/external/iputils/ |
tftpd.c | 79 int peer; variable 189 peer = socket(from.sa.sa_family, SOCK_DGRAM, 0); 190 if (peer < 0) { 194 if (connect(peer, (struct sockaddr *)&from, sizeof(from)) < 0) { 372 if (send(peer, dp, size + 4, confirmed) != size + 4) { 380 n = recv(peer, ackbuf, sizeof (ackbuf), 0); 398 synchnet(peer); 437 if (send(peer, ackbuf, 4, confirmed) != 4) { 445 n = recv(peer, dp, PKTSIZE, 0); 461 (void) synchnet(peer); [all...] |
/external/openssl/apps/ |
pkeyutl.c | 516 EVP_PKEY *peer = NULL; local 524 peer = load_pubkey(bio_err, file, peerform, 0, NULL, NULL, "Peer Key"); 526 if (!peer) 528 BIO_printf(bio_err, "Error reading peer key %s\n", file); 533 ret = EVP_PKEY_derive_set_peer(ctx, peer); 535 EVP_PKEY_free(peer);
|
/external/openssl/crypto/bio/ |
bss_bio.c | 57 * of this kind, handled by the same thread (i.e. the "peer" is actually 127 BIO *peer; /* NULL if buf == NULL. member in struct:bio_bio_st 128 * If peer != NULL, then peer->ptr is also a bio_bio_st, 129 * and its "peer" member points back to us. 130 * peer != NULL iff init != 0 in the BIO. */ 132 /* This is for what we write (i.e. reading uses peer's struct): */ 133 int closed; /* valid iff peer != NULL */ 134 size_t len; /* valid iff buf != NULL; 0 if peer == NULL */ 139 size_t request; /* valid iff peer != NULL; 0 if len != 0 [all...] |
/external/qemu/android/ |
charpipe.c | 75 struct CharPipeHalf* peer; /* NULL if closed */ member in struct:CharPipeHalf 91 ph->peer = NULL; 99 CharPipeHalf* peer = ph->peer; local 106 if (bip == NULL && peer != NULL && peer->cs->chr_read != NULL) { 107 /* no buffered data, try to write directly to the peer */ 111 if (peer->cs->chr_can_read) { 112 size = qemu_chr_can_read( peer->cs ); 121 qemu_chr_read( peer->cs, (uint8_t*)buf, size ) 158 CharPipeHalf* peer = ph->peer; local 297 CharDriverState* peer = cbuf->endpoint; local 348 CharDriverState* peer = cbuf->endpoint; local [all...] |
/external/qemu/util/ |
qemu-sockets.c | 289 /* connect to peer */ 311 struct addrinfo ai, *peer = NULL, *local = NULL; local 318 /* lookup peer addr */ 339 if (0 != (rc = getaddrinfo(addr, port, &ai, &peer))) { 345 fprintf(stderr, "%s: peer (%s:%s)\n", __FUNCTION__, addr, port); 346 inet_print_addrinfo(__FUNCTION__, peer); 352 ai.ai_family = peer->ai_family; 374 sock = qemu_socket(peer->ai_family, peer->ai_socktype, peer->ai_protocol) [all...] |
/external/smack/src/org/jivesoftware/smackx/filetransfer/ |
FileTransfer.java | 43 private String peer;
field in class:FileTransfer 64 protected FileTransfer(String peer, String streamID,
66 this.peer = peer;
110 * Returns the JID of the peer for this file transfer.
112 * @return Returns the JID of the peer for this file transfer.
