/external/chromium/chrome/common/extensions/ |
extension_localization_peer.h | 15 // webkit_glue::ResourceLoaderBridge::Peer instance. It is used to pre-process 20 // instance of ExtensionLocalizationPeer based on the original Peer. 22 : public webkit_glue::ResourceLoaderBridge::Peer { 27 webkit_glue::ResourceLoaderBridge::Peer* peer, 32 // ResourceLoaderBridge::Peer methods. 54 webkit_glue::ResourceLoaderBridge::Peer* peer, 62 // Original peer that handles the request once we are done processing data_. 63 webkit_glue::ResourceLoaderBridge::Peer* original_peer_ [all...] |
/external/openssl/crypto/evp/ |
pmeth_fn.c | 285 int EVP_PKEY_derive_set_peer(EVP_PKEY_CTX *ctx, EVP_PKEY *peer) 301 ret = ctx->pmeth->ctrl(ctx, EVP_PKEY_CTRL_PEER_KEY, 0, peer); 315 if (ctx->pkey->type != peer->type) 322 /* ran@cryptocom.ru: For clarity. The error is if parameters in peer are 327 if (!EVP_PKEY_missing_parameters(peer) && 328 !EVP_PKEY_cmp_parameters(ctx->pkey, peer)) 337 ctx->peerkey = peer; 339 ret = ctx->pmeth->ctrl(ctx, EVP_PKEY_CTRL_PEER_KEY, 1, peer); 347 CRYPTO_add(&peer->references,1,CRYPTO_LOCK_EVP_PKEY);
|
/external/smack/src/org/jivesoftware/smackx/filetransfer/ |
FileTransfer.java | 43 private String peer;
field in class:FileTransfer 64 protected FileTransfer(String peer, String streamID,
66 this.peer = peer;
110 * Returns the JID of the peer for this file transfer.
112 * @return Returns the JID of the peer for this file transfer.
115 return peer;
261 * The file transfer is being negotiated with the peer. The party
271 * The peer has refused the file transfer request halting the file
335 * The peer did not find any of the provided stream mechanisms [all...] |
/external/libppp/src/ |
iface.c | 189 ncpaddr_setsa(&addr->peer, sa[RTAX_BRD]); 191 ncpaddr_init(&addr->peer); 214 ncpaddr_getsa(&addr->peer, &sspeer); 229 if (ncpaddr_family(&addr->peer) == AF_UNSPEC) { 242 ifra.ifra_name, buf, ncpaddr_ntoa(&addr->peer), res); 254 if (ncpaddr_family(&addr->peer) == AF_UNSPEC) 274 if (ncpaddr_family(&addr->peer) == AF_UNSPEC) 278 snprintf(dst, sizeof dst, "%s", ncpaddr_ntoa(&addr->peer)); 299 ncpaddr_getsa(&addr->peer, &sspeer); 314 if (ncpaddr_family(&addr->peer) == AF_UNSPEC) [all...] |
chap.h | 52 u_char peer[CHAPCHALLENGELEN + AUTHLEN]; /* Peer gave us this one */ member in struct:chap::__anon10749
|
mppe.c | 113 * The peer has missed a packet. Mark the next output frame to be FLUSHED 539 u_int32_t mval, peer; local 541 ua_ntohl(o->data, &peer); 551 * whatever the peer asks for. 555 mval |= (peer & MPPE_OPT_BITMASK); 563 mval |= (peer & MPPE_OPT_STATELESS); 572 * The peer has requested the given options 578 u_int32_t mval, peer; local 581 ua_ntohl(o->data, &peer); 583 if (peer != 0) [all...] |
mp.c | 92 peerid_Init(struct peerid *peer) 94 peer->enddisc.class = 0; 95 *peer->enddisc.address = '\0'; 96 peer->enddisc.len = 0; 97 *peer->authname = '\0'; 245 peerid_Init(&mp->peer); 303 if (!peerid_Equal(&dl->peer, &mp->peer)) { 304 log_Printf(LogPHASE, "%s: Inappropriate peer !\n", dl->name); 305 log_Printf(LogPHASE, " Attached to peer %s/%s\n", mp->peer.authname [all...] |
