/external/chromium_org/third_party/mesa/src/src/egl/drivers/dri2/ |
H A D | egl_dri2.h | 120 xcb_connection_t *conn; member in struct:dri2_egl_display
|
/external/mesa3d/src/egl/drivers/dri2/ |
H A D | egl_dri2.h | 120 xcb_connection_t *conn; member in struct:dri2_egl_display
|
/external/ppp/pppd/plugins/rp-pppoe/ |
H A D | if.c | 526 sendPacket(PPPoEConnection *conn, int sock, PPPoEPacket *pkt, int size) argument 579 if (!conn) { 582 strcpy(sa.sa_data, conn->ifName);
|
H A D | pppoe.h | 274 PPPoEConnection *conn; member in struct:PacketCriteria 284 int sendPacket(PPPoEConnection *conn, int sock, PPPoEPacket *pkt, int size); 294 void syncReadFromPPP(PPPoEConnection *conn, PPPoEPacket *packet); 295 void asyncReadFromPPP(PPPoEConnection *conn, PPPoEPacket *packet); 296 void asyncReadFromEth(PPPoEConnection *conn, int sock, int clampMss); 297 void syncReadFromEth(PPPoEConnection *conn, int sock, int clampMss); 299 void sendPADT(PPPoEConnection *conn, char const *msg); 300 void sendSessionPacket(PPPoEConnection *conn, 306 void discovery(PPPoEConnection *conn);
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | tls_nss.c | 75 struct tls_connection *conn = (struct tls_connection *) fd->secret; local 80 if (conn->pull_buf == NULL) { 85 end = conn->pull_buf + conn->pull_buf_len; 86 if (end - conn->pull_buf_offset < amount) 87 amount = end - conn->pull_buf_offset; 88 os_memcpy(buf, conn->pull_buf_offset, amount); 89 conn->pull_buf_offset += amount; 90 if (conn->pull_buf_offset == end) { 92 os_free(conn 107 struct tls_connection *conn = (struct tls_connection *) fd->secret; local 288 struct tls_connection *conn = arg; local 318 struct tls_connection *conn = client_data; local 326 struct tls_connection *conn; local 366 tls_connection_deinit(void *tls_ctx, struct tls_connection *conn) argument 375 tls_connection_established(void *tls_ctx, struct tls_connection *conn) argument 381 tls_connection_shutdown(void *tls_ctx, struct tls_connection *conn) argument 387 tls_connection_set_params(void *tls_ctx, struct tls_connection *conn, const struct tls_connection_params *params) argument 408 tls_connection_set_verify(void *tls_ctx, struct tls_connection *conn, int verify_peer) argument 416 tls_connection_get_keys(void *tls_ctx, struct tls_connection *conn, struct tls_keys *keys) argument 424 tls_connection_prf(void *tls_ctx, struct tls_connection *conn, const char *label, int server_random_first, u8 *out, size_t out_len) argument 446 tls_connection_handshake(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data, struct wpabuf **appl_data) argument 493 tls_connection_server_handshake(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data, struct wpabuf **appl_data) argument 502 tls_connection_encrypt(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data) argument 528 tls_connection_decrypt(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data) argument 572 tls_connection_resumed(void *tls_ctx, struct tls_connection *conn) argument 578 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument 585 tls_get_cipher(void *tls_ctx, struct tls_connection *conn, char *buf, size_t buflen) argument 592 tls_connection_enable_workaround(void *tls_ctx, struct tls_connection *conn) argument 599 tls_connection_client_hello_ext(void *tls_ctx, struct tls_connection *conn, int ext_type, const u8 *data, size_t data_len) argument 607 tls_connection_get_failed(void *tls_ctx, struct tls_connection *conn) argument 613 tls_connection_get_read_alerts(void *tls_ctx, struct tls_connection *conn) argument 619 tls_connection_get_write_alerts(void *tls_ctx, struct tls_connection *conn) argument 626 tls_connection_get_keyblock_size(void *tls_ctx, struct tls_connection *conn) argument 639 tls_connection_set_session_ticket_cb(void *tls_ctx, struct tls_connection *conn, tls_session_ticket_cb cb, void *ctx) argument [all...] |
