/external/wpa_supplicant_8/hostapd/src/p2p/ |
H A D | p2p_invitation.c | 19 struct p2p_device *peer, 56 peer->dialog_token++; 57 if (peer->dialog_token == 0) 58 peer->dialog_token = 1; 60 peer->dialog_token); 71 !(peer->flags & P2P_DEV_NO_PREF_CHAN)) 81 dev_addr = peer->info.p2p_device_addr; 85 p2p_buf_add_device_info(buf, p2p, peer); 106 struct p2p_device *peer, 190 p2p_dbg(p2p, "Invitation Request from unknown peer " MACST 18 p2p_build_invitation_req(struct p2p_data *p2p, struct p2p_device *peer, const u8 *go_dev_addr, int dev_pw_id) argument 105 p2p_build_invitation_resp(struct p2p_data *p2p, struct p2p_device *peer, u8 dialog_token, u8 status, const u8 *group_bssid, u8 reg_class, u8 channel, struct p2p_channels *channels) argument 569 p2p_invite(struct p2p_data *p2p, const u8 *peer, enum p2p_invite_role role, const u8 *bssid, const u8 *ssid, size_t ssid_len, unsigned int force_freq, const u8 *go_dev_addr, int persistent_group, unsigned int pref_freq, int dev_pw_id) argument [all...] |
H A D | p2p_build.c | 148 struct p2p_device *peer) 163 if (peer && peer->wps_method != WPS_NOT_READY) { 164 if (peer->wps_method == WPS_PBC) 166 else if (peer->wps_method == WPS_PIN_DISPLAY || 167 peer->wps_method == WPS_PIN_KEYPAD) 147 p2p_buf_add_device_info(struct wpabuf *buf, struct p2p_data *p2p, struct p2p_device *peer) argument
|
/external/wpa_supplicant_8/src/p2p/ |
H A D | p2p_invitation.c | 19 struct p2p_device *peer, 56 peer->dialog_token++; 57 if (peer->dialog_token == 0) 58 peer->dialog_token = 1; 60 peer->dialog_token); 71 !(peer->flags & P2P_DEV_NO_PREF_CHAN)) 81 dev_addr = peer->info.p2p_device_addr; 85 p2p_buf_add_device_info(buf, p2p, peer); 106 struct p2p_device *peer, 190 p2p_dbg(p2p, "Invitation Request from unknown peer " MACST 18 p2p_build_invitation_req(struct p2p_data *p2p, struct p2p_device *peer, const u8 *go_dev_addr, int dev_pw_id) argument 105 p2p_build_invitation_resp(struct p2p_data *p2p, struct p2p_device *peer, u8 dialog_token, u8 status, const u8 *group_bssid, u8 reg_class, u8 channel, struct p2p_channels *channels) argument 569 p2p_invite(struct p2p_data *p2p, const u8 *peer, enum p2p_invite_role role, const u8 *bssid, const u8 *ssid, size_t ssid_len, unsigned int force_freq, const u8 *go_dev_addr, int persistent_group, unsigned int pref_freq, int dev_pw_id) argument [all...] |
H A D | p2p_build.c | 148 struct p2p_device *peer) 163 if (peer && peer->wps_method != WPS_NOT_READY) { 164 if (peer->wps_method == WPS_PBC) 166 else if (peer->wps_method == WPS_PIN_DISPLAY || 167 peer->wps_method == WPS_PIN_KEYPAD) 147 p2p_buf_add_device_info(struct wpabuf *buf, struct p2p_data *p2p, struct p2p_device *peer) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/p2p/ |
H A D | p2p_invitation.c | 19 struct p2p_device *peer, 56 peer->dialog_token++; 57 if (peer->dialog_token == 0) 58 peer->dialog_token = 1; 60 peer->dialog_token); 71 !(peer->flags & P2P_DEV_NO_PREF_CHAN)) 81 dev_addr = peer->info.p2p_device_addr; 85 p2p_buf_add_device_info(buf, p2p, peer); 106 struct p2p_device *peer, 190 p2p_dbg(p2p, "Invitation Request from unknown peer " MACST 18 p2p_build_invitation_req(struct p2p_data *p2p, struct p2p_device *peer, const u8 *go_dev_addr, int dev_pw_id) argument 105 p2p_build_invitation_resp(struct p2p_data *p2p, struct p2p_device *peer, u8 dialog_token, u8 status, const u8 *group_bssid, u8 reg_class, u8 channel, struct p2p_channels *channels) argument 569 p2p_invite(struct p2p_data *p2p, const u8 *peer, enum p2p_invite_role role, const u8 *bssid, const u8 *ssid, size_t ssid_len, unsigned int force_freq, const u8 *go_dev_addr, int persistent_group, unsigned int pref_freq, int dev_pw_id) argument [all...] |
