HomeSort by relevance Sort by last modified time
    Searched refs:peer (Results 1 - 25 of 149) sorted by null

1 2 3 4 5 6

  /external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/spdy/
SpdyConnectionTest.java 59 private final MockSpdyPeer peer = new MockSpdyPeer(); field in class:SpdyConnectionTest
62 peer.close();
67 peer.acceptFrame(); // SYN_STREAM
68 peer.sendFrame()
70 peer.sendFrame().data(true, 1, new OkBuffer().writeUtf8("robot"));
71 peer.acceptFrame(); // DATA
72 peer.play();
75 SpdyConnection connection = connection(peer, SPDY3);
84 // verify the peer received what was expected
85 MockSpdyPeer.InFrame synStream = peer.takeFrame()
    [all...]
  /bootable/recovery/minadbd/
sockets.c 54 ** these have no peer anymore, but still packets to
122 if(s->transport == t || (s->peer && s->peer->transport == t)) {
223 if(s->peer) {
224 D("LS(%d): closing peer. peer->id=%d peer->fd=%d\n",
225 s->id, s->peer->id, s->peer->fd);
226 s->peer->peer = 0
471 asocket* peer = s->peer; local
    [all...]
  /external/chromium_org/v8/tools/testrunner/server/
status_handler.py 36 def _StatusQuery(peer, query):
38 code = sock.connect_ex((peer.address, constants.STATUS_PORT))
55 def RequestTrustedPubkeys(peer, server):
56 pubkey_list = _StatusQuery(peer, [constants.LIST_TRUSTED_PUBKEYS])
59 result = _StatusQuery(peer, [constants.GET_SIGNED_PUBKEY, pubkey])
63 def NotifyNewTrusted(peer, data):
64 _StatusQuery(peer, [constants.NOTIFY_NEW_TRUSTED] + data)
67 def ITrustYouNow(peer):
68 _StatusQuery(peer, [constants.TRUST_YOU_NOW])
71 def TryTransitiveTrust(peer, pubkey, server)
    [all...]
  /external/chromium_org/content/child/
resource_dispatcher_unittest.cc 358 TestRequestPeer peer(bridge.get());
360 EXPECT_TRUE(bridge->Start(&peer));
366 EXPECT_TRUE(peer.received_response());
378 EXPECT_EQ(kTestPageContents, peer.data());
379 EXPECT_TRUE(peer.complete());
429 TestRequestPeer peer(bridge.get());
431 EXPECT_TRUE(bridge->Start(&peer));
446 EXPECT_EQ("", peer.data());
447 EXPECT_FALSE(peer.received_response());
448 EXPECT_FALSE(peer.complete())
    [all...]
resource_loader_bridge.h 47 // the peer's methods will be called asynchronously to report various events.
48 virtual bool Start(RequestPeer* peer) = 0;
53 // the peer is still valid.
  /external/openssl/apps/
s_cb.c 777 } peer; local
790 /* Read peer information */
791 (void)BIO_dgram_get_peer(SSL_get_rbio(ssl), &peer); local
793 /* Create buffer with peer's address and port */
795 switch (peer.sa.sa_family)
799 length += sizeof(peer.s4.sin_port);
804 length += sizeof(peer.s6.sin6_port);
819 switch (peer.sa.sa_family)
823 &peer.s4.sin_port,
824 sizeof(peer.s4.sin_port))
865 } peer; local
872 (void)BIO_dgram_get_peer(SSL_get_rbio(ssl), &peer); local
    [all...]
  /external/chromium_org/chrome/renderer/
security_filter_peer.h 16 // SecurityFilterPeer based on the original Peer.
25 content::RequestPeer* peer,
29 content::RequestPeer* peer,
51 explicit SecurityFilterPeer(content::RequestPeer* peer);
63 BufferedPeer(content::RequestPeer* peer, const std::string& mime_type);
82 // to the original peer, giving an opportunity to subclasses to process the
84 // original peer, if it returns false, an error is sent instead.
