HomeSort by relevance Sort by last modified time
    Searched refs:peer (Results 1 - 25 of 85) sorted by null

1 2 3 4

  /external/bluetooth/bluez/src/
dbus-hci.h 26 void hcid_dbus_inquiry_result(bdaddr_t *local, bdaddr_t *peer, uint32_t class, int8_t rssi, uint8_t *data);
27 void hcid_dbus_set_legacy_pairing(bdaddr_t *local, bdaddr_t *peer, gboolean legacy);
28 void hcid_dbus_remote_class(bdaddr_t *local, bdaddr_t *peer, uint32_t class);
29 void hcid_dbus_remote_name(bdaddr_t *local, bdaddr_t *peer, uint8_t status, char *name);
30 void hcid_dbus_conn_complete(bdaddr_t *local, uint8_t status, uint16_t handle, bdaddr_t *peer);
32 void hcid_dbus_bonding_process_complete(bdaddr_t *local, bdaddr_t *peer, uint8_t status);
33 void hcid_dbus_simple_pairing_complete(bdaddr_t *local, bdaddr_t *peer, uint8_t status);
36 void hcid_dbus_returned_link_key(bdaddr_t *local, bdaddr_t *peer);
43 int hcid_dbus_link_key_notify(bdaddr_t *local, bdaddr_t *peer,
storage.h 37 int write_remote_class(bdaddr_t *local, bdaddr_t *peer, uint32_t class);
38 int read_remote_class(bdaddr_t *local, bdaddr_t *peer, uint32_t *class);
39 int write_device_name(bdaddr_t *local, bdaddr_t *peer, char *name);
41 int write_remote_eir(bdaddr_t *local, bdaddr_t *peer, uint8_t *data);
42 int read_remote_eir(bdaddr_t *local, bdaddr_t *peer, uint8_t *data);
43 int write_l2cap_info(bdaddr_t *local, bdaddr_t *peer,
46 int read_l2cap_info(bdaddr_t *local, bdaddr_t *peer,
49 int write_version_info(bdaddr_t *local, bdaddr_t *peer, uint16_t manufacturer, uint8_t lmp_ver, uint16_t lmp_subver);
50 int write_features_info(bdaddr_t *local, bdaddr_t *peer, unsigned char *page1, unsigned char *page2);
51 int read_remote_features(bdaddr_t *local, bdaddr_t *peer, unsigned char *page1, unsigned char *page2)
    [all...]
dbus-hci.c 538 void hcid_dbus_bonding_process_complete(bdaddr_t *local, bdaddr_t *peer,
546 if (!get_adapter_and_device(local, peer, &adapter, &device, TRUE))
562 void hcid_dbus_simple_pairing_complete(bdaddr_t *local, bdaddr_t *peer,
570 if (!get_adapter_and_device(local, peer, &adapter, &device, TRUE))
595 void hcid_dbus_inquiry_result(bdaddr_t *local, bdaddr_t *peer, uint32_t class,
610 ba2str(peer, peer_addr);
612 if (!get_adapter_and_device(local, peer, &adapter, &device, FALSE)) {
617 write_remote_class(local, peer, class);
620 write_remote_eir(local, peer, data);
634 bacpy(&match.bdaddr, peer);
    [all...]
storage.c 281 int write_remote_class(bdaddr_t *local, bdaddr_t *peer, uint32_t class)
289 ba2str(peer, addr);
295 int read_remote_class(bdaddr_t *local, bdaddr_t *peer, uint32_t *class)
301 ba2str(peer, addr);
317 int write_device_name(bdaddr_t *local, bdaddr_t *peer, char *name)
333 ba2str(peer, addr);
358 int write_remote_eir(bdaddr_t *local, bdaddr_t *peer, uint8_t *data)
371 ba2str(peer, addr);
375 int read_remote_eir(bdaddr_t *local, bdaddr_t *peer, uint8_t *data)
382 ba2str(peer, addr)
    [all...]