H A D | p2p_build.c | 148 struct p2p_device *peer) 163 if (peer && peer->wps_method != WPS_NOT_READY) { 164 if (peer->wps_method == WPS_PBC) 166 else if (peer->wps_method == WPS_PIN_DISPLAY || 167 peer->wps_method == WPS_PIN_KEYPAD) 147 p2p_buf_add_device_info(struct wpabuf *buf, struct p2p_data *p2p, struct p2p_device *peer) argument
|
/external/chromium_org/content/child/ |
H A D | resource_dispatcher.cc | 79 virtual bool Start(RequestPeer* peer) OVERRIDE; 173 bool IPCResourceLoaderBridge::Start(RequestPeer* peer) { argument 180 request_id_ = dispatcher_->AddPendingRequest(peer, 339 request_info->peer->OnUploadProgress(position, size); 356 request_info->peer, response_head.mime_type, request_info->url); 358 request_info->peer = new_peer; 369 request_info->peer->OnReceivedResponse(renderer_response_info); 379 request_info->peer->OnReceivedCachedMetadata(&data.front(), data.size()); 449 // call peer's callback. 465 request_info->peer 545 RequestPeer* peer = request_info->peer; local 675 PendingRequestInfo( RequestPeer* peer, ResourceType::Type resource_type, int origin_pid, const GURL& frame_origin, const GURL& request_url, bool download_to_file) argument [all...] |
H A D | resource_dispatcher.h | 110 PendingRequestInfo(RequestPeer* peer, 119 RequestPeer* peer; member in struct:content::ResourceDispatcher::PendingRequestInfo
|
/external/chromium_org/v8/tools/testrunner/server/ |
H A D | presence_handler.py | 38 from ..objects import peer namespace 41 STARTUP_REQUEST = "V8 test peer starting up" 43 EXIT_REQUEST = "V8 testing peer going down" 69 p = peer.Peer(self.client_address[0], jobs, relative_perf, 78 p = peer.Peer(self.client_address[0], jobs, perf, pubkey_fingerprint)
|
/external/chromium_org/content/browser/ |
H A D | byte_stream.cc | 54 void SetPeer(ByteStreamReaderImpl* peer, 114 void SetPeer(ByteStreamWriterImpl* peer, 126 // Receive data from our peer. 204 ByteStreamReaderImpl* peer, 207 peer_ = peer; 336 ByteStreamWriterImpl* peer, 339 peer_ = peer; 203 SetPeer( ByteStreamReaderImpl* peer, scoped_refptr<base::SequencedTaskRunner> peer_task_runner, scoped_refptr<LifetimeFlag> peer_lifetime_flag) argument 335 SetPeer( ByteStreamWriterImpl* peer, scoped_refptr<base::SequencedTaskRunner> peer_task_runner, scoped_refptr<LifetimeFlag> peer_lifetime_flag) argument
|
/external/chromium_org/net/base/ |
H A D | address_tracker_linux.cc | 144 struct sockaddr_nl peer = {}; local 145 peer.nl_family = AF_NETLINK; 159 0, reinterpret_cast<struct sockaddr*>(&peer), 160 sizeof(peer))); 178 reinterpret_cast<struct sockaddr*>(&peer), 179 sizeof(peer)));
|
/external/chromium_org/ui/views/controls/button/ |
H A D | radio_button.cc | 84 RadioButton* peer = static_cast<RadioButton*>(*i); local 85 peer->SetChecked(false);
