/external/bluetooth/bluez/src/ |
dbus-hci.h | 26 void hcid_dbus_inquiry_result(bdaddr_t *local, bdaddr_t *peer, uint32_t class, int8_t rssi, uint8_t *data); 27 void hcid_dbus_set_legacy_pairing(bdaddr_t *local, bdaddr_t *peer, gboolean legacy); 28 void hcid_dbus_remote_class(bdaddr_t *local, bdaddr_t *peer, uint32_t class); 29 void hcid_dbus_remote_name(bdaddr_t *local, bdaddr_t *peer, uint8_t status, char *name); 30 void hcid_dbus_conn_complete(bdaddr_t *local, uint8_t status, uint16_t handle, bdaddr_t *peer); 32 void hcid_dbus_bonding_process_complete(bdaddr_t *local, bdaddr_t *peer, uint8_t status); 33 void hcid_dbus_simple_pairing_complete(bdaddr_t *local, bdaddr_t *peer, uint8_t status); 36 void hcid_dbus_returned_link_key(bdaddr_t *local, bdaddr_t *peer); 43 int hcid_dbus_link_key_notify(bdaddr_t *local, bdaddr_t *peer,
|
storage.h | 37 int write_remote_class(bdaddr_t *local, bdaddr_t *peer, uint32_t class); 38 int read_remote_class(bdaddr_t *local, bdaddr_t *peer, uint32_t *class); 39 int write_device_name(bdaddr_t *local, bdaddr_t *peer, char *name); 41 int write_remote_eir(bdaddr_t *local, bdaddr_t *peer, uint8_t *data); 42 int read_remote_eir(bdaddr_t *local, bdaddr_t *peer, uint8_t *data); 43 int write_l2cap_info(bdaddr_t *local, bdaddr_t *peer, 46 int read_l2cap_info(bdaddr_t *local, bdaddr_t *peer, 49 int write_version_info(bdaddr_t *local, bdaddr_t *peer, uint16_t manufacturer, uint8_t lmp_ver, uint16_t lmp_subver); 50 int write_features_info(bdaddr_t *local, bdaddr_t *peer, unsigned char *page1, unsigned char *page2); 51 int read_remote_features(bdaddr_t *local, bdaddr_t *peer, unsigned char *page1, unsigned char *page2) [all...] |
dbus-hci.c | 538 void hcid_dbus_bonding_process_complete(bdaddr_t *local, bdaddr_t *peer, 546 if (!get_adapter_and_device(local, peer, &adapter, &device, TRUE)) 562 void hcid_dbus_simple_pairing_complete(bdaddr_t *local, bdaddr_t *peer, 570 if (!get_adapter_and_device(local, peer, &adapter, &device, TRUE)) 595 void hcid_dbus_inquiry_result(bdaddr_t *local, bdaddr_t *peer, uint32_t class, 610 ba2str(peer, peer_addr); 612 if (!get_adapter_and_device(local, peer, &adapter, &device, FALSE)) { 617 write_remote_class(local, peer, class); 620 write_remote_eir(local, peer, data); 634 bacpy(&match.bdaddr, peer); [all...] |
storage.c | 281 int write_remote_class(bdaddr_t *local, bdaddr_t *peer, uint32_t class) 289 ba2str(peer, addr); 295 int read_remote_class(bdaddr_t *local, bdaddr_t *peer, uint32_t *class) 301 ba2str(peer, addr); 317 int write_device_name(bdaddr_t *local, bdaddr_t *peer, char *name) 333 ba2str(peer, addr); 358 int write_remote_eir(bdaddr_t *local, bdaddr_t *peer, uint8_t *data) 371 ba2str(peer, addr); 375 int read_remote_eir(bdaddr_t *local, bdaddr_t *peer, uint8_t *data) 382 ba2str(peer, addr) [all...] |
/external/bluetooth/bluez/network/ |
