/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/spdy/ |
H A D | SpdyConnectionTest.java | 59 private final MockSpdyPeer peer = new MockSpdyPeer(); field in class:SpdyConnectionTest 62 peer.close(); 67 peer.acceptFrame(); // SYN_STREAM 68 peer.sendFrame() 70 peer.sendFrame().data(true, 1, new OkBuffer().writeUtf8("robot")); 71 peer.acceptFrame(); // DATA 72 peer.play(); 75 SpdyConnection connection = connection(peer, SPDY3); 84 // verify the peer received what was expected 85 MockSpdyPeer.InFrame synStream = peer 1556 connection(MockSpdyPeer peer, Variant variant) argument 1560 connectionBuilder(MockSpdyPeer peer, Variant variant) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | tdls.c | 84 static void wpa_tdls_peer_free(struct wpa_sm *sm, struct wpa_tdls_peer *peer); 86 struct wpa_tdls_peer *peer); 172 static int wpa_tdls_del_key(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument 174 if (wpa_sm_set_key(sm, WPA_ALG_NONE, peer->addr, 185 static int wpa_tdls_set_key(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument 193 switch (peer->cipher) { 208 if (wpa_sm_set_key(sm, alg, peer->addr, -1, 1, 209 rsc, sizeof(rsc), peer->tpk.tk, key_len) < 0) { 232 struct wpa_tdls_peer *peer; local 252 for (peer 295 wpa_tdls_do_teardown(struct wpa_sm *sm, struct wpa_tdls_peer *peer, u16 reason_code) argument 312 struct wpa_tdls_peer *peer = timeout_ctx; local 356 wpa_tdls_tpk_retry_timeout_cancel(struct wpa_sm *sm, struct wpa_tdls_peer *peer, u8 action_code) argument 382 wpa_tdls_generate_tpk(struct wpa_tdls_peer *peer, const u8 *own_addr, const u8 *bssid) argument 556 wpa_supplicant_verify_tdls_mic(u8 trans_seq, struct wpa_tdls_peer *peer, const u8 *lnkid, const u8 *timeoutie, const struct wpa_tdls_ftie *ftie) argument 585 wpa_supplicant_verify_tdls_mic_teardown( u8 trans_seq, u16 rcode, u8 dtoken, struct wpa_tdls_peer *peer, const u8 *lnkid, const struct wpa_tdls_ftie *ftie) argument 611 struct wpa_tdls_peer *peer = timeout_ctx; local 634 wpa_tdls_peer_remove_from_list(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument 660 wpa_tdls_peer_clear(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument 692 wpa_tdls_peer_free(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument 700 wpa_tdls_linkid(struct wpa_sm *sm, struct wpa_tdls_peer *peer, struct wpa_tdls_lnkid *lnkid) argument 719 struct wpa_tdls_peer *peer; local 805 struct wpa_tdls_peer *peer; local 831 wpa_tdls_disable_peer_link(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument 841 struct wpa_tdls_peer *peer; local 872 struct wpa_tdls_peer *peer; local 895 struct wpa_tdls_peer *peer = NULL; local 988 struct wpa_tdls_peer *peer; local 1015 wpa_tdls_send_tpk_m1(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument 1194 wpa_tdls_send_tpk_m2(struct wpa_sm *sm, const unsigned char *src_addr, u8 dtoken, struct wpa_tdls_lnkid *lnkid, const struct wpa_tdls_peer *peer) argument 1284 wpa_tdls_send_tpk_m3(struct wpa_sm *sm, const unsigned char *src_addr, u8 dtoken, struct wpa_tdls_lnkid *lnkid, const struct wpa_tdls_peer *peer) argument 1381 wpa_tdls_send_discovery_response(struct wpa_sm *sm, struct wpa_tdls_peer *peer, u8 dialog_token) argument 1399 struct wpa_tdls_peer *peer; local 1461 copy_supp_rates(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1477 copy_peer_ht_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1505 copy_peer_vht_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1533 copy_peer_ext_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1557 