|
/external/bluetooth/bluedroid/btif/include/ |
H A D | btif_pan_internal.h | 69 BD_ADDR peer; member in struct:__anon1044
|
/external/chromium_org/device/nfc/ |
H A D | nfc_chromeos_unittest.cc | 83 virtual void PeerFound(NfcAdapter* adapter, NfcPeer* peer) OVERRIDE { 86 peer_identifier_ = peer->GetIdentifier(); 90 virtual void PeerLost(NfcAdapter* adapter, NfcPeer* peer) OVERRIDE { 92 EXPECT_EQ(peer_identifier_, peer->GetIdentifier()); 114 NfcPeer* peer, const NfcNdefRecord* record) OVERRIDE { 115 EXPECT_EQ(peer, adapter_->GetPeer(peer_identifier_)); 116 EXPECT_EQ(peer_identifier_, peer->GetIdentifier()); 321 // Tests that peer and record objects are created for all peers and records 365 NfcPeer* peer = peers[0]; local 366 const NfcNdefMessage& message = peer 540 NfcPeer* peer = adapter_->GetPeer(observer.peer_identifier_); local [all...] |
H A D | nfc_adapter_chromeos.cc | 185 VLOG(1) << "Found peer device does not belong to the current adapter."; 189 // Create the peer object. 198 device::NfcPeer* peer = RemovePeer(object_path.value()); local 199 if (!peer) { 200 VLOG(1) << "Removed peer device does not belong to the current adapter."; 203 FOR_EACH_OBSERVER(NfcAdapter::Observer, observers_, PeerLost(this, peer)); 204 delete peer; 265 // Create peer objects for peers that were added before the adapter was set. 319 device::NfcPeer* peer = *iter; local 321 PeerLost(this, peer)); [all...] |
/external/iptables/include/libipq/ |
H A D | libipq.h | 53 struct sockaddr_nl peer; member in struct:ipq_handle
|
/external/chromium_org/net/spdy/ |
H A D | hpack_encoder_test.cc | 404 test::HpackEncoderPeer peer(NULL); 411 peer.CookieToCrumbs(" foo=1;bar=2 ; bar=3; bing=4; ", &out); 414 peer.CookieToCrumbs(";;foo = bar ;; ;baz =bing", &out); 417 peer.CookieToCrumbs("baz=bing; foo=bar; baz=bing", &out); 420 peer.CookieToCrumbs("baz=bing", &out); 423 peer.CookieToCrumbs("", &out); 426 peer.CookieToCrumbs("foo;bar; baz;baz;bing;", &out);
|
/external/chromium_org/third_party/libjingle/source/talk/examples/peerconnection/server/ |
H A D | peer_channel.cc | 39 // Set to the peer id of the originator when messages are being 40 // exchanged between peers, but set to the id of the receiving peer 45 // next, we don't use a custom name for our peer-id header (originally it was 110 void ChannelMember::ForwardRequestToPeer(DataSocket* ds, ChannelMember* peer) { argument 111 assert(peer); 116 if (peer == this) { 121 name_.c_str(), peer->name().c_str()); 122 peer->QueueResponse("200 OK", ds->content_type(), extra_headers, 261 // Let the newly connected peer know about other members of the channel. 359 // The peer itsel [all...] |
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | peerkey_auth.c | 51 struct wpa_state_machine *sm, const u8 *peer, 64 if (peer) { 65 pos = wpa_add_kde(pos, RSN_KEY_DATA_MAC_ADDR, peer, ETH_ALEN, 202 const u8 *smk, const u8 *peer) 228 pos = wpa_add_kde(pos, RSN_KEY_DATA_MAC_ADDR, peer, ETH_ALEN, NULL, 0); 50 wpa_smk_send_error(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, const u8 *peer, u16 mui, u16 error_type) argument 198 wpa_send_smk_m5(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, struct wpa_eapol_ie_parse *kde, const u8 *smk, const u8 *peer) argument
