/frameworks/base/core/java/android/net/arp/ |
ArpPeer.java | 57 InetAddress peer) throws SocketException { 68 if (myAddr instanceof Inet6Address || peer instanceof Inet6Address) { 72 mPeer = peer; 81 * peer. 151 ArpPeer peer = new ArpPeer(interfaceName, inetAddress, myMacAddress, gateway); local 154 if(peer.doArp(timeoutMillis) != null) responses++; 158 peer.close();
|
/external/iptables/libipq/ |
libipq.c | 77 { IPQ_ERR_ADDRLEN, "Invalid peer address length" }, 107 (struct sockaddr *)&h->peer, sizeof(h->peer)); 135 addrlen = sizeof(h->peer); 168 (struct sockaddr *)&h->peer, &addrlen); 173 if (addrlen != sizeof(h->peer)) { 177 if (h->peer.nl_pid != 0) { 249 memset(&h->peer, 0, sizeof(struct sockaddr_nl)); 250 h->peer.nl_family = AF_NETLINK; 251 h->peer.nl_pid = 0 [all...] |
/external/chromium/chrome/common/extensions/ |
extension_localization_peer.cc | 18 webkit_glue::ResourceLoaderBridge::Peer* peer, 21 : original_peer_(peer), 32 webkit_glue::ResourceLoaderBridge::Peer* peer, 40 new ExtensionLocalizationPeer(peer, message_sender, request_url) : NULL;
|
extension_localization_peer.h | 15 // webkit_glue::ResourceLoaderBridge::Peer instance. It is used to pre-process 20 // instance of ExtensionLocalizationPeer based on the original Peer. 22 : public webkit_glue::ResourceLoaderBridge::Peer { 27 webkit_glue::ResourceLoaderBridge::Peer* peer, 32 // ResourceLoaderBridge::Peer methods. 54 webkit_glue::ResourceLoaderBridge::Peer* peer, 62 // Original peer that handles the request once we are done processing data_. 63 webkit_glue::ResourceLoaderBridge::Peer* original_peer_ [all...] |
/external/chromium_org/chrome/renderer/extensions/ |
extension_localization_peer.cc | 18 webkit_glue::ResourceLoaderBridge::Peer* peer, 21 : original_peer_(peer), 32 webkit_glue::ResourceLoaderBridge::Peer* peer, 40 new ExtensionLocalizationPeer(peer, message_sender, request_url) : NULL;
|
extension_localization_peer.h | 14 // webkit_glue::ResourceLoaderBridge::Peer instance. It is used to pre-process 19 // instance of ExtensionLocalizationPeer based on the original Peer. 21 : public webkit_glue::ResourceLoaderBridge::Peer { 26 webkit_glue::ResourceLoaderBridge::Peer* peer, 31 // ResourceLoaderBridge::Peer methods. 55 webkit_glue::ResourceLoaderBridge::Peer* peer, 63 // Original peer that handles the request once we are done processing data_. 64 webkit_glue::ResourceLoaderBridge::Peer* original_peer_ [all...] |
/external/chromium_org/sandbox/win/src/ |
broker_services.cc | 63 // Helper structure that allows the broker to track peer processes 74 void DeregisterPeerTracker(PeerTracker* peer) { 76 if (::UnregisterWaitEx(peer->wait_object, INVALID_HANDLE_VALUE)) { 77 delete peer; 147 // Cancel the wait events and delete remaining peer trackers. 448 PeerTracker* peer = reinterpret_cast<PeerTracker*>(parameter); local 450 ::PostQueuedCompletionStatus(peer->job_port, 0, THREAD_CTRL_REMOVE_PEER, 451 reinterpret_cast<LPOVERLAPPED>(peer->id)); 455 scoped_ptr<PeerTracker> peer(new PeerTracker(::GetProcessId(peer_process), 457 if (!peer->id [all...] |
/external/chromium_org/v8/tools/testrunner/network/ |
distro.py | 77 # Pick the least-busy peer. Sorting the list for each test 81 # If the peer already has a shell assigned and would need this one 83 peer = peers[index] 84 if (shell.total_duration < peer.needed_work and 85 len(peer.shells) > 0 and 90 peer.AddTests(shell)
|
network_execution.py | 38 from ..objects import peer namespace 49 return [ peer.Peer.Unpack(p) for p in data ] 141 # Spawn one thread for each peer. 168 def _TalkToPeer(self, peer): 171 code = sock.connect_ex((peer.address, constants.PEER_PORT)) 174 peer.runtime = None 176 packet = workpacket.WorkPacket(peer=peer, context=self.context, 189 # The peer is reporting an error [all...] |
/external/libppp/src/ |