copy_peer_wmm_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1582 copy_peer_supp_channels(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1608 copy_peer_supp_oper_classes(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1634 wpa_tdls_addset_peer(struct wpa_sm *sm, struct wpa_tdls_peer *peer, int add) argument 1654 struct wpa_tdls_peer *peer; local 1988 wpa_tdls_enable_link(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument 2026 struct wpa_tdls_peer *peer; local 2301 struct wpa_tdls_peer *peer; local 2482 struct wpa_tdls_peer *peer; local 2534 struct wpa_tdls_peer *peer; local 2669 struct wpa_tdls_peer *peer, *tmp; local 2692 struct wpa_tdls_peer *peer, *tmp; local [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | tdls.c | 84 static void wpa_tdls_peer_free(struct wpa_sm *sm, struct wpa_tdls_peer *peer); 86 struct wpa_tdls_peer *peer); 172 static int wpa_tdls_del_key(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument 174 if (wpa_sm_set_key(sm, WPA_ALG_NONE, peer->addr, 185 static int wpa_tdls_set_key(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument 193 switch (peer->cipher) { 208 if (wpa_sm_set_key(sm, alg, peer->addr, -1, 1, 209 rsc, sizeof(rsc), peer->tpk.tk, key_len) < 0) { 232 struct wpa_tdls_peer *peer; local 252 for (peer 295 wpa_tdls_do_teardown(struct wpa_sm *sm, struct wpa_tdls_peer *peer, u16 reason_code) argument 312 struct wpa_tdls_peer *peer = timeout_ctx; local 356 wpa_tdls_tpk_retry_timeout_cancel(struct wpa_sm *sm, struct wpa_tdls_peer *peer, u8 action_code) argument 382 wpa_tdls_generate_tpk(struct wpa_tdls_peer *peer, const u8 *own_addr, const u8 *bssid) argument 556 wpa_supplicant_verify_tdls_mic(u8 trans_seq, struct wpa_tdls_peer *peer, const u8 *lnkid, const u8 *timeoutie, const struct wpa_tdls_ftie *ftie) argument 585 wpa_supplicant_verify_tdls_mic_teardown( u8 trans_seq, u16 rcode, u8 dtoken, struct wpa_tdls_peer *peer, const u8 *lnkid, const struct wpa_tdls_ftie *ftie) argument 611 struct wpa_tdls_peer *peer = timeout_ctx; local 634 wpa_tdls_peer_remove_from_list(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument 660 wpa_tdls_peer_clear(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument 692 wpa_tdls_peer_free(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument 700 wpa_tdls_linkid(struct wpa_sm *sm, struct wpa_tdls_peer *peer, struct wpa_tdls_lnkid *lnkid) argument 719 struct wpa_tdls_peer *peer; local 805 struct wpa_tdls_peer *peer; local 831 wpa_tdls_disable_peer_link(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument 841 struct wpa_tdls_peer *peer; local 872 struct wpa_tdls_peer *peer; local 895 struct wpa_tdls_peer *peer = NULL; local 988 struct wpa_tdls_peer *peer; local 1015 wpa_tdls_send_tpk_m1(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument 1194 wpa_tdls_send_tpk_m2(struct wpa_sm *sm, const unsigned char *src_addr, u8 dtoken, struct wpa_tdls_lnkid *lnkid, const struct wpa_tdls_peer *peer) argument 1284 wpa_tdls_send_tpk_m3(struct wpa_sm *sm, const unsigned char *src_addr, u8 dtoken, struct wpa_tdls_lnkid *lnkid, const struct wpa_tdls_peer *peer) argument 1381 wpa_tdls_send_discovery_response(struct wpa_sm *sm, struct wpa_tdls_peer *peer, u8 dialog_token) argument 1399 struct wpa_tdls_peer *peer; local 1461 copy_supp_rates(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1477 copy_peer_ht_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1505 copy_peer_vht_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1533 