HomeSort by relevance Sort by last modified time
    Searched refs:peer (Results 151 - 175 of 243) sorted by null

1 2 3 4 5 67 8 910

  /external/wpa_supplicant_8/wpa_supplicant/
ctrl_iface.c 510 /* MLME-STKSTART.request(peer) */
514 u8 peer[ETH_ALEN]; local
516 if (hwaddr_aton(addr, peer)) {
523 MAC2STR(peer));
525 return wpa_sm_stkstart(wpa_s->wpa, peer);
535 u8 peer[ETH_ALEN]; local
538 if (hwaddr_aton(addr, peer)) {
545 MAC2STR(peer));
548 ret = wpa_tdls_send_discovery_request(wpa_s->wpa, peer);
550 ret = wpa_drv_tdls_oper(wpa_s, TDLS_DISCOVERY_REQ, peer);
559 u8 peer[ETH_ALEN]; local
590 u8 peer[ETH_ALEN]; local
1369 u8 peer[ETH_ALEN]; local
4142 u8 *_peer = NULL, peer[ETH_ALEN]; local
4187 u8 peer[ETH_ALEN], go_dev_addr[ETH_ALEN], *go_dev = NULL; local
4674 u8 peer[ETH_ALEN]; local
    [all...]
  /art/runtime/
thread.cc 78 static const char* kThreadNameDuringStartup = "<native thread without managed peer>";
156 // Copy peer into self, deleting global reference when done.
251 // Use global JNI ref to hold peer live while child thread starts.
342 // a native peer!
368 ScopedLocalRef<jobject> peer(env, env->AllocObject(WellKnownClasses::java_lang_Thread));
369 if (peer.get() == NULL) {
375 opeer_ = soa.Decode<mirror::Object*>(peer.get());
377 env->CallNonvirtualVoidMethod(peer.get(),
385 jni_env_->SetIntField(peer.get(), WellKnownClasses::java_lang_Thread_nativePeer,
480 << ",peer=" << opeer
    [all...]
  /external/chromium/webkit/glue/
resource_loader_bridge.h 14 // In turn, the bridge's owner on the WebKit end will implement the Peer
270 // within webkit. The Peer and it's bridge should have identical lifetimes
276 class Peer {
278 virtual ~Peer() {}
364 // the peer's methods will be called asynchronously to report various events.
365 virtual bool Start(Peer* peer) = 0;
370 // the peer is still valid.
  /external/chromium_org/third_party/openssl/openssl/ssl/
s3_srvr.c 511 ((s->session->peer != NULL) &&
622 if (!s->session->peer)
2946 X509 *peer; local
    [all...]
s2_clnt.c 513 if (s->session->peer != NULL) /* can't happen*/
520 s->session->peer = s->session->sess_cert->peer_key->x509;
522 CRYPTO_add(&s->session->peer->references, 1, CRYPTO_LOCK_X509);
526 || s->session->peer != s->session->sess_cert->peer_key->x509)
s2_srvr.c 301 ((s->session->peer != NULL) &&
1093 if (s->session->peer != NULL)
1094 X509_free(s->session->peer);
1095 s->session->peer=x509;
  /external/iproute2/misc/
ss.c 1938 int peer; member in struct:unixstat
1968 char *peer; local
    [all...]
  /external/openssl/ssl/
s3_srvr.c 511 ((s->session->peer != NULL) &&
622 if (!s->session->peer)
2945 X509 *peer; local
    [all...]
s2_clnt.c 513 if (s->session->peer != NULL) /* can't happen*/
520 s->session->peer = s->session->sess_cert->peer_key->x509;
522 CRYPTO_add(&s->session->peer->references, 1, CRYPTO_LOCK_X509);
526 || s->session->peer != s->session->sess_cert->peer_key->x509)
s2_srvr.c 301 ((s->session->peer != NULL) &&
1093 if (s->session->peer != NULL)
1094 X509_free(s->session->peer);
1095 s->session->peer=x509;
  /external/wpa_supplicant_8/src/p2p/
p2p.h 106 * peer_device_addr - P2P Device Address of the peer
111 * peer_interface_addr - P2P Interface Address of the peer
136 * peer_config_timeout - Peer configuration timeout (in 10 msec units)
152 * struct p2p_peer_info - P2P peer information
156 * p2p_device_addr - P2P Device Address of the peer
411 * target peer is known or if other channels are scanned in steps).
472 * no need to wait for a response from the destination peer anymore.
529 * @info: P2P peer information
530 * @new_device: Inform if the peer is newly found
630 * @peer: Source address of the reques
    [all...]
p2p_i.h 33 * If the peer was discovered based on an interface address (e.g., GO
112 u8 peer[ETH_ALEN]; member in struct:p2p_sd_query
175 * P2P_WAIT_PEER_CONNECT - Waiting peer in List for GO Neg
180 * P2P_WAIT_PEER_IDLE - Waiting peer idle for GO Neg
249 * go_neg_peer - Pointer to GO Negotiation peer
254 * invite_peer - Pointer to Invite peer