H A D | tls_schannel.c | 118 struct tls_connection *conn; local 120 conn = os_zalloc(sizeof(*conn)); 121 if (conn == NULL) 123 conn->start = 1; 125 return conn; 129 void tls_connection_deinit(void *ssl_ctx, struct tls_connection *conn) argument 131 if (conn == NULL) 134 os_free(conn); 138 int tls_connection_established(void *ssl_ctx, struct tls_connection *conn) argument 144 tls_connection_shutdown(void *ssl_ctx, struct tls_connection *conn) argument 173 tls_connection_set_verify(void *ssl_ctx, struct tls_connection *conn, int verify_peer) argument 180 tls_connection_get_keys(void *ssl_ctx, struct tls_connection *conn, struct tls_keys *keys) argument 188 tls_connection_prf(void *tls_ctx, struct tls_connection *conn, const char *label, int server_random_first, u8 *out, size_t out_len) argument 212 tls_conn_hs_clienthello(struct tls_global *global, struct tls_connection *conn) argument 283 tls_get_eap(struct tls_global *global, struct tls_connection *conn) argument 311 tls_connection_handshake(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data, struct wpabuf **appl_data) argument 458 tls_connection_server_handshake(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data, struct wpabuf **appl_data) argument 467 tls_connection_encrypt(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data) argument 549 tls_connection_decrypt(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data) argument 625 tls_connection_resumed(void *ssl_ctx, struct tls_connection *conn) argument 631 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument 638 tls_get_cipher(void *ssl_ctx, struct tls_connection *conn, char *buf, size_t buflen) argument 645 tls_connection_enable_workaround(void *ssl_ctx, struct tls_connection *conn) argument 652 tls_connection_client_hello_ext(void *ssl_ctx, struct tls_connection *conn, int ext_type, const u8 *data, size_t data_len) argument 660 tls_connection_get_failed(void *ssl_ctx, struct tls_connection *conn) argument 668 tls_connection_get_read_alerts(void *ssl_ctx, struct tls_connection *conn) argument 676 tls_connection_get_write_alerts(void *ssl_ctx, struct tls_connection *conn) argument 684 tls_connection_set_params(void *tls_ctx, struct tls_connection *conn, const struct tls_connection_params *params) argument [all...] |
H A D | tls_gnutls.c | 205 struct tls_connection *conn = (struct tls_connection *) ptr; local 207 if (conn->pull_buf == NULL) { 212 end = wpabuf_head_u8(conn->pull_buf) + wpabuf_len(conn->pull_buf); 213 if ((size_t) (end - conn->pull_buf_offset) < len) 214 len = end - conn->pull_buf_offset; 215 os_memcpy(buf, conn->pull_buf_offset, len); 216 conn->pull_buf_offset += len; 217 if (conn->pull_buf_offset == end) { 219 wpabuf_free(conn 234 struct tls_connection *conn = (struct tls_connection *) ptr; local 246 tls_gnutls_init_session(struct tls_global *global, struct tls_connection *conn) argument 304 struct tls_connection *conn; local 337 tls_connection_deinit(void *ssl_ctx, struct tls_connection *conn) argument 353 tls_connection_established(void *ssl_ctx, struct tls_connection *conn) argument 359 tls_connection_shutdown(void *ssl_ctx, struct tls_connection *conn) argument 504 tls_connection_set_params(void *tls_ctx, struct tls_connection *conn, const struct tls_connection_params *params) argument 735 tls_connection_set_verify(void *ssl_ctx, struct tls_connection *conn, int verify_peer) argument 750 tls_connection_get_keys(void *ssl_ctx, struct tls_connection *conn, struct tls_keys *keys) argument 787 tls_connection_prf(void *tls_ctx, struct tls_connection *conn, const char *label, int server_random_first, u8 *out, size_t out_len) argument 803 tls_connection_verify_peer(struct tls_connection *conn, gnutls_alert_description_t *err) argument 915 gnutls_get_appl_data(struct tls_connection *conn) argument 942 tls_connection_handshake(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data, struct wpabuf **appl_data) argument 1033 tls_connection_server_handshake(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data, struct wpabuf **appl_data) argument 1042 tls_connection_encrypt(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data) argument 1063 tls_connection_decrypt(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data) argument 1105 tls_connection_resumed(void *ssl_ctx, struct tls_connection *conn) argument 1113 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument 1121 tls_get_cipher(void *ssl_ctx, struct tls_connection *conn, char *buf, size_t buflen) argument 1130 tls_connection_enable_workaround(void *ssl_ctx, struct tls_connection *conn) argument 1138 tls_connection_client_hello_ext(void *ssl_ctx, struct tls_connection *conn, int ext_type, const u8 *data, size_t data_len) argument 1147 tls_connection_get_failed(void *ssl_ctx, struct tls_connection *conn) argument 1155 tls_connection_get_read_alerts(void *ssl_ctx, struct tls_connection *conn) argument 1163 tls_connection_get_write_alerts(void *ssl_ctx, struct tls_connection *conn) argument 1171 tls_connection_get_keyblock_size(void *tls_ctx, struct tls_connection *conn) argument 1185 tls_connection_set_session_ticket_cb(void *tls_ctx, struct tls_connection *conn, tls_session_ticket_cb cb, void *ctx) argument [all...] |
/external/wpa_supplicant_8/src/crypto/ |
H A D | tls_nss.c | 75 struct tls_connection *conn = (struct tls_connection *) fd->secret; local 80 if (conn->pull_buf == NULL) { 85 end = conn->pull_buf + conn->pull_buf_len; 86 if (end - conn->pull_buf_offset < amount) 87 amount = end - conn->pull_buf_offset; 88 os_memcpy(buf, conn->pull_buf_offset, amount); 89 conn->pull_buf_offset += amount; 90 if (conn->pull_buf_offset == end) { 92 os_free(conn 107 struct tls_connection *conn = (struct tls_connection *) fd->secret; local 288 struct tls_connection *conn = arg; local 318 struct tls_connection *conn = client_data; local 326 struct tls_connection *conn; local 366 tls_connection_deinit(void *tls_ctx, struct tls_connection *conn) argument 375 tls_connection_established(void *tls_ctx, struct tls_connection *conn) argument 381 tls_connection_shutdown(void *tls_ctx, struct tls_connection *conn) argument 387 tls_connection_set_params(void *tls_ctx, struct tls_connection *conn, const struct tls_connection_params *params) argument 408 tls_connection_set_verify(void *tls_ctx, struct tls_connection *conn, int verify_peer) argument 416 tls_connection_get_keys(void *tls_ctx, struct tls_connection *conn, struct tls_keys *keys) argument 424 tls_connection_prf(void *tls_ctx, struct tls_connection *conn, const char *label, int server_random_first, u8 *out, size_t out_len) argument 446 tls_connection_handshake(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data, struct wpabuf **appl_data) argument 493 tls_connection_server_handshake(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data, struct wpabuf **appl_data) argument 502 tls_connection_encrypt(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data) argument 528 tls_connection_decrypt(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data) argument 572 tls_connection_resumed(void *tls_ctx, struct tls_connection *conn) argument 578 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument 585 tls_get_cipher(void *tls_ctx, struct tls_connection *conn, char *buf, size_t buflen) argument 592 tls_connection_enable_workaround(void *tls_ctx, struct tls_connection *conn) argument 599 tls_connection_client_hello_ext(void *tls_ctx, struct tls_connection *conn, int ext_type, const u8 *data, size_t data_len) argument 607 tls_connection_get_failed(void *tls_ctx, struct tls_connection *conn) argument 613 tls_connection_get_read_alerts(void *tls_ctx, struct tls_connection *conn) argument 619 tls_connection_get_write_alerts(void *tls_ctx, struct tls_connection *conn) argument 626 tls_connection_get_keyblock_size(void *tls_ctx, struct tls_connection *conn) argument 639 tls_connection_set_session_ticket_cb(void *tls_ctx, struct tls_connection *conn, tls_session_ticket_cb cb, void *ctx) argument [all...] |