copy_peer_ext_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1557 copy_peer_wmm_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1582 copy_peer_supp_channels(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1608 copy_peer_supp_oper_classes(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1634 wpa_tdls_addset_peer(struct wpa_sm *sm, struct wpa_tdls_peer *peer, int add) argument 1654 struct wpa_tdls_peer *peer; local 1988 wpa_tdls_enable_link(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument 2026 struct wpa_tdls_peer *peer; local 2301 struct wpa_tdls_peer *peer; local 2482 struct wpa_tdls_peer *peer; local 2534 struct wpa_tdls_peer *peer; local 2669 struct wpa_tdls_peer *peer, *tmp; local 2692 struct wpa_tdls_peer *peer, *tmp; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | tdls.c | 84 static void wpa_tdls_peer_free(struct wpa_sm *sm, struct wpa_tdls_peer *peer); 86 struct wpa_tdls_peer *peer); 172 static int wpa_tdls_del_key(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument 174 if (wpa_sm_set_key(sm, WPA_ALG_NONE, peer->addr, 185 static int wpa_tdls_set_key(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument 193 switch (peer->cipher) { 208 if (wpa_sm_set_key(sm, alg, peer->addr, -1, 1, 209 rsc, sizeof(rsc), peer->tpk.tk, key_len) < 0) { 232 struct wpa_tdls_peer *peer; local 252 for (peer 295 wpa_tdls_do_teardown(struct wpa_sm *sm, struct wpa_tdls_peer *peer, u16 reason_code) argument 312 struct wpa_tdls_peer *peer = timeout_ctx; local 356 wpa_tdls_tpk_retry_timeout_cancel(struct wpa_sm *sm, struct wpa_tdls_peer *peer, u8 action_code) argument 382 wpa_tdls_generate_tpk(struct wpa_tdls_peer *peer, const u8 *own_addr, const u8 *bssid) argument 556 wpa_supplicant_verify_tdls_mic(u8 trans_seq, struct wpa_tdls_peer *peer, const u8 *lnkid, const u8 *timeoutie, const struct wpa_tdls_ftie *ftie) argument 585 wpa_supplicant_verify_tdls_mic_teardown( u8 trans_seq, u16 rcode, u8 dtoken, struct wpa_tdls_peer *peer, const u8 *lnkid, const struct wpa_tdls_ftie *ftie) argument 611 struct wpa_tdls_peer *peer = timeout_ctx; local 634 wpa_tdls_peer_remove_from_list(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument 660 wpa_tdls_peer_clear(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument 692 wpa_tdls_peer_free(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument 700 wpa_tdls_linkid(struct wpa_sm *sm, struct wpa_tdls_peer *peer, struct wpa_tdls_lnkid *lnkid) argument 719 struct wpa_tdls_peer *peer; local 805 struct wpa_tdls_peer *peer; local 831 wpa_tdls_disable_peer_link(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument 841 struct wpa_tdls_peer *peer; local 872 struct wpa_tdls_peer *peer; local 895 struct wpa_tdls_peer *peer = NULL; local 988 struct wpa_tdls_peer *peer; local 1015 wpa_tdls_send_tpk_m1(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument 1194 wpa_tdls_send_tpk_m2(struct wpa_sm *sm, const unsigned char *src_addr, u8 dtoken, struct wpa_tdls_lnkid *lnkid, const struct wpa_tdls_peer *peer) argument 1284 wpa_tdls_send_tpk_m3(struct wpa_sm *sm, const unsigned char *src_addr, u8 dtoken, struct wpa_tdls_lnkid *lnkid, const struct wpa_tdls_peer *peer) argument 1381 wpa_tdls_send_discovery_response(struct wpa_sm *sm, struct wpa_tdls_peer *peer, u8 dialog_token) argument 1399 struct wpa_tdls_peer *peer; local 1461 copy_supp_rates(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1477 copy_peer_ht_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1505 