HomeSort by relevance Sort by last modified time
    Searched refs:peer (Results 26 - 50 of 162) sorted by null

12 3 4 5 6 7

  /external/chromium/chrome/common/extensions/
extension_localization_peer.h 15 // webkit_glue::ResourceLoaderBridge::Peer instance. It is used to pre-process
20 // instance of ExtensionLocalizationPeer based on the original Peer.
22 : public webkit_glue::ResourceLoaderBridge::Peer {
27 webkit_glue::ResourceLoaderBridge::Peer* peer,
32 // ResourceLoaderBridge::Peer methods.
54 webkit_glue::ResourceLoaderBridge::Peer* peer,
62 // Original peer that handles the request once we are done processing data_.
63 webkit_glue::ResourceLoaderBridge::Peer* original_peer_
    [all...]
  /external/openssl/crypto/evp/
pmeth_fn.c 285 int EVP_PKEY_derive_set_peer(EVP_PKEY_CTX *ctx, EVP_PKEY *peer)
301 ret = ctx->pmeth->ctrl(ctx, EVP_PKEY_CTRL_PEER_KEY, 0, peer);
315 if (ctx->pkey->type != peer->type)
322 /* ran@cryptocom.ru: For clarity. The error is if parameters in peer are
327 if (!EVP_PKEY_missing_parameters(peer) &&
328 !EVP_PKEY_cmp_parameters(ctx->pkey, peer))
337 ctx->peerkey = peer;
339 ret = ctx->pmeth->ctrl(ctx, EVP_PKEY_CTRL_PEER_KEY, 1, peer);
347 CRYPTO_add(&peer->references,1,CRYPTO_LOCK_EVP_PKEY);
  /external/smack/src/org/jivesoftware/smackx/filetransfer/
FileTransfer.java 43 private String peer; field in class:FileTransfer
64 protected FileTransfer(String peer, String streamID,
66 this.peer = peer;
110 * Returns the JID of the peer for this file transfer.
112 * @return Returns the JID of the peer for this file transfer.
115 return peer;
261 * The file transfer is being negotiated with the peer. The party
271 * The peer has refused the file transfer request halting the file
335 * The peer did not find any of the provided stream mechanisms
    [all...]
  /external/libppp/src/
iface.c 189 ncpaddr_setsa(&addr->peer, sa[RTAX_BRD]);
191 ncpaddr_init(&addr->peer);
214 ncpaddr_getsa(&addr->peer, &sspeer);
229 if (ncpaddr_family(&addr->peer) == AF_UNSPEC) {
242 ifra.ifra_name, buf, ncpaddr_ntoa(&addr->peer), res);
254 if (ncpaddr_family(&addr->peer) == AF_UNSPEC)
274 if (ncpaddr_family(&addr->peer) == AF_UNSPEC)
278 snprintf(dst, sizeof dst, "%s", ncpaddr_ntoa(&addr->peer));
299 ncpaddr_getsa(&addr->peer, &sspeer);
314 if (ncpaddr_family(&addr->peer) == AF_UNSPEC)
    [all...]
chap.h 52 u_char peer[CHAPCHALLENGELEN + AUTHLEN]; /* Peer gave us this one */ member in struct:chap::__anon10749
mppe.c 113 * The peer has missed a packet. Mark the next output frame to be FLUSHED
539 u_int32_t mval, peer; local
541 ua_ntohl(o->data, &peer);
551 * whatever the peer asks for.
555 mval |= (peer & MPPE_OPT_BITMASK);
563 mval |= (peer & MPPE_OPT_STATELESS);
572 * The peer has requested the given options
578 u_int32_t mval, peer; local
581 ua_ntohl(o->data, &peer);
583 if (peer != 0)
    [all...]
mp.c 92 peerid_Init(struct peerid *peer)
94 peer->enddisc.class = 0;
95 *peer->enddisc.address = '\0';
96 peer->enddisc.len = 0;
97 *peer->authname = '\0';
245 peerid_Init(&mp->peer);
303 if (!peerid_Equal(&dl->peer, &mp->peer)) {
304 log_Printf(LogPHASE, "%s: Inappropriate peer !\n", dl->name);
305 log_Printf(LogPHASE, " Attached to peer %s/%s\n", mp->peer.authname
    [all...]
