HomeSort by relevance Sort by last modified time
    Searched refs:peer (Results 1 - 25 of 166) sorted by null

1 2 3 4 5 6 7

  /external/wpa_supplicant_8/src/rsn_supp/
tdls.c 81 static void wpa_tdls_peer_free(struct wpa_sm *sm, struct wpa_tdls_peer *peer);
95 u8 rsnie_p[TDLS_MAX_IE_LEN]; /* Peer RSN IE */
144 static int wpa_tdls_del_key(struct wpa_sm *sm, struct wpa_tdls_peer *peer)
146 if (wpa_sm_set_key(sm, WPA_ALG_NONE, peer->addr,
157 static int wpa_tdls_set_key(struct wpa_sm *sm, struct wpa_tdls_peer *peer)
165 switch (peer->cipher) {
180 if (wpa_sm_set_key(sm, alg, peer->addr, -1, 1,
181 rsc, sizeof(rsc), peer->tpk.tk, key_len) < 0) {
203 struct wpa_tdls_peer *peer; local
223 for (peer = sm->tdls; peer; peer = peer->next)
284 struct wpa_tdls_peer *peer = timeout_ctx; local
582 struct wpa_tdls_peer *peer = timeout_ctx; local
641 struct wpa_tdls_peer *peer; local
731 struct wpa_tdls_peer *peer; local
759 struct wpa_tdls_peer *peer; local
776 struct wpa_tdls_peer *peer = NULL; local
873 struct wpa_tdls_peer *peer; local
1250 struct wpa_tdls_peer *peer; local
1334 struct wpa_tdls_peer *peer; local
1689 struct wpa_tdls_peer *peer; local
1897 struct wpa_tdls_peer *peer; local
2051 struct wpa_tdls_peer *peer; local
2101 struct wpa_tdls_peer *peer; local
2237 struct wpa_tdls_peer *peer, *tmp; local
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
ibss_rsn.c 24 struct ibss_rsn_peer *peer; local
26 for (peer = ibss_rsn->peers; peer; peer = peer->next)
27 if (os_memcmp(addr, peer->addr, ETH_ALEN) == 0)
29 return peer;
33 static void ibss_rsn_free(struct ibss_rsn_peer *peer)
35 wpa_auth_sta_deinit(peer->auth);
36 wpa_sm_deinit(peer->supp)
43 struct ibss_rsn_peer *peer = ctx; local
50 struct ibss_rsn_peer *peer = ctx; local
58 struct ibss_rsn_peer *peer = ctx; local
103 struct ibss_rsn_peer *peer = ctx; local
121 struct ibss_rsn_peer *peer = ctx; local
150 struct ibss_rsn_peer *peer = ctx; local
304 struct ibss_rsn_peer *peer; local
347 struct ibss_rsn_peer *peer = ibss_rsn_get_peer(ibss_rsn, addr); local
435 struct ibss_rsn_peer *peer; local
477 struct ibss_rsn_peer *peer, *prev; local
535 struct ibss_rsn_peer *peer, *prev; local
627 struct ibss_rsn_peer *peer; local
    [all...]
  /external/okhttp/src/test/java/libcore/net/spdy/
SpdyConnectionTest.java 28 private final MockSpdyPeer peer = new MockSpdyPeer(); field in class:SpdyConnectionTest
32 peer.acceptFrame();
33 SpdyWriter reply = peer.sendFrame();
37 SpdyWriter replyData = peer.sendFrame();
41 peer.acceptFrame();
42 peer.play();
45 SpdyConnection connection = new SpdyConnection.Builder(true, peer.openSocket()).build();
56 // verify the peer received what was expected
57 MockSpdyPeer.InFrame synStream = peer.takeFrame();
62 MockSpdyPeer.InFrame requestData = peer.takeFrame()
    [all...]
  /bootable/recovery/minadbd/
sockets.c 54 ** these have no peer anymore, but still packets to
122 if(s->transport == t || (s->peer && s->peer->transport == t)) {
223 if(s->peer) {
224 D("LS(%d): closing peer. peer->id=%d peer->fd=%d\n",
225 s->id, s->peer->id, s->peer->fd);
226 s->peer->peer = 0
470 asocket* peer = s->peer; local
    [all...]
