/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/spdy/ |
SpdyConnectionTest.java | 59 private final MockSpdyPeer peer = new MockSpdyPeer(); field in class:SpdyConnectionTest 62 peer.close(); 67 peer.acceptFrame(); // SYN_STREAM 68 peer.sendFrame() 70 peer.sendFrame().data(true, 1, new OkBuffer().writeUtf8("robot")); 71 peer.acceptFrame(); // DATA 72 peer.play(); 75 SpdyConnection connection = connection(peer, SPDY3); 84 // verify the peer received what was expected 85 MockSpdyPeer.InFrame synStream = peer.takeFrame() [all...] |
/bootable/recovery/minadbd/ |
sockets.c | 54 ** these have no peer anymore, but still packets to 122 if(s->transport == t || (s->peer && s->peer->transport == t)) { 223 if(s->peer) { 224 D("LS(%d): closing peer. peer->id=%d peer->fd=%d\n", 225 s->id, s->peer->id, s->peer->fd); 226 s->peer->peer = 0 471 asocket* peer = s->peer; local [all...] |
/external/chromium_org/v8/tools/testrunner/server/ |
status_handler.py | 36 def _StatusQuery(peer, query): 38 code = sock.connect_ex((peer.address, constants.STATUS_PORT)) 55 def RequestTrustedPubkeys(peer, server): 56 pubkey_list = _StatusQuery(peer, [constants.LIST_TRUSTED_PUBKEYS]) 59 result = _StatusQuery(peer, [constants.GET_SIGNED_PUBKEY, pubkey]) 63 def NotifyNewTrusted(peer, data): 64 _StatusQuery(peer, [constants.NOTIFY_NEW_TRUSTED] + data) 67 def ITrustYouNow(peer): 68 _StatusQuery(peer, [constants.TRUST_YOU_NOW]) 71 def TryTransitiveTrust(peer, pubkey, server) [all...] |
/external/chromium_org/content/child/ |
resource_dispatcher_unittest.cc | 358 TestRequestPeer peer(bridge.get()); 360 EXPECT_TRUE(bridge->Start(&peer)); 366 EXPECT_TRUE(peer.received_response()); 378 EXPECT_EQ(kTestPageContents, peer.data()); 379 EXPECT_TRUE(peer.complete()); 429 TestRequestPeer peer(bridge.get()); 431 EXPECT_TRUE(bridge->Start(&peer)); 446 EXPECT_EQ("", peer.data()); 447 EXPECT_FALSE(peer.received_response()); 448 EXPECT_FALSE(peer.complete()) [all...] |
resource_loader_bridge.h | 47 // the peer's methods will be called asynchronously to report various events. 48 virtual bool Start(RequestPeer* peer) = 0; 53 // the peer is still valid.
|
/external/openssl/apps/ |
s_cb.c | 777 } peer; local 790 /* Read peer information */ 791 (void)BIO_dgram_get_peer(SSL_get_rbio(ssl), &peer); local 793 /* Create buffer with peer's address and port */ 795 switch (peer.sa.sa_family) 799 length += sizeof(peer.s4.sin_port); 804 length += sizeof(peer.s6.sin6_port); 819 switch (peer.sa.sa_family) 823 &peer.s4.sin_port, 824 sizeof(peer.s4.sin_port)) 865 } peer; local 872 (void)BIO_dgram_get_peer(SSL_get_rbio(ssl), &peer); local [all...] |
/external/chromium_org/chrome/renderer/ |
security_filter_peer.h | 16 // SecurityFilterPeer based on the original Peer. 25 content::RequestPeer* peer, 29 content::RequestPeer* peer, 51 explicit SecurityFilterPeer(content::RequestPeer* peer); 63 BufferedPeer(content::RequestPeer* peer, const std::string& mime_type); 82 // to the original peer, giving an opportunity to subclasses to process the 84 // original peer, if it returns false, an error is sent instead. 104 ReplaceContentPeer(content::RequestPeer* peer,
|
security_filter_peer.cc | 14 SecurityFilterPeer::SecurityFilterPeer(content::RequestPeer* peer) 15 : original_peer_(peer) { 25 content::RequestPeer* peer, 44 return CreateSecurityFilterPeerForFrame(peer, os_error); 46 return new ReplaceContentPeer(peer, std::string(), std::string()); 55 content::RequestPeer* peer, 64 return new ReplaceContentPeer(peer, "text/html", html); 130 BufferedPeer::BufferedPeer(content::RequestPeer* peer, 132 : SecurityFilterPeer(peer), mime_type_(mime_type) {} 181 ReplaceContentPeer::ReplaceContentPeer(content::RequestPeer* peer, [all...] |
