/external/wpa_supplicant_8/wpa_supplicant/ |
ibss_rsn.c | 27 static void ibss_rsn_free(struct ibss_rsn_peer *peer) 29 wpa_auth_sta_deinit(peer->auth); 30 wpa_sm_deinit(peer->supp); 31 os_free(peer); 37 struct ibss_rsn_peer *peer = ctx; local 38 peer->supp_state = state; 44 struct ibss_rsn_peer *peer = ctx; local 45 return peer->supp_state; 52 struct ibss_rsn_peer *peer = ctx; local 53 struct wpa_supplicant *wpa_s = peer->ibss_rsn->wpa_s 97 struct ibss_rsn_peer *peer = ctx; local 115 struct ibss_rsn_peer *peer = ctx; local 144 struct ibss_rsn_peer *peer = ctx; local 298 struct ibss_rsn_peer *peer; local 379 struct ibss_rsn_peer *peer; local 423 struct ibss_rsn_peer *peer, *prev; local 481 struct ibss_rsn_peer *peer, *prev; local 573 struct ibss_rsn_peer *peer; local [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
tdls.c | 87 static void wpa_tdls_peer_free(struct wpa_sm *sm, struct wpa_tdls_peer *peer); 99 u8 rsnie_p[TDLS_MAX_IE_LEN]; /* Peer RSN IE */ 143 static int wpa_tdls_del_key(struct wpa_sm *sm, struct wpa_tdls_peer *peer) 145 if (wpa_sm_set_key(sm, WPA_ALG_NONE, peer->addr, 156 static int wpa_tdls_set_key(struct wpa_sm *sm, struct wpa_tdls_peer *peer) 164 switch (peer->cipher) { 179 if (wpa_sm_set_key(sm, alg, peer->addr, -1, 1, 180 rsc, sizeof(rsc), peer->tpk.tk, key_len) < 0) { 202 struct wpa_tdls_peer *peer; local 220 for (peer = sm->tdls; peer; peer = peer->next) 260 struct wpa_tdls_peer *peer = timeout_ctx; local 562 struct wpa_tdls_peer *peer = timeout_ctx; local 621 struct wpa_tdls_peer *peer; local 711 struct wpa_tdls_peer *peer = NULL; local 1150 struct wpa_tdls_peer *peer; local 1477 struct wpa_tdls_peer *peer; local 1673 struct wpa_tdls_peer *peer; local 1823 struct wpa_tdls_peer *peer; local 1871 struct wpa_tdls_peer *peer; local 1978 struct wpa_tdls_peer *peer, *tmp; local [all...] |
/system/core/libcutils/ |
mq.c | 63 /** Request for a connection to another peer. */ 66 /** A connection to another peer. */ 88 // TODO: Use custom headers for master->peer, peer->master, peer->peer. 100 /** A packet which will be sent to a peer. */ 107 /** Connection to peer. Used with CONNECTION. */ 124 /** Represents a remote peer. */ 127 /** Local peer state. You typically have one peer per process. * 191 Peer* peer; member in struct:PeerProxy 304 Peer* peer = peerProxy->peer; local 315 Peer* peer = peerProxy->peer; local 783 Peer* peer = masterProxy->peer; local 895 Peer* peer = masterProxy->peer; local 1094 Peer* peer = calloc(1, sizeof(Peer)); local 1134 Peer* peer = localPeer; local 1202 Peer* peer = localPeer; local [all...] |
/external/bluetooth/bluez/src/ |
event.h | 26 void btd_event_device_found(bdaddr_t *local, bdaddr_t *peer, uint32_t class, 28 void btd_event_set_legacy_pairing(bdaddr_t *local, bdaddr_t *peer, gboolean legacy); 29 void btd_event_remote_class(bdaddr_t *local, bdaddr_t *peer, uint32_t class); 30 void btd_event_remote_name(bdaddr_t *local, bdaddr_t *peer, uint8_t status, char *name); 31 void btd_event_conn_complete(bdaddr_t *local, bdaddr_t *peer); 32 void btd_event_conn_failed(bdaddr_t *local, bdaddr_t *peer, uint8_t status); 33 void btd_event_disconn_complete(bdaddr_t *local, bdaddr_t *peer); 34 void btd_event_bonding_complete(bdaddr_t *local, bdaddr_t *peer, 36 void btd_event_simple_pairing_complete(bdaddr_t *local, bdaddr_t *peer, uint8_t status); 37 void btd_event_returned_link_key(bdaddr_t *local, bdaddr_t *peer); [all...] |
event.c | 258 void btd_event_bonding_complete(bdaddr_t *local, bdaddr_t *peer, 269 if (!get_adapter_and_device(local, peer, &adapter, &device, create)) 276 void btd_event_simple_pairing_complete(bdaddr_t *local, bdaddr_t *peer, 287 if (!get_adapter_and_device(local, peer, &adapter, &device, create)) 318 void btd_event_device_found(bdaddr_t *local, bdaddr_t *peer, uint32_t class, 329 update_lastseen(local, peer); 330 write_remote_class(local, peer, class); 333 write_remote_eir(local, peer, data); 335 adapter_update_found_devices(adapter, peer, class, rssi, data); 338 void btd_event_set_legacy_pairing(bdaddr_t *local, bdaddr_t *peer, [all...] |