  /system/core/adb/
jdwp_service.c 559 asocket* peer = s->peer; local
563 if (peer) {
564 peer->peer = NULL;
565 peer->close(peer);
575 s->peer->close(s->peer);
584 asocket* peer = jdwp->socket.peer local
646 asocket* peer = t->socket.peer; local
657 asocket* peer = s->peer; local
    [all...]
sockets.c 54 ** these have no peer anymore, but still packets to
122 if(s->transport == t || (s->peer && s->peer->transport == t)) {
230 if(s->peer) {
231 D("LS(%d): closing peer. peer->id=%d peer->fd=%d\n",
232 s->id, s->peer->id, s->peer->fd);
233 s->peer->peer = 0
511 asocket* peer = s->peer; local
    [all...]
  /system/core/libcutils/
mq.c 63 /** Request for a connection to another peer. */
66 /** A connection to another peer. */
88 // TODO: Use custom headers for master->peer, peer->master, peer->peer.
100 /** A packet which will be sent to a peer. */
107 /** Connection to peer. Used with CONNECTION. */
124 /** Represents a remote peer. */
127 /** Local peer state. You typically have one peer per process. *
191 Peer* peer; member in struct:PeerProxy
304 Peer* peer = peerProxy->peer; local
315 Peer* peer = peerProxy->peer; local
783 Peer* peer = masterProxy->peer; local
895 Peer* peer = masterProxy->peer; local
1094 Peer* peer = calloc(1, sizeof(Peer)); local
1134 Peer* peer = localPeer; local
1202 Peer* peer = localPeer; local
    [all...]
  /external/openssl/apps/
s_cb.c 771 } peer; local
784 /* Read peer information */
785 (void)BIO_dgram_get_peer(SSL_get_rbio(ssl), &peer); local
787 /* Create buffer with peer's address and port */
789 switch (peer.sa.sa_family)
793 length += sizeof(peer.s4.sin_port);
798 length += sizeof(peer.s6.sin6_port);
813 switch (peer.sa.sa_family)
817 &peer.s4.sin_port,
818 sizeof(peer.s4.sin_port))
859 } peer; local
866 (void)BIO_dgram_get_peer(SSL_get_rbio(ssl), &peer); local
    [all...]
sess_id.c 93 X509 *peer = NULL; local
167 peer = SSL_SESSION_get0_peer(x);
236 if (peer == NULL)
239 X509_print(out,peer);
258 else if (!noout && (peer != NULL)) /* just print the certificate */
261 i=(int)i2d_X509_bio(out,peer);
263 i=PEM_write_bio_X509(out,peer);
  /external/qemu/
charpipe.c 75 struct CharPipeHalf* peer; /* NULL if closed */ member in struct:CharPipeHalf
91 ph->peer = NULL;
99 CharPipeHalf* peer = ph->peer; local
106 if (bip == NULL && peer != NULL && peer->cs->chr_read != NULL) {
107 /* no buffered data, try to write directly to the peer */
111 if (peer->cs->chr_can_read) {
112 size = qemu_chr_can_read( peer->cs );
121 qemu_chr_read( peer->cs, (uint8_t*)buf, size )
158 CharPipeHalf* peer = ph->peer; local
297 CharDriverState* peer = cbuf->endpoint; local
348 CharDriverState* peer = cbuf->endpoint; local
    [all...]
qemu-sockets.c 289 /* connect to peer */
311 struct addrinfo ai, *peer = NULL, *local = NULL; local
318 /* lookup peer addr */
339 if (0 != (rc = getaddrinfo(addr, port, &ai, &peer))) {
345 fprintf(stderr, "%s: peer (%s:%s)\n", __FUNCTION__, addr, port);
346 inet_print_addrinfo(__FUNCTION__, peer);
352 ai.ai_family = peer->ai_family;
374 sock = qemu_socket(peer->ai_family, peer->ai_socktype, peer->ai_protocol)
    [all...]
