HomeSort by relevance Sort by last modified time
    Searched refs:peer (Results 26 - 50 of 149) sorted by null

12 3 4 5 6

  /external/chromium_org/device/nfc/
nfc_peer.h 21 // - NDEF. Specifically, reading NDEF records found on the peer device and
35 // Interface for observing changes from NFC peer devices.
40 // This method will be called when an NDEF record |record| from the peer
41 // device |peer| is received. Users can use this method to be notified of
43 // received from it, if any. All records received from |peer| can be
44 // accessed by calling |peer->GetNdefMessage()|.
45 virtual void RecordReceived(NfcPeer* peer, const NfcNdefRecord* record) {}
53 // Adds and removes observers for events on this NFC peer. If monitoring
54 // multiple peers, check the |peer| parameter of observer methods to
55 // determine which peer is issuing the event
    [all...]
  /external/chromium_org/net/server/
http_server_request_info.h 34 // Request peer address.
35 IPEndPoint peer; member in class:net::HttpServerRequestInfo
  /external/chromium_org/sandbox/win/src/
broker_services.cc 65 // Helper structure that allows the broker to track peer processes
76 void DeregisterPeerTracker(PeerTracker* peer) {
78 if (::UnregisterWaitEx(peer->wait_object, INVALID_HANDLE_VALUE)) {
79 delete peer;
172 // Cancel the wait events and delete remaining peer trackers.
512 PeerTracker* peer = reinterpret_cast<PeerTracker*>(parameter); local
514 ::PostQueuedCompletionStatus(peer->job_port, 0, THREAD_CTRL_REMOVE_PEER,
515 reinterpret_cast<LPOVERLAPPED>(peer->id));
519 scoped_ptr<PeerTracker> peer(new PeerTracker(::GetProcessId(peer_process),
521 if (!peer->id
    [all...]
  /external/chromium_org/v8/tools/testrunner/network/
distro.py 77 # Pick the least-busy peer. Sorting the list for each test
81 # If the peer already has a shell assigned and would need this one
83 peer = peers[index]
84 if (shell.total_duration < peer.needed_work and
85 len(peer.shells) > 0 and
90 peer.AddTests(shell)
network_execution.py 38 from ..objects import peer namespace
49 return [ peer.Peer.Unpack(p) for p in data ]
143 # Spawn one thread for each peer.
170 def _TalkToPeer(self, peer):
173 code = sock.connect_ex((peer.address, constants.PEER_PORT))
176 peer.runtime = None
178 packet = workpacket.WorkPacket(peer=peer, context=self.context,
191 # The peer is reporting an error
    [all...]
  /external/chromium_org/chrome/browser/ui/webui/chromeos/
nfc_debug_ui.cc 202 virtual void PeerFound(NfcAdapter* adaper, NfcPeer* peer) OVERRIDE;
203 virtual void PeerLost(NfcAdapter* adapter, NfcPeer* peer) OVERRIDE;
212 NfcPeer* peer,
246 // Stores the properties of the NFC peer in |out|, mapping these to keys
247 // that will be read by JS. |out| will not be modified, if no peer is known.
261 // Updates the data displayed in the UI for the current peer.
270 // The cached identifier of the most recent NFC peer device found.
287 NfcPeer* peer = nfc_adapter_->GetPeer(peer_identifier_); local
288 if (peer)
289 peer->RemoveObserver(this)
496 NfcPeer* peer = nfc_adapter_->GetPeer(peer_identifier_); local
585 NfcPeer* peer = nfc_adapter_->GetPeer(peer_identifier_); local
    [all...]
  /external/openssl/crypto/bio/
bss_bio.c 57 * of this kind, handled by the same thread (i.e. the "peer" is actually
127 BIO *peer; /* NULL if buf == NULL. member in struct:bio_bio_st
128 * If peer != NULL, then peer->ptr is also a bio_bio_st,
129 * and its "peer" member points back to us.
130 * peer != NULL iff init != 0 in the BIO. */
132 /* This is for what we write (i.e. reading uses peer's struct): */
133 int closed; /* valid iff peer != NULL */
134 size_t len; /* valid iff buf != NULL; 0 if peer == NULL */
139 size_t request; /* valid iff peer != NULL; 0 if len != 0
    [all...]
bss_dgram.c 162 } peer; member in struct:bio_dgram_data_st
186 } peer; member in struct:bio_dgram_sctp_data_st
378 } peer; member in struct:__anon7718
382 sa.len.i=sizeof(sa.peer);
387 memset(&sa.peer, 0x00, sizeof(sa.peer));
389 ret=recvfrom(b->num,out,outl,0,&sa.peer.sa,(void *)&sa.len);
392 OPENSSL_assert(sa.len.s<=sizeof(sa.peer));
397 BIO_ctrl(b, BIO_CTRL_DGRAM_SET_PEER, 0, &sa.peer);
424 int peerlen = sizeof(data->peer);
    [all...]