copy_peer_vht_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1533 copy_peer_ext_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1557 copy_peer_wmm_capab(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1582 copy_peer_supp_channels(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1608 copy_peer_supp_oper_classes(const struct wpa_eapol_ie_parse *kde, struct wpa_tdls_peer *peer) argument 1634 wpa_tdls_addset_peer(struct wpa_sm *sm, struct wpa_tdls_peer *peer, int add) argument 1654 struct wpa_tdls_peer *peer; local 1988 wpa_tdls_enable_link(struct wpa_sm *sm, struct wpa_tdls_peer *peer) argument 2026 struct wpa_tdls_peer *peer; local 2301 struct wpa_tdls_peer *peer; local 2482 struct wpa_tdls_peer *peer; local 2534 struct wpa_tdls_peer *peer; local 2669 struct wpa_tdls_peer *peer, *tmp; local 2692 struct wpa_tdls_peer *peer, *tmp; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | ibss_rsn.c | 30 struct ibss_rsn_peer *peer; local 32 for (peer = ibss_rsn->peers; peer; peer = peer->next) 33 if (os_memcmp(addr, peer->addr, ETH_ALEN) == 0) 35 return peer; 39 static void ibss_rsn_free(struct ibss_rsn_peer *peer) argument 41 eloop_cancel_timeout(ibss_rsn_auth_timeout, peer, NULL); 42 wpa_auth_sta_deinit(peer 50 struct ibss_rsn_peer *peer = ctx; local 57 struct ibss_rsn_peer *peer = ctx; local 65 struct ibss_rsn_peer *peer = ctx; local 110 struct ibss_rsn_peer *peer = ctx; local 123 ibss_check_rsn_completed(struct ibss_rsn_peer *peer) argument 144 struct ibss_rsn_peer *peer = ctx; local 175 struct ibss_rsn_peer *peer = ctx; local 202 ibss_rsn_supp_init(struct ibss_rsn_peer *peer, const u8 *own_addr, const u8 *psk) argument 310 struct ibss_rsn_peer *peer; local 346 struct ibss_rsn_peer *peer; local 359 ibss_set_sta_authorized(struct ibss_rsn *ibss_rsn, struct ibss_rsn_peer *peer, int authorized) argument 389 struct ibss_rsn_peer *peer = ibss_rsn_get_peer(ibss_rsn, addr); local 445 ibss_rsn_auth_init(struct ibss_rsn *ibss_rsn, struct ibss_rsn_peer *peer) argument 505 ibss_rsn_is_auth_started(struct ibss_rsn_peer * peer) argument 515 struct ibss_rsn_peer *peer; local 554 struct ibss_rsn_peer *peer = eloop_ctx; local 571 struct ibss_rsn_peer *peer; local 601 ibss_rsn_peer_authenticated(struct ibss_rsn *ibss_rsn, struct ibss_rsn_peer *peer, int reason) argument 627 struct ibss_rsn_peer *peer, *prev; local 685 struct ibss_rsn_peer *peer, *prev; local 746 ibss_rsn_process_rx_eapol(struct ibss_rsn *ibss_rsn, struct ibss_rsn_peer *peer, const u8 *buf, size_t len) argument 788 struct ibss_rsn_peer *peer; local 827 ibss_rsn_handle_auth_1_of_2(struct ibss_rsn *ibss_rsn, struct ibss_rsn_peer *peer, const u8* addr) argument 880 struct ibss_rsn_peer *peer; local [all...] |
/external/chromium_org/v8/tools/testrunner/server/ |
H A D | status_handler.py | 36 def _StatusQuery(peer, query): 38 code = sock.connect_ex((peer.address, constants.STATUS_PORT)) 55 def RequestTrustedPubkeys(peer, server): 56 pubkey_list = _StatusQuery(peer, [constants.LIST_TRUSTED_PUBKEYS]) 59 result = _StatusQuery(peer, [constants.GET_SIGNED_PUBKEY, pubkey]) 63 def NotifyNewTrusted(peer, data): 64 _StatusQuery(peer, [constants.NOTIFY_NEW_TRUSTED] + data) 67 def ITrustYouNow(peer): 68 _StatusQuery(peer, [constants.TRUST_YOU_NOW]) 71 def TryTransitiveTrust(peer, pubke [all...] |
/external/chromium_org/v8/tools/testrunner/objects/ |
H A D | workpacket.py | 33 def __init__(self, peer=None, context=None, tests=None, binaries=None, 35 self.peer = peer 50 for shell in self.peer.shells: 64 for t in self.peer.tests:
|
/external/chromium_org/content/child/ |
H A D | resource_dispatcher_unittest.cc | 359 TestRequestPeer peer(bridge.get()); 361 EXPECT_TRUE(bridge->Start(&peer)); 367 EXPECT_TRUE(peer.received_response()); 379 EXPECT_EQ(kTestPageContents, peer.data()); 380 EXPECT_TRUE(peer.complete()); 430 TestRequestPeer peer(bridge.get()); 432 EXPECT_TRUE(bridge->Start(&peer)); 447 EXPECT_EQ("", peer.data()); 448 EXPECT_FALSE(peer.received_response()); 449 EXPECT_FALSE(peer [all...] |
/external/chromium_org/third_party/openssl/openssl/apps/ |
H A D | s_cb.c | 773 } peer; local 786 /* Read peer information */ 787 (void)BIO_dgram_get_peer(SSL_get_rbio(ssl), &peer); local 789 /* Create buffer with peer's address and port */ 791 switch (peer.sa.sa_family) 795 length += sizeof(peer.s4.sin_port); 800 length += sizeof(peer.s6.sin6_port); 815 switch (peer.sa.sa_family) 819 &peer.s4.sin_port, 820 sizeof(peer 861 } peer; local 868 (void)BIO_dgram_get_peer(SSL_get_rbio(ssl), &peer); local [all...] |
/external/openssl/apps/ |
H A D | s_cb.c | 777 } peer; local 790 /* Read peer information */ 791 (void)BIO_dgram_get_peer(SSL_get_rbio(ssl), &peer); local 793 /* Create buffer with peer's address and port */ 795 switch (peer.sa.sa_family) 799 length += sizeof(peer.s4.sin_port); 804 length += sizeof(peer.s6.sin6_port); 819 switch (peer.sa.sa_family) 823 &peer.s4.sin_port, 824 sizeof(peer 865 } peer; local 872 (void)BIO_dgram_get_peer(SSL_get_rbio(ssl), &peer); local [all...] |
/external/qemu/android/ |
H A D | charpipe.c | 75 struct CharPipeHalf* peer; /* NULL if closed */ member in struct:CharPipeHalf 91 ph->peer = NULL; 99 CharPipeHalf* peer = ph->peer; local 106 if (bip == NULL && peer != NULL && peer->cs->chr_read != NULL) { 107 /* no buffered data, try to write directly to the peer */ 111 if (peer->cs->chr_can_read) { 112 size = qemu_chr_can_read( peer->cs ); 121 qemu_chr_read( peer 158 CharPipeHalf* peer = ph->peer; local 297 CharDriverState* peer = cbuf->endpoint; local 348 CharDriverState* peer = cbuf->endpoint; local [all...] |
/external/chromium_org/components/cronet/android/ |
H A D | org_chromium_net_UrlRequestContext.cc | 101 URLRequestContextPeer* peer = new URLRequestContextPeer( local 106 peer->AddRef(); // Hold onto this ref-counted object. 107 peer->Initialize(context_config.Pass()); 108 return reinterpret_cast<jlong>(peer); 115 URLRequestContextPeer* peer = local 121 peer->Release(); 142 URLRequestContextPeer* peer = local 145 peer->StartNetLogToFile(file_name); 152 URLRequestContextPeer* peer = local 154 peer [all...] |
/external/chromium_org/mojo/apps/js/bindings/ |
H A D | connection_unittests.js | 90 function ServiceImpl(peer) { 91 this.peer = peer; 103 this.peer.didFrobinate(42); 108 function ServiceClientImpl(peer) { 109 this.peer = peer; 194 function ProviderImpl(peer) { 195 this.peer = peer; [all...] |
/external/chromium_org/net/quic/crypto/ |
H A D | quic_crypto_server_config_test.cc | 193 QuicCryptoServerConfigPeer peer(config_); 194 base::Lock* m = peer.GetStrikeRegisterClientLock(); 255 QuicCryptoServerConfigPeer peer(&server); 272 EXPECT_TRUE(peer.ConfigHasDefaultSourceAddressTokenBoxer(kPrimary)); 273 EXPECT_FALSE(peer.ConfigHasDefaultSourceAddressTokenBoxer(kOverride)); 280 const string token4 = peer.NewSourceAddressToken(kPrimary, ip4, rand, now); 281 const string token4d = peer.NewSourceAddressToken(kPrimary, ip4d, rand, now); 282 const string token6 = peer.NewSourceAddressToken(kPrimary, ip6, rand, now); 283 EXPECT_EQ(HANDSHAKE_OK, peer.ValidateSourceAddressToken( 285 DCHECK_EQ(HANDSHAKE_OK, peer [all...] |