262 * sd_peer - Pointer to Service Discovery peer
442 * Keep track of which peer a given PD request was sent to.
614 struct p2p_device *peer);
717 void p2p_go_neg_failed(struct p2p_data *p2p, struct p2p_device *peer,
    [all...]
p2p.c 41 * P2P_PEER_EXPIRATION_AGE - Number of seconds after which inactive peer
94 * peer is the GO, so do not expire the peer entry.
107 * The peer is connected as a client in a group where
108 * we are the GO, so do not expire the peer entry.
115 /* If Connection is in progress, don't expire the peer
121 p2p_dbg(p2p, "Expiring old peer entry " MACSTR,
241 void p2p_go_neg_failed(struct p2p_data *p2p, struct p2p_device *peer,
255 if (peer) {
256 os_memcpy(res.peer_device_addr, peer->info.p2p_device_addr
2233 struct p2p_device *peer; local
    [all...]
  /packages/apps/Settings/src/com/android/settings/wifi/p2p/
WifiP2pSettings.java 501 for (WifiP2pDevice peer: mPeers.getDeviceList()) {
502 if (DBG) Log.d(TAG, "-> " + peer);
503 mPeersGroup.addPreference(new WifiP2pPeer(getActivity(), peer));
504 if (peer.status == WifiP2pDevice.CONNECTED) mConnectedDevices++;
  /external/wpa_supplicant_8/src/rsn_supp/
wpa_i.h 42 u8 preauth_bssid[ETH_ALEN]; /* current RSN pre-auth peer or
276 const u8 *peer)
279 return sm->ctx->tdls_oper(sm->ctx->ctx, oper, peer);
  /system/core/adb/
adb.c 572 s->peer = create_remote_socket(p->msg.arg0, t);
573 s->peer->peer = s;
574 send_ready(s->id, s->peer->id, t);
583 if(s->peer == 0) {
584 s->peer = create_remote_socket(p->msg.arg0, t);
585 s->peer->peer = s;
    [all...]
  /external/chromium_org/third_party/openssl/openssl/apps/
s_server.c 464 BIO_printf(bio_err," -verify arg - turn on peer certificate verification\n");
465 BIO_printf(bio_err," -Verify arg - turn on peer certificate verification, must have a cert.\n");
468 BIO_printf(bio_err," -crl_check - check the peer certificate has not been revoked by its CA.\n" \
470 BIO_printf(bio_err," -crl_check_all - check the peer certificate has not been revoked by its CA\n" \
2387 X509 *peer; local
2706 X509 *peer; local
    [all...]
  /external/iproute2/lib/
libnetlink.c 277 int rtnl_talk(struct rtnl_handle *rtnl, struct nlmsghdr *n, pid_t peer,
298 nladdr.nl_pid = peer;
349 if (nladdr.nl_pid != peer ||
  /external/openssl/apps/
s_server.c 464 BIO_printf(bio_err," -verify arg - turn on peer certificate verification\n");
465 BIO_printf(bio_err," -Verify arg - turn on peer certificate verification, must have a cert.\n");
468 BIO_printf(bio_err," -crl_check - check the peer certificate has not been revoked by its CA.\n" \
470 BIO_printf(bio_err," -crl_check_all - check the peer certificate has not been revoked by its CA\n" \
2387 X509 *peer; local
2706 X509 *peer; local
    [all...]
  /external/wpa_supplicant_8/src/drivers/
driver_atheros.c 827 os_memcpy(event.auth.peer, mgmt->sa, ETH_ALEN);
    [all...]
  /bootable/recovery/minadbd/
adb.h 84 /* flag: set when the socket's peer has closed
92 asocket *peer; member in struct:asocket
106 /* enqueue is called by our peer when it has data
109 ** peer->ready() when we once again are ready to
114 /* ready is called by the peer when it is ready for
119 /* close is called by the peer when it has gone away.
121 ** peer once our close method is called.
  /external/chromium_org/third_party/libjingle/source/talk/p2p/base/
dtlstransportchannel_unittest.cc 130 void Negotiate(DtlsTestClient* peer, cricket::ContentAction action,
133 Negotiate(identity_.get(), (identity_) ? peer->identity_.get() : NULL,
200 bool Connect(DtlsTestClient* peer) {
202 transport_->SetDestination(peer->transport_.get());
  /external/clang/test/Analysis/
malloc.c 994 void foo (xpc_connection_t peer) {
996 xpc_connection_set_context(peer, ctx);
997 xpc_connection_set_finalizer_f(peer, finalize_connection_context);
998 xpc_connection_resume(peer);
  /external/qemu/
block_int.h 159 DeviceState *peer; member in struct:BlockDriverState
  /external/wpa_supplicant_8/src/ap/
wpa_auth_i.h 20 u8 peer[ETH_ALEN]; member in struct:wpa_stsl_negotiation

Completed in 7265 milliseconds

1 2 3 4 5 67 8 910