/development/samples/AppNavigation/src/com/example/android/appnavigation/app/ |
PeerActivity.java | 36 setContentView(R.layout.peer);
|
/external/libppp/src/ |
chap.h | 52 u_char peer[CHAPCHALLENGELEN + AUTHLEN]; /* Peer gave us this one */ member in struct:chap::__anon9578
|
mppe.c | 113 * The peer has missed a packet. Mark the next output frame to be FLUSHED 539 u_int32_t mval, peer; local 541 ua_ntohl(o->data, &peer); 551 * whatever the peer asks for. 555 mval |= (peer & MPPE_OPT_BITMASK); 563 mval |= (peer & MPPE_OPT_STATELESS); 572 * The peer has requested the given options 578 u_int32_t mval, peer; local 581 ua_ntohl(o->data, &peer); 583 if (peer != 0) [all...] |
mp.c | 92 peerid_Init(struct peerid *peer) 94 peer->enddisc.class = 0; 95 *peer->enddisc.address = '\0'; 96 peer->enddisc.len = 0; 97 *peer->authname = '\0'; 245 peerid_Init(&mp->peer); 303 if (!peerid_Equal(&dl->peer, &mp->peer)) { 304 log_Printf(LogPHASE, "%s: Inappropriate peer !\n", dl->name); 305 log_Printf(LogPHASE, " Attached to peer %s/%s\n", mp->peer.authname [all...] |
route.c | 550 const struct ncpaddr *me, const struct ncpaddr *peer) 561 ncpaddr_copy(&r->gw, peer); 562 } else if ((r->type & ROUTE_DSTHISADDR) && !ncpaddr_equal(&dst, peer)) { 564 ncprange_sethost(&r->dst, peer); 566 ncpaddr_copy(&r->gw, peer); 567 } else if ((r->type & ROUTE_DSTDNS0) && !ncpaddr_equal(&dst, peer)) { 572 ncpaddr_copy(&r->gw, peer); 573 } else if ((r->type & ROUTE_DSTDNS1) && !ncpaddr_equal(&dst, peer)) { 578 ncpaddr_copy(&r->gw, peer); 579 } else if ((r->type & ROUTE_GWHISADDR) && !ncpaddr_equal(&r->gw, peer)) [all...] |
hdlc.h | 50 #define DEF_MTU 0 /* whatever peer says */ 78 u_int32_t ifInUniPackets; /* Packets received from peer */ 81 u_int32_t ifInOctets; /* Octets received from peer (unused) */ 84 u_int32_t InGoodOctets; /* Good octets received from peer */ 86 u_int32_t InLQRs; /* LQRs received from peer */ 91 struct lqrdata peer; /* Last LQR from peer */ member in struct:hdlc::__anon9593::__anon9594
|
radius.h | 98 } peer; member in struct:radacct
|
lqr.c | 232 memcpy(&lastlqr, &p->hdlc.lqm.lqr.peer, sizeof lastlqr); 233 lqr_ChangeOrder(lqr, &p->hdlc.lqm.lqr.peer); 234 lqr_Dump(l->name, "Input", &p->hdlc.lqm.lqr.peer); 235 /* we have received an LQR from our peer */ 247 lqr_Analyse(&p->hdlc, &lastlqr, &p->hdlc.lqm.lqr.peer); 255 lastlqr.PeerInLQRs == p->hdlc.lqm.lqr.peer.PeerInLQRs)) 275 memset(&physical->hdlc.lqm.lqr.peer, '\0', 276 sizeof physical->hdlc.lqm.lqr.peer); 404 log_Printf(LogLQM, " Likely due to both peer congestion" 407 log_Printf(LogLQM, " Likely due to peer congestion\n") [all...] |
/bootable/recovery/minadbd/ |
adb.c | 326 s->peer = create_remote_socket(p->msg.arg0, t); 327 s->peer->peer = s; 328 send_ready(s->id, s->peer->id, t); 337 if(s->peer == 0) { 338 s->peer = create_remote_socket(p->msg.arg0, t); 339 s->peer->peer = s;
|
/external/openssl/crypto/bio/ |
bss_dgram.c | 152 } peer; member in struct:bio_dgram_data_st 176 } peer; member in struct:bio_dgram_sctp_data_st 363 } peer; member in struct:__anon11257 367 sa.len.i=sizeof(sa.peer); 372 memset(&sa.peer, 0x00, sizeof(sa.peer)); 374 ret=recvfrom(b->num,out,outl,0,&sa.peer.sa,(void *)&sa.len); 377 OPENSSL_assert(sa.len.s<=sizeof(sa.peer)); 382 BIO_ctrl(b, BIO_CTRL_DGRAM_SET_PEER, 0, &sa.peer); 409 int peerlen = sizeof(data->peer); [all...] |
/external/ipsec-tools/src/racoon/ |
sainfo.c | 76 * First pass is for sainfo from a specified peer, second for others. 79 getsainfo(loc, rmt, peer, remoteid) 80 const vchar_t *loc, *rmt, *peer; 87 if (peer == NULL) 104 if (peer == NULL) 107 dpeer = ipsecdoi_id2str(peer); 110 "getsainfo params: loc=\'%s\', rmt=\'%s\', peer=\'%s\', id=%i\n", 133 if (ipsecdoi_chkcmpids(peer, s->id_i, 0)) 294 snprintf(buf, 255, "loc=\'%s\', rmt=\'%s\', peer=\'%s\', id=%i",
