HomeSort by relevance Sort by last modified time
    Searched refs:peer (Results 51 - 75 of 238) sorted by null

1 23 4 5 6 7 8 910

  /external/chromium_org/third_party/openssl/openssl/apps/
sess_id.c 93 X509 *peer = NULL; local
167 peer = SSL_SESSION_get0_peer(x);
236 if (peer == NULL)
239 X509_print(out,peer);
258 else if (!noout && (peer != NULL)) /* just print the certificate */
261 i=(int)i2d_X509_bio(out,peer);
263 i=PEM_write_bio_X509(out,peer);
  /external/openssl/apps/
sess_id.c 93 X509 *peer = NULL; local
167 peer = SSL_SESSION_get0_peer(x);
236 if (peer == NULL)
239 X509_print(out,peer);
258 else if (!noout && (peer != NULL)) /* just print the certificate */
261 i=(int)i2d_X509_bio(out,peer);
263 i=PEM_write_bio_X509(out,peer);
  /external/qemu/util/
qemu-sockets.c 289 /* connect to peer */
311 struct addrinfo ai, *peer = NULL, *local = NULL; local
318 /* lookup peer addr */
339 if (0 != (rc = getaddrinfo(addr, port, &ai, &peer))) {
345 fprintf(stderr, "%s: peer (%s:%s)\n", __FUNCTION__, addr, port);
346 inet_print_addrinfo(__FUNCTION__, peer);
352 ai.ai_family = peer->ai_family;
374 sock = qemu_socket(peer->ai_family, peer->ai_socktype, peer->ai_protocol)
    [all...]
  /frameworks/base/core/java/com/android/internal/os/
ZygoteConnection.java 67 * mSocket is retained in the child process in "peer wait" mode, so
69 * it is closed in the peer.
74 private final Credentials peer; field in class:ZygoteConnection
98 peer = mSocket.getPeerCredentials();
100 Log.e(TAG, "Cannot read peer credentials", ex);
192 applyUidSecurityPolicy(parsedArgs, peer, peerSecurityContext);
193 applyRlimitSecurityPolicy(parsedArgs, peer, peerSecurityContext);
194 applyInvokeWithSecurityPolicy(parsedArgs, peer, peerSecurityContext);
195 applyseInfoSecurityPolicy(parsedArgs, peer, peerSecurityContext);
652 * @param peer non-null; peer credential
    [all...]
  /development/samples/AppNavigation/src/com/example/android/appnavigation/app/
PeerActivity.java 36 setContentView(R.layout.peer);
  /bootable/recovery/minadbd/
adb.c 324 s->peer = create_remote_socket(p->msg.arg0, t);
325 s->peer->peer = s;
326 send_ready(s->id, s->peer->id, t);
335 if(s->peer == 0) {
336 s->peer = create_remote_socket(p->msg.arg0, t);
337 s->peer->peer = s;
  /external/wpa_supplicant_8/src/p2p/
p2p_go_neg.c 51 wpa_hexdump_ascii(MSG_DEBUG, "P2P: Peer country", pos, 3);
53 p2p_info(p2p, "Mismatching country (ours=%c%c peer's=%c%c)",
64 p2p_info(p2p, "Invalid peer Channel List");
78 p2p_dbg(p2p, "Own reg_classes %d peer reg_classes %d intersection reg_classes %d",
133 struct p2p_device *peer)
153 p2p_buf_add_public_action_hdr(buf, P2P_GO_NEG_REQ, peer->dialog_token);
157 if (peer->flags & P2P_DEV_PREFER_PERSISTENT_GROUP) {
159 if (peer->flags & P2P_DEV_PREFER_PERSISTENT_RECONN)
169 p2p_buf_add_go_intent(buf, (p2p->go_intent << 1) | peer->tie_breaker);
178 p2p_buf_add_device_info(buf, p2p, peer);
    [all...]
p2p_invitation.c 19 struct p2p_device *peer,
56 peer->dialog_token++;
57 if (peer->dialog_token == 0)
58 peer->dialog_token = 1;
60 peer->dialog_token);
71 !(peer->flags & P2P_DEV_NO_PREF_CHAN))
81 dev_addr = peer->info.p2p_device_addr;
85 p2p_buf_add_device_info(buf, p2p, peer);
106 struct p2p_device *peer,
190 p2p_dbg(p2p, "Invitation Request from unknown peer " MACSTR
    [all...]