H A D | tls_schannel.c | 118 struct tls_connection *conn; local 120 conn = os_zalloc(sizeof(*conn)); 121 if (conn == NULL) 123 conn->start = 1; 125 return conn; 129 void tls_connection_deinit(void *ssl_ctx, struct tls_connection *conn) argument 131 if (conn == NULL) 134 os_free(conn); 138 int tls_connection_established(void *ssl_ctx, struct tls_connection *conn) argument 144 tls_connection_shutdown(void *ssl_ctx, struct tls_connection *conn) argument 173 tls_connection_set_verify(void *ssl_ctx, struct tls_connection *conn, int verify_peer) argument 180 tls_connection_get_keys(void *ssl_ctx, struct tls_connection *conn, struct tls_keys *keys) argument 188 tls_connection_prf(void *tls_ctx, struct tls_connection *conn, const char *label, int server_random_first, u8 *out, size_t out_len) argument 212 tls_conn_hs_clienthello(struct tls_global *global, struct tls_connection *conn) argument 283 tls_get_eap(struct tls_global *global, struct tls_connection *conn) argument 311 tls_connection_handshake(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data, struct wpabuf **appl_data) argument 458 tls_connection_server_handshake(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data, struct wpabuf **appl_data) argument 467 tls_connection_encrypt(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data) argument 549 tls_connection_decrypt(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data) argument 625 tls_connection_resumed(void *ssl_ctx, struct tls_connection *conn) argument 631 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument 638 tls_get_cipher(void *ssl_ctx, struct tls_connection *conn, char *buf, size_t buflen) argument 645 tls_connection_enable_workaround(void *ssl_ctx, struct tls_connection *conn) argument 652 tls_connection_client_hello_ext(void *ssl_ctx, struct tls_connection *conn, int ext_type, const u8 *data, size_t data_len) argument 660 tls_connection_get_failed(void *ssl_ctx, struct tls_connection *conn) argument 668 tls_connection_get_read_alerts(void *ssl_ctx, struct tls_connection *conn) argument 676 tls_connection_get_write_alerts(void *ssl_ctx, struct tls_connection *conn) argument 684 tls_connection_set_params(void *tls_ctx, struct tls_connection *conn, const struct tls_connection_params *params) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | tls_nss.c | 75 struct tls_connection *conn = (struct tls_connection *) fd->secret; local 80 if (conn->pull_buf == NULL) { 85 end = conn->pull_buf + conn->pull_buf_len; 86 if (end - conn->pull_buf_offset < amount) 87 amount = end - conn->pull_buf_offset; 88 os_memcpy(buf, conn->pull_buf_offset, amount); 89 conn->pull_buf_offset += amount; 90 if (conn->pull_buf_offset == end) { 92 os_free(conn 107 struct tls_connection *conn = (struct tls_connection *) fd->secret; local 288 struct tls_connection *conn = arg; local 318 struct tls_connection *conn = client_data; local 326 struct tls_connection *conn; local 366 tls_connection_deinit(void *tls_ctx, struct tls_connection *conn) argument 375 tls_connection_established(void *tls_ctx, struct tls_connection *conn) argument 381 tls_connection_shutdown(void *tls_ctx, struct tls_connection *conn) argument 387 tls_connection_set_params(void *tls_ctx, struct tls_connection *conn, const struct tls_connection_params *params) argument 408 