HomeSort by relevance Sort by last modified time
    Searched full:peer (Results 1 - 25 of 918) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/wpa_supplicant_8/wpa_supplicant/
ibss_rsn.c 27 static void ibss_rsn_free(struct ibss_rsn_peer *peer)
29 wpa_auth_sta_deinit(peer->auth);
30 wpa_sm_deinit(peer->supp);
31 os_free(peer);
37 struct ibss_rsn_peer *peer = ctx; local
38 peer->supp_state = state;
44 struct ibss_rsn_peer *peer = ctx; local
45 return peer->supp_state;
52 struct ibss_rsn_peer *peer = ctx; local
53 struct wpa_supplicant *wpa_s = peer->ibss_rsn->wpa_s
97 struct ibss_rsn_peer *peer = ctx; local
115 struct ibss_rsn_peer *peer = ctx; local
144 struct ibss_rsn_peer *peer = ctx; local
298 struct ibss_rsn_peer *peer; local
379 struct ibss_rsn_peer *peer; local
423 struct ibss_rsn_peer *peer, *prev; local
481 struct ibss_rsn_peer *peer, *prev; local
573 struct ibss_rsn_peer *peer; local
    [all...]
  /external/wpa_supplicant_8/src/rsn_supp/
tdls.c 87 static void wpa_tdls_peer_free(struct wpa_sm *sm, struct wpa_tdls_peer *peer);
99 u8 rsnie_p[TDLS_MAX_IE_LEN]; /* Peer RSN IE */
143 static int wpa_tdls_del_key(struct wpa_sm *sm, struct wpa_tdls_peer *peer)
145 if (wpa_sm_set_key(sm, WPA_ALG_NONE, peer->addr,
156 static int wpa_tdls_set_key(struct wpa_sm *sm, struct wpa_tdls_peer *peer)
164 switch (peer->cipher) {
179 if (wpa_sm_set_key(sm, alg, peer->addr, -1, 1,
180 rsc, sizeof(rsc), peer->tpk.tk, key_len) < 0) {
202 struct wpa_tdls_peer *peer; local
220 for (peer = sm->tdls; peer; peer = peer->next)
260 struct wpa_tdls_peer *peer = timeout_ctx; local
562 struct wpa_tdls_peer *peer = timeout_ctx; local
621 struct wpa_tdls_peer *peer; local
711 struct wpa_tdls_peer *peer = NULL; local
1150 struct wpa_tdls_peer *peer; local
1477 struct wpa_tdls_peer *peer; local
1673 struct wpa_tdls_peer *peer; local
1823 struct wpa_tdls_peer *peer; local
1871 struct wpa_tdls_peer *peer; local
1978 struct wpa_tdls_peer *peer, *tmp; local
    [all...]
  /system/core/libcutils/
mq.c 63 /** Request for a connection to another peer. */
66 /** A connection to another peer. */
88 // TODO: Use custom headers for master->peer, peer->master, peer->peer.
100 /** A packet which will be sent to a peer. */
107 /** Connection to peer. Used with CONNECTION. */
124 /** Represents a remote peer. */
127 /** Local peer state. You typically have one peer per process. *
191 Peer* peer; member in struct:PeerProxy
304 Peer* peer = peerProxy->peer; local
315 Peer* peer = peerProxy->peer; local
783 Peer* peer = masterProxy->peer; local
895 Peer* peer = masterProxy->peer; local
1094 Peer* peer = calloc(1, sizeof(Peer)); local
1134 Peer* peer = localPeer; local
1202 Peer* peer = localPeer; local
    [all...]
  /external/bluetooth/bluez/src/
event.h 26 void btd_event_device_found(bdaddr_t *local, bdaddr_t *peer, uint32_t class,
28 void btd_event_set_legacy_pairing(bdaddr_t *local, bdaddr_t *peer, gboolean legacy);
29 void btd_event_remote_class(bdaddr_t *local, bdaddr_t *peer, uint32_t class);
30 void btd_event_remote_name(bdaddr_t *local, bdaddr_t *peer, uint8_t status, char *name);
31 void btd_event_conn_complete(bdaddr_t *local, bdaddr_t *peer);
32 void btd_event_conn_failed(bdaddr_t *local, bdaddr_t *peer, uint8_t status);
33 void btd_event_disconn_complete(bdaddr_t *local, bdaddr_t *peer);
34 void btd_event_bonding_complete(bdaddr_t *local, bdaddr_t *peer,
36 void btd_event_simple_pairing_complete(bdaddr_t *local, bdaddr_t *peer, uint8_t status);
37 void btd_event_returned_link_key(bdaddr_t *local, bdaddr_t *peer);
    [all...]