storage.h | 39 int write_remote_class(bdaddr_t *local, bdaddr_t *peer, uint32_t class); 40 int read_remote_class(bdaddr_t *local, bdaddr_t *peer, uint32_t *class); 41 int write_device_name(bdaddr_t *local, bdaddr_t *peer, char *name); 43 int write_remote_eir(bdaddr_t *local, bdaddr_t *peer, uint8_t *data); 44 int read_remote_eir(bdaddr_t *local, bdaddr_t *peer, uint8_t *data); 45 int write_version_info(bdaddr_t *local, bdaddr_t *peer, uint16_t manufacturer, uint8_t lmp_ver, uint16_t lmp_subver); 46 int write_features_info(bdaddr_t *local, bdaddr_t *peer, unsigned char *page1, unsigned char *page2); 47 int read_remote_features(bdaddr_t *local, bdaddr_t *peer, unsigned char *page1, unsigned char *page2); 48 int write_lastseen_info(bdaddr_t *local, bdaddr_t *peer, struct tm *tm); 49 int write_lastused_info(bdaddr_t *local, bdaddr_t *peer, struct tm *tm) [all...] |
/external/webkit/Source/WebCore/websockets/ |
WorkerThreadableWebSocketChannel.cpp | 111 WorkerThreadableWebSocketChannel::Peer::Peer(RefPtr<ThreadableWebSocketChannelClientWrapper> clientWrapper, WorkerLoaderProxy& loaderProxy, ScriptExecutionContext* context, const String& taskMode, const KURL& url, const String& protocol) 120 WorkerThreadableWebSocketChannel::Peer::~Peer() 127 void WorkerThreadableWebSocketChannel::Peer::connect() 141 void WorkerThreadableWebSocketChannel::Peer::send(const String& message) 156 void WorkerThreadableWebSocketChannel::Peer::bufferedAmount() 165 void WorkerThreadableWebSocketChannel::Peer::close() 174 void WorkerThreadableWebSocketChannel::Peer::disconnect() 183 void WorkerThreadableWebSocketChannel::Peer::suspend( 248 Peer* peer = Peer::create(clientWrapper, thisPtr->m_loaderProxy, context, taskMode, url, protocol); local 361 Peer* peer = m_peer; local [all...] |
WorkerThreadableWebSocketChannel.h | 79 // Generated by the bridge. The Peer and its bridge should have identical 81 class Peer : public WebSocketChannelClient { 82 WTF_MAKE_NONCOPYABLE(Peer); WTF_MAKE_FAST_ALLOCATED; 84 static Peer* create(RefPtr<ThreadableWebSocketChannelClientWrapper> clientWrapper, WorkerLoaderProxy& loaderProxy, ScriptExecutionContext* context, const String& taskMode, const KURL& url, const String& protocol) 86 return new Peer(clientWrapper, loaderProxy, context, taskMode, url, protocol); 88 ~Peer(); 103 Peer(RefPtr<ThreadableWebSocketChannelClientWrapper>, WorkerLoaderProxy&, ScriptExecutionContext*, const String& taskMode, const KURL&, const String& protocol); 111 // Bridge for Peer. Running on the worker thread. 133 static void setWebSocketChannel(ScriptExecutionContext*, Bridge* thisPtr, Peer*, RefPtr<ThreadableWebSocketChannelClientWrapper>); 135 // Executed on the main thread to create a Peer for this bridge [all...] |
/external/bluetooth/bluez/network/ |
connection.c | 75 struct network_peer *peer; member in struct:network_conn 89 struct network_peer *peer = list->data; local 91 if (!strcmp(peer->path, path)) 92 return peer; 118 emit_property_changed(connection, nc->peer->path, 121 emit_property_changed(connection, nc->peer->path, 124 emit_property_changed(connection, nc->peer->path, 127 device_remove_disconnect_watch(nc->peer->device, nc->dc_id); 172 bnep_kill_connection(&nc->peer->dst); 182 info("Network: disconnect %s", nc->peer->path) 353 struct network_peer *peer = data; local 415 struct network_peer *peer = data; local 433 struct network_peer *peer = data; local 502 struct network_peer *peer = data; local 526 struct network_peer *peer; local 549 struct network_peer *peer; local 577 struct network_peer *peer; local [all...] |
