/external/wpa_supplicant_8/src/rsn_supp/ |
tdls.c | 81 static void wpa_tdls_peer_free(struct wpa_sm *sm, struct wpa_tdls_peer *peer); 95 u8 rsnie_p[TDLS_MAX_IE_LEN]; /* Peer RSN IE */ 144 static int wpa_tdls_del_key(struct wpa_sm *sm, struct wpa_tdls_peer *peer) 146 if (wpa_sm_set_key(sm, WPA_ALG_NONE, peer->addr, 157 static int wpa_tdls_set_key(struct wpa_sm *sm, struct wpa_tdls_peer *peer) 165 switch (peer->cipher) { 180 if (wpa_sm_set_key(sm, alg, peer->addr, -1, 1, 181 rsc, sizeof(rsc), peer->tpk.tk, key_len) < 0) { 203 struct wpa_tdls_peer *peer; local 223 for (peer = sm->tdls; peer; peer = peer->next) 284 struct wpa_tdls_peer *peer = timeout_ctx; local 582 struct wpa_tdls_peer *peer = timeout_ctx; local 641 struct wpa_tdls_peer *peer; local 731 struct wpa_tdls_peer *peer; local 759 struct wpa_tdls_peer *peer; local 776 struct wpa_tdls_peer *peer = NULL; local 873 struct wpa_tdls_peer *peer; local 1250 struct wpa_tdls_peer *peer; local 1334 struct wpa_tdls_peer *peer; local 1689 struct wpa_tdls_peer *peer; local 1897 struct wpa_tdls_peer *peer; local 2051 struct wpa_tdls_peer *peer; local 2101 struct wpa_tdls_peer *peer; local 2235 struct wpa_tdls_peer *peer, *tmp; local [all...] |
/external/bluetooth/bluez/src/ |
event.h | 26 void btd_event_device_found(bdaddr_t *local, bdaddr_t *peer, uint32_t class, 28 void btd_event_set_legacy_pairing(bdaddr_t *local, bdaddr_t *peer, gboolean legacy); 29 void btd_event_remote_class(bdaddr_t *local, bdaddr_t *peer, uint32_t class); 30 void btd_event_remote_name(bdaddr_t *local, bdaddr_t *peer, uint8_t status, char *name); 31 void btd_event_conn_complete(bdaddr_t *local, bdaddr_t *peer); 32 void btd_event_conn_failed(bdaddr_t *local, bdaddr_t *peer, uint8_t status); 33 void btd_event_disconn_complete(bdaddr_t *local, bdaddr_t *peer); 34 void btd_event_bonding_complete(bdaddr_t *local, bdaddr_t *peer, 36 void btd_event_simple_pairing_complete(bdaddr_t *local, bdaddr_t *peer, uint8_t status); 37 void btd_event_returned_link_key(bdaddr_t *local, bdaddr_t *peer); [all...] |
event.c | 258 void btd_event_bonding_complete(bdaddr_t *local, bdaddr_t *peer, 269 if (!get_adapter_and_device(local, peer, &adapter, &device, create)) 276 void btd_event_simple_pairing_complete(bdaddr_t *local, bdaddr_t *peer, 287 if (!get_adapter_and_device(local, peer, &adapter, &device, create)) 318 void btd_event_device_found(bdaddr_t *local, bdaddr_t *peer, uint32_t class, 329 update_lastseen(local, peer); 330 write_remote_class(local, peer, class); 333 write_remote_eir(local, peer, data); 335 adapter_update_found_devices(adapter, peer, class, rssi, data); 338 void btd_event_set_legacy_pairing(bdaddr_t *local, bdaddr_t *peer, [all...] |
storage.h | 39 int write_remote_class(bdaddr_t *local, bdaddr_t *peer, uint32_t class); 40 int read_remote_class(bdaddr_t *local, bdaddr_t *peer, uint32_t *class); 41 int write_device_name(bdaddr_t *local, bdaddr_t *peer, char *name); 43 int write_remote_eir(bdaddr_t *local, bdaddr_t *peer, uint8_t *data); 44 int read_remote_eir(bdaddr_t *local, bdaddr_t *peer, uint8_t *data); 45 int write_version_info(bdaddr_t *local, bdaddr_t *peer, uint16_t manufacturer, uint8_t lmp_ver, uint16_t lmp_subver); 46 int write_features_info(bdaddr_t *local, bdaddr_t *peer, unsigned char *page1, unsigned char *page2); 47 int read_remote_features(bdaddr_t *local, bdaddr_t *peer, unsigned char *page1, unsigned char *page2); 48 int write_lastseen_info(bdaddr_t *local, bdaddr_t *peer, struct tm *tm); 49 int write_lastused_info(bdaddr_t *local, bdaddr_t *peer, struct tm *tm) [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
