/external/chromium_org/third_party/openssl/openssl/apps/ |
sess_id.c | 93 X509 *peer = NULL; local 167 peer = SSL_SESSION_get0_peer(x); 236 if (peer == NULL) 239 X509_print(out,peer); 258 else if (!noout && (peer != NULL)) /* just print the certificate */ 261 i=(int)i2d_X509_bio(out,peer); 263 i=PEM_write_bio_X509(out,peer);
|
/external/openssl/apps/ |
sess_id.c | 93 X509 *peer = NULL; local 167 peer = SSL_SESSION_get0_peer(x); 236 if (peer == NULL) 239 X509_print(out,peer); 258 else if (!noout && (peer != NULL)) /* just print the certificate */ 261 i=(int)i2d_X509_bio(out,peer); 263 i=PEM_write_bio_X509(out,peer);
|
/external/qemu/util/ |
qemu-sockets.c | 289 /* connect to peer */ 311 struct addrinfo ai, *peer = NULL, *local = NULL; local 318 /* lookup peer addr */ 339 if (0 != (rc = getaddrinfo(addr, port, &ai, &peer))) { 345 fprintf(stderr, "%s: peer (%s:%s)\n", __FUNCTION__, addr, port); 346 inet_print_addrinfo(__FUNCTION__, peer); 352 ai.ai_family = peer->ai_family; 374 sock = qemu_socket(peer->ai_family, peer->ai_socktype, peer->ai_protocol) [all...] |
/frameworks/base/core/java/com/android/internal/os/ |
ZygoteConnection.java | 67 * mSocket is retained in the child process in "peer wait" mode, so 69 * it is closed in the peer. 74 private final Credentials peer; field in class:ZygoteConnection 98 peer = mSocket.getPeerCredentials(); 100 Log.e(TAG, "Cannot read peer credentials", ex); 192 applyUidSecurityPolicy(parsedArgs, peer, peerSecurityContext); 193 applyRlimitSecurityPolicy(parsedArgs, peer, peerSecurityContext); 194 applyInvokeWithSecurityPolicy(parsedArgs, peer, peerSecurityContext); 195 applyseInfoSecurityPolicy(parsedArgs, peer, peerSecurityContext); 652 * @param peer non-null; peer credential [all...] |
/development/samples/AppNavigation/src/com/example/android/appnavigation/app/ |
PeerActivity.java | 36 setContentView(R.layout.peer);
|
/bootable/recovery/minadbd/ |
adb.c | 324 s->peer = create_remote_socket(p->msg.arg0, t); 325 s->peer->peer = s; 326 send_ready(s->id, s->peer->id, t); 335 if(s->peer == 0) { 336 s->peer = create_remote_socket(p->msg.arg0, t); 337 s->peer->peer = s;
|
/external/wpa_supplicant_8/src/p2p/ |
p2p_go_neg.c | 51 wpa_hexdump_ascii(MSG_DEBUG, "P2P: Peer country", pos, 3); 53 p2p_info(p2p, "Mismatching country (ours=%c%c peer's=%c%c)", 64 p2p_info(p2p, "Invalid peer Channel List"); 78 p2p_dbg(p2p, "Own reg_classes %d peer reg_classes %d intersection reg_classes %d", 133 struct p2p_device *peer) 153 p2p_buf_add_public_action_hdr(buf, P2P_GO_NEG_REQ, peer->dialog_token); 157 if (peer->flags & P2P_DEV_PREFER_PERSISTENT_GROUP) { 159 if (peer->flags & P2P_DEV_PREFER_PERSISTENT_RECONN) 169 p2p_buf_add_go_intent(buf, (p2p->go_intent << 1) | peer->tie_breaker); 178 p2p_buf_add_device_info(buf, p2p, peer); [all...] |
p2p_invitation.c | 19 struct p2p_device *peer, 56 peer->dialog_token++; 57 if (peer->dialog_token == 0) 58 peer->dialog_token = 1; 60 peer->dialog_token); 71 !(peer->flags & P2P_DEV_NO_PREF_CHAN)) 81 dev_addr = peer->info.p2p_device_addr; 85 p2p_buf_add_device_info(buf, p2p, peer); 106 struct p2p_device *peer, 190 p2p_dbg(p2p, "Invitation Request from unknown peer " MACSTR [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/bio/ |
