HomeSort by relevance Sort by last modified time
    Searched refs:peer (Results 26 - 50 of 239) sorted by null

12 3 4 5 6 7 8 910

  /frameworks/base/core/java/android/net/arp/
ArpPeer.java 57 InetAddress peer) throws SocketException {
68 if (myAddr instanceof Inet6Address || peer instanceof Inet6Address) {
72 mPeer = peer;
81 * peer.
151 ArpPeer peer = new ArpPeer(interfaceName, inetAddress, myMacAddress, gateway); local
154 if(peer.doArp(timeoutMillis) != null) responses++;
158 peer.close();
  /external/iptables/libipq/
libipq.c 77 { IPQ_ERR_ADDRLEN, "Invalid peer address length" },
107 (struct sockaddr *)&h->peer, sizeof(h->peer));
135 addrlen = sizeof(h->peer);
168 (struct sockaddr *)&h->peer, &addrlen);
173 if (addrlen != sizeof(h->peer)) {
177 if (h->peer.nl_pid != 0) {
249 memset(&h->peer, 0, sizeof(struct sockaddr_nl));
250 h->peer.nl_family = AF_NETLINK;
251 h->peer.nl_pid = 0
    [all...]
  /external/chromium/chrome/common/extensions/
extension_localization_peer.cc 18 webkit_glue::ResourceLoaderBridge::Peer* peer,
21 : original_peer_(peer),
32 webkit_glue::ResourceLoaderBridge::Peer* peer,
40 new ExtensionLocalizationPeer(peer, message_sender, request_url) : NULL;
extension_localization_peer.h 15 // webkit_glue::ResourceLoaderBridge::Peer instance. It is used to pre-process
20 // instance of ExtensionLocalizationPeer based on the original Peer.
22 : public webkit_glue::ResourceLoaderBridge::Peer {
27 webkit_glue::ResourceLoaderBridge::Peer* peer,
32 // ResourceLoaderBridge::Peer methods.
54 webkit_glue::ResourceLoaderBridge::Peer* peer,
62 // Original peer that handles the request once we are done processing data_.
63 webkit_glue::ResourceLoaderBridge::Peer* original_peer_
    [all...]
  /external/chromium_org/chrome/renderer/extensions/
extension_localization_peer.cc 18 webkit_glue::ResourceLoaderBridge::Peer* peer,
21 : original_peer_(peer),
32 webkit_glue::ResourceLoaderBridge::Peer* peer,
40 new ExtensionLocalizationPeer(peer, message_sender, request_url) : NULL;
extension_localization_peer.h 14 // webkit_glue::ResourceLoaderBridge::Peer instance. It is used to pre-process
19 // instance of ExtensionLocalizationPeer based on the original Peer.
21 : public webkit_glue::ResourceLoaderBridge::Peer {
26 webkit_glue::ResourceLoaderBridge::Peer* peer,
31 // ResourceLoaderBridge::Peer methods.
55 webkit_glue::ResourceLoaderBridge::Peer* peer,
63 // Original peer that handles the request once we are done processing data_.
64 webkit_glue::ResourceLoaderBridge::Peer* original_peer_
    [all...]
  /external/chromium_org/sandbox/win/src/
broker_services.cc 63 // Helper structure that allows the broker to track peer processes
74 void DeregisterPeerTracker(PeerTracker* peer) {
76 if (::UnregisterWaitEx(peer->wait_object, INVALID_HANDLE_VALUE)) {
77 delete peer;
147 // Cancel the wait events and delete remaining peer trackers.
448 PeerTracker* peer = reinterpret_cast<PeerTracker*>(parameter); local
450 ::PostQueuedCompletionStatus(peer->job_port, 0, THREAD_CTRL_REMOVE_PEER,
451 reinterpret_cast<LPOVERLAPPED>(peer->id));
455 scoped_ptr<PeerTracker> peer(new PeerTracker(::GetProcessId(peer_process),
457 if (!peer->id
    [all...]
  /external/chromium_org/v8/tools/testrunner/network/
distro.py 77 # Pick the least-busy peer. Sorting the list for each test
81 # If the peer already has a shell assigned and would need this one
83 peer = peers[index]
84 if (shell.total_duration < peer.needed_work and
85 len(peer.shells) > 0 and
90 peer.AddTests(shell)
network_execution.py 38 from ..objects import peer namespace
49 return [ peer.Peer.Unpack(p) for p in data ]
141 # Spawn one thread for each peer.
168 def _TalkToPeer(self, peer):
171 code = sock.connect_ex((peer.address, constants.PEER_PORT))
174 peer.runtime = None
176 packet = workpacket.WorkPacket(peer=peer, context=self.context,
189 # The peer is reporting an error
    [all...]