  /external/bluetooth/bluez/network/
connection.c 76 struct network_peer *peer; member in struct:network_conn
92 struct network_peer *peer = l->data; local
94 if (!strcmp(peer->path, path))
95 return peer;
155 emit_property_changed(connection, nc->peer->path,
158 emit_property_changed(connection, nc->peer->path,
161 emit_property_changed(connection, nc->peer->path,
164 device_remove_disconnect_watch(nc->peer->device, nc->dc_id);
209 bnep_kill_connection(&nc->peer->dst);
219 info("Network: disconnect %s", nc->peer->path)
390 struct network_peer *peer = data; local
452 struct network_peer *peer = data; local
470 struct network_peer *peer = data; local
539 struct network_peer *peer = data; local
563 struct network_peer *peer; local
586 struct network_peer *peer; local
614 struct network_peer *peer; local
    [all...]
  /system/core/adb/
sockets.c 54 ** these have no peer anymore, but still packets to
119 if(s->transport == t || (s->peer && s->peer->transport == t)) {
218 if(s->peer) {
219 s->peer->peer = 0;
221 if (s->peer->close == local_socket_close)
222 local_socket_close_locked(s->peer);
224 s->peer->close(s->peer);
469 asocket* peer = s->peer; local
    [all...]
jdwp_service.c 533 asocket* peer = s->peer; local
537 if (peer) {
538 peer->peer = NULL;
539 peer->close(peer);
549 s->peer->close(s->peer);
558 asocket* peer = jdwp->socket.peer local
620 asocket* peer = t->socket.peer; local
631 asocket* peer = s->peer; local
    [all...]
  /system/core/libcutils/
mq.c 63 /** Request for a connection to another peer. */
66 /** A connection to another peer. */
88 // TODO: Use custom headers for master->peer, peer->master, peer->peer.
100 /** A packet which will be sent to a peer. */
107 /** Connection to peer. Used with CONNECTION. */
124 /** Represents a remote peer. */
127 /** Local peer state. You typically have one peer per process. *
191 Peer* peer; member in struct:PeerProxy
304 Peer* peer = peerProxy->peer; local
315 Peer* peer = peerProxy->peer; local
783 Peer* peer = masterProxy->peer; local
895 Peer* peer = masterProxy->peer; local
1094 Peer* peer = calloc(1, sizeof(Peer)); local
1134 Peer* peer = localPeer; local
1202 Peer* peer = localPeer; local
    [all...]
  /external/webkit/WebCore/websockets/
WorkerThreadableWebSocketChannel.cpp 97 WorkerThreadableWebSocketChannel::Peer::Peer(RefPtr<ThreadableWebSocketChannelClientWrapper> clientWrapper, WorkerLoaderProxy& loaderProxy, ScriptExecutionContext* context, const String& taskMode, const KURL& url, const String& protocol)
106 WorkerThreadableWebSocketChannel::Peer::~Peer()
113 void WorkerThreadableWebSocketChannel::Peer::connect()
127 void WorkerThreadableWebSocketChannel::Peer::send(const String& message)
142 void WorkerThreadableWebSocketChannel::Peer::bufferedAmount()
151 void WorkerThreadableWebSocketChannel::Peer::close()
160 void WorkerThreadableWebSocketChannel::Peer::disconnect()
175 void WorkerThreadableWebSocketChannel::Peer::didConnect(
218 Peer* peer = Peer::create(clientWrapper, thisPtr->m_loaderProxy, context, taskMode, url, protocol); local
329 Peer* peer = m_peer; local
    [all...]
