/external/iptables/include/libipq/ |
H A D | libipq.h | 53 struct sockaddr_nl peer; member in struct:ipq_handle
|
/external/chromium_org/device/nfc/ |
H A D | nfc_peer.h | 21 // - NDEF. Specifically, reading NDEF records found on the peer device and 35 // Interface for observing changes from NFC peer devices. 40 // This method will be called when an NDEF message |message| from the peer 41 // device |peer| is received. Users can use this method to be notified of 44 virtual void RecordsReceived(NfcPeer* peer, argument 53 // Adds and removes observers for events on this NFC peer. If monitoring 54 // multiple peers, check the |peer| parameter of observer methods to 55 // determine which peer is issuing the event. 59 // Returns the unique identifier assigned to this peer. 62 // Returns all NDEF records that were received from the peer devic [all...] |
H A D | nfc_adapter.h | 56 // was never started or because a connection with a tag or peer has been 74 // Called when a remote NFC adapter |peer| has been detected, which is 75 // available for peer-to-peer communication over NFC. The observer can use 76 // this method to take further action on |peer| such as reading its records 77 // or pushing NDEFs to it. While |peer| will be valid within the context of 79 // the object may get destroyed if the connection with the peer is lost. 81 // peer's assigned unique identifier instead, which can be used to obtain a 82 // pointer to the peer, as long as it exists. 83 virtual void PeerFound(NfcAdapter* adaper, NfcPeer* peer) {} argument 87 PeerLost(NfcAdapter* adapter, NfcPeer* peer) argument [all...] |
/external/chromium_org/v8/tools/testrunner/server/ |
H A D | presence_handler.py | 38 from ..objects import peer namespace 41 STARTUP_REQUEST = "V8 test peer starting up" 43 EXIT_REQUEST = "V8 testing peer going down" 69 p = peer.Peer(self.client_address[0], jobs, relative_perf, 78 p = peer.Peer(self.client_address[0], jobs, perf, pubkey_fingerprint)
|
/external/libppp/src/ |
H A D | iface.h | 34 struct ncpaddr peer; /* peer address */ member in struct:iface_addr
|
H A D | chap.h | 52 u_char peer[CHAPCHALLENGELEN + AUTHLEN]; /* Peer gave us this one */ member in struct:chap::__anon21359
|
/external/apache-harmony/auth/src/test/java/common/org/ietf/jgss/ |
H A D | GSSManagerTest.java | 99 public GSSContext createContext(GSSName peer, Oid mech, argument
|
/external/chromium_org/mojo/public/bindings/lib/ |
H A D | remote_ptr.h | 100 void SetPeer(typename S::_Peer::_Stub* peer) { argument 102 state_->connector.SetIncomingReceiver(peer);
|
/external/chromium_org/ui/views/controls/button/ |
H A D | radio_button.cc | 84 RadioButton* peer = static_cast<RadioButton*>(*i); local 85 peer->SetChecked(false);
|
/external/chromium_org/v8/tools/testrunner/network/ |
H A D | network_execution.py | 38 from ..objects import peer namespace 49 return [ peer.Peer.Unpack(p) for p in data ] 141 # Spawn one thread for each peer. 168 def _TalkToPeer(self, peer): 171 code = sock.connect_ex((peer.address, constants.PEER_PORT)) 174 peer.runtime = None 176 packet = workpacket.WorkPacket(peer=peer, context=self.context, 189 # The peer is reporting an error. 191 print("\nPeer %s reports error: %s" % (peer [all...] |
/external/bluetooth/bluedroid/btif/include/ |
H A D | btif_pan_internal.h | 69 BD_ADDR peer; member in struct:__anon963
|
/external/chromium/chrome/common/extensions/ |