  /external/chromium_org/third_party/openssl/openssl/crypto/bio/
bss_dgram.c 162 } peer; member in struct:bio_dgram_data_st
186 } peer; member in struct:bio_dgram_sctp_data_st
378 } peer; member in struct:__anon18341
382 sa.len.i=sizeof(sa.peer);
387 memset(&sa.peer, 0x00, sizeof(sa.peer));
389 ret=recvfrom(b->num,out,outl,0,&sa.peer.sa,(void *)&sa.len);
392 OPENSSL_assert(sa.len.s<=sizeof(sa.peer));
397 BIO_ctrl(b, BIO_CTRL_DGRAM_SET_PEER, 0, &sa.peer);
424 int peerlen = sizeof(data->peer);
    [all...]
  /external/openssl/crypto/bio/
bss_dgram.c 162 } peer; member in struct:bio_dgram_data_st
186 } peer; member in struct:bio_dgram_sctp_data_st
378 } peer; member in struct:__anon31930
382 sa.len.i=sizeof(sa.peer);
387 memset(&sa.peer, 0x00, sizeof(sa.peer));
389 ret=recvfrom(b->num,out,outl,0,&sa.peer.sa,(void *)&sa.len);
392 OPENSSL_assert(sa.len.s<=sizeof(sa.peer));
397 BIO_ctrl(b, BIO_CTRL_DGRAM_SET_PEER, 0, &sa.peer);
424 int peerlen = sizeof(data->peer);
    [all...]
  /external/bluetooth/bluedroid/btif/co/
bta_pan_co.c 93 //bdcpy(conn->peer, peer_addr);
114 ** peer is closed.
188 BTIF_TRACE_DEBUG("pan bt peer addr: %02x:%02x:%02x:%02x:%02x:%02x",
189 conn->peer[0], conn->peer[1], conn->peer[2],
190 conn->peer[3],conn->peer[4], conn->peer[5]);
315 ** Description protocol filter indication from peer devic
    [all...]
  /external/ipsec-tools/src/racoon/
sainfo.c 76 * First pass is for sainfo from a specified peer, second for others.
79 getsainfo(loc, rmt, peer, remoteid)
80 const vchar_t *loc, *rmt, *peer;
87 if (peer == NULL)
104 if (peer == NULL)
107 dpeer = ipsecdoi_id2str(peer);
110 "getsainfo params: loc=\'%s\', rmt=\'%s\', peer=\'%s\', id=%i\n",
133 if (ipsecdoi_chkcmpids(peer, s->id_i, 0))
294 snprintf(buf, 255, "loc=\'%s\', rmt=\'%s\', peer=\'%s\', id=%i",
  /external/dnsmasq/src/
tftp.c 46 struct sockaddr_in addr, peer; local
72 msg.msg_name = &peer;
73 msg.msg_namelen = sizeof(peer);
153 transfer->peer = peer;
194 len = tftp_err(ERR_ILL, packet, _("unsupported request from %s"), inet_ntoa(peer.sin_addr));
244 strncat(daemon->namebuff, inet_ntoa(peer.sin_addr), (MAXDNAME-1) - strlen(daemon->namebuff));
276 (struct sockaddr *)&peer, sizeof(peer)) == -1 && errno == EINTR);
282 my_syslog(MS_TFTP | LOG_INFO, _("TFTP sent %s to %s"), daemon->namebuff, inet_ntoa(peer.sin_addr))
    [all...]
