/external/wpa_supplicant_8/src/rsn_supp/ |
tdls.c | 81 static void wpa_tdls_peer_free(struct wpa_sm *sm, struct wpa_tdls_peer *peer); 95 u8 rsnie_p[TDLS_MAX_IE_LEN]; /* Peer RSN IE */ 144 static int wpa_tdls_del_key(struct wpa_sm *sm, struct wpa_tdls_peer *peer) 146 if (wpa_sm_set_key(sm, WPA_ALG_NONE, peer->addr, 157 static int wpa_tdls_set_key(struct wpa_sm *sm, struct wpa_tdls_peer *peer) 165 switch (peer->cipher) { 180 if (wpa_sm_set_key(sm, alg, peer->addr, -1, 1, 181 rsc, sizeof(rsc), peer->tpk.tk, key_len) < 0) { 203 struct wpa_tdls_peer *peer; local 223 for (peer = sm->tdls; peer; peer = peer->next) 284 struct wpa_tdls_peer *peer = timeout_ctx; local 582 struct wpa_tdls_peer *peer = timeout_ctx; local 641 struct wpa_tdls_peer *peer; local 731 struct wpa_tdls_peer *peer; local 759 struct wpa_tdls_peer *peer; local 776 struct wpa_tdls_peer *peer = NULL; local 873 struct wpa_tdls_peer *peer; local 1250 struct wpa_tdls_peer *peer; local 1334 struct wpa_tdls_peer *peer; local 1689 struct wpa_tdls_peer *peer; local 1897 struct wpa_tdls_peer *peer; local 2051 struct wpa_tdls_peer *peer; local 2101 struct wpa_tdls_peer *peer; local 2237 struct wpa_tdls_peer *peer, *tmp; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
ibss_rsn.c | 24 struct ibss_rsn_peer *peer; local 26 for (peer = ibss_rsn->peers; peer; peer = peer->next) 27 if (os_memcmp(addr, peer->addr, ETH_ALEN) == 0) 29 return peer; 33 static void ibss_rsn_free(struct ibss_rsn_peer *peer) 35 wpa_auth_sta_deinit(peer->auth); 36 wpa_sm_deinit(peer->supp) 43 struct ibss_rsn_peer *peer = ctx; local 50 struct ibss_rsn_peer *peer = ctx; local 58 struct ibss_rsn_peer *peer = ctx; local 103 struct ibss_rsn_peer *peer = ctx; local 121 struct ibss_rsn_peer *peer = ctx; local 150 struct ibss_rsn_peer *peer = ctx; local 304 struct ibss_rsn_peer *peer; local 347 struct ibss_rsn_peer *peer = ibss_rsn_get_peer(ibss_rsn, addr); local 435 struct ibss_rsn_peer *peer; local 477 struct ibss_rsn_peer *peer, *prev; local 535 struct ibss_rsn_peer *peer, *prev; local 627 struct ibss_rsn_peer *peer; local [all...] |
/external/okhttp/src/test/java/libcore/net/spdy/ |
SpdyConnectionTest.java | 28 private final MockSpdyPeer peer = new MockSpdyPeer(); field in class:SpdyConnectionTest 32 peer.acceptFrame(); 33 SpdyWriter reply = peer.sendFrame(); 37 SpdyWriter replyData = peer.sendFrame(); 41 peer.acceptFrame(); 42 peer.play(); 45 SpdyConnection connection = new SpdyConnection.Builder(true, peer.openSocket()).build(); 56 // verify the peer received what was expected 57 MockSpdyPeer.InFrame synStream = peer.takeFrame(); 62 MockSpdyPeer.InFrame requestData = peer.takeFrame() [all...] |
/bootable/recovery/minadbd/ |
sockets.c | 54 ** these have no peer anymore, but still packets to 122 if(s->transport == t || (s->peer && s->peer->transport == t)) { 223 if(s->peer) { 224 D("LS(%d): closing peer. peer->id=%d peer->fd=%d\n", 225 s->id, s->peer->id, s->peer->fd); 226 s->peer->peer = 0 470 asocket* peer = s->peer; local [all...] |
/system/core/adb/ |
