HomeSort by relevance Sort by last modified time
    Searched refs:peer (Results 176 - 200 of 395) sorted by null

1 2 3 4 5 6 78 91011>>

  /device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Modules/
_ssl.c 828 PyObject *peer; local
843 peer = _create_tuple_for_X509_NAME(
845 if (peer == NULL)
847 if (PyDict_SetItemString(retval, (const char *) "subject", peer) < 0) {
848 Py_DECREF(peer);
851 Py_DECREF(peer);
1036 Returns the certificate for the peer. If no certificate was provided,\n\
1039 about the peer certificate.\n\
1042 peer certificate, or None if no certificate was provided. This will\n\
    [all...]
  /device/google/cuttlefish_common/host/libs/ivserver/
README.md 29 pretends to be another peer VM to comply to the ivshmem protocol.
  /external/boringssl/src/crypto/ecdh/
ecdh_test.cc 205 const EC_POINT *peer = EC_GROUP_get0_generator(b.get()); local
207 ECDH_compute_key(out, sizeof(out), peer, key.get(), nullptr));
  /external/webrtc/webrtc/tools/rtcbot/bot/browser/
bot.js 29 console.log("Creating peer connection");
  /external/wpa_supplicant_8/src/rsn_supp/
wpa_i.h 48 u8 preauth_bssid[ETH_ALEN]; /* current RSN pre-auth peer or
327 const u8 *peer)
330 return sm->ctx->tdls_oper(sm->ctx->ctx, oper, peer);
  /frameworks/opt/net/wifi/service/java/com/android/server/wifi/rtt/
RttNative.java 289 config.peer = halRttPeerTypeFromResponderType(responder.responderType);
298 if (config.peer == RttPeerType.NAN) {
  /external/wpa_supplicant_8/wpa_supplicant/
ctrl_iface.c 796 u8 peer[ETH_ALEN]; local
799 if (hwaddr_aton(addr, peer)) {
806 MAC2STR(peer));
809 ret = wpa_tdls_send_discovery_request(wpa_s->wpa, peer);
811 ret = wpa_drv_tdls_oper(wpa_s, TDLS_DISCOVERY_REQ, peer);
820 u8 peer[ETH_ALEN]; local
823 if (hwaddr_aton(addr, peer)) {
830 MAC2STR(peer));
834 return wpa_drv_tdls_oper(wpa_s, TDLS_SETUP, peer);
836 wpa_tdls_remove(wpa_s->wpa, peer);
850 u8 peer[ETH_ALEN]; local
903 u8 peer[ETH_ALEN]; local
976 u8 peer[ETH_ALEN]; local
1002 u8 peer[ETH_ALEN]; local
1907 u8 peer[ETH_ALEN]; local
6106 u8 *_peer = NULL, peer[ETH_ALEN]; local
6166 u8 peer[ETH_ALEN], go_dev_addr[ETH_ALEN], *go_dev = NULL; local
6744 u8 peer[ETH_ALEN]; local
    [all...]
driver_i.h 556 enum tdls_oper oper, const u8 *peer)
560 return wpa_s->driver->tdls_oper(wpa_s->drv_priv, oper, peer);
640 enum wnm_oper oper, const u8 *peer,
645 return wpa_s->driver->wnm_oper(wpa_s->drv_priv, oper, peer, buf,
wpas_glue.c 720 static int wpa_supplicant_tdls_oper(void *ctx, int oper, const u8 *peer)
723 return wpa_drv_tdls_oper(wpa_s, oper, peer);
728 void *ctx, const u8 *peer, int add, u16 aid, u16 capability,
741 params.addr = peer;
    [all...]
sme.c 876 wpa_printf(MSG_DEBUG, "SAE: Failed to process peer "
918 if (os_memcmp(wpa_s->pending_bssid, data->auth.peer, ETH_ALEN) != 0) {
920 "unexpected peer " MACSTR,
921 MAC2STR(data->auth.peer));
925 wpa_dbg(wpa_s, MSG_DEBUG, "SME: Authentication response: peer=" MACSTR
927 MAC2STR(data->auth.peer), data->auth.auth_type,
968 MAC2STR(data->auth.peer), data->auth.auth_type,
1018 data->auth.peer,
1072 sme_associate(wpa_s, ssid->mode, data->auth.peer,
    [all...]
  /art/runtime/
thread_list.h 80 // Suspend a thread using a peer, typically used by the debugger. Returns the thread on success,
81 // else null. The peer is used to identify the thread to avoid races with the thread terminating.
85 Thread* SuspendThreadByPeer(jobject peer,
  /external/autotest/client/common_lib/cros/
virtual_ethernet_pair.py 14 peer_interface_name="peer",
61 interface will be called |interface_name|, and the peer end