route.c 550 const struct ncpaddr *me, const struct ncpaddr *peer)
561 ncpaddr_copy(&r->gw, peer);
562 } else if ((r->type & ROUTE_DSTHISADDR) && !ncpaddr_equal(&dst, peer)) {
564 ncprange_sethost(&r->dst, peer);
566 ncpaddr_copy(&r->gw, peer);
567 } else if ((r->type & ROUTE_DSTDNS0) && !ncpaddr_equal(&dst, peer)) {
572 ncpaddr_copy(&r->gw, peer);
573 } else if ((r->type & ROUTE_DSTDNS1) && !ncpaddr_equal(&dst, peer)) {
578 ncpaddr_copy(&r->gw, peer);
579 } else if ((r->type & ROUTE_GWHISADDR) && !ncpaddr_equal(&r->gw, peer))
    [all...]
hdlc.h 50 #define DEF_MTU 0 /* whatever peer says */
78 u_int32_t ifInUniPackets; /* Packets received from peer */
81 u_int32_t ifInOctets; /* Octets received from peer (unused) */
84 u_int32_t InGoodOctets; /* Good octets received from peer */
86 u_int32_t InLQRs; /* LQRs received from peer */
91 struct lqrdata peer; /* Last LQR from peer */ member in struct:hdlc::__anon10764::__anon10765
  /external/openssl/apps/
sess_id.c 93 X509 *peer = NULL; local
167 peer = SSL_SESSION_get0_peer(x);
236 if (peer == NULL)
239 X509_print(out,peer);
258 else if (!noout && (peer != NULL)) /* just print the certificate */
261 i=(int)i2d_X509_bio(out,peer);
263 i=PEM_write_bio_X509(out,peer);
  /external/qemu/
qemu-sockets.c 289 /* connect to peer */
311 struct addrinfo ai, *peer = NULL, *local = NULL; local
318 /* lookup peer addr */
339 if (0 != (rc = getaddrinfo(addr, port, &ai, &peer))) {
345 fprintf(stderr, "%s: peer (%s:%s)\n", __FUNCTION__, addr, port);
346 inet_print_addrinfo(__FUNCTION__, peer);
352 ai.ai_family = peer->ai_family;
374 sock = qemu_socket(peer->ai_family, peer->ai_socktype, peer->ai_protocol)
    [all...]
  /development/samples/AppNavigation/src/com/example/android/appnavigation/app/
PeerActivity.java 36 setContentView(R.layout.peer);
  /bootable/recovery/minadbd/
adb.c 324 s->peer = create_remote_socket(p->msg.arg0, t);
325 s->peer->peer = s;
326 send_ready(s->id, s->peer->id, t);
335 if(s->peer == 0) {
336 s->peer = create_remote_socket(p->msg.arg0, t);
337 s->peer->peer = s;
  /external/openssl/crypto/bio/
bss_dgram.c 162 } peer; member in struct:bio_dgram_data_st
186 } peer; member in struct:bio_dgram_sctp_data_st
378 } peer; member in struct:__anon12505
382 sa.len.i=sizeof(sa.peer);
387 memset(&sa.peer, 0x00, sizeof(sa.peer));
389 ret=recvfrom(b->num,out,outl,0,&sa.peer.sa,(void *)&sa.len);
392 OPENSSL_assert(sa.len.s<=sizeof(sa.peer));
397 BIO_ctrl(b, BIO_CTRL_DGRAM_SET_PEER, 0, &sa.peer);
424 int peerlen = sizeof(data->peer);
    [all...]
  /external/ipsec-tools/src/racoon/
sainfo.c 76 * First pass is for sainfo from a specified peer, second for others.