iface.h | 34 struct ncpaddr peer; /* peer address */ member in struct:iface_addr
|
iface.c | 189 ncpaddr_setsa(&addr->peer, sa[RTAX_BRD]); 191 ncpaddr_init(&addr->peer); 214 ncpaddr_getsa(&addr->peer, &sspeer); 229 if (ncpaddr_family(&addr->peer) == AF_UNSPEC) { 242 ifra.ifra_name, buf, ncpaddr_ntoa(&addr->peer), res); 254 if (ncpaddr_family(&addr->peer) == AF_UNSPEC) 274 if (ncpaddr_family(&addr->peer) == AF_UNSPEC) 278 snprintf(dst, sizeof dst, "%s", ncpaddr_ntoa(&addr->peer)); 299 ncpaddr_getsa(&addr->peer, &sspeer); 314 if (ncpaddr_family(&addr->peer) == AF_UNSPEC) [all...] |
/external/wpa_supplicant_8/wpa_supplicant/examples/ |
wps-nfc.py | 143 def wps_handover_resp(peer, uuid): 153 nfc.llcp.activate(peer); 170 print "Remove peer" 176 def wps_handover_init(peer): 198 nfc.llcp.activate(peer); 243 print "Remove peer" 344 peer = clf.listen(ord(os.urandom(1)) + 250, general_bytes) 345 if isinstance(peer, nfc.DEP): 347 if peer.general_bytes.startswith("Ffm"): 349 return peer [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/bio/ |
bss_bio.c | 57 * of this kind, handled by the same thread (i.e. the "peer" is actually 127 BIO *peer; /* NULL if buf == NULL. member in struct:bio_bio_st 128 * If peer != NULL, then peer->ptr is also a bio_bio_st, 129 * and its "peer" member points back to us. 130 * peer != NULL iff init != 0 in the BIO. */ 132 /* This is for what we write (i.e. reading uses peer's struct): */ 133 int closed; /* valid iff peer != NULL */ 134 size_t len; /* valid iff buf != NULL; 0 if peer == NULL */ 139 size_t request; /* valid iff peer != NULL; 0 if len != 0 [all...] |
/external/openssl/crypto/bio/ |
bss_bio.c | 57 * of this kind, handled by the same thread (i.e. the "peer" is actually 127 BIO *peer; /* NULL if buf == NULL. member in struct:bio_bio_st 128 * If peer != NULL, then peer->ptr is also a bio_bio_st, 129 * and its "peer" member points back to us. 130 * peer != NULL iff init != 0 in the BIO. */ 132 /* This is for what we write (i.e. reading uses peer's struct): */ 133 int closed; /* valid iff peer != NULL */ 134 size_t len; /* valid iff buf != NULL; 0 if peer == NULL */ 139 size_t request; /* valid iff peer != NULL; 0 if len != 0 [all...] |
/frameworks/base/core/java/com/android/internal/os/ |
ZygoteConnection.java | 68 * mSocket is retained in the child process in "peer wait" mode, so 70 * it is closed in the peer. 75 private final Credentials peer; field in class:ZygoteConnection 96 peer = mSocket.getPeerCredentials(); 98 Log.e(TAG, "Cannot read peer credentials", ex); 201 applyUidSecurityPolicy(parsedArgs, peer, peerSecurityContext); 202 applyRlimitSecurityPolicy(parsedArgs, peer, peerSecurityContext); 203 applyCapabilitiesSecurityPolicy(parsedArgs, peer, peerSecurityContext); 204 applyInvokeWithSecurityPolicy(parsedArgs, peer, peerSecurityContext); 205 applyseInfoSecurityPolicy(parsedArgs, peer, peerSecurityContext) [all...] |
/external/chromium_org/net/quic/crypto/ |
crypto_handshake_test.cc | 172 QuicCryptoServerConfigPeer peer(&server); 177 const string token4 = peer.NewSourceAddressToken(ip4, rand, now); 178 const string token6 = peer.NewSourceAddressToken(ip6, rand, now); 179 EXPECT_TRUE(peer.ValidateSourceAddressToken(token4, ip4, now)); 180 EXPECT_FALSE(peer.ValidateSourceAddressToken(token4, ip6, now)); 181 EXPECT_TRUE(peer.ValidateSourceAddressToken(token6, ip6, now)); 184 EXPECT_FALSE(peer.ValidateSourceAddressToken(token4, ip4, now)); 187 EXPECT_FALSE(peer.ValidateSourceAddressToken(token4, ip4, now));
|
/external/chromium_org/third_party/openssl/openssl/crypto/evp/ |