tls_connection_set_verify(void *tls_ctx, struct tls_connection *conn, int verify_peer) argument 416 tls_connection_get_keys(void *tls_ctx, struct tls_connection *conn, struct tls_keys *keys) argument 424 tls_connection_prf(void *tls_ctx, struct tls_connection *conn, const char *label, int server_random_first, u8 *out, size_t out_len) argument 446 tls_connection_handshake(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data, struct wpabuf **appl_data) argument 493 tls_connection_server_handshake(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data, struct wpabuf **appl_data) argument 502 tls_connection_encrypt(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data) argument 528 tls_connection_decrypt(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data) argument 572 tls_connection_resumed(void *tls_ctx, struct tls_connection *conn) argument 578 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument 585 tls_get_cipher(void *tls_ctx, struct tls_connection *conn, char *buf, size_t buflen) argument 592 tls_connection_enable_workaround(void *tls_ctx, struct tls_connection *conn) argument 599 tls_connection_client_hello_ext(void *tls_ctx, struct tls_connection *conn, int ext_type, const u8 *data, size_t data_len) argument 607 tls_connection_get_failed(void *tls_ctx, struct tls_connection *conn) argument 613 tls_connection_get_read_alerts(void *tls_ctx, struct tls_connection *conn) argument 619 tls_connection_get_write_alerts(void *tls_ctx, struct tls_connection *conn) argument 626 tls_connection_get_keyblock_size(void *tls_ctx, struct tls_connection *conn) argument 639 tls_connection_set_session_ticket_cb(void *tls_ctx, struct tls_connection *conn, tls_session_ticket_cb cb, void *ctx) argument [all...] |
H A D | tls_schannel.c | 118 struct tls_connection *conn; local 120 conn = os_zalloc(sizeof(*conn)); 121 if (conn == NULL) 123 conn->start = 1; 125 return conn; 129 void tls_connection_deinit(void *ssl_ctx, struct tls_connection *conn) argument 131 if (conn == NULL) 134 os_free(conn); 138 int tls_connection_established(void *ssl_ctx, struct tls_connection *conn) argument 144 tls_connection_shutdown(void *ssl_ctx, struct tls_connection *conn) argument 173 tls_connection_set_verify(void *ssl_ctx, struct tls_connection *conn, int verify_peer) argument 180 tls_connection_get_keys(void *ssl_ctx, struct tls_connection *conn, struct tls_keys *keys) argument 188 tls_connection_prf(void *tls_ctx, struct tls_connection *conn, const char *label, int server_random_first, u8 *out, size_t out_len) argument 212 tls_conn_hs_clienthello(struct tls_global *global, struct tls_connection *conn) argument 283 tls_get_eap(struct tls_global *global, struct tls_connection *conn) argument 311 tls_connection_handshake(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data, struct wpabuf **appl_data) argument 458 tls_connection_server_handshake(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data, struct wpabuf **appl_data) argument 467 tls_connection_encrypt(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data) argument 549 tls_connection_decrypt(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data) argument 625 tls_connection_resumed(void *ssl_ctx, struct tls_connection *conn) argument 631 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument 638 tls_get_cipher(void *ssl_ctx, struct tls_connection *conn, char *buf, size_t buflen) argument 645 tls_connection_enable_workaround(void *ssl_ctx, struct tls_connection *conn) argument 652 tls_connection_client_hello_ext(void *ssl_ctx, struct tls_connection *conn, int ext_type, const u8 *data, size_t data_len) argument 660 tls_connection_get_failed(void *ssl_ctx, struct tls_connection *conn) argument 668 tls_connection_get_read_alerts(void *ssl_ctx, struct tls_connection *conn) argument 676 tls_connection_get_write_alerts(void *ssl_ctx, struct tls_connection *conn) argument 684 tls_connection_set_params(void *tls_ctx, struct tls_connection *conn, const struct tls_connection_params *params) argument [all...] |