/external/chromium/chrome/common/extensions/ |
extension_localization_peer.h | 15 // webkit_glue::ResourceLoaderBridge::Peer instance. It is used to pre-process 20 // instance of ExtensionLocalizationPeer based on the original Peer. 22 : public webkit_glue::ResourceLoaderBridge::Peer { 27 webkit_glue::ResourceLoaderBridge::Peer* peer, 32 // ResourceLoaderBridge::Peer methods. 54 webkit_glue::ResourceLoaderBridge::Peer* peer, 62 // Original peer that handles the request once we are done processing data_. 63 webkit_glue::ResourceLoaderBridge::Peer* original_peer_ [all...] |
extension_localization_peer.cc | 18 webkit_glue::ResourceLoaderBridge::Peer* peer, 21 : original_peer_(peer), 32 webkit_glue::ResourceLoaderBridge::Peer* peer, 40 new ExtensionLocalizationPeer(peer, message_sender, request_url) : NULL;
|
/system/core/adb/ |
sockets.c | 54 ** these have no peer anymore, but still packets to 122 if(s->transport == t || (s->peer && s->peer->transport == t)) { 223 if(s->peer) { 224 D("LS(%d): closing peer. peer->id=%d peer->fd=%d\n", 225 s->id, s->peer->id, s->peer->fd); 226 s->peer->peer = 0 494 asocket* peer = s->peer; local [all...] |
/libcore/luni/src/main/java/javax/net/ssl/ |
HandshakeCompletedEvent.java | 67 * certificates were sent to the peer. 78 * Return the list of certificates identifying the peer during the 81 * @return the list of certificates identifying the peer with the peer's 84 * if the identity of the peer has not been verified. 91 * Returns the list of certificates identifying the peer. The peer's 97 * @return the list of certificates identifying the peer 99 * if the identity of the peer has not been verified. 106 * Returns the {@code Principal} identifying the peer [all...] |
SSLSession.java | 69 * side to the peer during the handshake. 77 * Returns the principal used to identify the local side to the peer during 92 * Returns the list of certificates the peer used to identify itself during 101 * if the identity of the peer is not verified. 106 * Returns the list of certificates the peer used to identify itself during 112 * if the identity of the peer is not verified. 117 * Returns the host name of the peer of this session. The host name is not 120 * @return the host name of the peer of this session, or {@code null} if no 126 * Returns the port number of the peer of this session. The port number is 129 * @return the port number of the peer, of {@code -1} is no port number i [all...] |
/external/wpa_supplicant_8/src/ap/ |
ap_mlme.c | 46 * relationship with a specific peer MAC entity 48 * @sta: peer STA data 51 * authentication relationship with a specific peer MAC entity that 53 * that specific peer MAC entity. 72 * authentication relationship with a specific peer MAC entity 74 * @sta: Peer STA data 78 * authentication relationship with a specific peer MAC entity. 95 * a specific peer MAC entity 97 * @sta: peer STA data 100 * association with a specific peer MAC entity that resulted from a [all...] |
/external/qemu/ |
charpipe.c | 75 struct CharPipeHalf* peer; /* NULL if closed */ member in struct:CharPipeHalf 91 ph->peer = NULL; 99 CharPipeHalf* peer = ph->peer; local 106 if (bip == NULL && peer != NULL && peer->cs->chr_read != NULL) { 107 /* no buffered data, try to write directly to the peer */ 111 if (peer->cs->chr_can_read) { 112 size = qemu_chr_can_read( peer->cs ); 121 qemu_chr_read( peer->cs, (uint8_t*)buf, size ) 158 CharPipeHalf* peer = ph->peer; local 297 CharDriverState* peer = cbuf->endpoint; local 348 CharDriverState* peer = cbuf->endpoint; local [all...] |
/external/chromium/third_party/libjingle/source/talk/base/ |