  /external/chromium_org/chrome/renderer/extensions/
extension_localization_peer.h 23 // instance of ExtensionLocalizationPeer based on the original Peer.
29 content::RequestPeer* peer,
56 ExtensionLocalizationPeer(content::RequestPeer* peer,
64 // Original peer that handles the request once we are done processing data_.
  /external/openssl/crypto/evp/
pmeth_fn.c 285 int EVP_PKEY_derive_set_peer(EVP_PKEY_CTX *ctx, EVP_PKEY *peer)
301 ret = ctx->pmeth->ctrl(ctx, EVP_PKEY_CTRL_PEER_KEY, 0, peer);
315 if (ctx->pkey->type != peer->type)
322 /* ran@cryptocom.ru: For clarity. The error is if parameters in peer are
327 if (!EVP_PKEY_missing_parameters(peer) &&
328 !EVP_PKEY_cmp_parameters(ctx->pkey, peer))
337 ctx->peerkey = peer;
339 ret = ctx->pmeth->ctrl(ctx, EVP_PKEY_CTRL_PEER_KEY, 1, peer);
347 CRYPTO_add(&peer->references,1,CRYPTO_LOCK_EVP_PKEY);
  /external/chromium_org/net/spdy/
hpack_encoder_test.cc 382 test::HpackEncoderPeer peer(NULL);
389 peer.CookieToCrumbs(" foo=1;bar=2 ; bar=3; bing=4; ", &out);
392 peer.CookieToCrumbs(";;foo = bar ;; ;baz =bing", &out);
395 peer.CookieToCrumbs("baz=bing; foo=bar; baz=bing", &out);
398 peer.CookieToCrumbs("baz=bing", &out);
401 peer.CookieToCrumbs("", &out);
404 peer.CookieToCrumbs("foo;bar; baz;baz;bing;", &out);
430 test::HpackEncoderPeer peer(NULL);
433 peer.DecomposeRepresentation("", &out);
436 peer.DecomposeRepresentation("foobar", &out)
    [all...]
  /external/iputils/
tftpd.c 79 int peer; variable
189 peer = socket(from.sa.sa_family, SOCK_DGRAM, 0);
190 if (peer < 0) {
194 if (connect(peer, (struct sockaddr *)&from, sizeof(from)) < 0) {
372 if (send(peer, dp, size + 4, confirmed) != size + 4) {
380 n = recv(peer, ackbuf, sizeof (ackbuf), 0);
398 synchnet(peer);
437 if (send(peer, ackbuf, 4, confirmed) != 4) {
445 n = recv(peer, dp, PKTSIZE, 0);
461 (void) synchnet(peer);
    [all...]
  /external/chromium_org/remoting/signaling/
fake_signal_strategy.cc 43 void FakeSignalStrategy::ConnectTo(FakeSignalStrategy* peer) {
48 if (peer->main_thread_->BelongsToCurrentThread()) {
49 peer->SetPeerCallback(peer_callback);
51 peer->main_thread_->PostTask(
54 base::Unretained(peer),
  /external/chromium_org/v8/tools/testrunner/server/
main.py 151 def AddPeer(self, peer):
154 if p.address == peer.address:
156 self.peers.append(peer)
157 if peer.trusted:
158 status_handler.ITrustYouNow(peer)
187 for peer in self.peers:
188 if peer.address == self.ip: continue
189 if peer.pubkey == fingerprint:
190 status_handler.ITrustYouNow(peer)
193 status_handler.NotifyNewTrusted(peer, result
    [all...]
presence_handler.py 38 from ..objects import peer namespace
41 STARTUP_REQUEST = "V8 test peer starting up"
43 EXIT_REQUEST = "V8 testing peer going down"
69 p = peer.Peer(self.client_address[0], jobs, relative_perf,
78 p = peer.Peer(self.client_address[0], jobs, perf, pubkey_fingerprint)
  /external/openssl/apps/
sess_id.c 93 X509 *peer = NULL; local
167 peer = SSL_SESSION_get0_peer(x);
236 if (peer == NULL)
239 X509_print(out,peer);
258 else if (!noout && (peer != NULL)) /* just print the certificate */
261 i=(int)i2d_X509_bio(out,peer);
263 i=PEM_write_bio_X509(out,peer);
  /external/chromium_org/content/child/
web_url_loader_impl_unittest.cc 66 virtual bool Start(RequestPeer* peer) OVERRIDE {
68 peer_ = peer;
90 RequestPeer* peer() { return peer_; } function in class:content::__anon12146::TestBridge
281 ASSERT_TRUE(peer());
291 peer()->OnReceivedRedirect(redirect_info,
298 peer()->OnReceivedResponse(content::ResourceResponseInfo());
305 peer()->OnReceivedData(kTestData, strlen(kTestData), strlen(kTestData));
311 peer()->OnCompletedRequest(net::OK, false, false, "", base::TimeTicks(),
321 peer()->OnCompletedRequest(net::ERR_FAILED, false, false, "",
332 peer()->OnReceivedResponse(response_info)
363 RequestPeer* peer() { return bridge()->peer(); } function in class:content::__anon12146::WebURLLoaderImplTest
    [all...]
