/external/wpa_supplicant_8/src/radius/ |
D | radius_das.c | 35 int from_port) in radius_das_disconnect() argument 69 abuf, from_port); in radius_das_disconnect() 80 abuf, from_port); in radius_das_disconnect() 92 abuf, from_port); in radius_das_disconnect() 114 "'%s' from %s:%d", tmp, abuf, from_port); in radius_das_disconnect() 149 abuf, from_port); in radius_das_disconnect() 154 "%s:%d", abuf, from_port); in radius_das_disconnect() 160 abuf, from_port); in radius_das_disconnect() 198 int from_port = 0; in radius_das_receive() local 217 from_port = ntohs(from.sin.sin_port); in radius_das_receive() [all …]
|
D | radius_server.c | 931 const char *from_addr, int from_port) in radius_server_reject() argument 940 from_addr, from_port); in radius_server_reject() 992 const char *from_addr, int from_port, in radius_server_request() argument 1022 from_addr, from_port); in radius_server_request() 1030 from_addr, from_port); in radius_server_request() 1035 if (sess->last_from_port == from_port && in radius_server_request() 1101 sess->last_from_port = from_port; in radius_server_request() 1130 RADIUS_DEBUG("Reply to %s:%d", from_addr, from_port); in radius_server_request() 1161 sess->last_from_port = from_port; in radius_server_request() 1201 int from_port = 0; in radius_server_receive_auth() local [all …]
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/ec2/ |
D | securitygroup.py | 97 def add_rule(self, ip_protocol, from_port, to_port, argument 107 rule.from_port = from_port 118 def remove_rule(self, ip_protocol, from_port, to_port, argument 132 if rule.from_port == from_port: 146 def authorize(self, ip_protocol=None, from_port=None, to_port=None, argument 198 from_port, 208 self.add_rule(ip_protocol, from_port, to_port, src_group_name, 213 def revoke(self, ip_protocol=None, from_port=None, to_port=None, argument 238 from_port, 245 self.remove_rule(ip_protocol, from_port, to_port, src_group_name, [all …]
|
D | connection.py | 3043 from_port=None, to_port=None, argument 3088 if from_port: 3089 params['FromPort'] = from_port 3102 from_port=None, to_port=None, argument 3155 if from_port is None and to_port is None and ip_protocol is None: 3177 if from_port is not None: 3178 params['IpPermissions.1.FromPort'] = from_port 3196 from_port=None, argument 3217 if from_port is not None: 3218 params['IpPermissions.1.FromPort'] = from_port [all …]
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/vpc/ |
D | networkacl.py | 148 self.from_port = None 152 return 'PortRange:(%s-%s)' % ( self.from_port, self.to_port) 160 self.from_port = value
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/unit/ec2/ |
D | test_securitygroup.py | 196 from_port='80',
|
/external/avahi/avahi-compat-howl/include/corby/ |
D | channel.h | 135 sw_port * from_port);
|
/external/avahi/avahi-compat-howl/ |
D | unsupported.c | 853 AVAHI_GCC_UNUSED sw_port * from_port) { in sw_corby_channel_last_recv_from() argument
|