ibss_rsn.c | 24 struct ibss_rsn_peer *peer; local 26 for (peer = ibss_rsn->peers; peer; peer = peer->next) 27 if (os_memcmp(addr, peer->addr, ETH_ALEN) == 0) 29 return peer; 33 static void ibss_rsn_free(struct ibss_rsn_peer *peer) 35 wpa_auth_sta_deinit(peer->auth); 36 wpa_sm_deinit(peer->supp) 43 struct ibss_rsn_peer *peer = ctx; local 50 struct ibss_rsn_peer *peer = ctx; local 58 struct ibss_rsn_peer *peer = ctx; local 103 struct ibss_rsn_peer *peer = ctx; local 121 struct ibss_rsn_peer *peer = ctx; local 150 struct ibss_rsn_peer *peer = ctx; local 304 struct ibss_rsn_peer *peer; local 347 struct ibss_rsn_peer *peer = ibss_rsn_get_peer(ibss_rsn, addr); local 435 struct ibss_rsn_peer *peer; local 477 struct ibss_rsn_peer *peer, *prev; local 535 struct ibss_rsn_peer *peer, *prev; local 627 struct ibss_rsn_peer *peer; local [all...] |
/system/core/adb/ |
sockets.c | 54 ** these have no peer anymore, but still packets to 122 if(s->transport == t || (s->peer && s->peer->transport == t)) { 230 if(s->peer) { 231 D("LS(%d): closing peer. peer->id=%d peer->fd=%d\n", 232 s->id, s->peer->id, s->peer->fd); 233 s->peer->peer = 0 511 asocket* peer = s->peer; local [all...] |
jdwp_service.c | 559 asocket* peer = s->peer; local 563 if (peer) { 564 peer->peer = NULL; 565 peer->close(peer); 575 s->peer->close(s->peer); 584 asocket* peer = jdwp->socket.peer local 646 asocket* peer = t->socket.peer; local 657 asocket* peer = s->peer; local [all...] |
/external/bluetooth/bluez/network/ |
connection.c | 75 struct network_peer *peer; member in struct:network_conn 89 struct network_peer *peer = list->data; local 91 if (!strcmp(peer->path, path)) 92 return peer; 118 emit_property_changed(connection, nc->peer->path, 121 emit_property_changed(connection, nc->peer->path, 124 emit_property_changed(connection, nc->peer->path, 127 device_remove_disconnect_watch(nc->peer->device, nc->dc_id); 172 bnep_kill_connection(&nc->peer->dst); 182 info("Network: disconnect %s", nc->peer->path) 353 struct network_peer *peer = data; local 415 struct network_peer *peer = data; local 433 struct network_peer *peer = data; local 502 struct network_peer *peer = data; local 526 struct network_peer *peer; local 549 struct network_peer *peer; local 577 struct network_peer *peer; local [all...] |
/bootable/recovery/minadbd/ |
sockets.c | 54 ** these have no peer anymore, but still packets to 122 if(s->transport == t || (s->peer && s->peer->transport == t)) { 223 if(s->peer) { 224 D("LS(%d): closing peer. peer->id=%d peer->fd=%d\n", 225 s->id, s->peer->id, s->peer->fd); 226 s->peer->peer = 0 470 asocket* peer = s->peer; local [all...] |
/system/core/libcutils/ |
mq.c | 63 /** Request for a connection to another peer. */ 66 /** A connection to another peer. */ 88 // TODO: Use custom headers for master->peer, peer->master, peer->peer. 100 /** A packet which will be sent to a peer. */ 107 /** Connection to peer. Used with CONNECTION. */ 124 /** Represents a remote peer. */ 127 /** Local peer state. You typically have one peer per process. * 191 Peer* peer; member in struct:PeerProxy 304 Peer* peer = peerProxy->peer; local 315 Peer* peer = peerProxy->peer; local 783 Peer* peer = masterProxy->peer; local 895 Peer* peer = masterProxy->peer; local 1094 Peer* peer = calloc(1, sizeof(Peer)); local 1134 Peer* peer = localPeer; local 1202 Peer* peer = localPeer; local [all...] |
