| /external/chromium_org/device/nfc/ |
| nfc_peer.h | 21 // - NDEF. Specifically, reading NDEF records found on the peer device and 35 // Interface for observing changes from NFC peer devices. 40 // This method will be called when an NDEF record |record| from the peer 41 // device |peer| is received. Users can use this method to be notified of 43 // received from it, if any. All records received from |peer| can be 44 // accessed by calling |peer->GetNdefMessage()|. 45 virtual void RecordReceived(NfcPeer* peer, const NfcNdefRecord* record) {} 53 // Adds and removes observers for events on this NFC peer. If monitoring 54 // multiple peers, check the |peer| parameter of observer methods to 55 // determine which peer is issuing the event [all...] |
| /external/chromium_org/net/server/ |
| http_server_request_info.h | 34 // Request peer address. 35 IPEndPoint peer; member in class:net::HttpServerRequestInfo
|
| /external/chromium_org/sandbox/win/src/ |
| broker_services.cc | 65 // Helper structure that allows the broker to track peer processes 76 void DeregisterPeerTracker(PeerTracker* peer) { 78 if (::UnregisterWaitEx(peer->wait_object, INVALID_HANDLE_VALUE)) { 79 delete peer; 172 // Cancel the wait events and delete remaining peer trackers. 512 PeerTracker* peer = reinterpret_cast<PeerTracker*>(parameter); local 514 ::PostQueuedCompletionStatus(peer->job_port, 0, THREAD_CTRL_REMOVE_PEER, 515 reinterpret_cast<LPOVERLAPPED>(peer->id)); 519 scoped_ptr<PeerTracker> peer(new PeerTracker(::GetProcessId(peer_process), 521 if (!peer->id [all...] |
| /external/chromium_org/v8/tools/testrunner/network/ |
| distro.py | 77 # Pick the least-busy peer. Sorting the list for each test 81 # If the peer already has a shell assigned and would need this one 83 peer = peers[index] 84 if (shell.total_duration < peer.needed_work and 85 len(peer.shells) > 0 and 90 peer.AddTests(shell)
|
| network_execution.py | 38 from ..objects import peer namespace 49 return [ peer.Peer.Unpack(p) for p in data ] 143 # Spawn one thread for each peer. 170 def _TalkToPeer(self, peer): 173 code = sock.connect_ex((peer.address, constants.PEER_PORT)) 176 peer.runtime = None 178 packet = workpacket.WorkPacket(peer=peer, context=self.context, 191 # The peer is reporting an error [all...] |
| /external/chromium_org/chrome/browser/ui/webui/chromeos/ |
| nfc_debug_ui.cc | 202 virtual void PeerFound(NfcAdapter* adaper, NfcPeer* peer) OVERRIDE; 203 virtual void PeerLost(NfcAdapter* adapter, NfcPeer* peer) OVERRIDE; 212 NfcPeer* peer, 246 // Stores the properties of the NFC peer in |out|, mapping these to keys 247 // that will be read by JS. |out| will not be modified, if no peer is known. 261 // Updates the data displayed in the UI for the current peer. 270 // The cached identifier of the most recent NFC peer device found. 287 NfcPeer* peer = nfc_adapter_->GetPeer(peer_identifier_); local 288 if (peer) 289 peer->RemoveObserver(this) 496 NfcPeer* peer = nfc_adapter_->GetPeer(peer_identifier_); local 585 NfcPeer* peer = nfc_adapter_->GetPeer(peer_identifier_); local [all...] |
| /external/openssl/crypto/bio/ |
| bss_bio.c | 57 * of this kind, handled by the same thread (i.e. the "peer" is actually 127 BIO *peer; /* NULL if buf == NULL. member in struct:bio_bio_st 128 * If peer != NULL, then peer->ptr is also a bio_bio_st, 129 * and its "peer" member points back to us. 130 * peer != NULL iff init != 0 in the BIO. */ 132 /* This is for what we write (i.e. reading uses peer's struct): */ 133 int closed; /* valid iff peer != NULL */ 134 size_t len; /* valid iff buf != NULL; 0 if peer == NULL */ 139 size_t request; /* valid iff peer != NULL; 0 if len != 0 [all...] |
| bss_dgram.c | 162 } peer; member in struct:bio_dgram_data_st 186 } peer; member in struct:bio_dgram_sctp_data_st 378 } peer; member in struct:__anon7718 382 sa.len.i=sizeof(sa.peer); 387 memset(&sa.peer, 0x00, sizeof(sa.peer)); 389 ret=recvfrom(b->num,out,outl,0,&sa.peer.sa,(void *)&sa.len); 392 OPENSSL_assert(sa.len.s<=sizeof(sa.peer)); 397 BIO_ctrl(b, BIO_CTRL_DGRAM_SET_PEER, 0, &sa.peer); 424 int peerlen = sizeof(data->peer); [all...] |
| /external/chromium_org/chrome/renderer/extensions/ |
| extension_localization_peer.h | 23 // instance of ExtensionLocalizationPeer based on the original Peer. 29 content::RequestPeer* peer, 56 ExtensionLocalizationPeer(content::RequestPeer* peer, 64 // Original peer that handles the request once we are done processing data_.