connection.c | 76 struct network_peer *peer; member in struct:network_conn 92 struct network_peer *peer = l->data; local 94 if (!strcmp(peer->path, path)) 95 return peer; 155 emit_property_changed(connection, nc->peer->path, 158 emit_property_changed(connection, nc->peer->path, 161 emit_property_changed(connection, nc->peer->path, 164 device_remove_disconnect_watch(nc->peer->device, nc->dc_id); 209 bnep_kill_connection(&nc->peer->dst); 219 info("Network: disconnect %s", nc->peer->path) 390 struct network_peer *peer = data; local 452 struct network_peer *peer = data; local 470 struct network_peer *peer = data; local 539 struct network_peer *peer = data; local 563 struct network_peer *peer; local 586 struct network_peer *peer; local 614 struct network_peer *peer; local [all...] |
/system/core/adb/ |
sockets.c | 54 ** these have no peer anymore, but still packets to 119 if(s->transport == t || (s->peer && s->peer->transport == t)) { 218 if(s->peer) { 219 s->peer->peer = 0; 221 if (s->peer->close == local_socket_close) 222 local_socket_close_locked(s->peer); 224 s->peer->close(s->peer); 469 asocket* peer = s->peer; local [all...] |
jdwp_service.c | 533 asocket* peer = s->peer; local 537 if (peer) { 538 peer->peer = NULL; 539 peer->close(peer); 549 s->peer->close(s->peer); 558 asocket* peer = jdwp->socket.peer local 620 asocket* peer = t->socket.peer; local 631 asocket* peer = s->peer; local [all...] |
/system/core/libcutils/ |
mq.c | 63 /** Request for a connection to another peer. */ 66 /** A connection to another peer. */ 88 // TODO: Use custom headers for master->peer, peer->master, peer->peer. 100 /** A packet which will be sent to a peer. */ 107 /** Connection to peer. Used with CONNECTION. */ 124 /** Represents a remote peer. */ 127 /** Local peer state. You typically have one peer per process. * 191 Peer* peer; member in struct:PeerProxy 304 Peer* peer = peerProxy->peer; local 315 Peer* peer = peerProxy->peer; local 783 Peer* peer = masterProxy->peer; local 895 Peer* peer = masterProxy->peer; local 1094 Peer* peer = calloc(1, sizeof(Peer)); local 1134 Peer* peer = localPeer; local 1202 Peer* peer = localPeer; local [all...] |
/external/webkit/WebCore/websockets/ |
WorkerThreadableWebSocketChannel.cpp | 97 WorkerThreadableWebSocketChannel::Peer::Peer(RefPtr<ThreadableWebSocketChannelClientWrapper> clientWrapper, WorkerLoaderProxy& loaderProxy, ScriptExecutionContext* context, const String& taskMode, const KURL& url, const String& protocol) 106 WorkerThreadableWebSocketChannel::Peer::~Peer() 113 void WorkerThreadableWebSocketChannel::Peer::connect() 127 void WorkerThreadableWebSocketChannel::Peer::send(const String& message) 142 void WorkerThreadableWebSocketChannel::Peer::bufferedAmount() 151 void WorkerThreadableWebSocketChannel::Peer::close() 160 void WorkerThreadableWebSocketChannel::Peer::disconnect() 175 void WorkerThreadableWebSocketChannel::Peer::didConnect( 218 Peer* peer = Peer::create(clientWrapper, thisPtr->m_loaderProxy, context, taskMode, url, protocol); local 329 Peer* peer = m_peer; local [all...] |
/external/openssl/apps/ |
