage peer; local 593 len = sizeof (peer); 595 client_fd = accept(screen->listenSock, (struct sockaddr*)&peer, &len); 597 client_fd = accept(screen->listen6Sock, (struct sockaddr*)&peer, &len);
|
/external/webrtc/webrtc/p2p/base/ |
dtlstransportchannel_unittest.cc | 111 void Negotiate(DtlsTestClient* peer, cricket::ContentAction action, 114 Negotiate(certificate_, certificate_ ? peer->certificate_ : nullptr, action, 189 bool Connect(DtlsTestClient* peer) { 191 transport_->SetDestination(peer->transport_.get()); [all...] |
turnserver.h | 119 const rtc::SocketAddress& peer);
|
/external/wpa_supplicant_8/src/pae/ |
ieee802_1x_kay_i.h | 218 * struct ieee802_1x_mka_peer_body - Live Peer List and Potential Peer List 223 * @peer: array of (MI, MN) pairs 241 u8 peer[0]; member in struct:ieee802_1x_mka_peer_body
|
/kernel/tests/net/test/ |
forwarding_test.py | 113 accepted, peer = listensocket.accept()
|
/prebuilts/go/darwin-x86/src/net/ |
fd_windows.go | 68 // Always returns nil for connected peer address result. 214 // Get local and peer addr out of AcceptEx buffer.
|
/prebuilts/go/linux-x86/src/net/ |
fd_windows.go | 68 // Always returns nil for connected peer address result. 214 // Get local and peer addr out of AcceptEx buffer.
|
/frameworks/opt/net/wifi/tests/wifitests/src/com/android/server/wifi/aware/ |
WifiAwareDataPathStateManagerTest.java | 597 * Validate that multiple NDP requests to the same peer target different NDIs. 679 * peer mac and non-null PMK. 754 * Passphrase and no peer ID (i.e. 0). 763 * PMK/Passphrase and no peer ID (i.e. 0). [all...] |
/external/boringssl/src/ssl/test/runner/ |
common.go | 256 PeerCertificates []*x509.Certificate // certificate chain presented by remote peer 264 PeerSignatureAlgorithm signatureAlgorithm // algorithm used by the peer in the handshake 266 QUICTransportParams []byte // the QUIC transport params received from the peer 615 // SkipCertificateVerify, if true causes peer to skip sending a 720 // peer. 728 // expect the peer to False Start; the server Finished message 730 // from the peer. 736 // Start test to determine whether the peer processed the alert (and 801 // RequireExtendedMasterSecret, if true, requires that the peer support 856 // the peer must still send none [all...] |
/external/iproute2/ip/ |
ipaddress.c | 66 fprintf(stderr, "IFADDR := PREFIX | ADDR peer PREFIX\n"); 1206 print_string(PRINT_FP, NULL, " peer ", NULL); 2350 inet_prefix peer; local [all...] |
/prebuilts/tools/common/m2/repository/net/java/dev/jna/jna/3.4.0/ |
jna-3.4.0.jar | |
/prebuilts/go/darwin-x86/src/crypto/tls/ |
key_agreement.go | 118 return nil, crypto.Hash(0), errors.New("tls: unsupported hash function used by peer") 191 // publicKey is used to store the peer's public value when X25519 is 194 // x and y are used to store the peer's public value when one of the
|
/prebuilts/go/linux-x86/src/crypto/tls/ |
key_agreement.go | 118 return nil, crypto.Hash(0), errors.New("tls: unsupported hash function used by peer") 191 // publicKey is used to store the peer's public value when X25519 is 194 // x and y are used to store the peer's public value when one of the
|