|
| /external/openssl/crypto/evp/ |
| pmeth_fn.c | 285 int EVP_PKEY_derive_set_peer(EVP_PKEY_CTX *ctx, EVP_PKEY *peer) 301 ret = ctx->pmeth->ctrl(ctx, EVP_PKEY_CTRL_PEER_KEY, 0, peer); 315 if (ctx->pkey->type != peer->type) 322 /* ran@cryptocom.ru: For clarity. The error is if parameters in peer are 327 if (!EVP_PKEY_missing_parameters(peer) && 328 !EVP_PKEY_cmp_parameters(ctx->pkey, peer)) 337 ctx->peerkey = peer; 339 ret = ctx->pmeth->ctrl(ctx, EVP_PKEY_CTRL_PEER_KEY, 1, peer); 347 CRYPTO_add(&peer->references,1,CRYPTO_LOCK_EVP_PKEY);
|
| /external/chromium_org/net/spdy/ |
| hpack_encoder_test.cc | 382 test::HpackEncoderPeer peer(NULL); 389 peer.CookieToCrumbs(" foo=1;bar=2 ; bar=3; bing=4; ", &out); 392 peer.CookieToCrumbs(";;foo = bar ;; ;baz =bing", &out); 395 peer.CookieToCrumbs("baz=bing; foo=bar; baz=bing", &out); 398 peer.CookieToCrumbs("baz=bing", &out); 401 peer.CookieToCrumbs("", &out); 404 peer.CookieToCrumbs("foo;bar; baz;baz;bing;", &out); 430 test::HpackEncoderPeer peer(NULL); 433 peer.DecomposeRepresentation("", &out); 436 peer.DecomposeRepresentation("foobar", &out) [all...] |
| /external/iputils/ |
| tftpd.c | 79 int peer; variable 189 peer = socket(from.sa.sa_family, SOCK_DGRAM, 0); 190 if (peer < 0) { 194 if (connect(peer, (struct sockaddr *)&from, sizeof(from)) < 0) { 372 if (send(peer, dp, size + 4, confirmed) != size + 4) { 380 n = recv(peer, ackbuf, sizeof (ackbuf), 0); 398 synchnet(peer); 437 if (send(peer, ackbuf, 4, confirmed) != 4) { 445 n = recv(peer, dp, PKTSIZE, 0); 461 (void) synchnet(peer); [all...] |
| /external/chromium_org/remoting/signaling/ |
| fake_signal_strategy.cc | 43 void FakeSignalStrategy::ConnectTo(FakeSignalStrategy* peer) { 48 if (peer->main_thread_->BelongsToCurrentThread()) { 49 peer->SetPeerCallback(peer_callback); 51 peer->main_thread_->PostTask( 54 base::Unretained(peer),
|
| /external/chromium_org/v8/tools/testrunner/server/ |
| main.py | 151 def AddPeer(self, peer): 154 if p.address == peer.address: 156 self.peers.append(peer) 157 if peer.trusted: 158 status_handler.ITrustYouNow(peer) 187 for peer in self.peers: 188 if peer.address == self.ip: continue 189 if peer.pubkey == fingerprint: 190 status_handler.ITrustYouNow(peer) 193 status_handler.NotifyNewTrusted(peer, result [all...] |
| presence_handler.py | 38 from ..objects import peer namespace 41 STARTUP_REQUEST = "V8 test peer starting up" 43 EXIT_REQUEST = "V8 testing peer going down" 69 p = peer.Peer(self.client_address[0], jobs, relative_perf, 78 p = peer.Peer(self.client_address[0], jobs, perf, pubkey_fingerprint)
|
| /external/openssl/apps/ |
| sess_id.c | 93 X509 *peer = NULL; local 167 peer = SSL_SESSION_get0_peer(x); 236 if (peer == NULL) 239 X509_print(out,peer); 258 else if (!noout && (peer != NULL)) /* just print the certificate */ 261 i=(int)i2d_X509_bio(out,peer); 263 i=PEM_write_bio_X509(out,peer);
|
| /external/chromium_org/content/child/ |
| web_url_loader_impl_unittest.cc | 66 virtual bool Start(RequestPeer* peer) OVERRIDE { 68 peer_ = peer; 90 RequestPeer* peer() { return peer_; } function in class:content::__anon12146::TestBridge 281 ASSERT_TRUE(peer()); 291 peer()->OnReceivedRedirect(redirect_info, 298 peer()->OnReceivedResponse(content::ResourceResponseInfo()); 305 peer()->OnReceivedData(kTestData, strlen(kTestData), strlen(kTestData)); 311 peer()->OnCompletedRequest(net::OK, false, false, "", base::TimeTicks(), 321 peer()->OnCompletedRequest(net::ERR_FAILED, false, false, "", 332 peer()->OnReceivedResponse(response_info) 363 RequestPeer* peer() { return bridge()->peer(); } function in class:content::__anon12146::WebURLLoaderImplTest [all...] |
