/external/kernel-headers/original/linux/ |
H A D | if_pppopns.h | 29 __u16 remote; member in struct:sockaddr_pppopns
|
H A D | if_pppolac.h | 30 } local, remote; member in struct:sockaddr_pppolac
|
H A D | if_pppox.h | 47 unsigned char remote[ETH_ALEN]; /* Remote address */ member in struct:pppoe_addr 177 __u32 remote; member in struct:pppolac_opt 186 __u16 remote; member in struct:pppopns_opt
|
/external/chromium/chrome/browser/chromeos/login/ |
H A D | mock_auth_response_handler.cc | 37 const GURL remote, 42 remote, 36 CompleteFetch(URLFetcher::Delegate* delegate, const GURL remote, const net::URLRequestStatus status, const int http_response_code, const std::string data) argument
|
/external/jmonkeyengine/engine/src/networking/com/jme3/network/kernel/udp/ |
H A D | UdpConnector.java | 67 public UdpConnector( InetAddress remote, int remotePort ) throws IOException argument 71 remoteAddress = new InetSocketAddress( remote, remotePort ); 73 // Setup to receive only from the remote address
|
/external/chromium/third_party/libjingle/source/talk/base/ |
H A D | socketpool.cc | 59 const SocketAddress& remote, int* err) { 60 LOG_F(LS_VERBOSE) << "(" << remote << ")"; 63 if (remote == it->first) { 74 if (StreamInterface* stream = pool_->RequestConnectedStream(remote, err)) { 76 active_.push_front(ConnectedStream(remote, stream)); 137 NewSocketPool::RequestConnectedStream(const SocketAddress& remote, int* err) { argument 145 if ((socket->Connect(remote) != 0) && !socket->IsBlocking()) { 175 ReuseSocketPool::RequestConnectedStream(const SocketAddress& remote, int* err) { argument 189 if ((stream_->GetState() == SS_OPEN) && (remote == remote_)) { 192 remote_ = remote; 58 RequestConnectedStream( const SocketAddress& remote, int* err) argument 261 RequestConnectedStream( const SocketAddress& remote, int* err) argument [all...] |
/external/iproute2/ip/ |
H A D | link_gre.c | 30 fprintf(stderr, " type { gre | gretap } [ remote ADDR ] [ local ADDR ]\n"); 199 } else if (!matches(*argv, "remote")) { 274 const char *remote = "any"; local 285 remote = format_host(AF_INET, 4, &addr, s1, sizeof(s1)); 288 fprintf(f, "remote %s ", remote);
|
H A D | ip6tunnel.c | 51 fprintf(stderr, " [ remote ADDR local ADDR ] [ dev PHYS_DEV ]\n"); 69 char remote[64]; local 72 inet_ntop(AF_INET6, &p->raddr, remote, sizeof(remote)); 75 printf("%s: %s/ipv6 remote %s local %s", 76 p->name, tnl_strproto(p->proto), remote, local); 132 } else if (strcmp(*argv, "remote") == 0) { 137 invarg("\"remote\" address family is AF_UNSPEC", *argv);
|
/external/ipsec-tools/src/racoon/ |
H A D | admin.c | 408 struct sockaddr *remote = NULL; local 423 /* get remote IP address and port number. */ 424 if ((remote = dupsaddr(dst)) == NULL) 427 port = extract_port(rmconf->remote); 428 if (set_port(remote, port) == NULL) 461 "%s\n", saddrwop2str(remote)); 464 if (isakmp_ph1begin_i(rmconf, remote, local) < 0) 471 if (remote != NULL) 472 racoon_free(remote);
|
H A D | gssapi.c | 154 gssapi_get_default_name(struct ph1handle *iph1, int remote, gss_name_t *service) argument 162 sa = remote ? iph1->remote : iph1->local;
|
H A D | remoteconf.h | 37 /* remote configuration */ 60 struct sockaddr *remote; /* remote IP address */ member in struct:remoteconf 130 TAILQ_ENTRY(remoteconf) chain; /* next remote conf */ 165 __P((struct sockaddr *remote, int allow_anon));
|
H A D | isakmp_xauth.c | 287 iph1->remote, usr, pwd); 311 * On failure, throttle the connexion for the remote host 314 throttle_delay = throttle_host(iph1->remote, res) - time(NULL); 318 str = saddrwop2str(iph1->remote); 644 char *remote = NULL; local 668 if ((remote = strdup(saddrwop2str(raddr))) == NULL) { 674 if ((error = pam_set_item(pam, PAM_RHOST, remote)) != 0) { 707 if (remote != NULL) 708 free(remote); 715 if (remote ! [all...] |
H A D | sockmisc.c | 258 struct sockaddr *getlocaladdr(struct sockaddr *remote) argument 261 socklen_t len = sysdep_sa_len(remote); 262 int s = socket(remote->sa_family, SOCK_DGRAM, 0); 263 if (s == -1 || connect(s, remote, len) == -1 || 323 getlocaladdr(remote) 324 struct sockaddr *remote; 338 if ((s = socket(remote->sa_family, SOCK_DGRAM, 0)) < 0) { 344 setsockopt_bypass(s, remote->sa_family); 346 if (connect(s, remote, sysdep_sa_len(remote)) < [all...] |
/external/openssh/ |
H A D | sftp-common.c | 190 ls_file(const char *name, const struct stat *st, int remote, int si_units) argument 199 if (!remote) { 205 if (!remote) {
|