  /external/webkit/Source/WebCore/websockets/
WorkerThreadableWebSocketChannel.cpp 111 WorkerThreadableWebSocketChannel::Peer::Peer(RefPtr<ThreadableWebSocketChannelClientWrapper> clientWrapper, WorkerLoaderProxy& loaderProxy, ScriptExecutionContext* context, const String& taskMode, const KURL& url, const String& protocol)
120 WorkerThreadableWebSocketChannel::Peer::~Peer()
127 void WorkerThreadableWebSocketChannel::Peer::connect()
141 void WorkerThreadableWebSocketChannel::Peer::send(const String& message)
156 void WorkerThreadableWebSocketChannel::Peer::bufferedAmount()
165 void WorkerThreadableWebSocketChannel::Peer::close()
174 void WorkerThreadableWebSocketChannel::Peer::disconnect()
183 void WorkerThreadableWebSocketChannel::Peer::suspend(
248 Peer* peer = Peer::create(clientWrapper, thisPtr->m_loaderProxy, context, taskMode, url, protocol); local
361 Peer* peer = m_peer; local
    [all...]
  /external/iproute2/ip/
ifcfg 36 echo "Usage: ifcfg DEV [[add|del [ADDR[/LEN]] [PEER] | stop]" 1>&2
81 peer=$1
82 if [ "$peer" != "" ]; then
84 echo "Peer address with non-trivial netmask." 1>&2
87 pfx="$ipaddr peer $peer"
141 elif [ "$peer" != "" ]; then
142 if ping -q -c 2 -w 4 $peer ; then
143 ip ro append default via $peer dev $dev metric 30001
  /external/chromium/net/http/
http_stream_factory_impl_unittest.cc 105 HttpNetworkSessionPeer peer(session);
108 peer.SetHttpStreamFactory(mock_factory);
218 HttpNetworkSessionPeer peer(session);
223 peer.SetTransportSocketPool(transport_conn_pool);
228 peer.SetSSLSocketPool(ssl_conn_pool);
241 HttpNetworkSessionPeer peer(session);
247 peer.SetSocketPoolForHTTPProxy(proxy_host, http_proxy_pool);
252 peer.SetSocketPoolForSSLWithProxy(proxy_host, ssl_conn_pool);
266 HttpNetworkSessionPeer peer(session);
272 peer.SetSocketPoolForSOCKSProxy(proxy_host, socks_proxy_pool)
    [all...]
  /external/bluetooth/bluedroid/btif/co/
bta_pan_co.c 105 //bdcpy(conn->peer, peer_addr);
126 ** peer is closed.
203 ALOGD("pan bt peer addr: %02x:%02x:%02x:%02x:%02x:%02x, update its ethernet addr: %02x:%02x:%02x:%02x:%02x:%02x",
204 conn->peer[0], conn->peer[1], conn->peer[2], conn->peer[3],conn->peer[4], conn->peer[5],
308 ** Description protocol filter indication from peer devic
    [all...]
  /frameworks/base/core/java/android/net/arp/
ArpPeer.java 57 InetAddress peer) throws SocketException {
68 if (myAddr instanceof Inet6Address || peer instanceof Inet6Address) {
72 mPeer = peer;
81 * peer.
151 ArpPeer peer = new ArpPeer(interfaceName, inetAddress, myMacAddress, gateway); local
154 if(peer.doArp(timeoutMillis) != null) responses++;
158 peer.close();
  /external/iptables/libipq/
libipq.c 77 { IPQ_ERR_ADDRLEN, "Invalid peer address length" },
107 (struct sockaddr *)&h->peer, sizeof(h->peer));
135 addrlen = sizeof(h->peer);
168 (struct sockaddr *)&h->peer, &addrlen);
173 if (addrlen != sizeof(h->peer)) {
177 if (h->peer.nl_pid != 0) {
249 memset(&h->peer, 0, sizeof(struct sockaddr_nl));
250 h->peer.nl_family = AF_NETLINK;
251 h->peer.nl_pid = 0
    [all...]