| resource_dispatcher.cc | 77 virtual bool Start(RequestPeer* peer) OVERRIDE; 173 bool IPCResourceLoaderBridge::Start(RequestPeer* peer) { 180 request_id_ = dispatcher_->AddPendingRequest(peer, 339 request_info->peer->OnUploadProgress(position, size); 356 request_info->peer, response_head.mime_type, request_info->url); 358 request_info->peer = new_peer; 376 request_info->peer->OnReceivedResponse(renderer_response_info); 386 request_info->peer->OnReceivedCachedMetadata(&data.front(), data.size()); 456 // call peer's callback. 472 request_info->peer->OnReceivedData 551 RequestPeer* peer = request_info->peer; local [all...] |
| /development/samples/AppNavigation/src/com/example/android/appnavigation/app/ |
| PeerActivity.java | 36 setContentView(R.layout.peer);
|
| /bootable/recovery/minadbd/ |
| adb.c | 324 s->peer = create_remote_socket(p->msg.arg0, t); 325 s->peer->peer = s; 326 send_ready(s->id, s->peer->id, t); 335 if(s->peer == 0) { 336 s->peer = create_remote_socket(p->msg.arg0, t); 337 s->peer->peer = s;
|
| /external/bluetooth/bluedroid/btif/co/ |
| bta_pan_co.c | 93 //bdcpy(conn->peer, peer_addr); 114 ** peer is closed. 188 BTIF_TRACE_DEBUG("pan bt peer addr: %02x:%02x:%02x:%02x:%02x:%02x", 189 conn->peer[0], conn->peer[1], conn->peer[2], 190 conn->peer[3],conn->peer[4], conn->peer[5]); 315 ** Description protocol filter indication from peer devic [all...] |
| /external/ipsec-tools/src/racoon/ |
| sainfo.c | 76 * First pass is for sainfo from a specified peer, second for others. 79 getsainfo(loc, rmt, peer, remoteid) 80 const vchar_t *loc, *rmt, *peer; 87 if (peer == NULL) 104 if (peer == NULL) 107 dpeer = ipsecdoi_id2str(peer); 110 "getsainfo params: loc=\'%s\', rmt=\'%s\', peer=\'%s\', id=%i\n", 133 if (ipsecdoi_chkcmpids(peer, s->id_i, 0)) 294 snprintf(buf, 255, "loc=\'%s\', rmt=\'%s\', peer=\'%s\', id=%i",
|
| /external/dnsmasq/src/ |
| tftp.c | 46 struct sockaddr_in addr, peer; local 72 msg.msg_name = &peer; 73 msg.msg_namelen = sizeof(peer); 153 transfer->peer = peer; 194 len = tftp_err(ERR_ILL, packet, _("unsupported request from %s"), inet_ntoa(peer.sin_addr)); 244 strncat(daemon->namebuff, inet_ntoa(peer.sin_addr), (MAXDNAME-1) - strlen(daemon->namebuff)); 276 (struct sockaddr *)&peer, sizeof(peer)) == -1 && errno == EINTR); 282 my_syslog(MS_TFTP | LOG_INFO, _("TFTP sent %s to %s"), daemon->namebuff, inet_ntoa(peer.sin_addr)) [all...] |
| /art/runtime/native/ |
| dalvik_system_VMStack.cc | 29 static jobject GetThreadStack(const ScopedFastNativeObjectAccess& soa, jobject peer) 32 if (soa.Decode<mirror::Object*>(peer) == soa.Self()->GetPeer()) { 43 thread = thread_list->SuspendThreadByPeer(peer, true, false, &timed_out);
|
| /external/chromium_org/content/browser/ |
| byte_stream.cc | 54 void SetPeer(ByteStreamReaderImpl* peer, 90 // ** Peer information. 114 void SetPeer(ByteStreamWriterImpl* peer, 126 // Receive data from our peer. 166 // ** Peer information 204 ByteStreamReaderImpl* peer, 207 peer_ = peer; 336 ByteStreamWriterImpl* peer, 339 peer_ = peer;
|