H A D | canohost.c | 6 * Functions for returning the canonical host name of the remote site. 243 * Returns the local/remote IP-address/hostname of socket as a string. 247 get_socket_address(int sock, int remote, int flags) argument 258 if (remote) { 334 * Returns the IP-address of the remote host as a string. The returned 359 static const char *remote = ""; local 361 remote = get_canonical_hostname(use_dns); 362 if (utmp_len == 0 || strlen(remote) > utmp_len) 363 remote = get_remote_ipaddr(); 364 return remote; [all...] |
/external/webkit/Source/WebCore/dom/ |
H A D | MessagePort.cpp | 142 void MessagePort::entangle(PassOwnPtr<MessagePortChannel> remote) argument 149 if (remote->entangleIfOpen(this)) 150 m_entangledChannel = remote;
|
/external/webkit/Source/WebCore/dom/default/ |
H A D | PlatformMessagePortChannel.cpp | 139 // We can't call member functions on our remote pair while holding our mutex or we'll deadlock, but we need to guard against the remote port getting closed/freed, so create a standalone reference. 140 RefPtr<PlatformMessagePortChannel> remote = entangledChannel(); local 141 if (!remote) 143 remote->setRemotePort(port); 149 RefPtr<PlatformMessagePortChannel> remote = entangledChannel(); local 150 if (remote) 151 remote->setRemotePort(0); 174 void PlatformMessagePortChannel::setEntangledChannel(PassRefPtr<PlatformMessagePortChannel> remote) argument 178 if (remote) 209 RefPtr<PlatformMessagePortChannel> remote = entangledChannel(); local [all...] |
/external/webkit/Source/WebKit/chromium/src/ |
H A D | PlatformMessagePortChannel.cpp | 242 void PlatformMessagePortChannel::setEntangledChannel(PassRefPtr<PlatformMessagePortChannel> remote) argument 245 m_webChannel->entangle(remote->m_webChannel); 248 m_entangledChannel = remote;
|
/external/libppp/src/ |
H A D | filter.c | 562 struct ncpaddr *remote, struct in_addr *dns) 581 if (remote) { 582 if (fp->f_srctype == T_HISADDR && ncpaddr_family(remote) == AF_INET) 583 ncprange_sethost(&fp->f_src, remote); 584 if (fp->f_dsttype == T_HISADDR && ncpaddr_family(remote) == AF_INET) 585 ncprange_sethost(&fp->f_dst, remote); 587 if (fp->f_srctype == T_HISADDR6 && ncpaddr_family(remote) == AF_INET6) 588 ncprange_sethost(&fp->f_src, remote); 589 if (fp->f_dsttype == T_HISADDR6 && ncpaddr_family(remote) == AF_INET6) 590 ncprange_sethost(&fp->f_dst, remote); 561 filter_AdjustAddr(struct filter *filter, struct ncpaddr *local, struct ncpaddr *remote, struct in_addr *dns) argument [all...] |
/external/mtpd/ |
H A D | pptp.c | 76 static uint16_t remote; variable 246 .remote = remote, 311 remote = incoming.ocrp.call; 312 log_print(DEBUG, "Received OCRQ (remote = %d)", remote); 335 if (state == OCRP && incoming.ccrq.call == remote) { 336 log_print(DEBUG, "Received CCRQ (remote = %d)", remote); 343 if (state == OCRP && incoming.cdn.call == remote) { [all...] |
/external/bluetooth/bluedroid/udrv/ulinux/ |
H A D | uipc.c | 211 struct sockaddr_un remote; local 230 if ((fd = accept(sfd, (struct sockaddr *)&remote, &len)) == -1)
|
/external/ipsec-tools/ |
H A D | setup.c | 210 * spdadd src any protocol -P out ipsec esp/tunnel/local-remote/require; 211 * spdadd any src protocol -P in ipsec esp/tunnel/remote-local/require; */ 213 int protocol, struct sockaddr *local, struct sockaddr *remote) 249 memcpy(&policy.addresses[size], remote, size); 281 memcpy(policy.addresses, remote, size); 426 /* Create remote configuration. */ 440 remoteconf->remote = dupsaddr(targets[0]); 506 /* Install remote configuration. */ 511 isakmp_ph1begin_i(remoteconf, remoteconf->remote, source); 604 struct sockaddr *remote local 212 spdadd(struct sockaddr *src, struct sockaddr *dst, int protocol, struct sockaddr *local, struct sockaddr *remote) argument [all...] |
/external/ppp/pppd/plugins/radius/ |
H A D | radius.c | 546 u_int32_t remote; local 612 /* seting up remote IP addresses */ 613 remote = vp->lvalue; 614 if (remote == 0xffffffff) { 617 } else if (remote != 0xfffffffe) { 619 remote = htonl(vp->lvalue); 620 if (bad_ip_adrs (remote)) { 621 slprintf(msg, BUF_LEN, "RADIUS: bad remote IP address %I for %s", 622 remote, rstate.user); 626 rstate.ip_addr = remote; [all...] |
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | gas_serv.c | 580 unsigned int remote, u16 remote_delay, 586 } else if (bit & remote) { 587 wpa_printf(MSG_DEBUG, "ANQP: %s (remote)", name); 1060 "from remote processing"); 579 set_anqp_req(unsigned int bit, const char *name, int local, unsigned int remote, u16 remote_delay, struct anqp_query_info *qi) argument
|
/external/wpa_supplicant_8/src/ap/ |
H A D | gas_serv.c | 580 unsigned int remote, u16 remote_delay, 586 } else if (bit & remote) { 587 wpa_printf(MSG_DEBUG, "ANQP: %s (remote)", name); 1060 "from remote processing"); 579 set_anqp_req(unsigned int bit, const char *name, int local, unsigned int remote, u16 remote_delay, struct anqp_query_info *qi) argument
|