/external/v8/tools/testrunner/network/ |
network_execution.py | 38 from ..objects import peer 49 return [ peer.Peer.Unpack(p) for p in data ] 141 # Spawn one thread for each peer. 168 def _TalkToPeer(self, peer): 171 code = sock.connect_ex((peer.address, constants.PEER_PORT)) 174 peer.runtime = None 176 packet = workpacket.WorkPacket(peer=peer, context=self.context, 189 # The peer is reporting an error [all...] |
/external/v8/tools/testrunner/server/ |
main.py | 151 def AddPeer(self, peer): 154 if p.address == peer.address: 156 self.peers.append(peer) 157 if peer.trusted: 158 status_handler.ITrustYouNow(peer) 187 for peer in self.peers: 188 if peer.address == self.ip: continue 189 if peer.pubkey == fingerprint: 190 status_handler.ITrustYouNow(peer) 193 status_handler.NotifyNewTrusted(peer, result [all...] |
presence_handler.py | 38 from ..objects import peer 41 STARTUP_REQUEST = "V8 test peer starting up" 43 EXIT_REQUEST = "V8 testing peer going down" 69 p = peer.Peer(self.client_address[0], jobs, relative_perf, 78 p = peer.Peer(self.client_address[0], jobs, perf, pubkey_fingerprint)
|
/packages/services/BuiltInPrintService/src/com/android/bips/p2p/ |
P2pConnectionProcedure.java | 62 WifiP2pDevice peer, P2pConnectionListener listener) { 65 mPeer = peer; 72 mP2pManager.connect(mChannel, configForPeer(peer), null); 75 private WifiP2pConfig configForPeer(WifiP2pDevice peer) { 77 config.deviceAddress = peer.deviceAddress; 78 if (peer.wpsPbcSupported()) { 80 } else if (peer.wpsKeypadSupported()) { 88 /** Return the peer associated with this connection procedure */ 185 /** Return true if group is connected to the peer */
|
P2pMonitor.java | 104 * Request connection to a peer (which may already be connected) at least until stopped. Keeps 107 public void connect(WifiP2pDevice peer, P2pConnectionListener listener) { 108 if (DEBUG) Log.d(TAG, "connect(" + toString(peer) + ")"); 117 if (mConnection != null && !peer.deviceAddress.equals(mConnection.getPeer() 133 mConnection = new P2pConnectionProcedure(mService, mP2pManager, peer,
|
/external/parameter-framework/asio-1.10.6/include/asio/ |
basic_socket_acceptor.hpp | 903 * This function is used to accept a new connection from a peer into the 907 * @param peer The socket into which the new connection will be accepted. 920 void accept(basic_socket<Protocol1, SocketService>& peer, 925 peer, static_cast<endpoint_type*>(0), ec); 931 * This function is used to accept a new connection from a peer into the 935 * @param peer The socket into which the new connection will be accepted. 954 basic_socket<Protocol1, SocketService>& peer, 959 peer, static_cast<endpoint_type*>(0), ec); 967 * @param peer The socket into which the new connection will be accepted. 968 * Ownership of the peer object is retained by the caller, which mus [all...] |
/external/wpa_supplicant_8/src/wps/ |
wps_upnp_web.c | 413 static void wps_upnp_peer_del(struct upnp_wps_peer *peer) 415 dl_list_del(&peer->list); 416 if (peer->wps) 417 wps_deinit(peer->wps); 418 os_free(peer); 429 struct upnp_wps_peer *peer; local 439 peer = os_zalloc(sizeof(*peer)); 440 if (!peer) 455 peer->wps = wps_init(&cfg) 499 struct upnp_wps_peer *tmp, *peer; local [all...] |
/development/samples/AppNavigation/src/com/example/android/appnavigation/app/ |
PeerActivity.java | 36 setContentView(R.layout.peer);
|
/external/curl/docs/cmdline-opts/ |