115 return peer;
261 * The file transfer is being negotiated with the peer. The party
271 * The peer has refused the file transfer request halting the file
335 * The peer did not find any of the provided stream mechanisms [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
peerkey.c | 63 const u8 *peer, 74 if (peer) 96 if (peer) { 97 /* Peer MAC Address KDE */ 98 pos = wpa_add_kde(pos, RSN_KEY_DATA_MAC_ADDR, peer, ETH_ALEN); 106 if (peer) { 107 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK Error (peer " 109 MAC2STR(peer), mui, error_type); 133 /* KDEs: Peer RSN IE, Initiator MAC Address, Initiator Nonce */ 157 /* Peer RSN IE * 597 u8 peer[ETH_ALEN]; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
ibss_rsn.c | 30 struct ibss_rsn_peer *peer; local 32 for (peer = ibss_rsn->peers; peer; peer = peer->next) 33 if (os_memcmp(addr, peer->addr, ETH_ALEN) == 0) 35 return peer; 39 static void ibss_rsn_free(struct ibss_rsn_peer *peer) 41 eloop_cancel_timeout(ibss_rsn_auth_timeout, peer, NULL); 42 wpa_auth_sta_deinit(peer->auth) 50 struct ibss_rsn_peer *peer = ctx; local 57 struct ibss_rsn_peer *peer = ctx; local 65 struct ibss_rsn_peer *peer = ctx; local 110 struct ibss_rsn_peer *peer = ctx; local 144 struct ibss_rsn_peer *peer = ctx; local 175 struct ibss_rsn_peer *peer = ctx; local 310 struct ibss_rsn_peer *peer; local 346 struct ibss_rsn_peer *peer; local 389 struct ibss_rsn_peer *peer = ibss_rsn_get_peer(ibss_rsn, addr); local 515 struct ibss_rsn_peer *peer; local 554 struct ibss_rsn_peer *peer = eloop_ctx; local 571 struct ibss_rsn_peer *peer; local 627 struct ibss_rsn_peer *peer, *prev; local 685 struct ibss_rsn_peer *peer, *prev; local 788 struct ibss_rsn_peer *peer; local 880 struct ibss_rsn_peer *peer; local [all...] |
/frameworks/base/graphics/java/android/graphics/ |
Region.java | 376 Region peer = (Region) obj; local 377 return nativeEquals(mNativeRegion, peer.mNativeRegion);
|
/frameworks/base/services/core/java/com/android/server/am/ |
NativeCrashListener.java | 125 InetSocketAddress peer = new InetSocketAddress(); local 129 peerFd = Os.accept(serverFd, peer);
|
/hardware/libhardware_legacy/include/hardware_legacy/ |
rtt.h | 33 mac_addr addr; // peer device mac address 35 wifi_peer_type peer; // optional - peer device hint (STA, P2P, AP) member in struct:__anon40577 50 wifi_peer_type peer; // peer device type (P2P, AP) member in struct:__anon40578
|
/art/runtime/ |
thread_list.cc | 443 static void ThreadSuspendByPeerWarning(Thread* self, int level, const char* message, jobject peer) { 446 scoped_name_string(env, (jstring)env->GetObjectField(peer, 450 LOG(level) << message << ": " << peer; local 453 LOG(level) << message << ": " << peer << ":" << scoped_name_chars.c_str(); 457 Thread* ThreadList::SuspendThreadByPeer(jobject peer, bool request_suspension, 476 thread = Thread::FromManagedThread(soa, peer); 478 ThreadSuspendByPeerWarning(self, WARNING, "No such thread for suspend", peer); 510 ThreadSuspendByPeerWarning(self, FATAL, "Thread suspension timed out", peer); [all...] |
/cts/tests/tests/os/src/android/os/cts/ |
ParcelFileDescriptorProcessTest.java | 76 private static void crash(IParcelFileDescriptorPeer peer) { 78 peer.crash();
|
/external/chromium_org/content/child/ |
resource_dispatcher.cc | 79 virtual bool Start(RequestPeer* peer) OVERRIDE; 173 bool IPCResourceLoaderBridge::Start(RequestPeer* peer) { 180 request_id_ = dispatcher_->AddPendingRequest(peer, 339 request_info->peer->OnUploadProgress(position, size); 356 request_info->peer, response_head.mime_type, request_info->url); 358 request_info->peer = new_peer; 369 request_info->peer->OnReceivedResponse(renderer_response_info); 379 request_info->peer->OnReceivedCachedMetadata(&data.front(), data.size()); 449 // call peer's callback. 465 request_info->peer->OnReceivedData 545 RequestPeer* peer = request_info->peer; local [all...] |
/external/chromium_org/sandbox/win/src/ |
broker_services.cc | 65 // Helper structure that allows the broker to track peer processes 76 void DeregisterPeerTracker(PeerTracker* peer) { 78 if (::UnregisterWaitEx(peer->wait_object, INVALID_HANDLE_VALUE)) { 79 delete peer; 172 // Cancel the wait events and delete remaining peer trackers. 512 PeerTracker* peer = reinterpret_cast<PeerTracker*>(parameter); local 514 ::PostQueuedCompletionStatus(peer->job_port, 0, THREAD_CTRL_REMOVE_PEER, 515 reinterpret_cast<LPOVERLAPPED>(peer->id)); 519 scoped_ptr<PeerTracker> peer(new PeerTracker(::GetProcessId(peer_process), 521 if (!peer->id [all...] |