event.c 258 void btd_event_bonding_complete(bdaddr_t *local, bdaddr_t *peer,
269 if (!get_adapter_and_device(local, peer, &adapter, &device, create))
276 void btd_event_simple_pairing_complete(bdaddr_t *local, bdaddr_t *peer,
287 if (!get_adapter_and_device(local, peer, &adapter, &device, create))
318 void btd_event_device_found(bdaddr_t *local, bdaddr_t *peer, uint32_t class,
329 update_lastseen(local, peer);
330 write_remote_class(local, peer, class);
333 write_remote_eir(local, peer, data);
335 adapter_update_found_devices(adapter, peer, class, rssi, data);
338 void btd_event_set_legacy_pairing(bdaddr_t *local, bdaddr_t *peer,
    [all...]
storage.h 39 int write_remote_class(bdaddr_t *local, bdaddr_t *peer, uint32_t class);
40 int read_remote_class(bdaddr_t *local, bdaddr_t *peer, uint32_t *class);
41 int write_device_name(bdaddr_t *local, bdaddr_t *peer, char *name);
43 int write_remote_eir(bdaddr_t *local, bdaddr_t *peer, uint8_t *data);
44 int read_remote_eir(bdaddr_t *local, bdaddr_t *peer, uint8_t *data);
45 int write_version_info(bdaddr_t *local, bdaddr_t *peer, uint16_t manufacturer, uint8_t lmp_ver, uint16_t lmp_subver);
46 int write_features_info(bdaddr_t *local, bdaddr_t *peer, unsigned char *page1, unsigned char *page2);
47 int read_remote_features(bdaddr_t *local, bdaddr_t *peer, unsigned char *page1, unsigned char *page2);
48 int write_lastseen_info(bdaddr_t *local, bdaddr_t *peer, struct tm *tm);
49 int write_lastused_info(bdaddr_t *local, bdaddr_t *peer, struct tm *tm)
    [all...]
  /external/webkit/Source/WebCore/websockets/
WorkerThreadableWebSocketChannel.cpp 111 WorkerThreadableWebSocketChannel::Peer::Peer(RefPtr<ThreadableWebSocketChannelClientWrapper> clientWrapper, WorkerLoaderProxy& loaderProxy, ScriptExecutionContext* context, const String& taskMode, const KURL& url, const String& protocol)
120 WorkerThreadableWebSocketChannel::Peer::~Peer()
127 void WorkerThreadableWebSocketChannel::Peer::connect()
141 void WorkerThreadableWebSocketChannel::Peer::send(const String& message)
156 void WorkerThreadableWebSocketChannel::Peer::bufferedAmount()
165 void WorkerThreadableWebSocketChannel::Peer::close()
174 void WorkerThreadableWebSocketChannel::Peer::disconnect()
183 void WorkerThreadableWebSocketChannel::Peer::suspend(
248 Peer* peer = Peer::create(clientWrapper, thisPtr->m_loaderProxy, context, taskMode, url, protocol); local
361 Peer* peer = m_peer; local
    [all...]
WorkerThreadableWebSocketChannel.h 79 // Generated by the bridge. The Peer and its bridge should have identical
81 class Peer : public WebSocketChannelClient {
82 WTF_MAKE_NONCOPYABLE(Peer); WTF_MAKE_FAST_ALLOCATED;
84 static Peer* create(RefPtr<ThreadableWebSocketChannelClientWrapper> clientWrapper, WorkerLoaderProxy& loaderProxy, ScriptExecutionContext* context, const String& taskMode, const KURL& url, const String& protocol)
86 return new Peer(clientWrapper, loaderProxy, context, taskMode, url, protocol);
88 ~Peer();
103 Peer(RefPtr<ThreadableWebSocketChannelClientWrapper>, WorkerLoaderProxy&, ScriptExecutionContext*, const String& taskMode, const KURL&, const String& protocol);
111 // Bridge for Peer. Running on the worker thread.
133 static void setWebSocketChannel(ScriptExecutionContext*, Bridge* thisPtr, Peer*, RefPtr<ThreadableWebSocketChannelClientWrapper>);
135 // Executed on the main thread to create a Peer for this bridge
    [all...]