route.c | 550 const struct ncpaddr *me, const struct ncpaddr *peer) 561 ncpaddr_copy(&r->gw, peer); 562 } else if ((r->type & ROUTE_DSTHISADDR) && !ncpaddr_equal(&dst, peer)) { 564 ncprange_sethost(&r->dst, peer); 566 ncpaddr_copy(&r->gw, peer); 567 } else if ((r->type & ROUTE_DSTDNS0) && !ncpaddr_equal(&dst, peer)) { 572 ncpaddr_copy(&r->gw, peer); 573 } else if ((r->type & ROUTE_DSTDNS1) && !ncpaddr_equal(&dst, peer)) { 578 ncpaddr_copy(&r->gw, peer); 579 } else if ((r->type & ROUTE_GWHISADDR) && !ncpaddr_equal(&r->gw, peer)) [all...] |
hdlc.h | 50 #define DEF_MTU 0 /* whatever peer says */ 78 u_int32_t ifInUniPackets; /* Packets received from peer */ 81 u_int32_t ifInOctets; /* Octets received from peer (unused) */ 84 u_int32_t InGoodOctets; /* Good octets received from peer */ 86 u_int32_t InLQRs; /* LQRs received from peer */ 91 struct lqrdata peer; /* Last LQR from peer */ member in struct:hdlc::__anon10764::__anon10765
|
/external/openssl/apps/ |
sess_id.c | 93 X509 *peer = NULL; local 167 peer = SSL_SESSION_get0_peer(x); 236 if (peer == NULL) 239 X509_print(out,peer); 258 else if (!noout && (peer != NULL)) /* just print the certificate */ 261 i=(int)i2d_X509_bio(out,peer); 263 i=PEM_write_bio_X509(out,peer);
|
/external/qemu/ |
qemu-sockets.c | 289 /* connect to peer */ 311 struct addrinfo ai, *peer = NULL, *local = NULL; local 318 /* lookup peer addr */ 339 if (0 != (rc = getaddrinfo(addr, port, &ai, &peer))) { 345 fprintf(stderr, "%s: peer (%s:%s)\n", __FUNCTION__, addr, port); 346 inet_print_addrinfo(__FUNCTION__, peer); 352 ai.ai_family = peer->ai_family; 374 sock = qemu_socket(peer->ai_family, peer->ai_socktype, peer->ai_protocol) [all...] |
/development/samples/AppNavigation/src/com/example/android/appnavigation/app/ |
PeerActivity.java | 36 setContentView(R.layout.peer);
|
/bootable/recovery/minadbd/ |
adb.c | 324 s->peer = create_remote_socket(p->msg.arg0, t); 325 s->peer->peer = s; 326 send_ready(s->id, s->peer->id, t); 335 if(s->peer == 0) { 336 s->peer = create_remote_socket(p->msg.arg0, t); 337 s->peer->peer = s;
|
/external/openssl/crypto/bio/ |
bss_dgram.c | 162 } peer; member in struct:bio_dgram_data_st 186 } peer; member in struct:bio_dgram_sctp_data_st 378 } peer; member in struct:__anon12505 382 sa.len.i=sizeof(sa.peer); 387 memset(&sa.peer, 0x00, sizeof(sa.peer)); 389 ret=recvfrom(b->num,out,outl,0,&sa.peer.sa,(void *)&sa.len); 392 OPENSSL_assert(sa.len.s<=sizeof(sa.peer)); 397 BIO_ctrl(b, BIO_CTRL_DGRAM_SET_PEER, 0, &sa.peer); 424 int peerlen = sizeof(data->peer); [all...] |
/external/ipsec-tools/src/racoon/ |
sainfo.c | 76 * First pass is for sainfo from a specified peer, second for others. 79 getsainfo(loc, rmt, peer, remoteid) 80 const vchar_t *loc, *rmt, *peer; 87 if (peer == NULL) 104 if (peer == NULL) 107 dpeer = ipsecdoi_id2str(peer); 110 "getsainfo params: loc=\'%s\', rmt=\'%s\', peer=\'%s\', id=%i\n", 133 if (ipsecdoi_chkcmpids(peer, s->id_i, 0)) 294 snprintf(buf, 255, "loc=\'%s\', rmt=\'%s\', peer=\'%s\', id=%i",
|
/external/openssh/ |