/external/chromium_org/v8/tools/testrunner/objects/ |
workpacket.py | 33 def __init__(self, peer=None, context=None, tests=None, binaries=None, 35 self.peer = peer 50 for shell in self.peer.shells: 64 for t in self.peer.tests:
|
/external/chromium_org/net/quic/crypto/ |
quic_crypto_server_config_test.cc | 193 QuicCryptoServerConfigPeer peer(config_); 194 base::Lock* m = peer.GetStrikeRegisterClientLock(); 255 QuicCryptoServerConfigPeer peer(&server); 272 EXPECT_TRUE(peer.ConfigHasDefaultSourceAddressTokenBoxer(kPrimary)); 273 EXPECT_FALSE(peer.ConfigHasDefaultSourceAddressTokenBoxer(kOverride)); 280 const string token4 = peer.NewSourceAddressToken(kPrimary, ip4, rand, now); 281 const string token4d = peer.NewSourceAddressToken(kPrimary, ip4d, rand, now); 282 const string token6 = peer.NewSourceAddressToken(kPrimary, ip6, rand, now); 283 EXPECT_EQ(HANDSHAKE_OK, peer.ValidateSourceAddressToken( 285 DCHECK_EQ(HANDSHAKE_OK, peer.ValidateSourceAddressToken [all...] |
/cts/tests/tests/os/src/android/os/cts/ |
IParcelFileDescriptorPeer.aidl | 23 void setPeer(in IParcelFileDescriptorPeer peer); 34 /* Ask this peer to get their remote FD from another */ 36 /* Ask this peer to set their remote FD to another */
|
/developers/build/prebuilts/gradle/FindMyPhone/Wearable/src/main/java/com/example/android/wearable/findphone/ |
DisconnectListenerService.java | 34 public void onPeerDisconnected(com.google.android.gms.wearable.Node peer) { 49 public void onPeerConnected(com.google.android.gms.wearable.Node peer) {
|
/developers/samples/android/wearable/wear/FindMyPhone/Wearable/src/main/java/com/example/android/wearable/findphone/ |
DisconnectListenerService.java | 34 public void onPeerDisconnected(com.google.android.gms.wearable.Node peer) { 49 public void onPeerConnected(com.google.android.gms.wearable.Node peer) {
|
/development/samples/browseable/FindMyPhone/Wearable/src/com.example.android.wearable.findphone/ |
DisconnectListenerService.java | 34 public void onPeerDisconnected(com.google.android.gms.wearable.Node peer) { 49 public void onPeerConnected(com.google.android.gms.wearable.Node peer) {
|
/external/iproute2/ip/ |
ifcfg | 36 echo "Usage: ifcfg DEV [[add|del [ADDR[/LEN]] [PEER] | stop]" 1>&2 81 peer=$1 82 if [ "$peer" != "" ]; then 84 echo "Peer address with non-trivial netmask." 1>&2 87 pfx="$ipaddr peer $peer" 141 elif [ "$peer" != "" ]; then 142 if ping -q -c 2 -w 4 $peer ; then 143 ip ro append default via $peer dev $dev metric 30001
|
/external/chromium_org/third_party/boringssl/src/crypto/bio/ |
pair.c | 63 BIO *peer; /* NULL if buf == NULL. member in struct:bio_bio_st 64 * If peer != NULL, then peer->ptr is also a bio_bio_st, 65 * and its "peer" member points back to us. 66 * peer != NULL iff init != 0 in the BIO. */ 68 /* This is for what we write (i.e. reading uses peer's struct): */ 69 int closed; /* valid iff peer != NULL */ 70 size_t len; /* valid iff buf != NULL; 0 if peer == NULL */ 75 size_t request; /* valid iff peer != NULL; 0 if len != 0, 76 * otherwise set by peer to number of byte [all...] |
/external/chromium_org/content/browser/resources/media/ |
