/external/qemu/ |
qemu-sockets.c | 289 /* connect to peer */ 311 struct addrinfo ai, *peer = NULL, *local = NULL; local 318 /* lookup peer addr */ 339 if (0 != (rc = getaddrinfo(addr, port, &ai, &peer))) { 345 fprintf(stderr, "%s: peer (%s:%s)\n", __FUNCTION__, addr, port); 346 inet_print_addrinfo(__FUNCTION__, peer); 352 ai.ai_family = peer->ai_family; 374 sock = qemu_socket(peer->ai_family, peer->ai_socktype, peer->ai_protocol) [all...] |
/development/samples/AppNavigation/src/com/example/android/appnavigation/app/ |
PeerActivity.java | 36 setContentView(R.layout.peer);
|
/bootable/recovery/minadbd/ |
adb.c | 326 s->peer = create_remote_socket(p->msg.arg0, t); 327 s->peer->peer = s; 328 send_ready(s->id, s->peer->id, t); 337 if(s->peer == 0) { 338 s->peer = create_remote_socket(p->msg.arg0, t); 339 s->peer->peer = s;
|
/external/openssl/crypto/bio/ |
bss_dgram.c | 152 } peer; member in struct:bio_dgram_data_st 176 } peer; member in struct:bio_dgram_sctp_data_st 363 } peer; member in struct:__anon9929 367 sa.len.i=sizeof(sa.peer); 372 memset(&sa.peer, 0x00, sizeof(sa.peer)); 374 ret=recvfrom(b->num,out,outl,0,&sa.peer.sa,(void *)&sa.len); 377 OPENSSL_assert(sa.len.s<=sizeof(sa.peer)); 382 BIO_ctrl(b, BIO_CTRL_DGRAM_SET_PEER, 0, &sa.peer); 409 int peerlen = sizeof(data->peer); [all...] |
/external/ipsec-tools/src/racoon/ |
sainfo.c | 76 * First pass is for sainfo from a specified peer, second for others. 79 getsainfo(loc, rmt, peer, remoteid) 80 const vchar_t *loc, *rmt, *peer; 87 if (peer == NULL) 104 if (peer == NULL) 107 dpeer = ipsecdoi_id2str(peer); 110 "getsainfo params: loc=\'%s\', rmt=\'%s\', peer=\'%s\', id=%i\n", 133 if (ipsecdoi_chkcmpids(peer, s->id_i, 0)) 294 snprintf(buf, 255, "loc=\'%s\', rmt=\'%s\', peer=\'%s\', id=%i",
|
/external/openssh/ |
kex.c | 184 buffer_clear(&kex->peer); 238 buffer_append(&kex->peer, ptr, dlen); 258 buffer_init(&kex->peer); 378 proposals_match(char *my[PROPOSAL_MAX], char *peer[PROPOSAL_MAX]) 389 if ((p = strchr(peer[*idx], ',')) != NULL) 391 if (strcmp(my[*idx], peer[*idx]) != 0) { 392 debug2("proposal mismatch: my %s peer %s", 393 my[*idx], peer[*idx]); 405 char **my, **peer; local 412 peer = kex_buf2prop(&kex->peer, &first_kex_follows) [all...] |
kexdhc.c | 135 buffer_ptr(&kex->peer), buffer_len(&kex->peer),
|
kexdhs.c | 129 buffer_ptr(&kex->peer), buffer_len(&kex->peer),
|
kexecdhc.c | 135 buffer_ptr(&kex->peer), buffer_len(&kex->peer),
|
kexecdhs.c | 127 buffer_ptr(&kex->peer), buffer_len(&kex->peer),
|
kexgexc.c | 177 buffer_ptr(&kex->peer), buffer_len(&kex->peer),
|
/external/dnsmasq/src/ |
tftp.c | 46 struct sockaddr_in addr, peer; local 72 msg.msg_name = &peer; 73 msg.msg_namelen = sizeof(peer); 153 transfer->peer = peer; 194 len = tftp_err(ERR_ILL, packet, _("unsupported request from %s"), inet_ntoa(peer.sin_addr)); 244 strncat(daemon->namebuff, inet_ntoa(peer.sin_addr), (MAXDNAME-1) - strlen(daemon->namebuff)); 276 (struct sockaddr *)&peer, sizeof(peer)) == -1 && errno == EINTR); 282 my_syslog(MS_TFTP | LOG_INFO, _("TFTP sent %s to %s"), daemon->namebuff, inet_ntoa(peer.sin_addr)) [all...] |
/external/wpa_supplicant_8/src/p2p/ |
p2p_invitation.c | 18 struct p2p_device *peer, 29 peer->dialog_token++; 30 if (peer->dialog_token == 0) 31 peer->dialog_token = 1; 33 peer->dialog_token); 50 dev_addr = peer->info.p2p_device_addr; 54 p2p_buf_add_device_info(buf, p2p, peer); 62 struct p2p_device *peer, 121 "P2P: Invitation Request from unknown peer " 136 "peer " MACSTR, MAC2STR(sa)) [all...] |