  /external/bluetooth/bluez/network/
connection.c 75 struct network_peer *peer; member in struct:network_conn
89 struct network_peer *peer = list->data; local
91 if (!strcmp(peer->path, path))
92 return peer;
118 emit_property_changed(connection, nc->peer->path,
121 emit_property_changed(connection, nc->peer->path,
124 emit_property_changed(connection, nc->peer->path,
127 device_remove_disconnect_watch(nc->peer->device, nc->dc_id);
172 bnep_kill_connection(&nc->peer->dst);
182 info("Network: disconnect %s", nc->peer->path)
353 struct network_peer *peer = data; local
415 struct network_peer *peer = data; local
433 struct network_peer *peer = data; local
502 struct network_peer *peer = data; local
526 struct network_peer *peer; local
549 struct network_peer *peer; local
577 struct network_peer *peer; local
    [all...]
  /external/chromium/chrome/common/extensions/
extension_localization_peer.h 15 // webkit_glue::ResourceLoaderBridge::Peer instance. It is used to pre-process
20 // instance of ExtensionLocalizationPeer based on the original Peer.
22 : public webkit_glue::ResourceLoaderBridge::Peer {
27 webkit_glue::ResourceLoaderBridge::Peer* peer,
32 // ResourceLoaderBridge::Peer methods.
54 webkit_glue::ResourceLoaderBridge::Peer* peer,
62 // Original peer that handles the request once we are done processing data_.
63 webkit_glue::ResourceLoaderBridge::Peer* original_peer_
    [all...]
extension_localization_peer.cc 18 webkit_glue::ResourceLoaderBridge::Peer* peer,
21 : original_peer_(peer),
32 webkit_glue::ResourceLoaderBridge::Peer* peer,
40 new ExtensionLocalizationPeer(peer, message_sender, request_url) : NULL;
  /system/core/adb/
sockets.c 54 ** these have no peer anymore, but still packets to
122 if(s->transport == t || (s->peer && s->peer->transport == t)) {
223 if(s->peer) {
224 D("LS(%d): closing peer. peer->id=%d peer->fd=%d\n",
225 s->id, s->peer->id, s->peer->fd);
226 s->peer->peer = 0
494 asocket* peer = s->peer; local
    [all...]
  /libcore/luni/src/main/java/javax/net/ssl/
HandshakeCompletedEvent.java 67 * certificates were sent to the peer.
78 * Return the list of certificates identifying the peer during the
81 * @return the list of certificates identifying the peer with the peer's
84 * if the identity of the peer has not been verified.
91 * Returns the list of certificates identifying the peer. The peer's
97 * @return the list of certificates identifying the peer
99 * if the identity of the peer has not been verified.
106 * Returns the {@code Principal} identifying the peer
    [all...]
SSLSession.java 69 * side to the peer during the handshake.
77 * Returns the principal used to identify the local side to the peer during
92 * Returns the list of certificates the peer used to identify itself during
101 * if the identity of the peer is not verified.
106 * Returns the list of certificates the peer used to identify itself during
112 * if the identity of the peer is not verified.
117 * Returns the host name of the peer of this session. The host name is not
120 * @return the host name of the peer of this session, or {@code null} if no
126 * Returns the port number of the peer of this session. The port number is
129 * @return the port number of the peer, of {@code -1} is no port number i
    [all...]
  /external/wpa_supplicant_8/src/ap/
ap_mlme.c 46 * relationship with a specific peer MAC entity
48 * @sta: peer STA data
51 * authentication relationship with a specific peer MAC entity that
53 * that specific peer MAC entity.
72 * authentication relationship with a specific peer MAC entity
74 * @sta: Peer STA data
78 * authentication relationship with a specific peer MAC entity.
95 * a specific peer MAC entity
97 * @sta: peer STA data
100 * association with a specific peer MAC entity that resulted from a
    [all...]
  /external/qemu/
charpipe.c 75 struct CharPipeHalf* peer; /* NULL if closed */ member in struct:CharPipeHalf
91 ph->peer = NULL;
99 CharPipeHalf* peer = ph->peer; local
106 if (bip == NULL && peer != NULL && peer->cs->chr_read != NULL) {
107 /* no buffered data, try to write directly to the peer */
111 if (peer->cs->chr_can_read) {
112 size = qemu_chr_can_read( peer->cs );
121 qemu_chr_read( peer->cs, (uint8_t*)buf, size )
158 CharPipeHalf* peer = ph->peer; local
297 CharDriverState* peer = cbuf->endpoint; local
348 CharDriverState* peer = cbuf->endpoint; local
    [all...]
  /external/chromium/third_party/libjingle/source/talk/base/
sslstreamadapter.h 44 // peer-to-peer mode.
64 // only used in the peer-to-peer mode (unless we actually want to
72 // the peer-to-peer mode.
95 // StartSSLWithPeer starts negotiation in the special peer-to-peer
104 // Specify the certificate that our peer is expected to use in
105 // peer-to-peer mode. Only this certificate will be accepted durin
    [all...]