/external/bluetooth/bluedroid/bta/av/ |
H A D | bta_av_act.c | 325 ccb.conn = role; 1157 ** Open an AVRCP acceptor channel, if new conn. 1799 BOOLEAN conn = FALSE; local 1859 conn = TRUE; 1863 if(!conn)
|
/external/bluetooth/bluedroid/bta/include/ |
H A D | bta_hf_client_api.h | 236 tBTA_HF_CLIENT_CONN conn; member in union:__anon814
|
H A D | bta_hh_api.h | 296 tBTA_HH_CONN conn; /* BTA_HH_OPEN_EVT */ member in union:__anon831
|
/external/bluetooth/bluedroid/btif/src/ |
H A D | btif_hh.c | 627 tBTA_HH_CONN conn; local 783 BTIF_TRACE_WARNING("%s: BTA_HH_OPN_EVT: handle=%d, status =%d",__FUNCTION__, p_data->conn.handle, p_data->conn.status); 784 if (p_data->conn.status == BTA_HH_OK) { 785 p_dev = btif_hh_find_connected_dev_by_handle(p_data->conn.handle); 787 BTIF_TRACE_WARNING("BTA_HH_OPEN_EVT: Error, cannot find device with handle %d", p_data->conn.handle); 791 BTA_HhClose(p_data->conn.handle); 792 HAL_CBACK(bt_hh_callbacks, connection_state_cb, (bt_bdaddr_t*) &p_data->conn.bda,BTHH_CONN_STATE_DISCONNECTED); 796 memcpy(&(p_dev->bd_addr), p_data->conn.bda, BD_ADDR_LEN); 799 BTA_HhClose(p_data->conn [all...] |
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/ |
H A D | p2ptransportchannel.cc | 602 void P2PTransportChannel::OnUseCandidate(Connection* conn) { argument 606 if (conn->write_state() == Connection::STATE_WRITABLE) { 607 if (best_connection_ != conn) { 609 SwitchBestConnectionTo(conn); 615 pending_best_connection_ = conn; 1006 void P2PTransportChannel::SwitchBestConnectionTo(Connection* conn) { argument 1007 // Note: if conn is NULL, the previous best_connection_ has been destroyed, 1010 best_connection_ = conn; 1119 Connection* conn = FindNextPingableConnection(); local 1120 if (conn) 1129 IsPingable(Connection* conn) argument 1187 PingConnection(Connection* conn) argument [all...] |
H A D | relayport.cc | 305 Connection * conn = new ProxyConnection(this, index, address); local 306 AddConnection(conn); 307 return conn; 397 if (Connection* conn = GetConnection(remote_addr)) { 398 conn->OnReadPacket(data, size, packet_time);
|
H A D | turnport.cc | 393 ProxyConnection* conn = new ProxyConnection(this, index, address); local 394 conn->SignalDestroyed.connect(this, &TurnPort::OnConnectionDestroyed); 395 AddConnection(conn); 396 return conn; 706 if (Connection* conn = GetConnection(remote_addr)) { 707 conn->OnReadPacket(data, size, packet_time); 816 void TurnPort::OnConnectionDestroyed(Connection* conn) { argument 818 DestroyEntry(conn->remote_candidate().address());
|
H A D | turnserver.cc | 79 rtc::Thread* thread, const Connection& conn, 84 Connection* conn() { return &conn_; } function in class:cricket::TurnServer::Allocation 291 Connection conn(addr, iter->second, socket); 295 HandleStunMessage(&conn, data, size); 298 Allocation* allocation = FindAllocation(&conn); 305 void TurnServer::HandleStunMessage(Connection* conn, const char* data, argument 316 HandleBindingRequest(conn, &msg); 322 if (redirect_hook_->ShouldRedirect(conn->src(), &address)) { 324 conn, &msg, address); 331 Allocation* allocation = FindAllocation(conn); 379 CheckAuthorization(Connection* conn, const StunMessage* msg, const char* data, size_t size, const std::string& key) argument 439 HandleBindingRequest(Connection* conn, const StunMessage* req) argument 453 HandleAllocateRequest(Connection* conn, const TurnMessage* msg, const std::string& key) argument 519 FindAllocation(Connection* conn) argument 524 CreateAllocation(Connection* conn, int proto, const std::string& key) argument 541 SendErrorResponse(Connection* conn, const