105 logging.error('Failed to create peer test interface.')
152 """@return string name of the peer interface."""
164 """@return string IPv4 address of the peer interface."""
182 """@return string IPv4 subnet mask of the peer interface."""
194 """@return string MAC address of the peer interface."""
245 'type veth peer name %s >/dev/null 2>&1' %
  /external/libvncserver/libvncserver/
main.c 572 struct sockaddr_storage peer; local
593 len = sizeof (peer);
595 client_fd = accept(screen->listenSock, (struct sockaddr*)&peer, &len);
597 client_fd = accept(screen->listen6Sock, (struct sockaddr*)&peer, &len);
  /external/webrtc/webrtc/p2p/base/
dtlstransportchannel_unittest.cc 111 void Negotiate(DtlsTestClient* peer, cricket::ContentAction action,
114 Negotiate(certificate_, certificate_ ? peer->certificate_ : nullptr, action,
189 bool Connect(DtlsTestClient* peer) {
191 transport_->SetDestination(peer->transport_.get());
    [all...]
turnserver.h 119 const rtc::SocketAddress& peer);
  /external/wpa_supplicant_8/src/pae/
ieee802_1x_kay_i.h 218 * struct ieee802_1x_mka_peer_body - Live Peer List and Potential Peer List
223 * @peer: array of (MI, MN) pairs
241 u8 peer[0]; member in struct:ieee802_1x_mka_peer_body
  /kernel/tests/net/test/
forwarding_test.py 113 accepted, peer = listensocket.accept()
  /prebuilts/go/darwin-x86/src/net/
fd_windows.go 68 // Always returns nil for connected peer address result.
214 // Get local and peer addr out of AcceptEx buffer.
  /prebuilts/go/linux-x86/src/net/
fd_windows.go 68 // Always returns nil for connected peer address result.
214 // Get local and peer addr out of AcceptEx buffer.
  /frameworks/opt/net/wifi/tests/wifitests/src/com/android/server/wifi/aware/
WifiAwareDataPathStateManagerTest.java 597 * Validate that multiple NDP requests to the same peer target different NDIs.
679 * peer mac and non-null PMK.
754 * Passphrase and no peer ID (i.e. 0).
763 * PMK/Passphrase and no peer ID (i.e. 0).
    [all...]
  /external/boringssl/src/ssl/test/runner/
common.go 256 PeerCertificates []*x509.Certificate // certificate chain presented by remote peer
264 PeerSignatureAlgorithm signatureAlgorithm // algorithm used by the peer in the handshake
266 QUICTransportParams []byte // the QUIC transport params received from the peer
615 // SkipCertificateVerify, if true causes peer to skip sending a
720 // peer.
728 // expect the peer to False Start; the server Finished message
730 // from the peer.
736 // Start test to determine whether the peer processed the alert (and
801 // RequireExtendedMasterSecret, if true, requires that the peer support
856 // the peer must still send none
    [all...]
  /external/iproute2/ip/
ipaddress.c 66 fprintf(stderr, "IFADDR := PREFIX | ADDR peer PREFIX\n");
1206 print_string(PRINT_FP, NULL, " peer ", NULL);
2350 inet_prefix peer; local
    [all...]
  /prebuilts/tools/common/m2/repository/net/java/dev/jna/jna/3.4.0/
jna-3.4.0.jar 
  /prebuilts/go/darwin-x86/src/crypto/tls/
key_agreement.go 118 return nil, crypto.Hash(0), errors.New("tls: unsupported hash function used by peer")
191 // publicKey is used to store the peer's public value when X25519 is
194 // x and y are used to store the peer's public value when one of the
  /prebuilts/go/linux-x86/src/crypto/tls/
key_agreement.go 118 return nil, crypto.Hash(0), errors.New("tls: unsupported hash function used by peer")
191 // publicKey is used to store the peer's public value when X25519 is
194 // x and y are used to store the peer's public value when one of the

Completed in 691 milliseconds

1 2 3 4 5 6 78 91011>>