jdwp_service.c | 559 asocket* peer = s->peer; local 563 if (peer) { 564 peer->peer = NULL; 565 peer->close(peer); 575 s->peer->close(s->peer); 584 asocket* peer = jdwp->socket.peer local 646 asocket* peer = t->socket.peer; local 657 asocket* peer = s->peer; local [all...] |
sockets.c | 54 ** these have no peer anymore, but still packets to 122 if(s->transport == t || (s->peer && s->peer->transport == t)) { 230 if(s->peer) { 231 D("LS(%d): closing peer. peer->id=%d peer->fd=%d\n", 232 s->id, s->peer->id, s->peer->fd); 233 s->peer->peer = 0 511 asocket* peer = s->peer; local [all...] |
/system/core/libcutils/ |
mq.c | 63 /** Request for a connection to another peer. */ 66 /** A connection to another peer. */ 88 // TODO: Use custom headers for master->peer, peer->master, peer->peer. 100 /** A packet which will be sent to a peer. */ 107 /** Connection to peer. Used with CONNECTION. */ 124 /** Represents a remote peer. */ 127 /** Local peer state. You typically have one peer per process. * 191 Peer* peer; member in struct:PeerProxy 304 Peer* peer = peerProxy->peer; local 315 Peer* peer = peerProxy->peer; local 783 Peer* peer = masterProxy->peer; local 895 Peer* peer = masterProxy->peer; local 1094 Peer* peer = calloc(1, sizeof(Peer)); local 1134 Peer* peer = localPeer; local 1202 Peer* peer = localPeer; local [all...] |
/external/openssl/apps/ |
s_cb.c | 771 } peer; local 784 /* Read peer information */ 785 (void)BIO_dgram_get_peer(SSL_get_rbio(ssl), &peer); local 787 /* Create buffer with peer's address and port */ 789 switch (peer.sa.sa_family) 793 length += sizeof(peer.s4.sin_port); 798 length += sizeof(peer.s6.sin6_port); 813 switch (peer.sa.sa_family) 817 &peer.s4.sin_port, 818 sizeof(peer.s4.sin_port)) 859 } peer; local 866 (void)BIO_dgram_get_peer(SSL_get_rbio(ssl), &peer); local [all...] |
sess_id.c | 93 X509 *peer = NULL; local 167 peer = SSL_SESSION_get0_peer(x); 236 if (peer == NULL) 239 X509_print(out,peer); 258 else if (!noout && (peer != NULL)) /* just print the certificate */ 261 i=(int)i2d_X509_bio(out,peer); 263 i=PEM_write_bio_X509(out,peer);
|
/external/qemu/ |
charpipe.c | 75 struct CharPipeHalf* peer; /* NULL if closed */ member in struct:CharPipeHalf 91 ph->peer = NULL; 99 CharPipeHalf* peer = ph->peer; local 106 if (bip == NULL && peer != NULL && peer->cs->chr_read != NULL) { 107 /* no buffered data, try to write directly to the peer */ 111 if (peer->cs->chr_can_read) { 112 size = qemu_chr_can_read( peer->cs ); 121 qemu_chr_read( peer->cs, (uint8_t*)buf, size ) 158 CharPipeHalf* peer = ph->peer; local 297 CharDriverState* peer = cbuf->endpoint; local 348 CharDriverState* peer = cbuf->endpoint; local [all...] |
qemu-sockets.c | 289 /* connect to peer */ 311 struct addrinfo ai, *peer = NULL, *local = NULL; local 318 /* lookup peer addr */ 339 if (0 != (rc = getaddrinfo(addr, port, &ai, &peer))) { 345 fprintf(stderr, "%s: peer (%s:%s)\n", __FUNCTION__, addr, port); 346 inet_print_addrinfo(__FUNCTION__, peer); 352 ai.ai_family = peer->ai_family; 374 sock = qemu_socket(peer->ai_family, peer->ai_socktype, peer->ai_protocol) [all...] |
/external/webkit/Source/WebCore/websockets/ |