104 ReplaceContentPeer(content::RequestPeer* peer,
security_filter_peer.cc 14 SecurityFilterPeer::SecurityFilterPeer(content::RequestPeer* peer)
15 : original_peer_(peer) {
25 content::RequestPeer* peer,
44 return CreateSecurityFilterPeerForFrame(peer, os_error);
46 return new ReplaceContentPeer(peer, std::string(), std::string());
55 content::RequestPeer* peer,
64 return new ReplaceContentPeer(peer, "text/html", html);
130 BufferedPeer::BufferedPeer(content::RequestPeer* peer,
132 : SecurityFilterPeer(peer), mime_type_(mime_type) {}
181 ReplaceContentPeer::ReplaceContentPeer(content::RequestPeer* peer,
    [all...]
  /external/chromium_org/v8/tools/testrunner/objects/
workpacket.py 33 def __init__(self, peer=None, context=None, tests=None, binaries=None,
35 self.peer = peer
50 for shell in self.peer.shells:
64 for t in self.peer.tests:
  /external/chromium_org/net/quic/crypto/
quic_crypto_server_config_test.cc 193 QuicCryptoServerConfigPeer peer(config_);
194 base::Lock* m = peer.GetStrikeRegisterClientLock();
255 QuicCryptoServerConfigPeer peer(&server);
272 EXPECT_TRUE(peer.ConfigHasDefaultSourceAddressTokenBoxer(kPrimary));
273 EXPECT_FALSE(peer.ConfigHasDefaultSourceAddressTokenBoxer(kOverride));
280 const string token4 = peer.NewSourceAddressToken(kPrimary, ip4, rand, now);
281 const string token4d = peer.NewSourceAddressToken(kPrimary, ip4d, rand, now);
282 const string token6 = peer.NewSourceAddressToken(kPrimary, ip6, rand, now);
283 EXPECT_EQ(HANDSHAKE_OK, peer.ValidateSourceAddressToken(
285 DCHECK_EQ(HANDSHAKE_OK, peer.ValidateSourceAddressToken
    [all...]
  /cts/tests/tests/os/src/android/os/cts/
IParcelFileDescriptorPeer.aidl 23 void setPeer(in IParcelFileDescriptorPeer peer);
34 /* Ask this peer to get their remote FD from another */
36 /* Ask this peer to set their remote FD to another */
  /developers/build/prebuilts/gradle/FindMyPhone/Wearable/src/main/java/com/example/android/wearable/findphone/
DisconnectListenerService.java 34 public void onPeerDisconnected(com.google.android.gms.wearable.Node peer) {
49 public void onPeerConnected(com.google.android.gms.wearable.Node peer) {
  /developers/samples/android/wearable/wear/FindMyPhone/Wearable/src/main/java/com/example/android/wearable/findphone/
DisconnectListenerService.java 34 public void onPeerDisconnected(com.google.android.gms.wearable.Node peer) {
49 public void onPeerConnected(com.google.android.gms.wearable.Node peer) {
  /development/samples/browseable/FindMyPhone/Wearable/src/com.example.android.wearable.findphone/
DisconnectListenerService.java 34 public void onPeerDisconnected(com.google.android.gms.wearable.Node peer) {
49 public void onPeerConnected(com.google.android.gms.wearable.Node peer) {
  /external/iproute2/ip/
ifcfg 36 echo "Usage: ifcfg DEV [[add|del [ADDR[/LEN]] [PEER] | stop]" 1>&2
81 peer=$1
82 if [ "$peer" != "" ]; then
84 echo "Peer address with non-trivial netmask." 1>&2
87 pfx="$ipaddr peer $peer"
141 elif [ "$peer" != "" ]; then
142 if ping -q -c 2 -w 4 $peer ; then
143 ip ro append default via $peer dev $dev metric 30001
  /external/chromium_org/third_party/boringssl/src/crypto/bio/
pair.c 63 BIO *peer; /* NULL if buf == NULL. member in struct:bio_bio_st
64 * If peer != NULL, then peer->ptr is also a bio_bio_st,
65 * and its "peer" member points back to us.
66 * peer != NULL iff init != 0 in the BIO. */
68 /* This is for what we write (i.e. reading uses peer's struct): */
69 int closed; /* valid iff peer != NULL */
70 size_t len; /* valid iff buf != NULL; 0 if peer == NULL */
75 size_t request; /* valid iff peer != NULL; 0 if len != 0,
76 * otherwise set by peer to number of byte
    [all...]