/external/openssl/apps/ |
s_cb.c | 771 } peer; local 784 /* Read peer information */ 785 (void)BIO_dgram_get_peer(SSL_get_rbio(ssl), &peer); local 787 /* Create buffer with peer's address and port */ 789 switch (peer.sa.sa_family) 793 length += sizeof(peer.s4.sin_port); 798 length += sizeof(peer.s6.sin6_port); 813 switch (peer.sa.sa_family) 817 &peer.s4.sin_port, 818 sizeof(peer.s4.sin_port)) 859 } peer; local 866 (void)BIO_dgram_get_peer(SSL_get_rbio(ssl), &peer); local [all...] |
sess_id.c | 93 X509 *peer = NULL; local 167 peer = SSL_SESSION_get0_peer(x); 236 if (peer == NULL) 239 X509_print(out,peer); 258 else if (!noout && (peer != NULL)) /* just print the certificate */ 261 i=(int)i2d_X509_bio(out,peer); 263 i=PEM_write_bio_X509(out,peer);
|
/external/qemu/ |
charpipe.c | 75 struct CharPipeHalf* peer; /* NULL if closed */ member in struct:CharPipeHalf 91 ph->peer = NULL; 99 CharPipeHalf* peer = ph->peer; local 106 if (bip == NULL && peer != NULL && peer->cs->chr_read != NULL) { 107 /* no buffered data, try to write directly to the peer */ 111 if (peer->cs->chr_can_read) { 112 size = qemu_chr_can_read( peer->cs ); 121 qemu_chr_read( peer->cs, (uint8_t*)buf, size ) 158 CharPipeHalf* peer = ph->peer; local 297 CharDriverState* peer = cbuf->endpoint; local 348 CharDriverState* peer = cbuf->endpoint; local [all...] |
/external/webkit/Source/WebCore/websockets/ |
WorkerThreadableWebSocketChannel.cpp | 111 WorkerThreadableWebSocketChannel::Peer::Peer(RefPtr<ThreadableWebSocketChannelClientWrapper> clientWrapper, WorkerLoaderProxy& loaderProxy, ScriptExecutionContext* context, const String& taskMode, const KURL& url, const String& protocol) 120 WorkerThreadableWebSocketChannel::Peer::~Peer() 127 void WorkerThreadableWebSocketChannel::Peer::connect() 141 void WorkerThreadableWebSocketChannel::Peer::send(const String& message) 156 void WorkerThreadableWebSocketChannel::Peer::bufferedAmount() 165 void WorkerThreadableWebSocketChannel::Peer::close() 174 void WorkerThreadableWebSocketChannel::Peer::disconnect() 183 void WorkerThreadableWebSocketChannel::Peer::suspend( 248 Peer* peer = Peer::create(clientWrapper, thisPtr->m_loaderProxy, context, taskMode, url, protocol); local 361 Peer* peer = m_peer; local [all...] |
/external/iproute2/ip/ |
ifcfg | 36 echo "Usage: ifcfg DEV [[add|del [ADDR[/LEN]] [PEER] | stop]" 1>&2 81 peer=$1 82 if [ "$peer" != "" ]; then 84 echo "Peer address with non-trivial netmask." 1>&2 87 pfx="$ipaddr peer $peer" 141 elif [ "$peer" != "" ]; then 142 if ping -q -c 2 -w 4 $peer ; then 143 ip ro append default via $peer dev $dev metric 30001
|
/external/chromium/net/http/ |
http_stream_factory_impl_unittest.cc | 105 HttpNetworkSessionPeer peer(session); 108 peer.SetHttpStreamFactory(mock_factory); 218 HttpNetworkSessionPeer peer(session); 223 peer.SetTransportSocketPool(transport_conn_pool); 228 peer.SetSSLSocketPool(ssl_conn_pool); 241 HttpNetworkSessionPeer peer(session); 247 peer.SetSocketPoolForHTTPProxy(proxy_host, http_proxy_pool); 252 peer.SetSocketPoolForSSLWithProxy(proxy_host, ssl_conn_pool); 266 HttpNetworkSessionPeer peer(session); 272 peer.SetSocketPoolForSOCKSProxy(proxy_host, socks_proxy_pool) [all...] |
/external/iptables/libipq/ |
libipq.c | 77 { IPQ_ERR_ADDRLEN, "Invalid peer address length" }, 107 (struct sockaddr *)&h->peer, sizeof(h->peer)); 135 addrlen = sizeof(h->peer); 168 (struct sockaddr *)&h->peer, &addrlen); 173 if (addrlen != sizeof(h->peer)) { 177 if (h->peer.nl_pid != 0) { 249 memset(&h->peer, 0, sizeof(struct sockaddr_nl)); 250 h->peer.nl_family = AF_NETLINK; 251 h->peer.nl_pid = 0 [all...] |