|
/external/openssh/ |
kex.c | 184 buffer_clear(&kex->peer); 238 buffer_append(&kex->peer, ptr, dlen); 258 buffer_init(&kex->peer); 378 proposals_match(char *my[PROPOSAL_MAX], char *peer[PROPOSAL_MAX]) 389 if ((p = strchr(peer[*idx], ',')) != NULL) 391 if (strcmp(my[*idx], peer[*idx]) != 0) { 392 debug2("proposal mismatch: my %s peer %s", 393 my[*idx], peer[*idx]); 405 char **my, **peer; local 412 peer = kex_buf2prop(&kex->peer, &first_kex_follows) [all...] |
kexdhc.c | 135 buffer_ptr(&kex->peer), buffer_len(&kex->peer),
|
/external/wpa_supplicant_8/src/p2p/ |
p2p_go_neg.c | 50 wpa_hexdump_ascii(MSG_DEBUG, "P2P: Peer country", pos, 3); 53 "P2P: Mismatching country (ours=%c%c peer's=%c%c)", 65 "P2P: Invalid peer Channel List"); 80 "peer reg_classes %d intersection reg_classes %d", 132 struct p2p_device *peer) 148 peer->dialog_token++; 149 if (peer->dialog_token == 0) 150 peer->dialog_token = 1; 151 p2p_buf_add_public_action_hdr(buf, P2P_GO_NEG_REQ, peer->dialog_token); 155 if (peer->flags & P2P_DEV_PREFER_PERSISTENT_GROUP) [all...] |
p2p_invitation.c | 18 struct p2p_device *peer, 51 peer->dialog_token++; 52 if (peer->dialog_token == 0) 53 peer->dialog_token = 1; 55 peer->dialog_token); 73 dev_addr = peer->info.p2p_device_addr; 77 p2p_buf_add_device_info(buf, p2p, peer); 90 struct p2p_device *peer, 176 "P2P: Invitation Request from unknown peer " 192 "peer " MACSTR, MAC2STR(sa)) [all...] |
/external/dnsmasq/src/ |
tftp.c | 46 struct sockaddr_in addr, peer; local 72 msg.msg_name = &peer; 73 msg.msg_namelen = sizeof(peer); 153 transfer->peer = peer; 194 len = tftp_err(ERR_ILL, packet, _("unsupported request from %s"), inet_ntoa(peer.sin_addr)); 244 strncat(daemon->namebuff, inet_ntoa(peer.sin_addr), (MAXDNAME-1) - strlen(daemon->namebuff)); 276 (struct sockaddr *)&peer, sizeof(peer)) == -1 && errno == EINTR); 282 my_syslog(MS_TFTP | LOG_INFO, _("TFTP sent %s to %s"), daemon->namebuff, inet_ntoa(peer.sin_addr)) [all...] |
/libcore/luni/src/main/java/java/net/ |
DatagramSocket.java | 465 * Connects this datagram socket to the address and port specified by {@code peer}. 471 public void connect(SocketAddress peer) throws SocketException { 472 if (peer == null) { 473 throw new IllegalArgumentException("peer == null"); 476 if (!(peer instanceof InetSocketAddress)) { 477 throw new IllegalArgumentException("peer not an InetSocketAddress: " + peer.getClass()); 480 InetSocketAddress isa = (InetSocketAddress) peer;
|
/libcore/luni/src/main/native/ |
libcore_icu_NativeBreakIterator.cpp | 146 BreakIteratorPeer* peer = BreakIteratorPeer::fromAddress(address); local 147 peer->close(env); 148 delete peer; 156 BreakIteratorPeer* peer = BreakIteratorPeer::fromAddress(address); local 157 peer->setText(env, javaText);
|
/external/chromium/chrome/browser/extensions/ |
extension_function.h | 74 void set_dispatcher_peer(ExtensionFunctionDispatcher::Peer* peer) { 75 peer_ = peer; 130 // The peer to the dispatcher that will service this extension function call. 131 scoped_refptr<ExtensionFunctionDispatcher::Peer> peer_;
|
/development/samples/SupportAppNavigation/src/com/example/android/support/appnavigation/app/ |
PeerActivity.java | 39 setContentView(R.layout.peer);
|
/external/bluetooth/bluedroid/btif/include/ |
btif_pan_internal.h | 69 BD_ADDR peer; member in struct:__anon2437
|
/external/iptables/include/libipq/ |
libipq.h | 53 struct sockaddr_nl peer; member in struct:ipq_handle
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/rpcsvc/ |
yp.x | 88 peername peer; 134 peername peer;
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/rpcsvc/ |
yp.x | 88 peername peer; 134 peername peer;
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/rpcsvc/ |
yp.x | 88 peername peer; 134 peername peer;
|