  /external/libppp/src/
iface.h 34 struct ncpaddr peer; /* peer address */ member in struct:iface_addr
iface.c 189 ncpaddr_setsa(&addr->peer, sa[RTAX_BRD]);
191 ncpaddr_init(&addr->peer);
214 ncpaddr_getsa(&addr->peer, &sspeer);
229 if (ncpaddr_family(&addr->peer) == AF_UNSPEC) {
242 ifra.ifra_name, buf, ncpaddr_ntoa(&addr->peer), res);
254 if (ncpaddr_family(&addr->peer) == AF_UNSPEC)
274 if (ncpaddr_family(&addr->peer) == AF_UNSPEC)
278 snprintf(dst, sizeof dst, "%s", ncpaddr_ntoa(&addr->peer));
299 ncpaddr_getsa(&addr->peer, &sspeer);
314 if (ncpaddr_family(&addr->peer) == AF_UNSPEC)
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/examples/
wps-nfc.py 143 def wps_handover_resp(peer, uuid):
153 nfc.llcp.activate(peer);
170 print "Remove peer"
176 def wps_handover_init(peer):
198 nfc.llcp.activate(peer);
243 print "Remove peer"
344 peer = clf.listen(ord(os.urandom(1)) + 250, general_bytes)
345 if isinstance(peer, nfc.DEP):
347 if peer.general_bytes.startswith("Ffm"):
349 return peer
    [all...]
  /external/chromium_org/third_party/openssl/openssl/crypto/bio/
bss_bio.c 57 * of this kind, handled by the same thread (i.e. the "peer" is actually
127 BIO *peer; /* NULL if buf == NULL. member in struct:bio_bio_st
128 * If peer != NULL, then peer->ptr is also a bio_bio_st,
129 * and its "peer" member points back to us.
130 * peer != NULL iff init != 0 in the BIO. */
132 /* This is for what we write (i.e. reading uses peer's struct): */
133 int closed; /* valid iff peer != NULL */
134 size_t len; /* valid iff buf != NULL; 0 if peer == NULL */
139 size_t request; /* valid iff peer != NULL; 0 if len != 0
    [all...]
  /external/openssl/crypto/bio/
bss_bio.c 57 * of this kind, handled by the same thread (i.e. the "peer" is actually
127 BIO *peer; /* NULL if buf == NULL. member in struct:bio_bio_st
128 * If peer != NULL, then peer->ptr is also a bio_bio_st,
129 * and its "peer" member points back to us.
130 * peer != NULL iff init != 0 in the BIO. */
132 /* This is for what we write (i.e. reading uses peer's struct): */
133 int closed; /* valid iff peer != NULL */
134 size_t len; /* valid iff buf != NULL; 0 if peer == NULL */
139 size_t request; /* valid iff peer != NULL; 0 if len != 0
    [all...]
  /frameworks/base/core/java/com/android/internal/os/
ZygoteConnection.java 68 * mSocket is retained in the child process in "peer wait" mode, so
70 * it is closed in the peer.
75 private final Credentials peer; field in class:ZygoteConnection
96 peer = mSocket.getPeerCredentials();
98 Log.e(TAG, "Cannot read peer credentials", ex);
201 applyUidSecurityPolicy(parsedArgs, peer, peerSecurityContext);
202 applyRlimitSecurityPolicy(parsedArgs, peer, peerSecurityContext);
203 applyCapabilitiesSecurityPolicy(parsedArgs, peer, peerSecurityContext);
204 applyInvokeWithSecurityPolicy(parsedArgs, peer, peerSecurityContext);
205 applyseInfoSecurityPolicy(parsedArgs, peer, peerSecurityContext)
    [all...]