H A D | extension_localization_peer.cc | 18 webkit_glue::ResourceLoaderBridge::Peer* peer, 21 : original_peer_(peer), 32 webkit_glue::ResourceLoaderBridge::Peer* peer, 40 new ExtensionLocalizationPeer(peer, message_sender, request_url) : NULL; 17 ExtensionLocalizationPeer( webkit_glue::ResourceLoaderBridge::Peer* peer, IPC::Message::Sender* message_sender, const GURL& request_url) argument 31 CreateExtensionLocalizationPeer( webkit_glue::ResourceLoaderBridge::Peer* peer, IPC::Message::Sender* message_sender, const std::string& mime_type, const GURL& request_url) argument
|
/external/chromium_org/chrome/renderer/extensions/ |
H A D | extension_localization_peer.cc | 18 webkit_glue::ResourceLoaderBridge::Peer* peer, 21 : original_peer_(peer), 32 webkit_glue::ResourceLoaderBridge::Peer* peer, 40 new ExtensionLocalizationPeer(peer, message_sender, request_url) : NULL; 17 ExtensionLocalizationPeer( webkit_glue::ResourceLoaderBridge::Peer* peer, IPC::Sender* message_sender, const GURL& request_url) argument 31 CreateExtensionLocalizationPeer( webkit_glue::ResourceLoaderBridge::Peer* peer, IPC::Sender* message_sender, const std::string& mime_type, const GURL& request_url) argument
|
/external/chromium_org/chrome/renderer/ |
H A D | security_filter_peer.cc | 16 webkit_glue::ResourceLoaderBridge::Peer* peer) 17 : original_peer_(peer), 28 webkit_glue::ResourceLoaderBridge::Peer* peer, 47 return CreateSecurityFilterPeerForFrame(peer, os_error); 49 return new ReplaceContentPeer(NULL, peer, std::string(), std::string()); 58 webkit_glue::ResourceLoaderBridge::Peer* peer, int os_error) { 66 return new ReplaceContentPeer(NULL, peer, "text/html", html); 135 webkit_glue::ResourceLoaderBridge::Peer* peer, 137 : SecurityFilterPeer(resource_loader_bridge, peer), 185 webkit_glue::ResourceLoaderBridge::Peer* peer, 14 SecurityFilterPeer( webkit_glue::ResourceLoaderBridge* resource_loader_bridge, webkit_glue::ResourceLoaderBridge::Peer* peer) argument 26 CreateSecurityFilterPeerForDeniedRequest( ResourceType::Type resource_type, webkit_glue::ResourceLoaderBridge::Peer* peer, int os_error) argument 57 CreateSecurityFilterPeerForFrame( webkit_glue::ResourceLoaderBridge::Peer* peer, int os_error) argument 133 BufferedPeer( webkit_glue::ResourceLoaderBridge* resource_loader_bridge, webkit_glue::ResourceLoaderBridge::Peer* peer, const std::string& mime_type) argument 183 ReplaceContentPeer( webkit_glue::ResourceLoaderBridge* resource_loader_bridge, webkit_glue::ResourceLoaderBridge::Peer* peer, const std::string& mime_type, const std::string& data) argument [all...] |
/external/chromium_org/content/child/ |
H A D | resource_dispatcher.h | 88 PendingRequestInfo(webkit_glue::ResourceLoaderBridge::Peer* peer, 96 webkit_glue::ResourceLoaderBridge::Peer* peer; member in struct:content::ResourceDispatcher::PendingRequestInfo
|
/external/chromium_org/net/base/ |
H A D | address_tracker_linux.cc | 111 struct sockaddr_nl peer = {}; local 112 peer.nl_family = AF_NETLINK; 126 0, reinterpret_cast<struct sockaddr*>(&peer), 127 sizeof(peer))); 144 reinterpret_cast<struct sockaddr*>(&peer), 145 sizeof(peer)));
|
/external/chromium_org/third_party/openssl/openssl/apps/ |
H A D | sess_id.c | 93 X509 *peer = NULL; local 167 peer = SSL_SESSION_get0_peer(x); 236 if (peer == NULL) 239 X509_print(out,peer); 258 else if (!noout && (peer != NULL)) /* just print the certificate */ 261 i=(int)i2d_X509_bio(out,peer); 263 i=PEM_write_bio_X509(out,peer);
|
/external/chromium_org/third_party/openssl/openssl/crypto/evp/ |
