/external/qemu/hw/android/goldfish/ |
H A D | pipe.c | 421 void* peer = svc->funcs.init(pipe, svc->opaque, pipeArgs); local 422 if (peer == NULL) { 428 pipe->opaque = peer;
|
/external/chromium_org/chromeos/dbus/ |
H A D | fake_shill_device_client.cc | 209 const std::string& peer, 206 PerformTDLSOperation( const dbus::ObjectPath& device_path, const std::string& operation, const std::string& peer, const StringCallback& callback, const ErrorCallback& error_callback) argument
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | ap_drv_ops.h | 119 enum wnm_oper oper, const u8 *peer,
|
H A D | ap_drv_ops.c | 729 const u8 *peer, u8 *buf, u16 *buf_len) 733 return hapd->driver->wnm_oper(hapd->drv_priv, oper, peer, buf, 728 hostapd_drv_wnm_oper(struct hostapd_data *hapd, enum wnm_oper oper, const u8 *peer, u8 *buf, u16 *buf_len) argument
|
/external/wpa_supplicant_8/src/ap/ |
H A D | ap_drv_ops.h | 119 enum wnm_oper oper, const u8 *peer,
|
H A D | ap_drv_ops.c | 729 const u8 *peer, u8 *buf, u16 *buf_len) 733 return hapd->driver->wnm_oper(hapd->drv_priv, oper, peer, buf, 728 hostapd_drv_wnm_oper(struct hostapd_data *hapd, enum wnm_oper oper, const u8 *peer, u8 *buf, u16 *buf_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | ap_drv_ops.h | 119 enum wnm_oper oper, const u8 *peer,
|
H A D | ap_drv_ops.c | 729 const u8 *peer, u8 *buf, u16 *buf_len) 733 return hapd->driver->wnm_oper(hapd->drv_priv, oper, peer, buf, 728 hostapd_drv_wnm_oper(struct hostapd_data *hapd, enum wnm_oper oper, const u8 *peer, u8 *buf, u16 *buf_len) argument
|
/external/sepolicy/ |
H A D | access_vectors | 811 # network peer labels 812 class peer
|
/external/wpa_supplicant_8/hostapd/src/p2p/ |
H A D | p2p_sd.c | 58 return NULL; /* peer does not support SD */ 65 /* Use WSD only if the peer indicates support or it */ 82 os_memcmp(q->peer, dev->info.p2p_device_addr, ETH_ALEN) == 273 p2p_dbg(p2p, "No Listen/Operating frequency known for the peer " 427 * separately for each peer to avoid having to drop old 858 os_memcpy(q->peer, dst, ETH_ALEN);
|
/external/wpa_supplicant_8/hostapd/src/wps/ |
H A D | wps_upnp.c | 1094 if (iface->peer.wps) 1095 wps_deinit(iface->peer.wps);
|
/external/wpa_supplicant_8/src/p2p/ |
H A D | p2p_sd.c | 58 return NULL; /* peer does not support SD */ 65 /* Use WSD only if the peer indicates support or it */ 82 os_memcmp(q->peer, dev->info.p2p_device_addr, ETH_ALEN) == 273 p2p_dbg(p2p, "No Listen/Operating frequency known for the peer " 427 * separately for each peer to avoid having to drop old 858 os_memcpy(q->peer, dst, ETH_ALEN);
|
/external/wpa_supplicant_8/src/wps/ |
H A D | wps_upnp.c | 1094 if (iface->peer.wps) 1095 wps_deinit(iface->peer.wps);
|
/external/wpa_supplicant_8/wpa_supplicant/src/p2p/ |
H A D | p2p_sd.c | 58 return NULL; /* peer does not support SD */ 65 /* Use WSD only if the peer indicates support or it */ 82 os_memcmp(q->peer, dev->info.p2p_device_addr, ETH_ALEN) == 273 p2p_dbg(p2p, "No Listen/Operating frequency known for the peer " 427 * separately for each peer to avoid having to drop old 858 os_memcpy(q->peer, dst, ETH_ALEN);
|
/external/wpa_supplicant_8/wpa_supplicant/src/wps/ |
H A D | wps_upnp.c | 1094 if (iface->peer.wps) 1095 wps_deinit(iface->peer.wps);
|
/external/iproute2/doc/ |