pinnedpubkey.d | 3 Help: FILE/HASHES Public key to verify peer against 7 peer. This can be a path to a file which contains a single public key in PEM
|
/external/curl/tests/server/ |
tftpd.c | 200 static curl_socket_t peer = CURL_SOCKET_BAD; variable 851 peer = socket(AF_INET, SOCK_DGRAM, 0); 852 if(CURL_SOCKET_BAD == peer) { 857 if(connect(peer, &from.sa, sizeof(from.sa4)) < 0) { 866 peer = socket(AF_INET6, SOCK_DGRAM, 0); 867 if(CURL_SOCKET_BAD == peer) { 872 if(connect(peer, &from.sa, sizeof(from.sa6)) < 0) { 890 sclose(peer); 891 peer = CURL_SOCKET_BAD; 915 if((peer != sock) && (peer != CURL_SOCKET_BAD) [all...] |
/bionic/libc/kernel/uapi/linux/ |
scif_ioctl.h | 28 struct scif_port_id peer; member in struct:scifioctl_connect 32 struct scif_port_id peer; member in struct:scifioctl_accept
|
/cts/tests/tests/os/src/android/os/cts/ |
SeccompTest.java | 209 final IsolatedServiceConnection peer = new IsolatedServiceConnection(); local 211 assertTrue(getContext().bindService(intent, peer, Context.BIND_AUTO_CREATE)); 213 final ISeccompIsolatedService service = peer.get(); 223 getContext().unbindService(peer); 240 final IsolatedServiceConnection peer = new IsolatedServiceConnection(); local 242 assertTrue(getContext().bindService(intent, peer, Context.BIND_AUTO_CREATE)); 244 final ISeccompIsolatedService service = peer.get(); 255 getContext().unbindService(peer);
|
/external/kernel-headers/original/uapi/linux/ |
scif_ioctl.h | 77 * @peer: destination node and port to connect to 81 struct scif_port_id peer; member in struct:scifioctl_connect 87 * @peer: global id of peer endpoint 92 struct scif_port_id peer; member in struct:scifioctl_accept
|
/external/linux-kselftest/tools/testing/selftests/bpf/ |
test_xdp_redirect.sh | 38 ip link add veth1 index 111 type veth peer name veth11 39 ip link add veth2 index 222 type veth peer name veth22
|
/external/wpa_supplicant_8/src/p2p/ |
p2p_go_neg.c | 52 wpa_hexdump_ascii(MSG_DEBUG, "P2P: Peer country", pos, 3); 54 p2p_info(p2p, "Mismatching country (ours=%c%c peer's=%c%c)", 66 p2p_info(p2p, "Invalid peer Channel List"); 79 p2p_dbg(p2p, "Own reg_classes %d peer reg_classes %d intersection reg_classes %d", 138 struct p2p_device *peer) 158 p2p_buf_add_public_action_hdr(buf, P2P_GO_NEG_REQ, peer->dialog_token); 162 if (peer->flags & P2P_DEV_PREFER_PERSISTENT_GROUP) { 164 if (peer->flags & P2P_DEV_PREFER_PERSISTENT_RECONN) 174 p2p_buf_add_go_intent(buf, (p2p->go_intent << 1) | peer->tie_breaker); 183 p2p_buf_add_device_info(buf, p2p, peer); [all...] |
/external/ipsec-tools/src/racoon/ |
sainfo.c | 76 * First pass is for sainfo from a specified peer, second for others. 79 getsainfo(loc, rmt, peer, remoteid) 80 const vchar_t *loc, *rmt, *peer; 87 if (peer == NULL) 104 if (peer == NULL) 107 dpeer = ipsecdoi_id2str(peer); 110 "getsainfo params: loc=\'%s\', rmt=\'%s\', peer=\'%s\', id=%i\n", 133 if (ipsecdoi_chkcmpids(peer, s->id_i, 0)) 294 snprintf(buf, 255, "loc=\'%s\', rmt=\'%s\', peer=\'%s\', id=%i",
|
/external/libmojo/mojo/edk/system/ |