/external/chromium_org/v8/tools/testrunner/network/ |
H A D | distro.py | 77 # Pick the least-busy peer. Sorting the list for each test 81 # If the peer already has a shell assigned and would need this one 83 peer = peers[index] 84 if (shell.total_duration < peer.needed_work and 85 len(peer.shells) > 0 and 90 peer.AddTests(shell)
|
/external/iproute2/ip/ |
H A D | ifcfg | 81 peer=$1 82 if [ "$peer" != "" ]; then 87 pfx="$ipaddr peer $peer" 141 elif [ "$peer" != "" ]; then 142 if ping -q -c 2 -w 4 $peer ; then 143 ip ro append default via $peer dev $dev metric 30001
|
/external/chromium_org/chrome/renderer/ |
H A D | security_filter_peer.h | 25 content::RequestPeer* peer, 29 content::RequestPeer* peer, 52 explicit SecurityFilterPeer(content::RequestPeer* peer); 64 BufferedPeer(content::RequestPeer* peer, const std::string& mime_type); 83 // to the original peer, giving an opportunity to subclasses to process the 85 // original peer, if it returns false, an error is sent instead. 105 ReplaceContentPeer(content::RequestPeer* peer,
|
H A D | security_filter_peer.cc | 14 SecurityFilterPeer::SecurityFilterPeer(content::RequestPeer* peer) argument 15 : original_peer_(peer) { 25 content::RequestPeer* peer, 44 return CreateSecurityFilterPeerForFrame(peer, os_error); 46 return new ReplaceContentPeer(peer, std::string(), std::string()); 55 content::RequestPeer* peer, 64 return new ReplaceContentPeer(peer, "text/html", html); 131 BufferedPeer::BufferedPeer(content::RequestPeer* peer, argument 133 : SecurityFilterPeer(peer), mime_type_(mime_type) {} 182 ReplaceContentPeer::ReplaceContentPeer(content::RequestPeer* peer, argument 23 CreateSecurityFilterPeerForDeniedRequest( ResourceType::Type resource_type, content::RequestPeer* peer, int os_error) argument 54 CreateSecurityFilterPeerForFrame( content::RequestPeer* peer, int os_error) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/pae/ |
H A D | ieee802_1x_kay.c | 166 mi = body->peer + i; 291 struct ieee802_1x_kay_peer *peer; local 293 dl_list_for_each(peer, peers, struct ieee802_1x_kay_peer, list) { 294 if (os_memcmp(peer->mi, mi, MI_LEN) == 0) 295 return peer; 343 struct ieee802_1x_kay_peer *peer; local 345 peer = get_peer_mi(&participant->live_peers, mi); 346 if (peer) 347 return peer; 391 struct ieee802_1x_kay_peer *peer; local 519 struct ieee802_1x_kay_peer *peer; local 563 struct ieee802_1x_kay_peer *peer; local 595 struct ieee802_1x_kay_peer *peer; local 710 struct ieee802_1x_kay_peer *peer; local 803 struct ieee802_1x_kay_peer *peer; local 822 struct ieee802_1x_kay_peer *peer; local 864 struct ieee802_1x_kay_peer *peer; local 883 struct ieee802_1x_kay_peer *peer; local 984 struct ieee802_1x_kay_peer *peer; local 1237 struct ieee802_1x_kay_peer *peer; local 1516 struct ieee802_1x_kay_peer *peer; local 1944 struct ieee802_1x_kay_peer *peer; local 2081 struct ieee802_1x_kay_peer *peer; local 2194 struct ieee802_1x_kay_peer *peer; local 2344 struct ieee802_1x_kay_peer *peer, *pre_peer; local 3394 struct ieee802_1x_kay_peer *peer; local [all...] |
/external/wpa_supplicant_8/src/pae/ |