bss_dgram.c | 162 } peer; member in struct:bio_dgram_data_st 186 } peer; member in struct:bio_dgram_sctp_data_st 378 } peer; member in struct:__anon18341 382 sa.len.i=sizeof(sa.peer); 387 memset(&sa.peer, 0x00, sizeof(sa.peer)); 389 ret=recvfrom(b->num,out,outl,0,&sa.peer.sa,(void *)&sa.len); 392 OPENSSL_assert(sa.len.s<=sizeof(sa.peer)); 397 BIO_ctrl(b, BIO_CTRL_DGRAM_SET_PEER, 0, &sa.peer); 424 int peerlen = sizeof(data->peer); [all...] |
/external/openssl/crypto/bio/ |
bss_dgram.c | 162 } peer; member in struct:bio_dgram_data_st 186 } peer; member in struct:bio_dgram_sctp_data_st 378 } peer; member in struct:__anon31930 382 sa.len.i=sizeof(sa.peer); 387 memset(&sa.peer, 0x00, sizeof(sa.peer)); 389 ret=recvfrom(b->num,out,outl,0,&sa.peer.sa,(void *)&sa.len); 392 OPENSSL_assert(sa.len.s<=sizeof(sa.peer)); 397 BIO_ctrl(b, BIO_CTRL_DGRAM_SET_PEER, 0, &sa.peer); 424 int peerlen = sizeof(data->peer); [all...] |
/external/bluetooth/bluedroid/btif/co/ |
bta_pan_co.c | 93 //bdcpy(conn->peer, peer_addr); 114 ** peer is closed. 188 BTIF_TRACE_DEBUG("pan bt peer addr: %02x:%02x:%02x:%02x:%02x:%02x", 189 conn->peer[0], conn->peer[1], conn->peer[2], 190 conn->peer[3],conn->peer[4], conn->peer[5]); 315 ** Description protocol filter indication from peer devic [all...] |
/external/ipsec-tools/src/racoon/ |
sainfo.c | 76 * First pass is for sainfo from a specified peer, second for others. 79 getsainfo(loc, rmt, peer, remoteid) 80 const vchar_t *loc, *rmt, *peer; 87 if (peer == NULL) 104 if (peer == NULL) 107 dpeer = ipsecdoi_id2str(peer); 110 "getsainfo params: loc=\'%s\', rmt=\'%s\', peer=\'%s\', id=%i\n", 133 if (ipsecdoi_chkcmpids(peer, s->id_i, 0)) 294 snprintf(buf, 255, "loc=\'%s\', rmt=\'%s\', peer=\'%s\', id=%i",
|
/external/dnsmasq/src/ |
tftp.c | 46 struct sockaddr_in addr, peer; local 72 msg.msg_name = &peer; 73 msg.msg_namelen = sizeof(peer); 153 transfer->peer = peer; 194 len = tftp_err(ERR_ILL, packet, _("unsupported request from %s"), inet_ntoa(peer.sin_addr)); 244 strncat(daemon->namebuff, inet_ntoa(peer.sin_addr), (MAXDNAME-1) - strlen(daemon->namebuff)); 276 (struct sockaddr *)&peer, sizeof(peer)) == -1 && errno == EINTR); 282 my_syslog(MS_TFTP | LOG_INFO, _("TFTP sent %s to %s"), daemon->namebuff, inet_ntoa(peer.sin_addr)) [all...] |
/external/chromium_org/content/child/ |
resource_dispatcher.cc | 79 virtual bool Start(RequestPeer* peer) OVERRIDE; 173 bool IPCResourceLoaderBridge::Start(RequestPeer* peer) { 180 request_id_ = dispatcher_->AddPendingRequest(peer, 339 request_info->peer->OnUploadProgress(position, size); 356 request_info->peer, response_head.mime_type, request_info->url); 358 request_info->peer = new_peer; 369 request_info->peer->OnReceivedResponse(renderer_response_info); 379 request_info->peer->OnReceivedCachedMetadata(&data.front(), data.size()); 449 // call peer's callback. 465 request_info->peer->OnReceivedData 545 RequestPeer* peer = request_info->peer; local [all...] |
