/system/extras/tests/net_test/ |
forwarding_test.py | 63 accepted, peer = listensocket.accept()
|
/bionic/libc/dns/resolv/ |
res_send.c | 405 struct sockaddr_storage peer; local 421 peerlen = sizeof(peer); 423 (struct sockaddr *)(void *)&peer, &peerlen) < 0) { 427 if (!sock_eq((struct sockaddr *)(void *)&peer, 782 struct sockaddr_storage peer; local 783 socklen_t size = sizeof peer; 787 (struct sockaddr *)(void *)&peer, &size) < 0 || 788 !sock_eq((struct sockaddr *)(void *)&peer, nsap) || [all...] |
/external/libgdx/backends/gdx-backend-moe/src/com/badlogic/gdx/backends/iosmoe/objectal/ |
ALSource.java | 48 protected ALSource(Pointer peer) { 49 super(peer);
|
OALAudioTrack.java | 50 protected OALAudioTrack(Pointer peer) { 51 super(peer);
|
/external/wpa_supplicant_8/src/drivers/ |
driver.h | 1230 /** Driver supports operating as a TDLS peer */ 4304 u8 peer[ETH_ALEN]; member in struct:wpa_event_data::stkstart 4311 u8 peer[ETH_ALEN]; member in struct:wpa_event_data::tdls 4362 u8 peer[ETH_ALEN]; member in struct:wpa_event_data::ibss_rsn_start 4369 u8 peer[ETH_ALEN]; member in struct:wpa_event_data::auth_info 4599 u8 peer[ETH_ALEN]; member in struct:wpa_event_data::ibss_peer_lost 4719 const u8 *peer; member in struct:wpa_event_data::mesh_peer [all...] |
driver_atheros.c | 902 os_memcpy(event.auth.peer, mgmt->sa, ETH_ALEN); [all...] |
/external/wpa_supplicant_8/src/p2p/ |
p2p.c | 45 * P2P_PEER_EXPIRATION_AGE - Number of seconds after which inactive peer 66 * GO Negotiation is in progress with the peer, so 67 * don't expire the peer entry until GO Negotiation 78 * peer is the GO, so do not expire the peer entry. 91 * The peer is connected as a client in a group where 92 * we are the GO, so do not expire the peer entry. 98 p2p_dbg(p2p, "Expiring old peer entry " MACSTR, 223 struct p2p_device *peer = p2p->go_neg_peer; local 225 if (!peer) 2585 struct p2p_device *peer; local [all...] |
p2p_build.c | 187 struct p2p_device *peer) 202 if (peer && peer->wps_method != WPS_NOT_READY) { 203 if (peer->wps_method == WPS_PBC) 205 else if (peer->wps_method == WPS_PIN_DISPLAY || 206 peer->wps_method == WPS_PIN_KEYPAD) {
|
/system/connectivity/shill/dbus/ |
chromeos_device_dbus_adaptor.cc | 258 const string& peer, 263 *out_state = device_->PerformTDLSOperation(operation, peer, &e);
|
/external/wpa_supplicant_8/src/wps/ |
wps_upnp.c | 1085 struct upnp_wps_peer *peer; local [all...] |
/external/boringssl/src/ssl/ |
s3_srvr.c | 556 /* If we aren't retaining peer certificates then we can discard it 559 X509_free(ssl->session->peer); 560 ssl->session->peer = NULL; 1736 X509 *peer = ssl->session->peer; local [all...] |
/external/chromium-trace/catapult/telemetry/third_party/tsproxy/ |
tsproxy.py | 64 self.peer = 'server' 66 self.peer = 'client' 72 if connection_id in connections and self.peer in connections[connection_id]: 108 if self.peer in connections[connection_id]: 112 connections[connection_id][self.peer].handle_message(self.next_message)
|
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
dbus_new_handlers.c | 2173 u8 peer[ETH_ALEN]; local 2207 u8 peer[ETH_ALEN]; local 2242 u8 peer[ETH_ALEN]; local 2271 u8 peer[ETH_ALEN]; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
ctrl_iface.c | 579 /* MLME-STKSTART.request(peer) */ 583 u8 peer[ETH_ALEN]; local 585 if (hwaddr_aton(addr, peer)) { 592 MAC2STR(peer)); 594 return wpa_sm_stkstart(wpa_s->wpa, peer); 604 u8 peer[ETH_ALEN]; local 607 if (hwaddr_aton(addr, peer)) { 614 MAC2STR(peer)); 617 ret = wpa_tdls_send_discovery_request(wpa_s->wpa, peer); 619 ret = wpa_drv_tdls_oper(wpa_s, TDLS_DISCOVERY_REQ, peer); 628 u8 peer[ETH_ALEN]; local 658 u8 peer[ETH_ALEN]; local 711 u8 peer[ETH_ALEN]; local 784 u8 peer[ETH_ALEN]; local 810 u8 peer[ETH_ALEN]; local 1715 u8 peer[ETH_ALEN]; local 5646 u8 *_peer = NULL, peer[ETH_ALEN]; local 5706 u8 peer[ETH_ALEN], go_dev_addr[ETH_ALEN], *go_dev = NULL; local 6217 u8 peer[ETH_ALEN]; local [all...] |
/external/libgdx/backends/gdx-backend-moe/src/com/badlogic/gdx/backends/iosmoe/ |
IOSApplication.java | 62 protected Delegate (Pointer peer) {
63 super(peer);
|
IOSGraphics.java | 96 protected IOSGraphics (Pointer peer) {
97 super(peer);
|
/external/webrtc/webrtc/tools/rtcbot/bot/browser/ |
bot.js | 29 console.log("Creating peer connection");
|
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa_i.h | 44 u8 preauth_bssid[ETH_ALEN]; /* current RSN pre-auth peer or 296 const u8 *peer) 299 return sm->ctx->tdls_oper(sm->ctx->ctx, oper, peer);
|
/external/v8/test/mjsunit/asm/embenchen/ |
copy.js | 4755 var peer = SOCKFS.websocket_sock_ops.createPeer(sock, addr, port); variable [all...] |
corrections.js | 4755 var peer = SOCKFS.websocket_sock_ops.createPeer(sock, addr, port); variable [all...] |
primes.js | 4769 var peer = SOCKFS.websocket_sock_ops.createPeer(sock, addr, port); variable [all...] |
/external/v8/test/mjsunit/wasm/embenchen/ |
copy.js | 4758 var peer = SOCKFS.websocket_sock_ops.createPeer(sock, addr, port); variable [all...] |
corrections.js | 4758 var peer = SOCKFS.websocket_sock_ops.createPeer(sock, addr, port); variable [all...] |
primes.js | 4772 var peer = SOCKFS.websocket_sock_ops.createPeer(sock, addr, port); variable [all...] |
/art/runtime/ |
thread_list.h | 72 // Suspend a thread using a peer, typically used by the debugger. Returns the thread on success, 73 // else null. The peer is used to identify the thread to avoid races with the thread terminating. 77 Thread* SuspendThreadByPeer(jobject peer, bool request_suspension, bool debug_suspension,
|