  /external/chromium_org/content/child/
resource_dispatcher.cc 79 virtual bool Start(RequestPeer* peer) OVERRIDE;
173 bool IPCResourceLoaderBridge::Start(RequestPeer* peer) {
180 request_id_ = dispatcher_->AddPendingRequest(peer,
339 request_info->peer->OnUploadProgress(position, size);
356 request_info->peer, response_head.mime_type, request_info->url);
358 request_info->peer = new_peer;
369 request_info->peer->OnReceivedResponse(renderer_response_info);
379 request_info->peer->OnReceivedCachedMetadata(&data.front(), data.size());
449 // call peer's callback.
465 request_info->peer->OnReceivedData
545 RequestPeer* peer = request_info->peer; local
    [all...]
  /art/runtime/native/
dalvik_system_VMStack.cc 29 static jobject GetThreadStack(const ScopedFastNativeObjectAccess& soa, jobject peer)
32 if (soa.Decode<mirror::Object*>(peer) == soa.Self()->GetPeer()) {
43 thread = thread_list->SuspendThreadByPeer(peer, true, false, &timed_out);
  /external/chromium_org/v8/tools/testrunner/server/
presence_handler.py 38 from ..objects import peer namespace
41 STARTUP_REQUEST = "V8 test peer starting up"
43 EXIT_REQUEST = "V8 testing peer going down"
69 p = peer.Peer(self.client_address[0], jobs, relative_perf,
78 p = peer.Peer(self.client_address[0], jobs, perf, pubkey_fingerprint)
  /external/chromium_org/content/browser/
byte_stream.cc 54 void SetPeer(ByteStreamReaderImpl* peer,
90 // ** Peer information.
114 void SetPeer(ByteStreamWriterImpl* peer,
126 // Receive data from our peer.
166 // ** Peer information
204 ByteStreamReaderImpl* peer,
207 peer_ = peer;
336 ByteStreamWriterImpl* peer,
339 peer_ = peer;
  /external/chromium_org/net/base/
address_tracker_linux.cc 144 struct sockaddr_nl peer = {}; local
145 peer.nl_family = AF_NETLINK;
159 0, reinterpret_cast<struct sockaddr*>(&peer),
160 sizeof(peer)));
178 reinterpret_cast<struct sockaddr*>(&peer),
179 sizeof(peer)));
  /external/chromium_org/content/browser/resources/media/
peer_connection_update_table.js 7 * The data of a peer connection update.
9 * @param {number} lid The id of the peer conneciton inside a renderer.
38 * Maintains the peer connection update log table.
101 * Makes sure the update log table of the peer connection is created.
  /external/chromium_org/ui/views/controls/button/
radio_button.cc 84 RadioButton* peer = static_cast<RadioButton*>(*i); local
85 peer->SetChecked(false);
  /development/samples/SupportAppNavigation/src/com/example/android/support/appnavigation/app/
PeerActivity.java 39 setContentView(R.layout.peer);
  /external/bluetooth/bluedroid/btif/include/
btif_pan_internal.h 69 BD_ADDR peer; member in struct:__anon5664
  /external/chromium_org/device/nfc/
nfc_chromeos_unittest.cc 83 virtual void PeerFound(NfcAdapter* adapter, NfcPeer* peer) OVERRIDE {
86 peer_identifier_ = peer->GetIdentifier();
90 virtual void PeerLost(NfcAdapter* adapter, NfcPeer* peer) OVERRIDE {
92 EXPECT_EQ(peer_identifier_, peer->GetIdentifier());
114 NfcPeer* peer, const NfcNdefRecord* record) OVERRIDE {
115 EXPECT_EQ(peer, adapter_->GetPeer(peer_identifier_));
116 EXPECT_EQ(peer_identifier_, peer->GetIdentifier());
321 // Tests that peer and record objects are created for all peers and records
365 NfcPeer* peer = peers[0]; local
366 const NfcNdefMessage& message = peer->GetNdefMessage()
540 NfcPeer* peer = adapter_->GetPeer(observer.peer_identifier_); local
    [all...]
  /external/iptables/include/libipq/
libipq.h 53 struct sockaddr_nl peer; member in struct:ipq_handle
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.6/sysroot/usr/include/rpcsvc/
yp.x 88 peername peer;
134 peername peer;

Completed in 489 milliseconds

1 23 4 5 6 7 8 910