node_controller.cc | 388 scoped_refptr<NodeChannel> peer = GetPeerChannel(source_node); local 389 if (peer) 390 peer->NotifyBadMessage(error); 490 auto peer = peers_by_token_.find(peer_token); local 492 if (peer == peers_by_token_.end()) 495 // |peer| may be removed so make a copy of |name|. 496 ports::NodeName name = peer->second; 544 DVLOG(1) << "Ignoring duplicate peer name " << name; 551 DVLOG(2) << "Accepting new peer " << name << " on node " << name_; 581 ports::NodeName peer = it->first local 632 auto peer = peer_connections_.find(name); local 652 scoped_refptr<NodeChannel> peer = GetPeerChannel(name); local 1301 scoped_refptr<NodeChannel> peer = GetPeerChannel(destination); local [all...] |
/external/autotest/client/site_tests/p2p_ServeFiles/ |
p2p_ServeFiles.py | 112 # Create a single fake peer that will be sending the multicast requests. 113 peer = host.SimpleHost(self._sim, '94:EB:2C:00:00:61', '169.254.10.55') 117 zero = zeroconf.ZeroconfDaemon(peer, 'peer') 155 # Check we can download if the connection comes from a peer on the 158 self._sim.run_on_simulator(lambda: peer.tcp_forward(1234, ips[0], port)) 160 ret = self._p2p_fetch(peer.ip_addr, 1234, 'file') 165 peer.id_addr)
|
/frameworks/opt/net/wifi/tests/wifitests/src/com/android/server/wifi/rtt/ |
RttTestUtils.java | 59 * - Third: Aware peer 113 for (ResponderConfig peer: request.mRttPeers) { 115 if (peer.peerHandle == null) { 117 peer.macAddress, rangeCmBase++, rangeStdDevCmBase++, rssiBase++, 121 peer.peerHandle, rangeCmBase++, rangeStdDevCmBase++, rssiBase++, 125 halResults.add(getMatchingRttResult(rangingResult, peer.macAddress));
|
/prebuilts/go/darwin-x86/src/net/ |
unixsock_test.go | 68 t.Fatalf("unexpected peer address: %v", from) 104 var peer Addr 108 _, peer, err = c1.ReadFrom(b[:]) 112 if peer != nil { // peer is connected-mode 113 t.Fatalf("unexpected peer address: %v", peer) 154 var peer Addr 158 _, peer, err = c1.ReadFrom(nil) 162 if peer != nil { // peer is connected-mod [all...] |
/prebuilts/go/linux-x86/src/net/ |
unixsock_test.go | 68 t.Fatalf("unexpected peer address: %v", from) 104 var peer Addr 108 _, peer, err = c1.ReadFrom(b[:]) 112 if peer != nil { // peer is connected-mode 113 t.Fatalf("unexpected peer address: %v", peer) 154 var peer Addr 158 _, peer, err = c1.ReadFrom(nil) 162 if peer != nil { // peer is connected-mod [all...] |
/packages/apps/Dialer/java/com/android/dialer/common/ |
FragmentUtils.java | 94 MainActivityPeer peer = ((MainActivityPeer.PeerSupplier) fragment.getActivity()).getPeer(); local 95 if (peer instanceof FragmentUtilListener) { 96 return ((FragmentUtilListener) peer).getImpl(callbackInterface);
|
/art/openjdkjvmti/ |
ti_threadgroup.cc | 157 art::ObjPtr<art::mirror::Object> peer) 164 art::ObjPtr<art::mirror::Object> group = thread_group_field->GetObject(peer); 178 art::ObjPtr<art::mirror::Object> peer = t->GetPeerFromOtherThread(); variable 179 if (peer == nullptr) { 182 if (IsInDesiredThreadGroup(thread_group, peer)) { 183 thread_peers->push_back(peer);
|
/system/core/adb/ |
socket_test.cpp | 64 tail->peer = head; 65 head->peer = tail; 125 cause_close_s->peer = s; 126 s->peer = cause_close_s; 222 head->peer = tail; 225 tail->peer = head;
|
/external/boringssl/src/crypto/evp/ |
evp_ctx.c | 337 int EVP_PKEY_derive_set_peer(EVP_PKEY_CTX *ctx, EVP_PKEY *peer) { 352 ret = ctx->pmeth->ctrl(ctx, EVP_PKEY_CTRL_PEER_KEY, 0, peer); 367 if (ctx->pkey->type != peer->type) { 372 // ran@cryptocom.ru: For clarity. The error is if parameters in peer are 377 if (!EVP_PKEY_missing_parameters(peer) && 378 !EVP_PKEY_cmp_parameters(ctx->pkey, peer)) { 384 ctx->peerkey = peer; 386 ret = ctx->pmeth->ctrl(ctx, EVP_PKEY_CTRL_PEER_KEY, 1, peer); 393 EVP_PKEY_up_ref(peer);
|