/external/chromium_org/third_party/openssl/openssl/apps/ |
pkeyutl.c | 516 EVP_PKEY *peer = NULL; local 524 peer = load_pubkey(bio_err, file, peerform, 0, NULL, NULL, "Peer Key"); 526 if (!peer) 528 BIO_printf(bio_err, "Error reading peer key %s\n", file); 533 ret = EVP_PKEY_derive_set_peer(ctx, peer); 535 EVP_PKEY_free(peer);
|
/external/openssl/apps/ |
pkeyutl.c | 516 EVP_PKEY *peer = NULL; local 524 peer = load_pubkey(bio_err, file, peerform, 0, NULL, NULL, "Peer Key"); 526 if (!peer) 528 BIO_printf(bio_err, "Error reading peer key %s\n", file); 533 ret = EVP_PKEY_derive_set_peer(ctx, peer); 535 EVP_PKEY_free(peer);
|
/system/core/adb/ |
transport.c | 422 asocket* peer = socket->peer; local 425 if (peer) { 426 peer->peer = NULL; 427 peer->close(peer); 448 asocket* peer = tracker->socket.peer; local 452 return peer->enqueue( peer, p ) [all...] |
adb.c | 595 s->peer = create_remote_socket(p->msg.arg0, t); 596 s->peer->peer = s; 597 send_ready(s->id, s->peer->id, t); 606 if(s->peer == 0) { 608 s->peer = create_remote_socket(p->msg.arg0, t); 609 s->peer->peer = s; 611 } else if (s->peer->id == p->msg.arg0) { 616 p->msg.arg0, p->msg.arg1, s->peer->id, p->msg.arg1, t->serial) [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
peerkey.c | 63 const u8 *peer, 74 if (peer) 96 if (peer) { 97 /* Peer MAC Address KDE */ 98 pos = wpa_add_kde(pos, RSN_KEY_DATA_MAC_ADDR, peer, ETH_ALEN); 106 if (peer) { 107 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK Error (peer " 109 MAC2STR(peer), mui, error_type); 133 /* KDEs: Peer RSN IE, Initiator MAC Address, Initiator Nonce */ 157 /* Peer RSN IE * 597 u8 peer[ETH_ALEN]; local [all...] |
/external/wpa_supplicant_8/src/p2p/ |
p2p.h | 110 * peer_device_addr - P2P Device Address of the peer 115 * peer_interface_addr - P2P Interface Address of the peer 140 * peer_config_timeout - Peer configuration timeout (in 10 msec units) 156 * struct p2p_peer_info - P2P peer information 160 * p2p_device_addr - P2P Device Address of the peer 238 * IE(s) from the frame that was used to discover the peer. 312 * local end may become the client. This may allow the peer to become a 451 * target peer is known or if other channels are scanned in steps). 512 * no need to wait for a response from the destination peer anymore. 569 * @info: P2P peer informatio 1982 struct p2p_peer_info *peer; member in struct:p2p_nfc_params [all...] |
/external/chromium_org/net/http/ |
http_stream_factory_impl_unittest.cc | 293 HttpNetworkSessionPeer peer(session); 296 peer.SetHttpStreamFactory(scoped_ptr<HttpStreamFactory>(mock_factory)); 437 HttpNetworkSessionPeer peer(session); 450 peer.SetClientSocketPoolManager( 466 HttpNetworkSessionPeer peer(session); 480 peer.SetClientSocketPoolManager( 496 HttpNetworkSessionPeer peer(session); 510 peer.SetClientSocketPoolManager( 526 HttpNetworkSessionPeer peer(session); 546 peer.SetClientSocketPoolManager [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
eap_sake_common.c | 2 * EAP server/peer: EAP-SAKE shared routines 310 * @peer: MIC calculation for 0 = Server, 1 = Peer message 320 int peer, const u8 *eap, size_t eap_len, 332 if (peer) { 368 peer ? "Peer MIC" : "Server MIC",
|
/external/chromium_org/chromeos/dbus/ |
shill_device_client.h | 162 const std::string& peer,
|
/external/wpa_supplicant_8/src/wps/ |
wps_upnp_i.h | 112 /* FIX: maintain separate structures for each UPnP peer */ 113 struct upnp_wps_peer peer; member in struct:upnp_wps_device_interface
|
/external/wpa_supplicant_8/wpa_supplicant/ |
p2p_supplicant.c | 1159 wpa_printf(MSG_DEBUG, "P2P: Start WPS Enrollee for peer " MACSTR 6603 const u8 *peer; local 6694 u8 peer[ETH_ALEN]; local [all...] |
/art/runtime/ |
thread_list.cc | 443 static void ThreadSuspendByPeerWarning(Thread* self, int level, const char* message, jobject peer) { 446 scoped_name_string(env, (jstring)env->GetObjectField(peer, 450 LOG(level) << message << ": " << peer; local 453 LOG(level) << message << ": " << peer << ":" << scoped_name_chars.c_str(); 457 Thread* ThreadList::SuspendThreadByPeer(jobject peer, bool request_suspension, 476 thread = Thread::FromManagedThread(soa, peer); 478 ThreadSuspendByPeerWarning(self, WARNING, "No such thread for suspend", peer); 510 ThreadSuspendByPeerWarning(self, FATAL, "Thread suspension timed out", peer); [all...] |