webrtc_internals.js | 12 /** A map from peer connection id to the PeerConnectionRecord. */ 17 /** A simple class to store the updates and stats data for a peer connection. */ 38 * Adds the initilization info of the peer connection. 39 * @param {string} url The URL of the web page owning the peer connection. 104 // Requests stats from all peer connections every second. 110 /** Sends a request to the browser to get peer connection statistics. */ 118 * A helper function for getting a peer connection element id. 121 * of the peer connection. 122 * @return {string} The peer connection element id. 132 * @param {!PeerConnectionUpdateEntry} data The peer connection update data [all...] |
/art/runtime/ |
instruction_set.h | 213 bool operator==(const InstructionSetFeatures &peer) const { 214 return mask_ == peer.mask_; 217 bool operator!=(const InstructionSetFeatures &peer) const { 218 return mask_ != peer.mask_; 221 bool operator<=(const InstructionSetFeatures &peer) const { 222 return (mask_ & peer.mask_) == mask_;
|
/external/chromium_org/device/nfc/ |
nfc_adapter.h | 56 // was never started or because a connection with a tag or peer has been 74 // Called when a remote NFC adapter |peer| has been detected, which is 75 // available for peer-to-peer communication over NFC. The observer can use 76 // this method to take further action on |peer| such as reading its records 77 // or pushing NDEFs to it. While |peer| will be valid within the context of 79 // the object may get destroyed if the connection with the peer is lost. 81 // peer's assigned unique identifier instead, which can be used to obtain a 82 // pointer to the peer, as long as it exists. 83 virtual void PeerFound(NfcAdapter* adaper, NfcPeer* peer) {} [all...] |
nfc_adapter.cc | 59 void NfcAdapter::SetPeer(const std::string& identifier, NfcPeer* peer) { 61 VLOG(1) << "Peer object for peer \"" << identifier << "\" already exists."; 64 peers_[identifier] = peer; 81 VLOG(1) << "Peer object for peer \"" << identifier << "\" not found."; 84 NfcPeer* peer = iter->second; local 86 return peer;
|
/external/iptables/libipq/ |
libipq.c | 77 { IPQ_ERR_ADDRLEN, "Invalid peer address length" }, 107 (struct sockaddr *)&h->peer, sizeof(h->peer)); 135 addrlen = sizeof(h->peer); 168 (struct sockaddr *)&h->peer, &addrlen); 173 if (addrlen != sizeof(h->peer)) { 177 if (h->peer.nl_pid != 0) { 248 memset(&h->peer, 0, sizeof(struct sockaddr_nl)); 249 h->peer.nl_family = AF_NETLINK; 250 h->peer.nl_pid = 0 [all...] |
/developers/build/prebuilts/gradle/DataLayer/Wearable/src/main/java/com/example/android/wearable/datalayer/ |
DataLayerListenerService.java | 106 public void onPeerConnected(Node peer) { 107 LOGD(TAG, "onPeerConnected: " + peer); 111 public void onPeerDisconnected(Node peer) { 112 LOGD(TAG, "onPeerDisconnected: " + peer);
|
/developers/samples/android/wearable/wear/DataLayer/Wearable/src/main/java/com/example/android/wearable/datalayer/ |
DataLayerListenerService.java | 106 public void onPeerConnected(Node peer) { 107 LOGD(TAG, "onPeerConnected: " + peer); 111 public void onPeerDisconnected(Node peer) { 112 LOGD(TAG, "onPeerDisconnected: " + peer);
|
/development/samples/browseable/DataLayer/Wearable/src/com.example.android.wearable.datalayer/ |
DataLayerListenerService.java | 106 public void onPeerConnected(Node peer) { 107 LOGD(TAG, "onPeerConnected: " + peer); 111 public void onPeerDisconnected(Node peer) { 112 LOGD(TAG, "onPeerDisconnected: " + peer);
|
/external/chromium_org/chrome/renderer/extensions/ |
extension_localization_peer.cc | 18 content::RequestPeer* peer, 21 : original_peer_(peer), 32 content::RequestPeer* peer, 40 new ExtensionLocalizationPeer(peer, message_sender, request_url) : NULL;
|