WorkerThreadableWebSocketChannel.cpp | 111 WorkerThreadableWebSocketChannel::Peer::Peer(RefPtr<ThreadableWebSocketChannelClientWrapper> clientWrapper, WorkerLoaderProxy& loaderProxy, ScriptExecutionContext* context, const String& taskMode, const KURL& url, const String& protocol) 120 WorkerThreadableWebSocketChannel::Peer::~Peer() 127 void WorkerThreadableWebSocketChannel::Peer::connect() 141 void WorkerThreadableWebSocketChannel::Peer::send(const String& message) 156 void WorkerThreadableWebSocketChannel::Peer::bufferedAmount() 165 void WorkerThreadableWebSocketChannel::Peer::close() 174 void WorkerThreadableWebSocketChannel::Peer::disconnect() 183 void WorkerThreadableWebSocketChannel::Peer::suspend( 248 Peer* peer = Peer::create(clientWrapper, thisPtr->m_loaderProxy, context, taskMode, url, protocol); local 361 Peer* peer = m_peer; local [all...] |
/external/iproute2/ip/ |
ifcfg | 36 echo "Usage: ifcfg DEV [[add|del [ADDR[/LEN]] [PEER] | stop]" 1>&2 81 peer=$1 82 if [ "$peer" != "" ]; then 84 echo "Peer address with non-trivial netmask." 1>&2 87 pfx="$ipaddr peer $peer" 141 elif [ "$peer" != "" ]; then 142 if ping -q -c 2 -w 4 $peer ; then 143 ip ro append default via $peer dev $dev metric 30001
|
/external/chromium/net/http/ |
http_stream_factory_impl_unittest.cc | 105 HttpNetworkSessionPeer peer(session); 108 peer.SetHttpStreamFactory(mock_factory); 218 HttpNetworkSessionPeer peer(session); 223 peer.SetTransportSocketPool(transport_conn_pool); 228 peer.SetSSLSocketPool(ssl_conn_pool); 241 HttpNetworkSessionPeer peer(session); 247 peer.SetSocketPoolForHTTPProxy(proxy_host, http_proxy_pool); 252 peer.SetSocketPoolForSSLWithProxy(proxy_host, ssl_conn_pool); 266 HttpNetworkSessionPeer peer(session); 272 peer.SetSocketPoolForSOCKSProxy(proxy_host, socks_proxy_pool) [all...] |
/external/bluetooth/bluedroid/btif/co/ |
bta_pan_co.c | 105 //bdcpy(conn->peer, peer_addr); 126 ** peer is closed. 203 ALOGD("pan bt peer addr: %02x:%02x:%02x:%02x:%02x:%02x, update its ethernet addr: %02x:%02x:%02x:%02x:%02x:%02x", 204 conn->peer[0], conn->peer[1], conn->peer[2], conn->peer[3],conn->peer[4], conn->peer[5], 308 ** Description protocol filter indication from peer devic [all...] |
/frameworks/base/core/java/android/net/arp/ |
ArpPeer.java | 57 InetAddress peer) throws SocketException { 68 if (myAddr instanceof Inet6Address || peer instanceof Inet6Address) { 72 mPeer = peer; 81 * peer. 151 ArpPeer peer = new ArpPeer(interfaceName, inetAddress, myMacAddress, gateway); local 154 if(peer.doArp(timeoutMillis) != null) responses++; 158 peer.close();
|
/external/iptables/libipq/ |
libipq.c | 77 { IPQ_ERR_ADDRLEN, "Invalid peer address length" }, 107 (struct sockaddr *)&h->peer, sizeof(h->peer)); 135 addrlen = sizeof(h->peer); 168 (struct sockaddr *)&h->peer, &addrlen); 173 if (addrlen != sizeof(h->peer)) { 177 if (h->peer.nl_pid != 0) { 249 memset(&h->peer, 0, sizeof(struct sockaddr_nl)); 250 h->peer.nl_family = AF_NETLINK; 251 h->peer.nl_pid = 0 [all...] |
/external/chromium/chrome/common/extensions/ |
extension_localization_peer.cc | 18 webkit_glue::ResourceLoaderBridge::Peer* peer, 21 : original_peer_(peer), 32 webkit_glue::ResourceLoaderBridge::Peer* peer, 40 new ExtensionLocalizationPeer(peer, message_sender, request_url) : NULL;