  /external/chromium_org/content/browser/resources/media/
webrtc_internals.js 12 /** A map from peer connection id to the PeerConnectionRecord. */
17 /** A simple class to store the updates and stats data for a peer connection. */
38 * Adds the initilization info of the peer connection.
39 * @param {string} url The URL of the web page owning the peer connection.
104 // Requests stats from all peer connections every second.
110 /** Sends a request to the browser to get peer connection statistics. */
118 * A helper function for getting a peer connection element id.
121 * of the peer connection.
122 * @return {string} The peer connection element id.
132 * @param {!PeerConnectionUpdateEntry} data The peer connection update data
    [all...]
  /art/runtime/
instruction_set.h 213 bool operator==(const InstructionSetFeatures &peer) const {
214 return mask_ == peer.mask_;
217 bool operator!=(const InstructionSetFeatures &peer) const {
218 return mask_ != peer.mask_;
221 bool operator<=(const InstructionSetFeatures &peer) const {
222 return (mask_ & peer.mask_) == mask_;
  /external/chromium_org/device/nfc/
nfc_adapter.h 56 // was never started or because a connection with a tag or peer has been
74 // Called when a remote NFC adapter |peer| has been detected, which is
75 // available for peer-to-peer communication over NFC. The observer can use
76 // this method to take further action on |peer| such as reading its records
77 // or pushing NDEFs to it. While |peer| will be valid within the context of
79 // the object may get destroyed if the connection with the peer is lost.
81 // peer's assigned unique identifier instead, which can be used to obtain a
82 // pointer to the peer, as long as it exists.
83 virtual void PeerFound(NfcAdapter* adaper, NfcPeer* peer) {}
    [all...]
nfc_adapter.cc 59 void NfcAdapter::SetPeer(const std::string& identifier, NfcPeer* peer) {
61 VLOG(1) << "Peer object for peer \"" << identifier << "\" already exists.";
64 peers_[identifier] = peer;
81 VLOG(1) << "Peer object for peer \"" << identifier << "\" not found.";
84 NfcPeer* peer = iter->second; local
86 return peer;
  /external/iptables/libipq/
libipq.c 77 { IPQ_ERR_ADDRLEN, "Invalid peer address length" },
107 (struct sockaddr *)&h->peer, sizeof(h->peer));
135 addrlen = sizeof(h->peer);
168 (struct sockaddr *)&h->peer, &addrlen);
173 if (addrlen != sizeof(h->peer)) {
177 if (h->peer.nl_pid != 0) {
248 memset(&h->peer, 0, sizeof(struct sockaddr_nl));
249 h->peer.nl_family = AF_NETLINK;
250 h->peer.nl_pid = 0
    [all...]
  /developers/build/prebuilts/gradle/DataLayer/Wearable/src/main/java/com/example/android/wearable/datalayer/
DataLayerListenerService.java 106 public void onPeerConnected(Node peer) {
107 LOGD(TAG, "onPeerConnected: " + peer);
111 public void onPeerDisconnected(Node peer) {
112 LOGD(TAG, "onPeerDisconnected: " + peer);
  /developers/samples/android/wearable/wear/DataLayer/Wearable/src/main/java/com/example/android/wearable/datalayer/
DataLayerListenerService.java 106 public void onPeerConnected(Node peer) {
107 LOGD(TAG, "onPeerConnected: " + peer);
111 public void onPeerDisconnected(Node peer) {
112 LOGD(TAG, "onPeerDisconnected: " + peer);
  /development/samples/browseable/DataLayer/Wearable/src/com.example.android.wearable.datalayer/
DataLayerListenerService.java 106 public void onPeerConnected(Node peer) {
107 LOGD(TAG, "onPeerConnected: " + peer);
111 public void onPeerDisconnected(Node peer) {
112 LOGD(TAG, "onPeerDisconnected: " + peer);
  /external/chromium_org/chrome/renderer/extensions/
extension_localization_peer.cc 18 content::RequestPeer* peer,
21 : original_peer_(peer),
32 content::RequestPeer* peer,
40 new ExtensionLocalizationPeer(peer, message_sender, request_url) : NULL;

Completed in 552 milliseconds

1 2 3 4 5 6