sslstreamadapter.h | 44 // peer-to-peer mode. 64 // only used in the peer-to-peer mode (unless we actually want to 72 // the peer-to-peer mode. 95 // StartSSLWithPeer starts negotiation in the special peer-to-peer 104 // Specify the certificate that our peer is expected to use in 105 // peer-to-peer mode. Only this certificate will be accepted durin [all...] |
/system/core/include/sysutils/ |
SocketClient.h | 14 /* Peer process ID */ 17 /* Peer user ID */ 20 /* Peer group ID */
|
/external/chromium/chrome/browser/extensions/ |
extension_function_dispatcher.h | 53 // The peer object allows us to notify ExtensionFunctions when we are 56 struct Peer : public base::RefCounted<Peer> { 57 explicit Peer(ExtensionFunctionDispatcher* dispatcher) 62 friend class base::RefCounted<Peer>; 64 ~Peer() {} 137 scoped_refptr<Peer> peer_;
|
/external/chromium/net/http/ |
http_stream_factory_impl_unittest.cc | 105 HttpNetworkSessionPeer peer(session); 108 peer.SetHttpStreamFactory(mock_factory); 218 HttpNetworkSessionPeer peer(session); 223 peer.SetTransportSocketPool(transport_conn_pool); 228 peer.SetSSLSocketPool(ssl_conn_pool); 241 HttpNetworkSessionPeer peer(session); 247 peer.SetSocketPoolForHTTPProxy(proxy_host, http_proxy_pool); 252 peer.SetSocketPoolForSSLWithProxy(proxy_host, ssl_conn_pool); 266 HttpNetworkSessionPeer peer(session); 272 peer.SetSocketPoolForSOCKSProxy(proxy_host, socks_proxy_pool) [all...] |
/external/openssl/crypto/bio/ |
bss_dgram.c | 117 } peer; member in struct:bio_dgram_data_st 294 } peer; member in struct:__anon8917 298 sa.len.i=sizeof(sa.peer); 303 memset(&sa.peer, 0x00, sizeof(sa.peer)); 305 ret=recvfrom(b->num,out,outl,0,&sa.peer.sa,(void *)&sa.len); 308 OPENSSL_assert(sa.len.s<=sizeof(sa.peer)); 313 BIO_ctrl(b, BIO_CTRL_DGRAM_SET_PEER, 0, &sa.peer); 340 int peerlen = sizeof(data->peer); 342 if (data->peer.sa.sa_family == AF_INET [all...] |
/external/iptables/libipq/ |
libipq.c | 77 { IPQ_ERR_ADDRLEN, "Invalid peer address length" }, 107 (struct sockaddr *)&h->peer, sizeof(h->peer)); 135 addrlen = sizeof(h->peer); 168 (struct sockaddr *)&h->peer, &addrlen); 173 if (addrlen != sizeof(h->peer)) { 177 if (h->peer.nl_pid != 0) { 249 memset(&h->peer, 0, sizeof(struct sockaddr_nl)); 250 h->peer.nl_family = AF_NETLINK; 251 h->peer.nl_pid = 0 [all...] |
/frameworks/base/core/java/com/android/internal/os/ |
ZygoteConnection.java | 68 * mSocket is retained in the child process in "peer wait" mode, so 70 * it is closed in the peer. 75 private final Credentials peer; field in class:ZygoteConnection 79 * this peer. If "peer wait" mode is specified, the process that requested 85 * "peer-wait" mode was not requested. 107 peer = mSocket.getPeerCredentials(); 109 Log.e(TAG, "Cannot read peer credentials", ex); 210 applyUidSecurityPolicy(parsedArgs, peer); 211 applyRlimitSecurityPolicy(parsedArgs, peer); [all...] |
/external/ppp/pppd/ |
ipcp.h | 71 bool req_addr; /* Ask peer to send IP address? */ 73 bool proxy_arp; /* Make proxy ARP entry for peer? */ 76 bool accept_local; /* accept peer's value for ouraddr */ 77 bool accept_remote; /* accept peer's value for hisaddr */ 78 bool req_dns1; /* Ask peer to send primary DNS address? */ 79 bool req_dns2; /* Ask peer to send secondary DNS address? */
|
/external/qemu/slirp/ |
socket.h | 58 * Socket state bits. (peer means the host on the Internet, 63 #define SS_ISFCONNECTING 0x002 /* Socket is connecting to peer (non-blocking connect()'s) */ 64 #define SS_ISFCONNECTED 0x004 /* Socket is connected to peer */ 65 #define SS_FCANTRCVMORE 0x008 /* Socket can't receive more from peer (for half-closes) */ 66 #define SS_FCANTSENDMORE 0x010 /* Socket can't send more to peer (for half-closes) */ 67 /* #define SS_ISFDISCONNECTED 0x020*/ /* Socket has disconnected from peer, in 2MSL state */
|