p2p_build.c | 150 struct p2p_device *peer) 165 if (peer && peer->wps_method != WPS_NOT_READY) { 166 if (peer->wps_method == WPS_PBC) 168 else if (peer->wps_method == WPS_PIN_DISPLAY || 169 peer->wps_method == WPS_PIN_KEYPAD)
|
/libcore/luni/src/main/java/java/net/ |
DatagramSocket.java | 465 * Connects this datagram socket to the address and port specified by {@code peer}. 471 public void connect(SocketAddress peer) throws SocketException { 472 if (peer == null) { 473 throw new IllegalArgumentException("peer == null"); 476 if (!(peer instanceof InetSocketAddress)) { 477 throw new IllegalArgumentException("peer not an InetSocketAddress: " + peer.getClass()); 480 InetSocketAddress isa = (InetSocketAddress) peer;
|
/libcore/luni/src/main/native/ |
libcore_icu_NativeBreakIterator.cpp | 146 BreakIteratorPeer* peer = BreakIteratorPeer::fromAddress(address); local 147 peer->close(env); 148 delete peer; 156 BreakIteratorPeer* peer = BreakIteratorPeer::fromAddress(address); local 157 peer->setText(env, javaText);
|
/external/bluetooth/bluez/src/ |
storage.c | 288 int write_remote_class(bdaddr_t *local, bdaddr_t *peer, uint32_t class) 296 ba2str(peer, addr); 302 int read_remote_class(bdaddr_t *local, bdaddr_t *peer, uint32_t *class) 308 ba2str(peer, addr); 324 int write_device_name(bdaddr_t *local, bdaddr_t *peer, char *name) 340 ba2str(peer, addr); 365 int write_remote_eir(bdaddr_t *local, bdaddr_t *peer, uint8_t *data) 378 ba2str(peer, addr); 382 int read_remote_eir(bdaddr_t *local, bdaddr_t *peer, uint8_t *data) 389 ba2str(peer, addr) [all...] |
/external/chromium/chrome/browser/extensions/ |
extension_function.h | 74 void set_dispatcher_peer(ExtensionFunctionDispatcher::Peer* peer) { 75 peer_ = peer; 130 // The peer to the dispatcher that will service this extension function call. 131 scoped_refptr<ExtensionFunctionDispatcher::Peer> peer_;
|
/development/samples/SupportAppNavigation/src/com/example/android/support/appnavigation/app/ |
PeerActivity.java | 39 setContentView(R.layout.peer);
|
/external/iptables/include/libipq/ |
libipq.h | 53 struct sockaddr_nl peer; member in struct:ipq_handle
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/rpcsvc/ |
yp.x | 88 peername peer; 134 peername peer;
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/rpcsvc/ |
yp.x | 88 peername peer; 134 peername peer;
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/rpcsvc/ |
yp.x | 88 peername peer; 134 peername peer;
|
/external/wpa_supplicant_8/src/ap/ |
peerkey_auth.c | 51 struct wpa_state_machine *sm, const u8 *peer, 64 if (peer) { 65 pos = wpa_add_kde(pos, RSN_KEY_DATA_MAC_ADDR, peer, ETH_ALEN, 102 /* Initiator = sm->addr; Peer = kde.mac_addr */ 202 const u8 *smk, const u8 *peer) 223 /* Peer RSN IE */ 227 /* Peer MAC Address */ 228 pos = wpa_add_kde(pos, RSN_KEY_DATA_MAC_ADDR, peer, ETH_ALEN, NULL, 0); 276 /* Peer = sm->addr; Initiator = kde.mac_addr; 277 * Peer Nonce = key->key_nonce; Initiator Nonce = kde.nonce * [all...] |
/external/iproute2/include/ |
libnetlink.h | 15 struct sockaddr_nl peer; member in struct:rtnl_handle 46 extern int rtnl_talk(struct rtnl_handle *rtnl, struct nlmsghdr *n, pid_t peer,
|