/external/dnsmasq/src/ |
tftp.c | 46 struct sockaddr_in addr, peer; local 72 msg.msg_name = &peer; 73 msg.msg_namelen = sizeof(peer); 153 transfer->peer = peer; 194 len = tftp_err(ERR_ILL, packet, _("unsupported request from %s"), inet_ntoa(peer.sin_addr)); 244 strncat(daemon->namebuff, inet_ntoa(peer.sin_addr), (MAXDNAME-1) - strlen(daemon->namebuff)); 276 (struct sockaddr *)&peer, sizeof(peer)) == -1 && errno == EINTR); 282 my_syslog(MS_TFTP | LOG_INFO, _("TFTP sent %s to %s"), daemon->namebuff, inet_ntoa(peer.sin_addr)) [all...] |
/external/mtpd/ |
pptp.c | 119 uint16_t peer; member in struct:packet::__anon31796::__anon31797::__anon31799::__anon31802 309 if (state == OCRQ && incoming.ocrp.peer == local) { 367 outgoing.icrp.peer = incoming.icrq.call; 376 outgoing.ocrp.peer = incoming.ocrq.call;
|
/external/wpa_supplicant_8/src/wps/ |
wps_upnp_i.h | 112 /* FIX: maintain separate structures for each UPnP peer */ 113 struct upnp_wps_peer peer; member in struct:upnp_wps_device_interface
|
/system/core/adb/ |
jdwp_service.c | 559 asocket* peer = s->peer; local 563 if (peer) { 564 peer->peer = NULL; 565 peer->close(peer); 575 s->peer->close(s->peer); 584 asocket* peer = jdwp->socket.peer local 646 asocket* peer = t->socket.peer; local 657 asocket* peer = s->peer; local [all...] |
sockets.c | 58 ** these have no peer anymore, but still packets to 67 // If |peer_id| is not 0, also check that it is connected to a peer 78 if (peer_id == 0 || (s->peer && s->peer->id == peer_id)) { 136 if(s->transport == t || (s->peer && s->peer->transport == t)) { 244 if(s->peer) { 245 D("LS(%d): closing peer. peer->id=%d peer->fd=%d\n" 547 asocket* peer = s->peer; local [all...] |
/bionic/libc/dns/resolv/ |
res_send.c | 416 struct sockaddr_storage peer; local 432 peerlen = sizeof(peer); 434 (struct sockaddr *)(void *)&peer, &peerlen) < 0) { 438 if (!sock_eq((struct sockaddr *)(void *)&peer, 759 struct sockaddr_storage peer; local 760 socklen_t size = sizeof peer; 764 (struct sockaddr *)(void *)&peer, &size) < 0 || 765 !sock_eq((struct sockaddr *)(void *)&peer, nsap) || [all...] |
/bootable/recovery/minadbd/ |
adb.h | 84 /* flag: set when the socket's peer has closed 92 asocket *peer; member in struct:asocket 106 /* enqueue is called by our peer when it has data 109 ** peer->ready() when we once again are ready to 114 /* ready is called by the peer when it is ready for 119 /* close is called by the peer when it has gone away. 121 ** peer once our close method is called.
|
/external/chromium_org/chrome/browser/ui/webui/chromeos/ |
nfc_debug_ui.cc | 202 virtual void PeerFound(NfcAdapter* adaper, NfcPeer* peer) OVERRIDE; 203 virtual void PeerLost(NfcAdapter* adapter, NfcPeer* peer) OVERRIDE; 212 NfcPeer* peer, 246 // Stores the properties of the NFC peer in |out|, mapping these to keys 247 // that will be read by JS. |out| will not be modified, if no peer is known. 261 // Updates the data displayed in the UI for the current peer. 270 // The cached identifier of the most recent NFC peer device found. 287 NfcPeer* peer = nfc_adapter_->GetPeer(peer_identifier_); local 288 if (peer) 289 peer->RemoveObserver(this) 496 NfcPeer* peer = nfc_adapter_->GetPeer(peer_identifier_); local 585 NfcPeer* peer = nfc_adapter_->GetPeer(peer_identifier_); local [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/bio/ |
bss_dgram.c | 162 } peer; member in struct:bio_dgram_data_st 186 } peer; member in struct:bio_dgram_sctp_data_st 378 } peer; member in struct:__anon18341 382 sa.len.i=sizeof(sa.peer); 387 memset(&sa.peer, 0x00, sizeof(sa.peer)); 389 ret=recvfrom(b->num,out,outl,0,&sa.peer.sa,(void *)&sa.len); 392 OPENSSL_assert(sa.len.s<=sizeof(sa.peer)); 397 BIO_ctrl(b, BIO_CTRL_DGRAM_SET_PEER, 0, &sa.peer); 424 int peerlen = sizeof(data->peer); [all...] |
/external/iproute2/ip/ |
ipaddress.c | 70 fprintf(stderr, "IFADDR := PREFIX | ADDR peer PREFIX\n"); 448 fprintf(fp, " peer "); 608 fprintf(fp, " peer %s/%d ", 1062 inet_prefix peer; local 1080 if (strcmp(*argv, "peer") == 0 || 1085 duparg("peer", *argv); 1086 get_prefix(&peer, *argv, req.ifa.ifa_family); 1087 peer_len = peer.bytelen; 1089 req.ifa.ifa_family = peer.family; 1090 addattr_l(&req.n, sizeof(req), IFA_ADDRESS, &peer.data, peer.bytelen) [all...] |