/external/wpa_supplicant_8/src/p2p/ |
p2p_build.c | 187 struct p2p_device *peer) 202 if (peer && peer->wps_method != WPS_NOT_READY) { 203 if (peer->wps_method == WPS_PBC) 205 else if (peer->wps_method == WPS_P2PS) 207 else if (peer->wps_method == WPS_PIN_DISPLAY || 208 peer->wps_method == WPS_PIN_KEYPAD)
|
p2p.c | 45 * P2P_PEER_EXPIRATION_AGE - Number of seconds after which inactive peer 66 * GO Negotiation is in progress with the peer, so 67 * don't expire the peer entry until GO Negotiation 78 * peer is the GO, so do not expire the peer entry. 91 * The peer is connected as a client in a group where 92 * we are the GO, so do not expire the peer entry. 98 p2p_dbg(p2p, "Expiring old peer entry " MACSTR, 223 struct p2p_device *peer = p2p->go_neg_peer; local 225 if (!peer) 2613 struct p2p_device *peer; local [all...] |
/art/runtime/ |
thread_list.cc | 853 jobject peer) { 857 peer, WellKnownClasses::java_lang_Thread_name))); 860 LOG(severity) << message << ": " << peer; local 863 LOG(severity) << message << ": " << peer << ":" << scoped_name_chars.c_str(); 867 Thread* ThreadList::SuspendThreadByPeer(jobject peer, [all...] |
thread.cc | 120 static const char* kThreadNameDuringStartup = "<native thread without managed peer>"; 432 // Copy peer into self, deleting global reference when done. 623 // Use global JNI ref to hold peer live while child thread starts. 764 // Run the action that is acting on the peer. 797 // a native peer! 804 LOG(ERROR) << "Exception creating thread peer:"; 826 // Install the given peer. 857 ScopedLocalRef<jobject> peer(env, env->AllocObject(WellKnownClasses::java_lang_Thread)); 858 if (peer.get() == nullptr) { 864 tlsPtr_.opeer = soa.Decode<mirror::Object>(peer.get()).Ptr() 3597 mirror::Object* peer = tlsPtr_.opeer; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
p2p_supplicant.c | 721 * Peer has an active GO, so if the role allows it and 738 * more than one peer. 7559 const u8 *peer; local 7651 u8 peer[ETH_ALEN]; local [all...] |
ctrl_iface.c | 714 /* MLME-STKSTART.request(peer) */ 718 u8 peer[ETH_ALEN]; local 720 if (hwaddr_aton(addr, peer)) { 727 MAC2STR(peer)); 729 return wpa_sm_stkstart(wpa_s->wpa, peer); 739 u8 peer[ETH_ALEN]; local 742 if (hwaddr_aton(addr, peer)) { 749 MAC2STR(peer)); 752 ret = wpa_tdls_send_discovery_request(wpa_s->wpa, peer); 754 ret = wpa_drv_tdls_oper(wpa_s, TDLS_DISCOVERY_REQ, peer); 763 u8 peer[ETH_ALEN]; local 793 u8 peer[ETH_ALEN]; local 846 u8 peer[ETH_ALEN]; local 919 u8 peer[ETH_ALEN]; local 945 u8 peer[ETH_ALEN]; local 1850 u8 peer[ETH_ALEN]; local 5937 u8 *_peer = NULL, peer[ETH_ALEN]; local 5997 u8 peer[ETH_ALEN], go_dev_addr[ETH_ALEN], *go_dev = NULL; local 6569 u8 peer[ETH_ALEN]; local [all...] |
/external/libnl/python/netlink/route/ |
address.py | 218 def peer(self): member in class:Address 219 """Peer address""" 223 @peer.setter 224 def peer(self, value): member in class:Address 353 + fmt.nl('\t{t|peer} {t|anycast}')
|
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa.h | 62 int (*tdls_oper)(void *ctx, int oper, const u8 *peer); 341 int wpa_sm_stkstart(struct wpa_sm *sm, const u8 *peer); 345 static inline int wpa_sm_stkstart(struct wpa_sm *sm, const u8 *peer)
|
/external/boringssl/src/ssl/ |
ssl_asn1.c | 108 * peer [3] Certificate OPTIONAL, 222 /* The peer certificate is only serialized if the SHA-256 isn't 631 CBS peer; local 633 if (!CBS_get_optional_asn1(&session, &peer, &has_peer, kPeerTag) || 634 (has_peer && CBS_len(&peer) == 0)) { 638 /* |peer| is processed with the certificate chain. */ 735 CRYPTO_BUFFER *buffer = CRYPTO_BUFFER_new_from_CBS(&peer, pool);
|
/external/boringssl/src/ssl/test/runner/ |
packet_adapter.go | 20 // nanoseconds. On receipt, the peer should reply with 95 // SendReadTimeout instructs the peer to simulate a read timeout. It then waits
|
/external/openssh/ |
kex.h | 137 struct sshbuf *peer; member in struct:kex
|
/hardware/libhardware_legacy/include/hardware_legacy/ |