StunMessage* req, int code, const std::string& reason) argument 551 SendErrorResponseWithRealmAndNonce( Connection* conn, const StunMessage* msg, int code, const std::string& reason) argument 563 SendErrorResponseWithAlternateServer( Connection* conn, const StunMessage* msg, const rtc::SocketAddress& addr) argument 574 SendStun(Connection* conn, StunMessage* msg) argument 585 Send(Connection* conn, const rtc::ByteBuffer& buf) argument 644 Allocation(TurnServer* server, rtc::Thread* thread, const Connection& conn, rtc::AsyncPacketSocket* socket, const std::string& key) argument [all...] |
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/org.apache.ant_1.7.1.v20090120-1145/lib/ |
H A D | ant-swing.jar | ... .net.URL url
java.net.URLConnection conn
Throwable ioe
ClassLoader cl
javax.swing.ImageIcon img ... |
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/org.eclipse.build.tools/src_bugzilla/org/eclipse/releng/services/bugzilla/ |
H A D | UpdateBugStateTask.java | 585 URLConnection conn = null; 588 conn = u.openConnection(); 594 HttpsURLConnection sconn = (HttpsURLConnection)conn; 631 private void sendStream(HttpsURLConnection conn, String req) argument 635 PrintWriter out = new PrintWriter(conn.getOutputStream()); 646 private String slurpStream(HttpsURLConnection conn) argument 651 BufferedReader in = new BufferedReader(new InputStreamReader(conn.getInputStream()));
|
/external/kernel-headers/original/uapi/rdma/ |
H A D | rdma_user_cm.h | 265 struct rdma_ucm_conn_param conn; member in union:rdma_ucm_event_resp::__anon23528
|
/external/qemu/proxy/ |
H A D | proxy_http_rewriter.c | 370 RewriteConnection* conn = (RewriteConnection*)root; local 372 if (conn->slirp_fd >= 0) { 373 socket_close(conn->slirp_fd); 374 conn->slirp_fd = -1; 376 http_request_free(conn->request); 378 g_free(conn); 383 rewrite_connection_init( RewriteConnection* conn ) 385 HttpService* service = (HttpService*) conn->root->service; 386 ProxyConnection* root = conn->root; 388 conn 514 rewrite_connection_read_headers( RewriteConnection* conn, int fd ) argument 618 rewrite_connection_get_body_length( RewriteConnection* conn, int is_request ) argument 703 rewrite_connection_read_body( RewriteConnection* conn, int fd ) argument 900 rewrite_connection_send_body( RewriteConnection* conn, int fd ) argument 943 RewriteConnection* conn = (RewriteConnection*)root; local 996 RewriteConnection* conn = (RewriteConnection*)root; local 1154 RewriteConnection* conn; local [all...] |
/external/smack/src/org/jivesoftware/smackx/muc/ |
H A D | MultiUserChat.java | 772 * @param conn the connection to use for sending the rejection. 777 public static void decline(Connection conn, String room, String inviter, String reason) { argument 789 conn.sendPacket(message); 796 * @param conn the connection where the listener will be applied. 799 public static void addInvitationListener(Connection conn, InvitationListener listener) { argument 800 InvitationsMonitor.getInvitationsMonitor(conn).addInvitationListener(listener); 807 * @param conn the connection where the listener was applied. 810 public static void removeInvitationListener(Connection conn, InvitationListener listener) { argument 811 InvitationsMonitor.getInvitationsMonitor(conn).removeInvitationListener(listener); 2595 * @param conn th 2598 getInvitationsMonitor(Connection conn) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | tncs.c | 422 TNC_ConnectionID conn, 432 res = imv->NotifyConnectionChange(imv->imvID, conn, state); 1087 struct tncs_data *prev, *conn; local 1096 conn = tncs_global_data->connections; 1097 while (conn) { 1098 if (conn == tncs) { 1105 prev = conn; 1106 conn = conn->next; 421 tncs_imv_notify_connection_change(struct tnc_if_imv *imv, TNC_ConnectionID conn, TNC_ConnectionState state) argument
|