kex.c | 184 buffer_clear(&kex->peer); 238 buffer_append(&kex->peer, ptr, dlen); 258 buffer_init(&kex->peer); 378 proposals_match(char *my[PROPOSAL_MAX], char *peer[PROPOSAL_MAX]) 389 if ((p = strchr(peer[*idx], ',')) != NULL) 391 if (strcmp(my[*idx], peer[*idx]) != 0) { 392 debug2("proposal mismatch: my %s peer %s", 393 my[*idx], peer[*idx]); 405 char **my, **peer; local 412 peer = kex_buf2prop(&kex->peer, &first_kex_follows) [all...] |
kexdhc.c | 135 buffer_ptr(&kex->peer), buffer_len(&kex->peer),
|
/external/dnsmasq/src/ |
tftp.c | 46 struct sockaddr_in addr, peer; local 72 msg.msg_name = &peer; 73 msg.msg_namelen = sizeof(peer); 153 transfer->peer = peer; 194 len = tftp_err(ERR_ILL, packet, _("unsupported request from %s"), inet_ntoa(peer.sin_addr)); 244 strncat(daemon->namebuff, inet_ntoa(peer.sin_addr), (MAXDNAME-1) - strlen(daemon->namebuff)); 276 (struct sockaddr *)&peer, sizeof(peer)) == -1 && errno == EINTR); 282 my_syslog(MS_TFTP | LOG_INFO, _("TFTP sent %s to %s"), daemon->namebuff, inet_ntoa(peer.sin_addr)) [all...] |
/external/wpa_supplicant_8/src/p2p/ |
p2p_invitation.c | 18 struct p2p_device *peer, 51 peer->dialog_token++; 52 if (peer->dialog_token == 0) 53 peer->dialog_token = 1; 55 peer->dialog_token); 66 !(peer->flags & P2P_DEV_NO_PREF_CHAN)) 76 dev_addr = peer->info.p2p_device_addr; 80 p2p_buf_add_device_info(buf, p2p, peer); 93 struct p2p_device *peer, 179 "P2P: Invitation Request from unknown peer " [all...] |
p2p_go_neg.c | 50 wpa_hexdump_ascii(MSG_DEBUG, "P2P: Peer country", pos, 3); 53 "P2P: Mismatching country (ours=%c%c peer's=%c%c)", 65 "P2P: Invalid peer Channel List"); 80 "peer reg_classes %d intersection reg_classes %d", 132 struct p2p_device *peer) 148 p2p_buf_add_public_action_hdr(buf, P2P_GO_NEG_REQ, peer->dialog_token); 152 if (peer->flags & P2P_DEV_PREFER_PERSISTENT_GROUP) { 154 if (peer->flags & P2P_DEV_PREFER_PERSISTENT_RECONN) 164 p2p_buf_add_go_intent(buf, (p2p->go_intent << 1) | peer->tie_breaker); 173 p2p_buf_add_device_info(buf, p2p, peer); [all...] |
/libcore/luni/src/main/java/java/net/ |
DatagramSocket.java | 465 * Connects this datagram socket to the address and port specified by {@code peer}. 471 public void connect(SocketAddress peer) throws SocketException { 472 if (peer == null) { 473 throw new IllegalArgumentException("peer == null"); 476 if (!(peer instanceof InetSocketAddress)) { 477 throw new IllegalArgumentException("peer not an InetSocketAddress: " + peer.getClass()); 480 InetSocketAddress isa = (InetSocketAddress) peer;
|
/external/chromium/chrome/browser/extensions/ |
extension_function.h | 74 void set_dispatcher_peer(ExtensionFunctionDispatcher::Peer* peer) { 75 peer_ = peer; 130 // The peer to the dispatcher that will service this extension function call. 131 scoped_refptr<ExtensionFunctionDispatcher::Peer> peer_;
|
/development/samples/SupportAppNavigation/src/com/example/android/support/appnavigation/app/ |
PeerActivity.java | 39 setContentView(R.layout.peer);
|
/external/bluetooth/bluedroid/btif/include/ |
btif_pan_internal.h | 69 BD_ADDR peer; member in struct:__anon2924
|
/external/iptables/include/libipq/ |
libipq.h | 53 struct sockaddr_nl peer; member in struct:ipq_handle
|