/external/kernel-headers/original/linux/ |
H A D | if_pppolac.h | 32 } local, remote; member in struct:sockaddr_pppolac
|
H A D | if_pppopns.h | 31 __u16 remote;
member in struct:sockaddr_pppopns
|
H A D | atmdev.h | 309 struct sockaddr_atmsvc remote; member in struct:atm_vcc
|
/external/iproute2/ip/ |
H A D | link_gre.c | 30 fprintf(stderr, " type { gre | gretap } [ remote ADDR ] [ local ADDR ]\n"); 199 } else if (!matches(*argv, "remote")) { 274 const char *remote = "any"; local 285 remote = format_host(AF_INET, 4, &addr, s1, sizeof(s1)); 288 fprintf(f, "remote %s ", remote);
|
H A D | ip6tunnel.c | 51 fprintf(stderr, " [ remote ADDR local ADDR ] [ dev PHYS_DEV ]\n"); 69 char remote[64]; local 72 inet_ntop(AF_INET6, &p->raddr, remote, sizeof(remote)); 75 printf("%s: %s/ipv6 remote %s local %s", 76 p->name, tnl_strproto(p->proto), remote, local); 132 } else if (strcmp(*argv, "remote") == 0) { 137 invarg("\"remote\" address family is AF_UNSPEC", *argv);
|
/external/ipsec-tools/src/racoon/ |
H A D | admin.c | 408 struct sockaddr *remote = NULL; local 423 /* get remote IP address and port number. */ 424 if ((remote = dupsaddr(dst)) == NULL) 427 port = extract_port(rmconf->remote); 428 if (set_port(remote, port) == NULL) 461 "%s\n", saddrwop2str(remote)); 464 if (isakmp_ph1begin_i(rmconf, remote, local) < 0) 471 if (remote != NULL) 472 racoon_free(remote);
|
H A D | gssapi.c | 154 gssapi_get_default_name(struct ph1handle *iph1, int remote, gss_name_t *service) argument 162 sa = remote ? iph1->remote : iph1->local;
|
H A D | remoteconf.h | 37 /* remote configuration */ 60 struct sockaddr *remote; /* remote IP address */ member in struct:remoteconf 130 TAILQ_ENTRY(remoteconf) chain; /* next remote conf */ 165 __P((struct sockaddr *remote, int allow_anon));
|
H A D | isakmp_xauth.c | 287 iph1->remote, usr, pwd); 311 * On failure, throttle the connexion for the remote host 314 throttle_delay = throttle_host(iph1->remote, res) - time(NULL); 318 str = saddrwop2str(iph1->remote); 644 char *remote = NULL; local 668 if ((remote = strdup(saddrwop2str(raddr))) == NULL) { 674 if ((error = pam_set_item(pam, PAM_RHOST, remote)) != 0) { 707 if (remote != NULL) 708 free(remote); 715 if (remote ! [all...] |
H A D | sockmisc.c | 258 struct sockaddr *getlocaladdr(struct sockaddr *remote) argument 261 socklen_t len = sysdep_sa_len(remote); 262 int s = socket(remote->sa_family, SOCK_DGRAM, 0); 263 if (s == -1 || connect(s, remote, len) == -1 || 323 getlocaladdr(remote) 324 struct sockaddr *remote; 338 if ((s = socket(remote->sa_family, SOCK_DGRAM, 0)) < 0) { 344 setsockopt_bypass(s, remote->sa_family); 346 if (connect(s, remote, sysdep_sa_len(remote)) < [all...] |
H A D | handler.h | 102 * (local) (remote) (local) (remote) 118 struct sockaddr *remote; /* remote address to negosiate ph1 */ member in struct:ph1handle 123 struct remoteconf *rmconf; /* pointer to remote configuration */ 199 int dpd_support; /* Does remote supports DPD ? */ 329 struct sockaddr *remote; /* remote address to negosiate ph1 */ member in struct:contacted 337 struct sockaddr *remote; /* the remote addres member in struct:recvdpkt 413 struct sockaddr_storage remote; member in struct:ph1dump [all...] |
H A D | isakmp.c | 212 struct sockaddr_storage remote; local 214 unsigned int remote_len = sizeof(remote); 222 MSG_PEEK, (struct sockaddr *)&remote, &remote_len, 236 0, (struct sockaddr *)&remote, &remote_len)) != 1) { 279 plog(LLV_ERROR, LOCATION, (struct sockaddr *)&remote, 284 0, (struct sockaddr *)&remote, &remote_len)) < 0) { 297 0, (struct sockaddr *)&remote, &remote_len)) < 0) { 312 0, (struct sockaddr *)&remote, &remote_len)) < 0) { 321 0, (struct sockaddr *)&remote, &remote_len, 343 plog(LLV_ERROR, LOCATION, (struct sockaddr *)&remote, [all...] |
/external/webkit/WebCore/dom/ |
H A D | MessagePort.cpp | 141 void MessagePort::entangle(PassOwnPtr<MessagePortChannel> remote) argument 148 if (remote->entangleIfOpen(this)) 149 m_entangledChannel = remote;
|
/external/webkit/WebCore/dom/default/ |
H A D | PlatformMessagePortChannel.cpp | 139 // We can't call member functions on our remote pair while holding our mutex or we'll deadlock, but we need to guard against the remote port getting closed/freed, so create a standalone reference. 140 RefPtr<PlatformMessagePortChannel> remote = entangledChannel(); local 141 if (!remote) 143 remote->setRemotePort(port); 149 RefPtr<PlatformMessagePortChannel> remote = entangledChannel(); local 150 if (remote) 151 remote->setRemotePort(0); 174 void PlatformMessagePortChannel::setEntangledChannel(PassRefPtr<PlatformMessagePortChannel> remote) argument 178 if (remote) 209 RefPtr<PlatformMessagePortChannel> remote = entangledChannel(); local [all...] |