|
extension_localization_peer.h | 15 // webkit_glue::ResourceLoaderBridge::Peer instance. It is used to pre-process 20 // instance of ExtensionLocalizationPeer based on the original Peer. 22 : public webkit_glue::ResourceLoaderBridge::Peer { 27 webkit_glue::ResourceLoaderBridge::Peer* peer, 32 // ResourceLoaderBridge::Peer methods. 54 webkit_glue::ResourceLoaderBridge::Peer* peer, 62 // Original peer that handles the request once we are done processing data_. 63 webkit_glue::ResourceLoaderBridge::Peer* original_peer_ [all...] |
/external/libppp/src/ |
iface.h | 34 struct ncpaddr peer; /* peer address */ member in struct:iface_addr
|
iface.c | 189 ncpaddr_setsa(&addr->peer, sa[RTAX_BRD]); 191 ncpaddr_init(&addr->peer); 214 ncpaddr_getsa(&addr->peer, &sspeer); 229 if (ncpaddr_family(&addr->peer) == AF_UNSPEC) { 242 ifra.ifra_name, buf, ncpaddr_ntoa(&addr->peer), res); 254 if (ncpaddr_family(&addr->peer) == AF_UNSPEC) 274 if (ncpaddr_family(&addr->peer) == AF_UNSPEC) 278 snprintf(dst, sizeof dst, "%s", ncpaddr_ntoa(&addr->peer)); 299 ncpaddr_getsa(&addr->peer, &sspeer); 314 if (ncpaddr_family(&addr->peer) == AF_UNSPEC) [all...] |
/external/openssl/crypto/bio/ |
bss_bio.c | 57 * of this kind, handled by the same thread (i.e. the "peer" is actually 127 BIO *peer; /* NULL if buf == NULL. member in struct:bio_bio_st 128 * If peer != NULL, then peer->ptr is also a bio_bio_st, 129 * and its "peer" member points back to us. 130 * peer != NULL iff init != 0 in the BIO. */ 132 /* This is for what we write (i.e. reading uses peer's struct): */ 133 int closed; /* valid iff peer != NULL */ 134 size_t len; /* valid iff buf != NULL; 0 if peer == NULL */ 139 size_t request; /* valid iff peer != NULL; 0 if len != 0 [all...] |
/frameworks/base/core/java/com/android/internal/os/ |
ZygoteConnection.java | 68 * mSocket is retained in the child process in "peer wait" mode, so 70 * it is closed in the peer. 75 private final Credentials peer; field in class:ZygoteConnection 80 * this peer. If "peer wait" mode is specified, the process that requested 86 * "peer-wait" mode was not requested. 108 peer = mSocket.getPeerCredentials(); 110 Log.e(TAG, "Cannot read peer credentials", ex); 213 applyUidSecurityPolicy(parsedArgs, peer, peerSecurityContext); 214 applyRlimitSecurityPolicy(parsedArgs, peer, peerSecurityContext) [all...] |
/external/openssl/crypto/evp/ |
pmeth_fn.c | 285 int EVP_PKEY_derive_set_peer(EVP_PKEY_CTX *ctx, EVP_PKEY *peer) 301 ret = ctx->pmeth->ctrl(ctx, EVP_PKEY_CTRL_PEER_KEY, 0, peer); 315 if (ctx->pkey->type != peer->type) 322 /* ran@cryptocom.ru: For clarity. The error is if parameters in peer are 327 if (!EVP_PKEY_missing_parameters(peer) && 328 !EVP_PKEY_cmp_parameters(ctx->pkey, peer)) 337 ctx->peerkey = peer; 339 ret = ctx->pmeth->ctrl(ctx, EVP_PKEY_CTRL_PEER_KEY, 1, peer); 347 CRYPTO_add(&peer->references,1,CRYPTO_LOCK_EVP_PKEY);
|
/external/wpa_supplicant_6/wpa_supplicant/src/wps/ |
wps_upnp.h | 29 void *priv, struct upnp_wps_peer *peer); 31 void *priv, struct upnp_wps_peer *peer,
|