  /external/openssl/apps/
s_cb.c 705 } peer; local
718 /* Read peer information */
719 (void)BIO_dgram_get_peer(SSL_get_rbio(ssl), &peer); local
721 /* Create buffer with peer's address and port */
723 switch (peer.sa.sa_family)
727 length += sizeof(peer.s4.sin_port);
732 length += sizeof(peer.s6.sin6_port);
747 switch (peer.sa.sa_family)
751 &peer.s4.sin_port,
752 sizeof(peer.s4.sin_port))
793 } peer; local
800 (void)BIO_dgram_get_peer(SSL_get_rbio(ssl), &peer); local
    [all...]
sess_id.c 234 if (x->peer == NULL)
237 X509_print(out,x->peer);
256 else if (!noout && (x->peer != NULL)) /* just print the certificate */
259 i=(int)i2d_X509_bio(out,x->peer);
261 i=PEM_write_bio_X509(out,x->peer);
  /external/qemu/
charpipe.c 75 struct CharPipeHalf* peer; /* NULL if closed */ member in struct:CharPipeHalf
91 ph->peer = NULL;
99 CharPipeHalf* peer = ph->peer; local
106 if (bip == NULL && peer != NULL && peer->cs->chr_read != NULL) {
107 /* no buffered data, try to write directly to the peer */
111 if (peer->cs->chr_can_read) {
112 size = qemu_chr_can_read( peer->cs );
121 qemu_chr_read( peer->cs, (uint8_t*)buf, size )
158 CharPipeHalf* peer = ph->peer; local
297 CharDriverState* peer = cbuf->endpoint; local
348 CharDriverState* peer = cbuf->endpoint; local
    [all...]
  /external/openssl/crypto/bio/
bss_dgram.c 117 } peer; member in struct:bio_dgram_data_st
294 } peer; member in struct:__anon5462
298 sa.len.i=sizeof(sa.peer);
303 memset(&sa.peer, 0x00, sizeof(sa.peer));
305 ret=recvfrom(b->num,out,outl,0,&sa.peer.sa,(void *)&sa.len);
308 OPENSSL_assert(sa.len.s<=sizeof(sa.peer));
314 BIO_ctrl(b, BIO_CTRL_DGRAM_SET_PEER, 0, &sa.peer);
339 int peerlen = sizeof(data->peer);
341 if (data->peer.sa.sa_family == AF_INET
    [all...]
bss_bio.c 57 * of this kind, handled by the same thread (i.e. the "peer" is actually
127 BIO *peer; /* NULL if buf == NULL. member in struct:bio_bio_st
128 * If peer != NULL, then peer->ptr is also a bio_bio_st,
129 * and its "peer" member points back to us.
130 * peer != NULL iff init != 0 in the BIO. */
132 /* This is for what we write (i.e. reading uses peer's struct): */
133 int closed; /* valid iff peer != NULL */
134 size_t len; /* valid iff buf != NULL; 0 if peer == NULL */
139 size_t request; /* valid iff peer != NULL; 0 if len != 0
    [all...]
  /external/iproute2/ip/
ifcfg 36 echo "Usage: ifcfg DEV [[add|del [ADDR[/LEN]] [PEER] | stop]" 1>&2
81 peer=$1
82 if [ "$peer" != "" ]; then
84 echo "Peer address with non-trivial netmask." 1>&2
87 pfx="$ipaddr peer $peer"
141 elif [ "$peer" != "" ]; then
142 if ping -q -c 2 -w 4 $peer ; then
143 ip ro append default via $peer dev $dev metric 30001
  /external/iptables/libipq/
libipq.c 75 { IPQ_ERR_ADDRLEN, "Invalid peer address length" },
105 (struct sockaddr *)&h->peer, sizeof(h->peer));
133 addrlen = sizeof(h->peer);
166 (struct sockaddr *)&h->peer, &addrlen);
171 if (addrlen != sizeof(h->peer)) {
175 if (h->peer.nl_pid != 0) {
247 memset(&h->peer, 0, sizeof(struct sockaddr_nl));
248 h->peer.nl_family = AF_NETLINK;
249 h->peer.nl_pid = 0
    [all...]
  /frameworks/base/core/java/com/android/internal/os/
ZygoteConnection.java 61 * mSocket is retained in the child process in "peer wait" mode, so
63 * it is closed in the peer.
68 private final Credentials peer; field in class:ZygoteConnection
72 * this peer. If "peer wait" mode is specified, the process that requested
78 * "peer-wait" mode was not requested.