  /external/chromium_org/net/quic/crypto/
crypto_handshake_test.cc 172 QuicCryptoServerConfigPeer peer(&server);
177 const string token4 = peer.NewSourceAddressToken(ip4, rand, now);
178 const string token6 = peer.NewSourceAddressToken(ip6, rand, now);
179 EXPECT_TRUE(peer.ValidateSourceAddressToken(token4, ip4, now));
180 EXPECT_FALSE(peer.ValidateSourceAddressToken(token4, ip6, now));
181 EXPECT_TRUE(peer.ValidateSourceAddressToken(token6, ip6, now));
184 EXPECT_FALSE(peer.ValidateSourceAddressToken(token4, ip4, now));
187 EXPECT_FALSE(peer.ValidateSourceAddressToken(token4, ip4, now));
  /external/chromium_org/third_party/openssl/openssl/crypto/evp/
pmeth_fn.c 285 int EVP_PKEY_derive_set_peer(EVP_PKEY_CTX *ctx, EVP_PKEY *peer)
301 ret = ctx->pmeth->ctrl(ctx, EVP_PKEY_CTRL_PEER_KEY, 0, peer);
315 if (ctx->pkey->type != peer->type)
322 /* ran@cryptocom.ru: For clarity. The error is if parameters in peer are
327 if (!EVP_PKEY_missing_parameters(peer) &&
328 !EVP_PKEY_cmp_parameters(ctx->pkey, peer))
337 ctx->peerkey = peer;
339 ret = ctx->pmeth->ctrl(ctx, EVP_PKEY_CTRL_PEER_KEY, 1, peer);
347 CRYPTO_add(&peer->references,1,CRYPTO_LOCK_EVP_PKEY);
  /external/openssl/crypto/evp/
pmeth_fn.c 285 int EVP_PKEY_derive_set_peer(EVP_PKEY_CTX *ctx, EVP_PKEY *peer)
301 ret = ctx->pmeth->ctrl(ctx, EVP_PKEY_CTRL_PEER_KEY, 0, peer);
315 if (ctx->pkey->type != peer->type)
322 /* ran@cryptocom.ru: For clarity. The error is if parameters in peer are
327 if (!EVP_PKEY_missing_parameters(peer) &&
328 !EVP_PKEY_cmp_parameters(ctx->pkey, peer))
337 ctx->peerkey = peer;
339 ret = ctx->pmeth->ctrl(ctx, EVP_PKEY_CTRL_PEER_KEY, 1, peer);
347 CRYPTO_add(&peer->references,1,CRYPTO_LOCK_EVP_PKEY);
  /external/iputils/
tftpd.c 79 int peer; variable
189 peer = socket(from.sa.sa_family, SOCK_DGRAM, 0);
190 if (peer < 0) {
194 if (connect(peer, (struct sockaddr *)&from, sizeof(from)) < 0) {
372 if (send(peer, dp, size + 4, confirmed) != size + 4) {
380 n = recv(peer, ackbuf, sizeof (ackbuf), 0);
398 synchnet(peer);
437 if (send(peer, ackbuf, 4, confirmed) != 4) {
445 n = recv(peer, dp, PKTSIZE, 0);
461 (void) synchnet(peer);
    [all...]
  /external/chromium_org/content/child/
resource_dispatcher.cc 76 virtual bool Start(Peer* peer) OVERRIDE;
83 ResourceLoaderBridge::Peer* peer_;
172 bool IPCResourceLoaderBridge::Start(Peer* peer) {
178 peer_ = peer;
325 request_info->peer->OnUploadProgress(position, size);
340 ResourceLoaderBridge::Peer* new_peer =
342 request_info->peer, response_head.mime_type, request_info->url);
344 request_info->peer = new_peer
498 ResourceLoaderBridge::Peer* peer = request_info->peer; local
    [all...]
  /external/smack/src/org/jivesoftware/smackx/filetransfer/
FileTransfer.java 43 private String peer; field in class:FileTransfer
64 protected FileTransfer(String peer, String streamID,
66 this.peer = peer;
110 * Returns the JID of the peer for this file transfer.
112 * @return Returns the JID of the peer for this file transfer.
115 return peer;
261 * The file transfer is being negotiated with the peer. The party
271 * The peer has refused the file transfer request halting the file
335 * The peer did not find any of the provided stream mechanisms
    [all...]
  /external/chromium_org/v8/tools/testrunner/server/
main.py 151 def AddPeer(self, peer):
154 if p.address == peer.address:
156 self.peers.append(peer)
157 if peer.trusted:
158 status_handler.ITrustYouNow(peer)
187 for peer in self.peers:
188 if peer.address == self.ip: continue
189 if peer.pubkey == fingerprint:
190 status_handler.ITrustYouNow(peer)
193 status_handler.NotifyNewTrusted(peer, result
    [all...]
  /external/chromium_org/third_party/openssl/openssl/apps/
sess_id.c 93 X509 *peer = NULL; local
167 peer = SSL_SESSION_get0_peer(x);
236 if (peer == NULL)
239 X509_print(out,peer);
258 else if (!noout && (peer != NULL)) /* just print the certificate */
261 i=(int)i2d_X509_bio(out,peer);
263 i=PEM_write_bio_X509(out,peer);
  /external/openssl/apps/
sess_id.c 93 X509 *peer = NULL; local
167 peer = SSL_SESSION_get0_peer(x);
236 if (peer == NULL)
239 X509_print(out,peer);
258 else if (!noout && (peer != NULL)) /* just print the certificate */
261 i=(int)i2d_X509_bio(out,peer);
263 i=PEM_write_bio_X509(out,peer);
  /external/qemu/
qemu-sockets.c 289 /* connect to peer */
311 struct addrinfo ai, *peer = NULL, *local = NULL; local
318 /* lookup peer addr */
339 if (0 != (rc = getaddrinfo(addr, port, &ai, &peer))) {
345 fprintf(stderr, "%s: peer (%s:%s)\n", __FUNCTION__, addr, port);
346 inet_print_addrinfo(__FUNCTION__, peer);
352 ai.ai_family = peer->ai_family;
374 sock = qemu_socket(peer->ai_family, peer->ai_socktype, peer->ai_protocol)
    [all...]

Completed in 1007 milliseconds

12 3 4 5 6 7 8 910