s_cb.c | 705 } peer; local 718 /* Read peer information */ 719 (void)BIO_dgram_get_peer(SSL_get_rbio(ssl), &peer); local 721 /* Create buffer with peer's address and port */ 723 switch (peer.sa.sa_family) 727 length += sizeof(peer.s4.sin_port); 732 length += sizeof(peer.s6.sin6_port); 747 switch (peer.sa.sa_family) 751 &peer.s4.sin_port, 752 sizeof(peer.s4.sin_port)) 793 } peer; local 800 (void)BIO_dgram_get_peer(SSL_get_rbio(ssl), &peer); local [all...] |
sess_id.c | 234 if (x->peer == NULL) 237 X509_print(out,x->peer); 256 else if (!noout && (x->peer != NULL)) /* just print the certificate */ 259 i=(int)i2d_X509_bio(out,x->peer); 261 i=PEM_write_bio_X509(out,x->peer);
|
/external/qemu/ |
charpipe.c | 75 struct CharPipeHalf* peer; /* NULL if closed */ member in struct:CharPipeHalf 91 ph->peer = NULL; 99 CharPipeHalf* peer = ph->peer; local 106 if (bip == NULL && peer != NULL && peer->cs->chr_read != NULL) { 107 /* no buffered data, try to write directly to the peer */ 111 if (peer->cs->chr_can_read) { 112 size = qemu_chr_can_read( peer->cs ); 121 qemu_chr_read( peer->cs, (uint8_t*)buf, size ) 158 CharPipeHalf* peer = ph->peer; local 297 CharDriverState* peer = cbuf->endpoint; local 348 CharDriverState* peer = cbuf->endpoint; local [all...] |
/external/openssl/crypto/bio/ |
bss_dgram.c | 117 } peer; member in struct:bio_dgram_data_st 294 } peer; member in struct:__anon5462 298 sa.len.i=sizeof(sa.peer); 303 memset(&sa.peer, 0x00, sizeof(sa.peer)); 305 ret=recvfrom(b->num,out,outl,0,&sa.peer.sa,(void *)&sa.len); 308 OPENSSL_assert(sa.len.s<=sizeof(sa.peer)); 314 BIO_ctrl(b, BIO_CTRL_DGRAM_SET_PEER, 0, &sa.peer); 339 int peerlen = sizeof(data->peer); 341 if (data->peer.sa.sa_family == AF_INET [all...] |
bss_bio.c | 57 * of this kind, handled by the same thread (i.e. the "peer" is actually 127 BIO *peer; /* NULL if buf == NULL. member in struct:bio_bio_st 128 * If peer != NULL, then peer->ptr is also a bio_bio_st, 129 * and its "peer" member points back to us. 130 * peer != NULL iff init != 0 in the BIO. */ 132 /* This is for what we write (i.e. reading uses peer's struct): */ 133 int closed; /* valid iff peer != NULL */ 134 size_t len; /* valid iff buf != NULL; 0 if peer == NULL */ 139 size_t request; /* valid iff peer != NULL; 0 if len != 0 [all...] |
/external/iproute2/ip/ |
ifcfg | 36 echo "Usage: ifcfg DEV [[add|del [ADDR[/LEN]] [PEER] | stop]" 1>&2 81 peer=$1 82 if [ "$peer" != "" ]; then 84 echo "Peer address with non-trivial netmask." 1>&2 87 pfx="$ipaddr peer $peer" 141 elif [ "$peer" != "" ]; then 142 if ping -q -c 2 -w 4 $peer ; then 143 ip ro append default via $peer dev $dev metric 30001
|
/external/iptables/libipq/ |
libipq.c | 75 { IPQ_ERR_ADDRLEN, "Invalid peer address length" }, 105 (struct sockaddr *)&h->peer, sizeof(h->peer)); 133 addrlen = sizeof(h->peer); 166 (struct sockaddr *)&h->peer, &addrlen); 171 if (addrlen != sizeof(h->peer)) { 175 if (h->peer.nl_pid != 0) { 247 memset(&h->peer, 0, sizeof(struct sockaddr_nl)); 248 h->peer.nl_family = AF_NETLINK; 249 h->peer.nl_pid = 0 [all...] |
/frameworks/base/core/java/com/android/internal/os/ |