/bionic/libc/dns/resolv/ |
res_send.c | 416 struct sockaddr_storage peer; local 432 peerlen = sizeof(peer); 434 (struct sockaddr *)(void *)&peer, &peerlen) < 0) { 438 if (!sock_eq((struct sockaddr *)(void *)&peer, 759 struct sockaddr_storage peer; local 760 socklen_t size = sizeof peer; 764 (struct sockaddr *)(void *)&peer, &size) < 0 || 765 !sock_eq((struct sockaddr *)(void *)&peer, nsap) || [all...] |
/cts/tests/tests/os/src/android/os/cts/ |
ParcelFileDescriptorProcessTest.java | 76 private static void crash(IParcelFileDescriptorPeer peer) { 78 peer.crash();
|
/developers/samples/android/wearable/wear/AgendaData/Application/src/main/java/com/example/android/agendadata/ |
MainActivity.java | 156 public void onPeerConnected(Node peer) { 161 public void onPeerDisconnected(Node peer) {
|
/development/samples/wearable/AgendaData/Application/src/main/java/com/example/android/wearable/agendadata/ |
MainActivity.java | 156 public void onPeerConnected(Node peer) { 161 public void onPeerDisconnected(Node peer) {
|
/external/chromium_org/chrome/test/chromedriver/server/ |
chromedriver_server.cc | 110 std::string peer_address = request.peer.ToStringWithoutPort(); 114 LOG(WARNING) << "unauthorized access from " << request.peer.ToString();
|
/external/chromium_org/content/browser/resources/media/ |
webrtc_internals.css | 6 .peer-connection-dump-root {
|
/external/chromium_org/third_party/openssl/openssl/crypto/bio/ |
bio.h | 601 #define BIO_ctrl_dgram_connect(b,peer) \ 602 (int)BIO_ctrl(b,BIO_CTRL_DGRAM_CONNECT,0, (char *)peer) 603 #define BIO_ctrl_set_connected(b, state, peer) \ 604 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_CONNECTED, state, (char *)peer) 609 #define BIO_dgram_get_peer(b,peer) \ 610 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_GET_PEER, 0, (char *)peer) 611 #define BIO_dgram_set_peer(b,peer) \ 612 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_PEER, 0, (char *)peer) [all...] |
/external/chromium_org/third_party/openssl/openssl/include/openssl/ |
bio.h | 601 #define BIO_ctrl_dgram_connect(b,peer) \ 602 (int)BIO_ctrl(b,BIO_CTRL_DGRAM_CONNECT,0, (char *)peer) 603 #define BIO_ctrl_set_connected(b, state, peer) \ 604 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_CONNECTED, state, (char *)peer) 609 #define BIO_dgram_get_peer(b,peer) \ 610 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_GET_PEER, 0, (char *)peer) 611 #define BIO_dgram_set_peer(b,peer) \ 612 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_PEER, 0, (char *)peer) [all...] |
/external/iproute2/include/ |
libnetlink.h | 16 struct sockaddr_nl peer; member in struct:rtnl_handle 42 extern int rtnl_talk(struct rtnl_handle *rtnl, struct nlmsghdr *n, pid_t peer,
|
/external/openssl/crypto/bio/ |
bio.h | 601 #define BIO_ctrl_dgram_connect(b,peer) \ 602 (int)BIO_ctrl(b,BIO_CTRL_DGRAM_CONNECT,0, (char *)peer) 603 #define BIO_ctrl_set_connected(b, state, peer) \ 604 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_CONNECTED, state, (char *)peer) 609 #define BIO_dgram_get_peer(b,peer) \ 610 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_GET_PEER, 0, (char *)peer) 611 #define BIO_dgram_set_peer(b,peer) \ 612 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_PEER, 0, (char *)peer) [all...] |
/external/openssl/include/openssl/ |
bio.h | 601 #define BIO_ctrl_dgram_connect(b,peer) \ 602 (int)BIO_ctrl(b,BIO_CTRL_DGRAM_CONNECT,0, (char *)peer) 603 #define BIO_ctrl_set_connected(b, state, peer) \ 604 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_CONNECTED, state, (char *)peer) 609 #define BIO_dgram_get_peer(b,peer) \ 610 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_GET_PEER, 0, (char *)peer) 611 #define BIO_dgram_set_peer(b,peer) \ 612 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_PEER, 0, (char *)peer) [all...] |
/external/openssl/ssl/ |
ssl_asn1.c | 308 if (in->peer != NULL) 309 M_ASN1_I2D_len_EXP_opt(in->peer,i2d_X509,3,v3); 356 if (in->peer != NULL) 357 M_ASN1_I2D_put_EXP_opt(in->peer,i2d_X509,3,v3); 523 if (ret->peer != NULL) 525 X509_free(ret->peer); 526 ret->peer=NULL; 528 M_ASN1_D2I_get_EXP_opt(ret->peer,d2i_X509,3);
|
/external/sepolicy/ |
unconfined.te | 89 allow unconfineddomain domain:peer recv;
|