|
/external/wpa_supplicant_8/src/ap/ |
H A D | peerkey_auth.c | 51 struct wpa_state_machine *sm, const u8 *peer, 64 if (peer) { 65 pos = wpa_add_kde(pos, RSN_KEY_DATA_MAC_ADDR, peer, ETH_ALEN, 202 const u8 *smk, const u8 *peer) 228 pos = wpa_add_kde(pos, RSN_KEY_DATA_MAC_ADDR, peer, ETH_ALEN, NULL, 0); 50 wpa_smk_send_error(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, const u8 *peer, u16 mui, u16 error_type) argument 198 wpa_send_smk_m5(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, struct wpa_eapol_ie_parse *kde, const u8 *smk, const u8 *peer) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | peerkey_auth.c | 51 struct wpa_state_machine *sm, const u8 *peer, 64 if (peer) { 65 pos = wpa_add_kde(pos, RSN_KEY_DATA_MAC_ADDR, peer, ETH_ALEN, 202 const u8 *smk, const u8 *peer) 228 pos = wpa_add_kde(pos, RSN_KEY_DATA_MAC_ADDR, peer, ETH_ALEN, NULL, 0); 50 wpa_smk_send_error(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, const u8 *peer, u16 mui, u16 error_type) argument 198 wpa_send_smk_m5(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, struct wpa_eapol_key *key, struct wpa_eapol_ie_parse *kde, const u8 *smk, const u8 *peer) argument
|
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/ |
H A D | turnserver.cc | 125 const talk_base::SocketAddress& peer); 148 Permission(talk_base::Thread* thread, const talk_base::IPAddress& peer); 151 const talk_base::IPAddress& peer() const { return peer_; } function in class:cricket::TurnServer::Permission 169 const talk_base::SocketAddress& peer); 173 const talk_base::SocketAddress& peer() const { return peer_; } function in class:cricket::TurnServer::Channel 743 // If a permission exists, send the data on to the peer. 749 << "peer=" << peer_attr->GetAddress(); 766 LOG_J(LS_INFO, this) << "Created permission, peer=" 816 << ", peer=" << peer_attr->GetAddress(); 829 // Send the data to the peer addres 939 SendExternal(const void* data, size_t size, const talk_base::SocketAddress& peer) argument 964 Permission(talk_base::Thread* thread, const talk_base::IPAddress& peer) argument 985 Channel(talk_base::Thread* thread, int id, const talk_base::SocketAddress& peer) argument [all...] |
/external/bluetooth/bluedroid/btif/src/ |
H A D | btif_pan.c | 264 (const bt_bdaddr_t*)conn->peer, btpan_conn_local_role, btpan_remote_role); 496 if(memcmp(btpan_cb.conns[i].peer, addr, sizeof(BD_ADDR)) == 0) 507 memset(&conn->peer, 0, sizeof(conn->peer)); 524 bdcpy(btpan_cb.conns[i].peer, addr); 540 memset(&p->peer, 0, 6); 561 || memcmp(btpan_cb.conns[i].peer, eth_hdr->h_dest, sizeof(BD_ADDR)) == 0)) { 656 callback.connection_state_cb(BTPAN_STATE_DISCONNECTED, 0, (const bt_bdaddr_t*)conn->peer,
|
/external/chromium_org/chrome/browser/resources/chromeos/ |
H A D | nfc_debug.css | 41 #nfc-peer-info {
|
/external/chromium_org/third_party/openssl/openssl/ssl/ |
H A D | ssl_asn1.c | 300 if (in->peer != NULL) 301 M_ASN1_I2D_len_EXP_opt(in->peer,i2d_X509,3,v3); 346 if (in->peer != NULL) 347 M_ASN1_I2D_put_EXP_opt(in->peer,i2d_X509,3,v3); 508 if (ret->peer != NULL) 510 X509_free(ret->peer); 511 ret->peer=NULL; 513 M_ASN1_D2I_get_EXP_opt(ret->peer,d2i_X509,3);
|