/external/webkit/WebKit/chromium/src/ |
H A D | PlatformMessagePortChannel.cpp | 242 void PlatformMessagePortChannel::setEntangledChannel(PassRefPtr<PlatformMessagePortChannel> remote) argument 245 m_webChannel->entangle(remote->m_webChannel); 248 m_entangledChannel = remote;
|
/external/ipsec-tools/ |
H A D | setup.c | 128 remoteconf.remote = dupsaddr(r->ai_addr); 131 myaddrs[0].addr = getlocaladdr(remoteconf.remote); 193 * spdadd local remote udp -P out ipsec esp/transport//require; */ 194 static void spdadd(struct sockaddr *local, struct sockaddr *remote) argument 223 pfkey_send_spdadd(key, local, mask, remote, mask, IPPROTO_UDP, 243 /* Set local address and remote address. */ 247 spdadd(myaddrs[0].addr, remoteconf.remote); 249 /* Set local port and remote port. */ 251 set_port(remoteconf.remote, localconf.port_isakmp); 307 return cmpsaddrwop(addr, remoteconf.remote) [all...] |
/external/mtpd/ |
H A D | pptp.c | 75 static uint16_t remote; variable 249 .remote = remote, 314 remote = incoming.ocrp.call; 315 log_print(DEBUG, "Received OCRQ (remote = %d)", remote); 338 if (state == OCRP && incoming.ccrq.call == remote) { 339 log_print(DEBUG, "Received CCRQ (remote = %d)", remote); 346 if (state == OCRP && incoming.cdn.call == remote) { [all...] |
/external/bluetooth/bluez/src/ |
H A D | dbus-hci.c | 304 static int get_auth_requirements(bdaddr_t *local, bdaddr_t *remote, argument 322 bacpy(&req.bdaddr, remote); 374 debug("remote IO capabilities are 0x%02x", remcap); 375 debug("remote authentication requirement is 0x%02x", remauth); 377 /* If local IO capabilities are DisplayYesNo and remote IO 650 /* remove from remote name request list */ 684 debug("local auth 0x%02x and remote auth 0x%02x", 691 * 3. neither local nor remote side had no-bonding as a requirement 693 * 5. the remote side is using dedicated bonding since in that case 895 int hcid_dbus_get_io_cap(bdaddr_t *local, bdaddr_t *remote, argument 979 hcid_dbus_set_io_cap(bdaddr_t *local, bdaddr_t *remote, uint8_t cap, uint8_t auth) argument [all...] |
/external/ppp/pppd/plugins/radius/ |
H A D | radius.c | 546 u_int32_t remote; local 612 /* seting up remote IP addresses */ 613 remote = vp->lvalue; 614 if (remote == 0xffffffff) { 617 } else if (remote != 0xfffffffe) { 619 remote = htonl(vp->lvalue); 620 if (bad_ip_adrs (remote)) { 621 slprintf(msg, BUF_LEN, "RADIUS: bad remote IP address %I for %s", 622 remote, rstate.user); 626 rstate.ip_addr = remote; [all...] |
/external/ppp/pppd/ |
H A D | ipcp.c | 82 /* Hook for a plugin to choose the remote IP address */ 168 { "ipcp-accept-remote", o_bool, &ipcp_wantoptions[0].accept_remote, 223 "set local and remote IP addresses", 415 u_int32_t local, remote; local 450 * If colon last character, then no remote addr. 453 if ((remote = inet_addr(colon)) == (u_int32_t) -1) { 458 remote = *(u_int32_t *)hp->h_addr; 462 if (bad_ip_adrs(remote)) { 463 option_error("bad remote IP address %s", ip_ntoa(remote)); [all...] |
/external/iproute2/include/linux/ |
H A D | xfrm.h | 426 xfrm_address_t remote; member in struct:xfrm_user_kmaddress
|
/external/iproute2/misc/ |
H A D | ss.c | 369 inet_prefix remote; member in struct:tcpstat 667 return unix_match(&s->remote, &a->addr); 672 if (!inet2_addr_match(&s->remote, &a->addr, a->addr.bitlen)) 1132 s.local.family = s.remote.family = family; 1135 sscanf(rem, "%x:%x", s.remote.data, (unsigned*)&s.rport); 1136 s.local.bytelen = s.remote.bytelen = 4; 1145 s.remote.data, 1146 s.remote.data+1, 1147 s.remote.data+2, 1148 s.remote [all...] |
/external/netperf/ |
H A D | nettest_bsd.c | 34 /* rem_cpu_rate() find the remote cpu maxrate */ 162 rss_size_req = -1, /* requested remote socket send buffer size */ 163 rsr_size_req = -1, /* requested remote socket recv buffer size */ 164 rss_size, /* remote socket send buffer size */ 165 rsr_size, /* remote socket recv buffer size */ 198 remote_connected = 0; /* remote socket type, connected/non-connected */ 337 twice the remote's SO_RCVBUF or twice our SO_SNDBUF */ \ 434 -P local[,remote] Set the local/remote port for the data socket\n\ 437 -S send[,recv] Set remote socke 718 complete_addrinfos(struct addrinfo **remote,struct addrinfo **local, char remote_host[], int type, int protocol, int flags) argument [all...] |