HomeSort by relevance Sort by last modified time
    Searched refs:peer (Results 76 - 100 of 147) sorted by null

1 2 34 5 6

  /external/wpa_supplicant_8/wpa_supplicant/
p2p_supplicant.h 72 void wpas_prov_disc_req(void *ctx, const u8 *peer, u16 config_methods,
77 void wpas_prov_disc_resp(void *ctx, const u8 *peer, u16 config_methods);
ctrl_iface.c 259 /* MLME-STKSTART.request(peer) */
263 u8 peer[ETH_ALEN]; local
265 if (hwaddr_aton(addr, peer)) {
272 MAC2STR(peer));
274 return wpa_sm_stkstart(wpa_s->wpa, peer);
284 u8 peer[ETH_ALEN]; local
287 if (hwaddr_aton(addr, peer)) {
294 MAC2STR(peer));
297 ret = wpa_tdls_send_discovery_request(wpa_s->wpa, peer);
299 ret = wpa_drv_tdls_oper(wpa_s, TDLS_DISCOVERY_REQ, peer);
308 u8 peer[ETH_ALEN]; local
335 u8 peer[ETH_ALEN]; local
747 u8 peer[ETH_ALEN]; local
3049 u8 peer[ETH_ALEN]; local
3073 u8 peer[ETH_ALEN], go_dev_addr[ETH_ALEN], *go_dev = NULL; local
    [all...]
p2p_supplicant.c 715 wpa_printf(MSG_DEBUG, "P2P: Start WPS Enrollee for peer " MACSTR,
4303 const u8 *peer; local
4372 u8 peer[ETH_ALEN]; local
    [all...]
driver_i.h 618 const u8 *peer, int role, const u8 *bssid,
625 return wpa_s->driver->p2p_invite(wpa_s->drv_priv, peer, role, bssid,
644 enum tdls_oper oper, const u8 *peer)
648 return wpa_s->driver->tdls_oper(wpa_s->drv_priv, oper, peer);
wpas_glue.c 554 static int wpa_supplicant_tdls_oper(void *ctx, int oper, const u8 *peer)
557 return wpa_drv_tdls_oper(wpa_s, oper, peer);
562 void *ctx, const u8 *peer, int add, u16 capability,
568 params.addr = peer;
sme.c 293 if (os_memcmp(wpa_s->pending_bssid, data->auth.peer, ETH_ALEN) != 0) {
295 "unexpected peer " MACSTR,
296 MAC2STR(data->auth.peer));
300 wpa_dbg(wpa_s, MSG_DEBUG, "SME: Authentication response: peer=" MACSTR
302 MAC2STR(data->auth.peer), data->auth.auth_type,
349 os_memcpy(edata.ft_ies.target_ap, data->auth.peer, ETH_ALEN);
354 sme_associate(wpa_s, ssid->mode, data->auth.peer,
  /frameworks/base/graphics/java/android/graphics/
Region.java 335 Region peer = (Region) obj; local
336 return nativeEquals(mNativeRegion, peer.mNativeRegion);
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/rpcsvc/
yp.h 94 peername peer; member in struct:ypmap_parms
144 peername peer; member in struct:ypresp_master
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/rpcsvc/
yp.h 94 peername peer; member in struct:ypmap_parms
144 peername peer; member in struct:ypresp_master
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/rpcsvc/
yp.h 94 peername peer; member in struct:ypmap_parms
144 peername peer; member in struct:ypresp_master
  /system/core/adb/
adb.c 405 s->peer = create_remote_socket(p->msg.arg0, t);
406 s->peer->peer = s;
407 send_ready(s->id, s->peer->id, t);
416 if(s->peer == 0) {
417 s->peer = create_remote_socket(p->msg.arg0, t);
418 s->peer->peer = s;
    [all...]
  /external/openssl/apps/
s_client.c 292 BIO_printf(bio_err," -verify arg - turn on peer certificate verification\n");
614 struct sockaddr peer; local
615 int peerlen = sizeof(peer);
1928 X509 *peer=NULL; local
    [all...]
s_server.c 464 BIO_printf(bio_err," -verify arg - turn on peer certificate verification\n");
465 BIO_printf(bio_err," -Verify arg - turn on peer certificate verification, must have a cert.\n");
468 BIO_printf(bio_err," -crl_check - check the peer certificate has not been revoked by its CA.\n" \
470 BIO_printf(bio_err," -crl_check_all - check the peer certificate has not been revoked by its CA\n" \
2372 X509 *peer; local
2688 X509 *peer; local
    [all...]
  /external/iproute2/ip/
ipaddress.c 69 fprintf(stderr, "IFADDR := PREFIX | ADDR peer PREFIX\n");
300 fprintf(fp, " peer ");
551 fprintf(fp, " peer %s/%d ",
995 inet_prefix peer; local
1013 if (strcmp(*argv, "peer") == 0 ||
1018 duparg("peer", *argv);