H A D | ip-cref.tex | 285 \item \verb|broadcast LLADDRESS|, \verb|brd LLADDRESS| or \verb|peer LLADDRESS| 287 --- change the link layer broadcast address or the peer address when 406 attached to each end. All packets sent to this link will reach the peer 407 and all packets received by us came from this single peer. 464 (or the peer address for pointopoint links) is a 471 NBMA links have no well-defined broadcast or peer address, 584 \item \verb|peer ADDRESS| 588 encoding the network prefix length. If a peer address is specified, 590 with the peer rather than with the local address. 3146 \# ---Optional peer addres [all...] |
/external/chromium_org/net/server/ |
H A D | http_server_unittest.cc | 237 ASSERT_TRUE(StartsWithASCII(GetRequest(0).peer.ToString(),
|
/external/ipsec-tools/ |
H A D | setup.c | 648 const vchar_t *peer, int remoteid) 647 getsainfo(const vchar_t *src, const vchar_t *dst, const vchar_t *peer, int remoteid) argument
|
/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | driver_privsep.c | 394 os_memcpy(data.stkstart.peer, buf, ETH_ALEN);
|
/external/wpa_supplicant_8/src/drivers/ |
H A D | driver_privsep.c | 394 os_memcpy(data.stkstart.peer, buf, ETH_ALEN);
|
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/ |
H A D | driver_privsep.c | 394 os_memcpy(data.stkstart.peer, buf, ETH_ALEN);
|
/external/openssl/ssl/ |
H A D | s3_clnt.c | 1261 /* Inconsistency alert: cert_chain does include the peer's 1311 if (s->session->peer != NULL) 1312 X509_free(s->session->peer); 1314 s->session->peer=x; 1321 if (s->session->peer != NULL) 1322 X509_free(s->session->peer); 1323 s->session->peer=NULL; 2949 /* If we have client certificate, use its secret as peer key */
|
/external/chromium_org/third_party/openssl/openssl/include/openssl/ |
H A D | ssl.h | 175 * Version 1 - added the optional peer certificate 511 X509 *peer; member in struct:ssl_session_st 512 /* when app_verify_callback accepts a session where the peer's certificate 538 unsigned char *tlsext_ecpointformatlist; /* peer's list */ 540 unsigned char *tlsext_ellipticcurvelist; /* peer's list */ 1484 * -- that we expected from peer (SSL_get_peer_finished). 1680 #define DTLSv1_listen(ssl, peer) \ 1681 SSL_ctrl(ssl,DTLS_CTRL_LISTEN,0, (void *)peer)
|
/external/chromium_org/third_party/openssl/openssl/ssl/ |
H A D | ssl.h | 175 * Version 1 - added the optional peer certificate 511 X509 *peer; member in struct:ssl_session_st 512 /* when app_verify_callback accepts a session where the peer's certificate 538 unsigned char *tlsext_ecpointformatlist; /* peer's list */ 540 unsigned char *tlsext_ellipticcurvelist; /* peer's list */ 1484 * -- that we expected from peer (SSL_get_peer_finished). 1680 #define DTLSv1_listen(ssl, peer) \ 1681 SSL_ctrl(ssl,DTLS_CTRL_LISTEN,0, (void *)peer)
|
/external/openssl/include/openssl/ |
H A D | ssl.h | 175 * Version 1 - added the optional peer certificate 508 X509 *peer; member in struct:ssl_session_st 509 /* when app_verify_callback accepts a session where the peer's certificate 535 unsigned char *tlsext_ecpointformatlist; /* peer's list */ 537 unsigned char *tlsext_ellipticcurvelist; /* peer's list */ 1548 * -- that we expected from peer (SSL_get_peer_finished). 1744 #define DTLSv1_listen(ssl, peer) \ 1745 SSL_ctrl(ssl,DTLS_CTRL_LISTEN,0, (void *)peer)
|