  /external/chromium/chrome/common/extensions/
extension_localization_peer.cc 18 webkit_glue::ResourceLoaderBridge::Peer* peer,
21 : original_peer_(peer),
32 webkit_glue::ResourceLoaderBridge::Peer* peer,
40 new ExtensionLocalizationPeer(peer, message_sender, request_url) : NULL;
extension_localization_peer.h 15 // webkit_glue::ResourceLoaderBridge::Peer instance. It is used to pre-process
20 // instance of ExtensionLocalizationPeer based on the original Peer.
22 : public webkit_glue::ResourceLoaderBridge::Peer {
27 webkit_glue::ResourceLoaderBridge::Peer* peer,
32 // ResourceLoaderBridge::Peer methods.
54 webkit_glue::ResourceLoaderBridge::Peer* peer,
62 // Original peer that handles the request once we are done processing data_.
63 webkit_glue::ResourceLoaderBridge::Peer* original_peer_
    [all...]
  /external/libppp/src/
iface.h 34 struct ncpaddr peer; /* peer address */ member in struct:iface_addr
iface.c 189 ncpaddr_setsa(&addr->peer, sa[RTAX_BRD]);
191 ncpaddr_init(&addr->peer);
214 ncpaddr_getsa(&addr->peer, &sspeer);
229 if (ncpaddr_family(&addr->peer) == AF_UNSPEC) {
242 ifra.ifra_name, buf, ncpaddr_ntoa(&addr->peer), res);
254 if (ncpaddr_family(&addr->peer) == AF_UNSPEC)
274 if (ncpaddr_family(&addr->peer) == AF_UNSPEC)
278 snprintf(dst, sizeof dst, "%s", ncpaddr_ntoa(&addr->peer));
299 ncpaddr_getsa(&addr->peer, &sspeer);
314 if (ncpaddr_family(&addr->peer) == AF_UNSPEC)
    [all...]
  /external/openssl/crypto/bio/
bss_bio.c 57 * of this kind, handled by the same thread (i.e. the "peer" is actually
127 BIO *peer; /* NULL if buf == NULL. member in struct:bio_bio_st
128 * If peer != NULL, then peer->ptr is also a bio_bio_st,
129 * and its "peer" member points back to us.
130 * peer != NULL iff init != 0 in the BIO. */
132 /* This is for what we write (i.e. reading uses peer's struct): */
133 int closed; /* valid iff peer != NULL */
134 size_t len; /* valid iff buf != NULL; 0 if peer == NULL */
139 size_t request; /* valid iff peer != NULL; 0 if len != 0
    [all...]
  /frameworks/base/core/java/com/android/internal/os/
ZygoteConnection.java 68 * mSocket is retained in the child process in "peer wait" mode, so
70 * it is closed in the peer.
75 private final Credentials peer; field in class:ZygoteConnection
80 * this peer. If "peer wait" mode is specified, the process that requested
86 * "peer-wait" mode was not requested.
108 peer = mSocket.getPeerCredentials();
110 Log.e(TAG, "Cannot read peer credentials", ex);
213 applyUidSecurityPolicy(parsedArgs, peer, peerSecurityContext);
214 applyRlimitSecurityPolicy(parsedArgs, peer, peerSecurityContext)
    [all...]
  /external/openssl/crypto/evp/
pmeth_fn.c 285 int EVP_PKEY_derive_set_peer(EVP_PKEY_CTX *ctx, EVP_PKEY *peer)
301 ret = ctx->pmeth->ctrl(ctx, EVP_PKEY_CTRL_PEER_KEY, 0, peer);
315 if (ctx->pkey->type != peer->type)
322 /* ran@cryptocom.ru: For clarity. The error is if parameters in peer are
327 if (!EVP_PKEY_missing_parameters(peer) &&
328 !EVP_PKEY_cmp_parameters(ctx->pkey, peer))
337 ctx->peerkey = peer;
339 ret = ctx->pmeth->ctrl(ctx, EVP_PKEY_CTRL_PEER_KEY, 1, peer);
347 CRYPTO_add(&peer->references,1,CRYPTO_LOCK_EVP_PKEY);
  /external/wpa_supplicant_6/wpa_supplicant/src/wps/
wps_upnp.h 29 void *priv, struct upnp_wps_peer *peer);
31 void *priv, struct upnp_wps_peer *peer,

Completed in 720 milliseconds

1 2 3 4 5 6 7