1019 get_prefix(&peer, *argv, req.ifa.ifa_family);
1020 peer_len = peer.bytelen;
1022 req.ifa.ifa_family = peer.family;
1023 addattr_l(&req.n, sizeof(req), IFA_ADDRESS, &peer.data, peer.bytelen)
    [all...]
  /frameworks/base/core/java/com/android/internal/os/
ZygoteInit.java 89 * If true, zygote forks for each peer. If false, a select loop is used
562 * Runs the zygote in accept-and-fork mode. In this mode, each peer
571 ZygoteConnection peer = acceptCommandPeer(); local
578 // The child process should handle the peer requests
589 peer.run();
592 peer.closeSocket();
  /external/chromium/webkit/glue/
resource_loader_bridge.h 14 // In turn, the bridge's owner on the WebKit end will implement the Peer
270 // within webkit. The Peer and it's bridge should have identical lifetimes
276 class Peer {
278 virtual ~Peer() {}
364 // the peer's methods will be called asynchronously to report various events.
365 virtual bool Start(Peer* peer) = 0;
370 // the peer is still valid.
  /external/iproute2/misc/
ss.c 1902 int peer; member in struct:unixstat
1932 char *peer; local
    [all...]
  /external/openssl/ssl/
s3_srvr.c 506 ((s->session->peer != NULL) &&
624 if (!s->session->peer)
2916 X509 *peer; local
    [all...]
s2_clnt.c 511 if (s->session->peer != NULL) /* can't happen*/
518 s->session->peer = s->session->sess_cert->peer_key->x509;
520 CRYPTO_add(&s->session->peer->references, 1, CRYPTO_LOCK_X509);
524 || s->session->peer != s->session->sess_cert->peer_key->x509)
  /external/wpa_supplicant_8/src/p2p/
p2p_i.h 33 * If the peer was discovered based on an interface address (e.g., GO
109 u8 peer[ETH_ALEN]; member in struct:p2p_sd_query
171 * P2P_WAIT_PEER_CONNECT - Waiting peer in List for GO Neg
176 * P2P_WAIT_PEER_IDLE - Waiting peer idle for GO Neg
235 * go_neg_peer - Pointer to GO Negotiation peer
240 * invite_peer - Pointer to Invite peer
248 * sd_peer - Pointer to Service Discovery peer
424 * Keep track of which peer a given PD request was sent to.
568 struct p2p_device *peer);
667 void p2p_go_neg_failed(struct p2p_data *p2p, struct p2p_device *peer,
    [all...]
p2p.c 42 * P2P_PEER_EXPIRATION_AGE - Number of seconds after which inactive peer
95 * peer is the GO, so do not expire the peer entry.
108 * The peer is connected as a client in a group where
109 * we are the GO, so do not expire the peer entry.
116 /* If Connection is in progress, don't expire the peer
122 wpa_msg(p2p->cfg->msg_ctx, MSG_ERROR, "P2P: Expiring old peer "
235 void p2p_go_neg_failed(struct p2p_data *p2p, struct p2p_device *peer,
247 if (peer) {
248 os_memcpy(res.peer_device_addr, peer->info.p2p_device_addr
2104 struct p2p_device *peer; local
    [all...]
  /packages/apps/Settings/src/com/android/settings/wifi/p2p/
WifiP2pSettings.java 418 for (WifiP2pDevice peer: peers.getDeviceList()) {
419 if (DBG) Log.d(TAG, " peer " + peer);
420 mPeersGroup.addPreference(new WifiP2pPeer(getActivity(), peer));
421 if (peer.status == WifiP2pDevice.CONNECTED) mConnectedDevices++;
  /external/wpa_supplicant_8/src/rsn_supp/
wpa_i.h 42 u8 preauth_bssid[ETH_ALEN]; /* current RSN pre-auth peer or
282 const u8 *peer)
285 return sm->ctx->tdls_oper(sm->ctx->ctx, oper, peer);
  /external/iproute2/lib/
libnetlink.c 273 int rtnl_talk(struct rtnl_handle *rtnl, struct nlmsghdr *n, pid_t peer,
296 nladdr.nl_pid = peer;
348 if (nladdr.nl_pid != peer ||
  /bootable/recovery/minadbd/
adb.h 84 /* flag: set when the socket's peer has closed
92 asocket *peer; member in struct:asocket
106 /* enqueue is called by our peer when it has data
109 ** peer->ready() when we once again are ready to
114 /* ready is called by the peer when it is ready for
119 /* close is called by the peer when it has gone away.
121 ** peer once our close method is called.

Completed in 712 milliseconds

1 2 34 5 6