79 getsainfo(loc, rmt, peer, remoteid)
80 const vchar_t *loc, *rmt, *peer;
87 if (peer == NULL)
104 if (peer == NULL)
107 dpeer = ipsecdoi_id2str(peer);
110 "getsainfo params: loc=\'%s\', rmt=\'%s\', peer=\'%s\', id=%i\n",
133 if (ipsecdoi_chkcmpids(peer, s->id_i, 0))
294 snprintf(buf, 255, "loc=\'%s\', rmt=\'%s\', peer=\'%s\', id=%i",
  /external/openssh/
kex.c 184 buffer_clear(&kex->peer);
238 buffer_append(&kex->peer, ptr, dlen);
258 buffer_init(&kex->peer);
378 proposals_match(char *my[PROPOSAL_MAX], char *peer[PROPOSAL_MAX])
389 if ((p = strchr(peer[*idx], ',')) != NULL)
391 if (strcmp(my[*idx], peer[*idx]) != 0) {
392 debug2("proposal mismatch: my %s peer %s",
393 my[*idx], peer[*idx]);
405 char **my, **peer; local
412 peer = kex_buf2prop(&kex->peer, &first_kex_follows)
    [all...]
kexdhc.c 135 buffer_ptr(&kex->peer), buffer_len(&kex->peer),
  /external/dnsmasq/src/
tftp.c 46 struct sockaddr_in addr, peer; local
72 msg.msg_name = &peer;
73 msg.msg_namelen = sizeof(peer);
153 transfer->peer = peer;
194 len = tftp_err(ERR_ILL, packet, _("unsupported request from %s"), inet_ntoa(peer.sin_addr));
244 strncat(daemon->namebuff, inet_ntoa(peer.sin_addr), (MAXDNAME-1) - strlen(daemon->namebuff));
276 (struct sockaddr *)&peer, sizeof(peer)) == -1 && errno == EINTR);
282 my_syslog(MS_TFTP | LOG_INFO, _("TFTP sent %s to %s"), daemon->namebuff, inet_ntoa(peer.sin_addr))
    [all...]
  /external/wpa_supplicant_8/src/p2p/
p2p_invitation.c 18 struct p2p_device *peer,
51 peer->dialog_token++;
52 if (peer->dialog_token == 0)
53 peer->dialog_token = 1;
55 peer->dialog_token);
66 !(peer->flags & P2P_DEV_NO_PREF_CHAN))
76 dev_addr = peer->info.p2p_device_addr;
80 p2p_buf_add_device_info(buf, p2p, peer);
93 struct p2p_device *peer,
179 "P2P: Invitation Request from unknown peer "
    [all...]
p2p_go_neg.c 50 wpa_hexdump_ascii(MSG_DEBUG, "P2P: Peer country", pos, 3);
53 "P2P: Mismatching country (ours=%c%c peer's=%c%c)",
65 "P2P: Invalid peer Channel List");
80 "peer reg_classes %d intersection reg_classes %d",
132 struct p2p_device *peer)
148 p2p_buf_add_public_action_hdr(buf, P2P_GO_NEG_REQ, peer->dialog_token);
152 if (peer->flags & P2P_DEV_PREFER_PERSISTENT_GROUP) {
154 if (peer->flags & P2P_DEV_PREFER_PERSISTENT_RECONN)
164 p2p_buf_add_go_intent(buf, (p2p->go_intent << 1) | peer->tie_breaker);
173 p2p_buf_add_device_info(buf, p2p, peer);
    [all...]
  /libcore/luni/src/main/java/java/net/
DatagramSocket.java 465 * Connects this datagram socket to the address and port specified by {@code peer}.
471 public void connect(SocketAddress peer) throws SocketException {
472 if (peer == null) {
473 throw new IllegalArgumentException("peer == null");
476 if (!(peer instanceof InetSocketAddress)) {
477 throw new IllegalArgumentException("peer not an InetSocketAddress: " + peer.getClass());
480 InetSocketAddress isa = (InetSocketAddress) peer;
  /external/chromium/chrome/browser/extensions/
extension_function.h 74 void set_dispatcher_peer(ExtensionFunctionDispatcher::Peer* peer) {
75 peer_ = peer;
130 // The peer to the dispatcher that will service this extension function call.
131 scoped_refptr<ExtensionFunctionDispatcher::Peer> peer_;
  /development/samples/SupportAppNavigation/src/com/example/android/support/appnavigation/app/
PeerActivity.java 39 setContentView(R.layout.peer);
  /external/bluetooth/bluedroid/btif/include/
btif_pan_internal.h 69 BD_ADDR peer; member in struct:__anon2924
  /external/iptables/include/libipq/
libipq.h 53 struct sockaddr_nl peer; member in struct:ipq_handle

Completed in 5077 milliseconds

12 3 4 5 6 7