/art/runtime/native/ |
dalvik_system_VMStack.cc | 29 static jobject GetThreadStack(const ScopedFastNativeObjectAccess& soa, jobject peer) 32 if (soa.Decode<mirror::Object*>(peer) == soa.Self()->GetPeer()) { 43 thread = thread_list->SuspendThreadByPeer(peer, true, false, &timed_out);
|
/external/chromium_org/v8/tools/testrunner/server/ |
presence_handler.py | 38 from ..objects import peer namespace 41 STARTUP_REQUEST = "V8 test peer starting up" 43 EXIT_REQUEST = "V8 testing peer going down" 69 p = peer.Peer(self.client_address[0], jobs, relative_perf, 78 p = peer.Peer(self.client_address[0], jobs, perf, pubkey_fingerprint)
|
/external/chromium_org/content/browser/ |
byte_stream.cc | 54 void SetPeer(ByteStreamReaderImpl* peer, 90 // ** Peer information. 114 void SetPeer(ByteStreamWriterImpl* peer, 126 // Receive data from our peer. 166 // ** Peer information 204 ByteStreamReaderImpl* peer, 207 peer_ = peer; 336 ByteStreamWriterImpl* peer, 339 peer_ = peer;
|
/external/chromium_org/net/base/ |
address_tracker_linux.cc | 144 struct sockaddr_nl peer = {}; local 145 peer.nl_family = AF_NETLINK; 159 0, reinterpret_cast<struct sockaddr*>(&peer), 160 sizeof(peer))); 178 reinterpret_cast<struct sockaddr*>(&peer), 179 sizeof(peer)));
|
/external/chromium_org/content/browser/resources/media/ |
peer_connection_update_table.js | 7 * The data of a peer connection update. 9 * @param {number} lid The id of the peer conneciton inside a renderer. 38 * Maintains the peer connection update log table. 101 * Makes sure the update log table of the peer connection is created.
|
/external/chromium_org/ui/views/controls/button/ |
radio_button.cc | 84 RadioButton* peer = static_cast<RadioButton*>(*i); local 85 peer->SetChecked(false);
|
/development/samples/SupportAppNavigation/src/com/example/android/support/appnavigation/app/ |
PeerActivity.java | 39 setContentView(R.layout.peer);
|
/external/bluetooth/bluedroid/btif/include/ |
btif_pan_internal.h | 69 BD_ADDR peer; member in struct:__anon5664
|
/external/chromium_org/device/nfc/ |
nfc_chromeos_unittest.cc | 83 virtual void PeerFound(NfcAdapter* adapter, NfcPeer* peer) OVERRIDE { 86 peer_identifier_ = peer->GetIdentifier(); 90 virtual void PeerLost(NfcAdapter* adapter, NfcPeer* peer) OVERRIDE { 92 EXPECT_EQ(peer_identifier_, peer->GetIdentifier()); 114 NfcPeer* peer, const NfcNdefRecord* record) OVERRIDE { 115 EXPECT_EQ(peer, adapter_->GetPeer(peer_identifier_)); 116 EXPECT_EQ(peer_identifier_, peer->GetIdentifier()); 321 // Tests that peer and record objects are created for all peers and records 365 NfcPeer* peer = peers[0]; local 366 const NfcNdefMessage& message = peer->GetNdefMessage() 540 NfcPeer* peer = adapter_->GetPeer(observer.peer_identifier_); local [all...] |
/external/iptables/include/libipq/ |
libipq.h | 53 struct sockaddr_nl peer; member in struct:ipq_handle
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.6/sysroot/usr/include/rpcsvc/ |
yp.x | 88 peername peer; 134 peername peer;
|