ZygoteConnection.java | 61 * mSocket is retained in the child process in "peer wait" mode, so 63 * it is closed in the peer. 68 private final Credentials peer; field in class:ZygoteConnection 72 * this peer. If "peer wait" mode is specified, the process that requested 78 * "peer-wait" mode was not requested. 100 peer = mSocket.getPeerCredentials(); 102 Log.e(TAG, "Cannot read peer credentials", ex); 201 applyUidSecurityPolicy(parsedArgs, peer); 203 applyRlimitSecurityPolicy(parsedArgs, peer); [all...] |
/external/openssl/crypto/evp/ |
pmeth_fn.c | 285 int EVP_PKEY_derive_set_peer(EVP_PKEY_CTX *ctx, EVP_PKEY *peer) 301 ret = ctx->pmeth->ctrl(ctx, EVP_PKEY_CTRL_PEER_KEY, 0, peer); 315 if (ctx->pkey->type != peer->type) 322 /* ran@cryptocom.ru: For clarity. The error is if parameters in peer are 327 if (!EVP_PKEY_missing_parameters(peer) && 328 !EVP_PKEY_cmp_parameters(ctx->pkey, peer)) 337 ctx->peerkey = peer; 339 ret = ctx->pmeth->ctrl(ctx, EVP_PKEY_CTRL_PEER_KEY, 1, peer); 347 CRYPTO_add(&peer->references,1,CRYPTO_LOCK_EVP_PKEY);
|
/external/wpa_supplicant_6/wpa_supplicant/src/wps/ |
wps_upnp.h | 29 void *priv, struct upnp_wps_peer *peer); 31 void *priv, struct upnp_wps_peer *peer,
|
/external/wpa_supplicant/ |
wpa_supplicant.h | 132 * STAKey negotiation. The caller will need to set peer address for the 244 u8 peer[ETH_ALEN]; member in struct:wpa_event_data::stkstart
|
/external/ipsec-tools/src/racoon/ |
sainfo.c | 76 * First pass is for sainfo from a specified peer, second for others. 79 getsainfo(loc, rmt, peer, remoteid) 80 const vchar_t *loc, *rmt, *peer; 87 if (peer == NULL) 104 if (peer == NULL) 107 dpeer = ipsecdoi_id2str(peer); 110 "getsainfo params: loc=\'%s\', rmt=\'%s\', peer=\'%s\', id=%i\n", 133 if (ipsecdoi_chkcmpids(peer, s->id_i, 0)) 294 snprintf(buf, 255, "loc=\'%s\', rmt=\'%s\', peer=\'%s\', id=%i",
|
/external/dnsmasq/src/ |
tftp.c | 46 struct sockaddr_in addr, peer; local 72 msg.msg_name = &peer; 73 msg.msg_namelen = sizeof(peer); 153 transfer->peer = peer; 194 len = tftp_err(ERR_ILL, packet, _("unsupported request from %s"), inet_ntoa(peer.sin_addr)); 244 strncat(daemon->namebuff, inet_ntoa(peer.sin_addr), (MAXDNAME-1) - strlen(daemon->namebuff)); 276 (struct sockaddr *)&peer, sizeof(peer)) == -1 && errno == EINTR); 282 my_syslog(MS_TFTP | LOG_INFO, _("TFTP sent %s to %s"), daemon->namebuff, inet_ntoa(peer.sin_addr)) [all...] |
/external/iptables/include/libipq/ |
libipq.h | 58 struct sockaddr_nl peer; member in struct:ipq_handle
|
/external/iproute2/include/ |
libnetlink.h | 15 struct sockaddr_nl peer; member in struct:rtnl_handle 46 extern int rtnl_talk(struct rtnl_handle *rtnl, struct nlmsghdr *n, pid_t peer,
|
/external/openssl/ssl/ |
ssl_asn1.c | 286 if (in->peer != NULL) 287 M_ASN1_I2D_len_EXP_opt(in->peer,i2d_X509,3,v3); 328 if (in->peer != NULL) 329 M_ASN1_I2D_put_EXP_opt(in->peer,i2d_X509,3,v3); 487 if (ret->peer != NULL) 489 X509_free(ret->peer); 490 ret->peer=NULL; 492 M_ASN1_D2I_get_EXP_opt(ret->peer,d2i_X509,3);
|