H A D | pmeth_fn.c | 285 int EVP_PKEY_derive_set_peer(EVP_PKEY_CTX *ctx, EVP_PKEY *peer) argument 301 ret = ctx->pmeth->ctrl(ctx, EVP_PKEY_CTRL_PEER_KEY, 0, peer); 315 if (ctx->pkey->type != peer->type) 322 /* ran@cryptocom.ru: For clarity. The error is if parameters in peer are 327 if (!EVP_PKEY_missing_parameters(peer) && 328 !EVP_PKEY_cmp_parameters(ctx->pkey, peer)) 337 ctx->peerkey = peer; 339 ret = ctx->pmeth->ctrl(ctx, EVP_PKEY_CTRL_PEER_KEY, 1, peer); 347 CRYPTO_add(&peer->references,1,CRYPTO_LOCK_EVP_PKEY);
|
/external/iproute2/include/ |
H A D | libnetlink.h | 16 struct sockaddr_nl peer; member in struct:rtnl_handle 42 extern int rtnl_talk(struct rtnl_handle *rtnl, struct nlmsghdr *n, pid_t peer,
|
/external/openssl/apps/ |
H A D | sess_id.c | 93 X509 *peer = NULL; local 167 peer = SSL_SESSION_get0_peer(x); 236 if (peer == NULL) 239 X509_print(out,peer); 258 else if (!noout && (peer != NULL)) /* just print the certificate */ 261 i=(int)i2d_X509_bio(out,peer); 263 i=PEM_write_bio_X509(out,peer);
|
/external/openssl/crypto/evp/ |
H A D | pmeth_fn.c | 285 int EVP_PKEY_derive_set_peer(EVP_PKEY_CTX *ctx, EVP_PKEY *peer) argument 301 ret = ctx->pmeth->ctrl(ctx, EVP_PKEY_CTRL_PEER_KEY, 0, peer); 315 if (ctx->pkey->type != peer->type) 322 /* ran@cryptocom.ru: For clarity. The error is if parameters in peer are 327 if (!EVP_PKEY_missing_parameters(peer) && 328 !EVP_PKEY_cmp_parameters(ctx->pkey, peer)) 337 ctx->peerkey = peer; 339 ret = ctx->pmeth->ctrl(ctx, EVP_PKEY_CTRL_PEER_KEY, 1, peer); 347 CRYPTO_add(&peer->references,1,CRYPTO_LOCK_EVP_PKEY);
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | peerkey_auth.c | 51 struct wpa_state_machine *sm, const u8 *peer, 64 if (peer) { 65 pos = wpa_add_kde(pos, RSN_KEY_DATA_MAC_ADDR, peer, ETH_ALEN, 202 const u8 *smk, const u8 *peer) 228 pos = wpa_add_kde(pos, RSN_KEY_DATA_MAC_ADDR, peer, ETH_ALEN, NULL, 0); 50 wpa_smk_send_error(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, const u8 *peer, u16 mui, u16 error_type) argument 198 wpa_send_smk_m5(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, struct wpa_eapol_ie_parse *kde, const u8 *smk, const u8 *peer) argument
|
/external/wpa_supplicant_8/src/ap/ |
H A D | peerkey_auth.c | 51 struct wpa_state_machine *sm, const u8 *peer, 64 if (peer) { 65 pos = wpa_add_kde(pos, RSN_KEY_DATA_MAC_ADDR, peer, ETH_ALEN, 202 const u8 *smk, const u8 *peer) 228 pos = wpa_add_kde(pos, RSN_KEY_DATA_MAC_ADDR, peer, ETH_ALEN, NULL, 0); 50 wpa_smk_send_error(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, const u8 *peer, u16 mui, u16 error_type) argument 198 wpa_send_smk_m5(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, struct wpa_eapol_ie_parse *kde, const u8 *smk, const u8 *peer) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | peerkey_auth.c | 51 struct wpa_state_machine *sm, const u8 *peer, 64 if (peer) { 65 pos = wpa_add_kde(pos, RSN_KEY_DATA_MAC_ADDR, peer, ETH_ALEN, 202 const u8 *smk, const u8 *peer) 228 pos = wpa_add_kde(pos, RSN_KEY_DATA_MAC_ADDR, peer, ETH_ALEN, NULL, 0); 50 wpa_smk_send_error(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, const u8 *peer, u16 mui, u16 error_type) argument 198 wpa_send_smk_m5(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, struct wpa_eapol_ie_parse *kde, const u8 *smk, const u8 *peer) argument
|
/external/chromium/chrome/browser/extensions/ |
H A D | extension_function.h | 74 void set_dispatcher_peer(ExtensionFunctionDispatcher::Peer* peer) { argument 75 peer_ = peer; 130 // The peer to the dispatcher that will service this extension function call.
|