/external/chromium/chrome/common/extensions/ |
extension_localization_peer.cc | 18 webkit_glue::ResourceLoaderBridge::Peer* peer, 21 : original_peer_(peer), 32 webkit_glue::ResourceLoaderBridge::Peer* peer, 40 new ExtensionLocalizationPeer(peer, message_sender, request_url) : NULL;
|
extension_localization_peer.h | 15 // webkit_glue::ResourceLoaderBridge::Peer instance. It is used to pre-process 20 // instance of ExtensionLocalizationPeer based on the original Peer. 22 : public webkit_glue::ResourceLoaderBridge::Peer { 27 webkit_glue::ResourceLoaderBridge::Peer* peer, 32 // ResourceLoaderBridge::Peer methods. 54 webkit_glue::ResourceLoaderBridge::Peer* peer, 62 // Original peer that handles the request once we are done processing data_. 63 webkit_glue::ResourceLoaderBridge::Peer* original_peer_ [all...] |
/external/openssl/crypto/bio/ |
bss_bio.c | 57 * of this kind, handled by the same thread (i.e. the "peer" is actually 127 BIO *peer; /* NULL if buf == NULL. member in struct:bio_bio_st 128 * If peer != NULL, then peer->ptr is also a bio_bio_st, 129 * and its "peer" member points back to us. 130 * peer != NULL iff init != 0 in the BIO. */ 132 /* This is for what we write (i.e. reading uses peer's struct): */ 133 int closed; /* valid iff peer != NULL */ 134 size_t len; /* valid iff buf != NULL; 0 if peer == NULL */ 139 size_t request; /* valid iff peer != NULL; 0 if len != 0 [all...] |
/external/openssl/crypto/evp/ |
pmeth_fn.c | 285 int EVP_PKEY_derive_set_peer(EVP_PKEY_CTX *ctx, EVP_PKEY *peer) 301 ret = ctx->pmeth->ctrl(ctx, EVP_PKEY_CTRL_PEER_KEY, 0, peer); 315 if (ctx->pkey->type != peer->type) 322 /* ran@cryptocom.ru: For clarity. The error is if parameters in peer are 327 if (!EVP_PKEY_missing_parameters(peer) && 328 !EVP_PKEY_cmp_parameters(ctx->pkey, peer)) 337 ctx->peerkey = peer; 339 ret = ctx->pmeth->ctrl(ctx, EVP_PKEY_CTRL_PEER_KEY, 1, peer); 347 CRYPTO_add(&peer->references,1,CRYPTO_LOCK_EVP_PKEY);
|
/external/wpa_supplicant_6/wpa_supplicant/src/wps/ |
wps_upnp.h | 29 void *priv, struct upnp_wps_peer *peer); 31 void *priv, struct upnp_wps_peer *peer,
|
/external/wpa_supplicant_8/src/p2p/ |
p2p_go_neg.c | 50 wpa_hexdump_ascii(MSG_DEBUG, "P2P: Peer country", pos, 3); 53 "P2P: Mismatching country (ours=%c%c peer's=%c%c)", 65 "P2P: Invalid peer Channel List"); 80 "peer reg_classes %d intersection reg_classes %d", 132 struct p2p_device *peer) 142 peer->dialog_token++; 143 if (peer->dialog_token == 0) 144 peer->dialog_token = 1; 145 p2p_buf_add_public_action_hdr(buf, P2P_GO_NEG_REQ, peer->dialog_token); 149 if (peer->flags & P2P_DEV_PREFER_PERSISTENT_GROUP) [all...] |
/frameworks/base/core/java/com/android/internal/os/ |
ZygoteConnection.java | 68 * mSocket is retained in the child process in "peer wait" mode, so 70 * it is closed in the peer. 75 private final Credentials peer; field in class:ZygoteConnection 79 * this peer. If "peer wait" mode is specified, the process that requested 85 * "peer-wait" mode was not requested. 107 peer = mSocket.getPeerCredentials(); 109 Log.e(TAG, "Cannot read peer credentials", ex); 210 applyUidSecurityPolicy(parsedArgs, peer); 211 applyRlimitSecurityPolicy(parsedArgs, peer); [all...] |
/frameworks/base/core/java/android/net/arp/ |
ArpPeer.java | 52 InetAddress peer) throws SocketException { 61 if (myAddr instanceof Inet6Address || peer instanceof Inet6Address) { 65 mPeer = peer; 74 * peer.
|