pmeth_fn.c | 285 int EVP_PKEY_derive_set_peer(EVP_PKEY_CTX *ctx, EVP_PKEY *peer) 301 ret = ctx->pmeth->ctrl(ctx, EVP_PKEY_CTRL_PEER_KEY, 0, peer); 315 if (ctx->pkey->type != peer->type) 322 /* ran@cryptocom.ru: For clarity. The error is if parameters in peer are 327 if (!EVP_PKEY_missing_parameters(peer) && 328 !EVP_PKEY_cmp_parameters(ctx->pkey, peer)) 337 ctx->peerkey = peer; 339 ret = ctx->pmeth->ctrl(ctx, EVP_PKEY_CTRL_PEER_KEY, 1, peer); 347 CRYPTO_add(&peer->references,1,CRYPTO_LOCK_EVP_PKEY);
|
/external/openssl/crypto/evp/ |
pmeth_fn.c | 285 int EVP_PKEY_derive_set_peer(EVP_PKEY_CTX *ctx, EVP_PKEY *peer) 301 ret = ctx->pmeth->ctrl(ctx, EVP_PKEY_CTRL_PEER_KEY, 0, peer); 315 if (ctx->pkey->type != peer->type) 322 /* ran@cryptocom.ru: For clarity. The error is if parameters in peer are 327 if (!EVP_PKEY_missing_parameters(peer) && 328 !EVP_PKEY_cmp_parameters(ctx->pkey, peer)) 337 ctx->peerkey = peer; 339 ret = ctx->pmeth->ctrl(ctx, EVP_PKEY_CTRL_PEER_KEY, 1, peer); 347 CRYPTO_add(&peer->references,1,CRYPTO_LOCK_EVP_PKEY);
|
/external/iputils/ |
tftpd.c | 79 int peer; variable 189 peer = socket(from.sa.sa_family, SOCK_DGRAM, 0); 190 if (peer < 0) { 194 if (connect(peer, (struct sockaddr *)&from, sizeof(from)) < 0) { 372 if (send(peer, dp, size + 4, confirmed) != size + 4) { 380 n = recv(peer, ackbuf, sizeof (ackbuf), 0); 398 synchnet(peer); 437 if (send(peer, ackbuf, 4, confirmed) != 4) { 445 n = recv(peer, dp, PKTSIZE, 0); 461 (void) synchnet(peer); [all...] |
/external/chromium_org/content/child/ |
resource_dispatcher.cc | 76 virtual bool Start(Peer* peer) OVERRIDE; 83 ResourceLoaderBridge::Peer* peer_; 172 bool IPCResourceLoaderBridge::Start(Peer* peer) { 178 peer_ = peer; 325 request_info->peer->OnUploadProgress(position, size); 340 ResourceLoaderBridge::Peer* new_peer = 342 request_info->peer, response_head.mime_type, request_info->url); 344 request_info->peer = new_peer 498 ResourceLoaderBridge::Peer* peer = request_info->peer; local [all...] |
/external/smack/src/org/jivesoftware/smackx/filetransfer/ |
FileTransfer.java | 43 private String peer;
field in class:FileTransfer 64 protected FileTransfer(String peer, String streamID,
66 this.peer = peer;
110 * Returns the JID of the peer for this file transfer.
112 * @return Returns the JID of the peer for this file transfer.
115 return peer;
261 * The file transfer is being negotiated with the peer. The party
271 * The peer has refused the file transfer request halting the file
335 * The peer did not find any of the provided stream mechanisms [all...] |
/external/chromium_org/v8/tools/testrunner/server/ |
main.py | 151 def AddPeer(self, peer): 154 if p.address == peer.address: 156 self.peers.append(peer) 157 if peer.trusted: 158 status_handler.ITrustYouNow(peer) 187 for peer in self.peers: 188 if peer.address == self.ip: continue 189 if peer.pubkey == fingerprint: 190 status_handler.ITrustYouNow(peer) 193 status_handler.NotifyNewTrusted(peer, result [all...] |
/external/chromium_org/third_party/openssl/openssl/apps/ |
sess_id.c | 93 X509 *peer = NULL; local 167 peer = SSL_SESSION_get0_peer(x); 236 if (peer == NULL) 239 X509_print(out,peer); 258 else if (!noout && (peer != NULL)) /* just print the certificate */ 261 i=(int)i2d_X509_bio(out,peer); 263 i=PEM_write_bio_X509(out,peer);
|
/external/openssl/apps/ |
sess_id.c | 93 X509 *peer = NULL; local 167 peer = SSL_SESSION_get0_peer(x); 236 if (peer == NULL) 239 X509_print(out,peer); 258 else if (!noout && (peer != NULL)) /* just print the certificate */ 261 i=(int)i2d_X509_bio(out,peer); 263 i=PEM_write_bio_X509(out,peer);
|
/external/qemu/ |
qemu-sockets.c | 289 /* connect to peer */ 311 struct addrinfo ai, *peer = NULL, *local = NULL; local 318 /* lookup peer addr */ 339 if (0 != (rc = getaddrinfo(addr, port, &ai, &peer))) { 345 fprintf(stderr, "%s: peer (%s:%s)\n", __FUNCTION__, addr, port); 346 inet_print_addrinfo(__FUNCTION__, peer); 352 ai.ai_family = peer->ai_family; 374 sock = qemu_socket(peer->ai_family, peer->ai_socktype, peer->ai_protocol) [all...] |