rtt.h | 28 /* RTT peer type */ 62 mac_addr addr; // peer device mac address 64 rtt_peer_type peer; // optional - peer device hint (STA, P2P, AP) member in struct:__anon41496
|
/kernel/tests/net/test/ |
forwarding_test.py | 72 accepted, peer = listensocket.accept()
|
/packages/apps/Settings/src/com/android/settings/wifi/p2p/ |
WifiP2pSettings.java | 531 for (WifiP2pDevice peer: mPeers.getDeviceList()) { 532 if (DBG) Log.d(TAG, "-> " + peer); 533 mPeersGroup.addPreference(new WifiP2pPeer(getActivity(), peer)); 534 if (peer.status == WifiP2pDevice.CONNECTED) mConnectedDevices++;
|
/system/bt/btif/co/ |
bta_pan_co.cc | 94 // bdcpy(conn->peer, peer_addr); 112 * peer is closed. 185 "%s pan bt peer addr: %s", __func__, 186 bdaddr_to_string((bt_bdaddr_t*)conn->peer, bdstr, sizeof(bdstr))); 288 * Description protocol filter indication from peer device 305 * Description multicast filter indication from peer device
|
/bionic/libc/dns/resolv/ |
res_send.c | 404 struct sockaddr_storage peer; local 420 peerlen = sizeof(peer); 422 (struct sockaddr *)(void *)&peer, &peerlen) < 0) { 426 if (!sock_eq((struct sockaddr *)(void *)&peer, 781 struct sockaddr_storage peer; local 782 socklen_t size = sizeof peer; 786 (struct sockaddr *)(void *)&peer, &size) < 0 || 787 !sock_eq((struct sockaddr *)(void *)&peer, nsap) || [all...] |
/external/wpa_supplicant_8/src/drivers/ |
driver.h | 4599 u8 peer[ETH_ALEN]; member in struct:wpa_event_data::stkstart 4606 u8 peer[ETH_ALEN]; member in struct:wpa_event_data::tdls 4657 u8 peer[ETH_ALEN]; member in struct:wpa_event_data::ibss_rsn_start 4664 u8 peer[ETH_ALEN]; member in struct:wpa_event_data::auth_info 4915 u8 peer[ETH_ALEN]; member in struct:wpa_event_data::ibss_peer_lost 5035 const u8 *peer; member in struct:wpa_event_data::mesh_peer [all...] |
driver_atheros.c | 906 os_memcpy(event.auth.peer, mgmt->sa, ETH_ALEN); [all...] |
/external/wpa_supplicant_8/src/wps/ |
wps_upnp.c | 1085 struct upnp_wps_peer *peer; local [all...] |
/prebuilts/go/darwin-x86/src/net/ |
mockserver_test.go | 442 n, peer, err := c.ReadFrom(b) 450 if peer == nil { // for connected-mode sockets 453 peer, err = ResolveUDPAddr("udp", string(b[:n])) 455 peer, err = ResolveUnixAddr("unixgram", string(b[:n])) 462 if _, err := c.WriteTo(b[:n], peer); err != nil {
|
/prebuilts/go/linux-x86/src/net/ |
mockserver_test.go | 442 n, peer, err := c.ReadFrom(b) 450 if peer == nil { // for connected-mode sockets 453 peer, err = ResolveUDPAddr("udp", string(b[:n])) 455 peer, err = ResolveUnixAddr("unixgram", string(b[:n])) 462 if _, err := c.WriteTo(b[:n], peer); err != nil {
|
/art/runtime/openjdkjvmti/ |
ti_stack.cc | 458 // Get the peer, and check whether we know it. 459 art::ObjPtr<art::mirror::Object> peer = thread->GetPeerFromOtherThread(); local 461 if (peer == handles[index].Get()) { 551 art::ObjPtr<art::mirror::Object> peer = soa.Decode<art::mirror::Object>(thread_list[i]); local 552 art::ObjPtr<art::mirror::Class> klass = peer->GetClass(); 555 bool started = started_field->GetBoolean(peer) != 0;
|
/external/chromium-trace/catapult/telemetry/third_party/tsproxy/ |
tsproxy.py | 68 self.peer = 'server' 70 self.peer = 'client' 86 if main_thread and connection_id in connections and self.peer in connections[connection_id]and self.latency == 0 and self.kbps == .0: 102 if self.peer in connections[connection_id]: 104 connections[connection_id][self.peer].handle_message(message)
|
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
dbus_new_handlers.c | 2175 u8 peer[ETH_ALEN]; local 2209 u8 peer[ETH_ALEN]; local 2244 u8 peer[ETH_ALEN]; local 2273 u8 peer[ETH_ALEN]; local [all...] |
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Modules/ |
_ssl.c | 828 PyObject *peer;
local 843 peer = _create_tuple_for_X509_NAME(
845 if (peer == NULL)
847 if (PyDict_SetItemString(retval, (const char *) "subject", peer) < 0) {
848 Py_DECREF(peer);
851 Py_DECREF(peer);
1036 Returns the certificate for the peer. If no certificate was provided,\n\
1039 about the peer certificate.\n\
1042 peer certificate, or None if no certificate was provided. This will\n\
[all...] |