  /system/core/include/sysutils/
SocketClient.h 14 /* Peer process ID */
17 /* Peer user ID */
20 /* Peer group ID */
  /external/chromium/chrome/browser/extensions/
extension_function_dispatcher.h 53 // The peer object allows us to notify ExtensionFunctions when we are
56 struct Peer : public base::RefCounted<Peer> {
57 explicit Peer(ExtensionFunctionDispatcher* dispatcher)
62 friend class base::RefCounted<Peer>;
64 ~Peer() {}
137 scoped_refptr<Peer> peer_;
  /external/chromium/net/http/
http_stream_factory_impl_unittest.cc 105 HttpNetworkSessionPeer peer(session);
108 peer.SetHttpStreamFactory(mock_factory);
218 HttpNetworkSessionPeer peer(session);
223 peer.SetTransportSocketPool(transport_conn_pool);
228 peer.SetSSLSocketPool(ssl_conn_pool);
241 HttpNetworkSessionPeer peer(session);
247 peer.SetSocketPoolForHTTPProxy(proxy_host, http_proxy_pool);
252 peer.SetSocketPoolForSSLWithProxy(proxy_host, ssl_conn_pool);
266 HttpNetworkSessionPeer peer(session);
272 peer.SetSocketPoolForSOCKSProxy(proxy_host, socks_proxy_pool)
    [all...]
  /external/openssl/crypto/bio/
bss_dgram.c 117 } peer; member in struct:bio_dgram_data_st
294 } peer; member in struct:__anon8917
298 sa.len.i=sizeof(sa.peer);
303 memset(&sa.peer, 0x00, sizeof(sa.peer));
305 ret=recvfrom(b->num,out,outl,0,&sa.peer.sa,(void *)&sa.len);
308 OPENSSL_assert(sa.len.s<=sizeof(sa.peer));
313 BIO_ctrl(b, BIO_CTRL_DGRAM_SET_PEER, 0, &sa.peer);
340 int peerlen = sizeof(data->peer);
342 if (data->peer.sa.sa_family == AF_INET
    [all...]
  /external/iptables/libipq/
libipq.c 77 { IPQ_ERR_ADDRLEN, "Invalid peer address length" },
107 (struct sockaddr *)&h->peer, sizeof(h->peer));
135 addrlen = sizeof(h->peer);
168 (struct sockaddr *)&h->peer, &addrlen);
173 if (addrlen != sizeof(h->peer)) {
177 if (h->peer.nl_pid != 0) {
249 memset(&h->peer, 0, sizeof(struct sockaddr_nl));
250 h->peer.nl_family = AF_NETLINK;
251 h->peer.nl_pid = 0
    [all...]
  /frameworks/base/core/java/com/android/internal/os/
ZygoteConnection.java 68 * mSocket is retained in the child process in "peer wait" mode, so
70 * it is closed in the peer.
75 private final Credentials peer; field in class:ZygoteConnection
79 * this peer. If "peer wait" mode is specified, the process that requested
85 * "peer-wait" mode was not requested.
107 peer = mSocket.getPeerCredentials();
109 Log.e(TAG, "Cannot read peer credentials", ex);
210 applyUidSecurityPolicy(parsedArgs, peer);
211 applyRlimitSecurityPolicy(parsedArgs, peer);
    [all...]
  /external/ppp/pppd/
ipcp.h 71 bool req_addr; /* Ask peer to send IP address? */
73 bool proxy_arp; /* Make proxy ARP entry for peer? */
76 bool accept_local; /* accept peer's value for ouraddr */
77 bool accept_remote; /* accept peer's value for hisaddr */
78 bool req_dns1; /* Ask peer to send primary DNS address? */
79 bool req_dns2; /* Ask peer to send secondary DNS address? */
  /external/qemu/slirp/
socket.h 58 * Socket state bits. (peer means the host on the Internet,
63 #define SS_ISFCONNECTING 0x002 /* Socket is connecting to peer (non-blocking connect()'s) */
64 #define SS_ISFCONNECTED 0x004 /* Socket is connected to peer */
65 #define SS_FCANTRCVMORE 0x008 /* Socket can't receive more from peer (for half-closes) */
66 #define SS_FCANTSENDMORE 0x010 /* Socket can't send more to peer (for half-closes) */
67 /* #define SS_ISFDISCONNECTED 0x020*/ /* Socket has disconnected from peer, in 2MSL state */

Completed in 344 milliseconds

1 2 3 4 5 6 7 8 91011>>