resource_dispatcher.cc 77 virtual bool Start(RequestPeer* peer) OVERRIDE;
173 bool IPCResourceLoaderBridge::Start(RequestPeer* peer) {
180 request_id_ = dispatcher_->AddPendingRequest(peer,
339 request_info->peer->OnUploadProgress(position, size);
356 request_info->peer, response_head.mime_type, request_info->url);
358 request_info->peer = new_peer;
376 request_info->peer->OnReceivedResponse(renderer_response_info);
386 request_info->peer->OnReceivedCachedMetadata(&data.front(), data.size());
456 // call peer's callback.
472 request_info->peer->OnReceivedData
551 RequestPeer* peer = request_info->peer; local
    [all...]
  /development/samples/AppNavigation/src/com/example/android/appnavigation/app/
PeerActivity.java 36 setContentView(R.layout.peer);
  /bootable/recovery/minadbd/
adb.c 324 s->peer = create_remote_socket(p->msg.arg0, t);
325 s->peer->peer = s;
326 send_ready(s->id, s->peer->id, t);
335 if(s->peer == 0) {
336 s->peer = create_remote_socket(p->msg.arg0, t);
337 s->peer->peer = s;
  /external/bluetooth/bluedroid/btif/co/
bta_pan_co.c 93 //bdcpy(conn->peer, peer_addr);
114 ** peer is closed.
188 BTIF_TRACE_DEBUG("pan bt peer addr: %02x:%02x:%02x:%02x:%02x:%02x",
189 conn->peer[0], conn->peer[1], conn->peer[2],
190 conn->peer[3],conn->peer[4], conn->peer[5]);
315 ** Description protocol filter indication from peer devic
    [all...]
  /external/ipsec-tools/src/racoon/
sainfo.c 76 * First pass is for sainfo from a specified peer, second for others.
79 getsainfo(loc, rmt, peer, remoteid)
80 const vchar_t *loc, *rmt, *peer;
87 if (peer == NULL)
104 if (peer == NULL)
107 dpeer = ipsecdoi_id2str(peer);
110 "getsainfo params: loc=\'%s\', rmt=\'%s\', peer=\'%s\', id=%i\n",
133 if (ipsecdoi_chkcmpids(peer, s->id_i, 0))
294 snprintf(buf, 255, "loc=\'%s\', rmt=\'%s\', peer=\'%s\', id=%i",
  /external/dnsmasq/src/
tftp.c 46 struct sockaddr_in addr, peer; local
72 msg.msg_name = &peer;
73 msg.msg_namelen = sizeof(peer);
153 transfer->peer = peer;
194 len = tftp_err(ERR_ILL, packet, _("unsupported request from %s"), inet_ntoa(peer.sin_addr));
244 strncat(daemon->namebuff, inet_ntoa(peer.sin_addr), (MAXDNAME-1) - strlen(daemon->namebuff));
276 (struct sockaddr *)&peer, sizeof(peer)) == -1 && errno == EINTR);
282 my_syslog(MS_TFTP | LOG_INFO, _("TFTP sent %s to %s"), daemon->namebuff, inet_ntoa(peer.sin_addr))
    [all...]
  /art/runtime/native/
dalvik_system_VMStack.cc 29 static jobject GetThreadStack(const ScopedFastNativeObjectAccess& soa, jobject peer)
32 if (soa.Decode<mirror::Object*>(peer) == soa.Self()->GetPeer()) {
43 thread = thread_list->SuspendThreadByPeer(peer, true, false, &timed_out);
  /external/chromium_org/content/browser/
byte_stream.cc 54 void SetPeer(ByteStreamReaderImpl* peer,
90 // ** Peer information.
114 void SetPeer(ByteStreamWriterImpl* peer,
126 // Receive data from our peer.
166 // ** Peer information
204 ByteStreamReaderImpl* peer,
207 peer_ = peer;
336 ByteStreamWriterImpl* peer,
339 peer_ = peer;

Completed in 1235 milliseconds

12 3 4 5 6