H A D | ieee802_1x_kay.c | 166 mi = body->peer + i; 291 struct ieee802_1x_kay_peer *peer; local 293 dl_list_for_each(peer, peers, struct ieee802_1x_kay_peer, list) { 294 if (os_memcmp(peer->mi, mi, MI_LEN) == 0) 295 return peer; 343 struct ieee802_1x_kay_peer *peer; local 345 peer = get_peer_mi(&participant->live_peers, mi); 346 if (peer) 347 return peer; 391 struct ieee802_1x_kay_peer *peer; local 519 struct ieee802_1x_kay_peer *peer; local 563 struct ieee802_1x_kay_peer *peer; local 595 struct ieee802_1x_kay_peer *peer; local 710 struct ieee802_1x_kay_peer *peer; local 803 struct ieee802_1x_kay_peer *peer; local 822 struct ieee802_1x_kay_peer *peer; local 864 struct ieee802_1x_kay_peer *peer; local 883 struct ieee802_1x_kay_peer *peer; local 984 struct ieee802_1x_kay_peer *peer; local 1237 struct ieee802_1x_kay_peer *peer; local 1516 struct ieee802_1x_kay_peer *peer; local 1944 struct ieee802_1x_kay_peer *peer; local 2081 struct ieee802_1x_kay_peer *peer; local 2194 struct ieee802_1x_kay_peer *peer; local 2344 struct ieee802_1x_kay_peer *peer, *pre_peer; local 3394 struct ieee802_1x_kay_peer *peer; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/pae/ |
H A D | ieee802_1x_kay.c | 166 mi = body->peer + i; 291 struct ieee802_1x_kay_peer *peer; local 293 dl_list_for_each(peer, peers, struct ieee802_1x_kay_peer, list) { 294 if (os_memcmp(peer->mi, mi, MI_LEN) == 0) 295 return peer; 343 struct ieee802_1x_kay_peer *peer; local 345 peer = get_peer_mi(&participant->live_peers, mi); 346 if (peer) 347 return peer; 391 struct ieee802_1x_kay_peer *peer; local 519 struct ieee802_1x_kay_peer *peer; local 563 struct ieee802_1x_kay_peer *peer; local 595 struct ieee802_1x_kay_peer *peer; local 710 struct ieee802_1x_kay_peer *peer; local 803 struct ieee802_1x_kay_peer *peer; local 822 struct ieee802_1x_kay_peer *peer; local 864 struct ieee802_1x_kay_peer *peer; local 883 struct ieee802_1x_kay_peer *peer; local 984 struct ieee802_1x_kay_peer *peer; local 1237 struct ieee802_1x_kay_peer *peer; local 1516 struct ieee802_1x_kay_peer *peer; local 1944 struct ieee802_1x_kay_peer *peer; local 2081 struct ieee802_1x_kay_peer *peer; local 2194 struct ieee802_1x_kay_peer *peer; local 2344 struct ieee802_1x_kay_peer *peer, *pre_peer; local 3394 struct ieee802_1x_kay_peer *peer; local [all...] |
/external/iptables/libipq/ |
H A D | libipq.c | 77 { IPQ_ERR_ADDRLEN, "Invalid peer address length" }, 107 (struct sockaddr *)&h->peer, sizeof(h->peer)); 135 addrlen = sizeof(h->peer); 168 (struct sockaddr *)&h->peer, &addrlen); 173 if (addrlen != sizeof(h->peer)) { 177 if (h->peer.nl_pid != 0) { 248 memset(&h->peer, 0, sizeof(struct sockaddr_nl)); 249 h->peer.nl_family = AF_NETLINK; 250 h->peer [all...] |
/external/chromium_org/chrome/renderer/extensions/ |
H A D | extension_localization_peer.cc | 19 content::RequestPeer* peer, 22 : original_peer_(peer), 33 content::RequestPeer* peer, 41 new ExtensionLocalizationPeer(peer, message_sender, request_url) : NULL; 18 ExtensionLocalizationPeer( content::RequestPeer* peer, IPC::Sender* message_sender, const GURL& request_url) argument 32 CreateExtensionLocalizationPeer( content::RequestPeer* peer, IPC::Sender* message_sender, const std::string& mime_type, const GURL& request_url) argument
|
/external/chromium_org/device/nfc/ |
H A D | nfc_adapter.cc | 59 void NfcAdapter::SetPeer(const std::string& identifier, NfcPeer* peer) { argument 61 VLOG(1) << "Peer object for peer \"" << identifier << "\" already exists."; 64 peers_[identifier] = peer; 81 VLOG(1) << "Peer object for peer \"" << identifier << "\" not found."; 84 NfcPeer* peer = iter->second; local 86 return peer;
|
/external/chromium_org/net/server/ |
H A D | http_server_request_info.h | 34 // Request peer address. 35 IPEndPoint peer; member in class:net::HttpServerRequestInfo
|