100 peer = mSocket.getPeerCredentials();
102 Log.e(TAG, "Cannot read peer credentials", ex);
201 applyUidSecurityPolicy(parsedArgs, peer);
203 applyRlimitSecurityPolicy(parsedArgs, peer);
    [all...]
  /external/openssl/crypto/evp/
pmeth_fn.c 285 int EVP_PKEY_derive_set_peer(EVP_PKEY_CTX *ctx, EVP_PKEY *peer)
301 ret = ctx->pmeth->ctrl(ctx, EVP_PKEY_CTRL_PEER_KEY, 0, peer);
315 if (ctx->pkey->type != peer->type)
322 /* ran@cryptocom.ru: For clarity. The error is if parameters in peer are
327 if (!EVP_PKEY_missing_parameters(peer) &&
328 !EVP_PKEY_cmp_parameters(ctx->pkey, peer))
337 ctx->peerkey = peer;
339 ret = ctx->pmeth->ctrl(ctx, EVP_PKEY_CTRL_PEER_KEY, 1, peer);
347 CRYPTO_add(&peer->references,1,CRYPTO_LOCK_EVP_PKEY);
  /external/wpa_supplicant_6/wpa_supplicant/src/wps/
wps_upnp.h 29 void *priv, struct upnp_wps_peer *peer);
31 void *priv, struct upnp_wps_peer *peer,
  /external/wpa_supplicant/
wpa_supplicant.h 132 * STAKey negotiation. The caller will need to set peer address for the
244 u8 peer[ETH_ALEN]; member in struct:wpa_event_data::stkstart
  /external/ipsec-tools/src/racoon/
sainfo.c 76 * First pass is for sainfo from a specified peer, second for others.
79 getsainfo(loc, rmt, peer, remoteid)
80 const vchar_t *loc, *rmt, *peer;
87 if (peer == NULL)
104 if (peer == NULL)
107 dpeer = ipsecdoi_id2str(peer);
110 "getsainfo params: loc=\'%s\', rmt=\'%s\', peer=\'%s\', id=%i\n",
133 if (ipsecdoi_chkcmpids(peer, s->id_i, 0))
294 snprintf(buf, 255, "loc=\'%s\', rmt=\'%s\', peer=\'%s\', id=%i",
  /external/dnsmasq/src/
tftp.c 46 struct sockaddr_in addr, peer; local
72 msg.msg_name = &peer;
73 msg.msg_namelen = sizeof(peer);
153 transfer->peer = peer;
194 len = tftp_err(ERR_ILL, packet, _("unsupported request from %s"), inet_ntoa(peer.sin_addr));
244 strncat(daemon->namebuff, inet_ntoa(peer.sin_addr), (MAXDNAME-1) - strlen(daemon->namebuff));
276 (struct sockaddr *)&peer, sizeof(peer)) == -1 && errno == EINTR);
282 my_syslog(MS_TFTP | LOG_INFO, _("TFTP sent %s to %s"), daemon->namebuff, inet_ntoa(peer.sin_addr))
    [all...]
  /external/iptables/include/libipq/
libipq.h 58 struct sockaddr_nl peer; member in struct:ipq_handle
  /external/iproute2/include/
libnetlink.h 15 struct sockaddr_nl peer; member in struct:rtnl_handle
46 extern int rtnl_talk(struct rtnl_handle *rtnl, struct nlmsghdr *n, pid_t peer,
  /external/openssl/ssl/
ssl_asn1.c 286 if (in->peer != NULL)
287 M_ASN1_I2D_len_EXP_opt(in->peer,i2d_X509,3,v3);
328 if (in->peer != NULL)
329 M_ASN1_I2D_put_EXP_opt(in->peer,i2d_X509,3,v3);
487 if (ret->peer != NULL)
489 X509_free(ret->peer);
490 ret->peer=NULL;
492 M_ASN1_D2I_get_EXP_opt(ret->peer,d2i_X509,3);

Completed in 1540 milliseconds

1 2 3 4