HomeSort by relevance Sort by last modified time
    Searched refs:psm (Results 1 - 25 of 34) sorted by null

1 2

  /external/chromium/net/base/
keygen_handler_nss.cc 14 // PSM = Mozilla's Personal Security Manager.
15 namespace psm = mozilla_security_manager;
37 return psm::GenKeyAndSignChallenge(key_size_in_bits_, challenge_, url_,
cert_database_nss.cc 24 // PSM = Mozilla's Personal Security Manager.
25 namespace psm = mozilla_security_manager;
31 psm::EnsurePKCS12Init();
160 int result = psm::nsPKCS12Blob_Import(module->os_module_handle(),
173 return psm::nsPKCS12Blob_Export(output, certs, password);
203 bool success = psm::ImportCACerts(certificates, root, trust_bits,
213 return psm::ImportServerCert(certificates, not_imported);
224 psm::nsNSSCertTrust trust(&nsstrust);
242 bool success = psm::SetCertTrust(cert, type, trusted);
cert_database_nss_unittest.cc 30 namespace psm = mozilla_security_manager;
210 psm::nsNSSCertTrust trust(cert->os_cert_handle()->trust);
242 psm::nsNSSCertTrust trust(cert->os_cert_handle()->trust);
273 psm::nsNSSCertTrust trust(cert->os_cert_handle()->trust);
459 psm::nsNSSCertTrust goog_trust(goog_cert->os_cert_handle()->trust);
484 psm::nsNSSCertTrust puny_trust(puny_cert->os_cert_handle()->trust);
  /external/bluetooth/bluedroid/stack/l2cap/
l2c_ucd.c 93 UINT16 psm; local
99 STREAM_TO_UINT16(psm, p)
104 if ((p_rcb = l2cu_find_rcb_by_psm (psm)) == NULL)
106 L2CAP_TRACE_ERROR1 ("L2CAP - no RCB for l2c_ucd_data_ind_cback, PSM: 0x%04x", psm);
138 L2CAP_TRACE_DEBUG4 ("L2CAP - Calling UCDCongestionStatus_Cb (%d), PSM=0x%04x, BDA: %08x%04x,",
139 is_congested, p_rcb->psm,
195 ** Description Register PSM on UCD.
202 BOOLEAN L2CA_UcdRegister ( UINT16 psm, tL2CAP_UCD_CB_INFO *p_cb_info )
206 L2CAP_TRACE_API1 ("L2CA_UcdRegister() PSM: 0x%04x", psm)
755 UINT16 psm; local
832 UINT16 psm; local
    [all...]
l2c_api.c 45 ** Returns PSM to use or zero if error. Typically, the PSM returned
47 ** connection to a dynamic PSM, a "virtual" PSM is returned
52 UINT16 L2CA_Register (UINT16 psm, tL2CAP_APPL_INFO *p_cb_info)
55 UINT16 vpsm = psm;
57 L2CAP_TRACE_API1 ("L2CAP - L2CA_Register() called for PSM: 0x%04x", psm);
69 L2CAP_TRACE_ERROR1 ("L2CAP - no cb registering PSM: 0x%04x", psm);
171 UINT16 psm = l2cb.dyn_psm; local
    [all...]
l2c_main.c 63 void l2c_bcst_msg( BT_HDR *p_buf, UINT16 psm )
98 UINT16_TO_STREAM (p, psm);
126 UINT16 l2cap_len, rcv_cid, psm; local
235 STREAM_TO_UINT16 (psm, p);
236 L2CAP_TRACE_DEBUG1( "GOT CONNECTIONLESS DATA PSM:%d", psm ) ;
238 if (psm == TCS_PSM_INTERCOM || psm == TCS_PSM_CORDLESS)
404 STREAM_TO_UINT16 (con_info.psm, p);
406 if ((p_rcb = l2cu_find_rcb_by_psm (con_info.psm)) == NULL
    [all...]
l2c_csm.c 169 btm_sec_l2cap_access_req (p_ccb->p_lcb->remote_bd_addr, p_ccb->p_rcb->psm,
207 if (btm_sec_l2cap_access_req (p_ccb->p_lcb->remote_bd_addr, p_ccb->p_rcb->psm,
264 if (btm_sec_l2cap_access_req (p_ccb->p_lcb->remote_bd_addr, p_ccb->p_rcb->psm,
334 btm_sec_l2cap_access_req (p_ccb->p_lcb->remote_bd_addr, p_ccb->p_rcb->psm,
436 p_ccb->p_rcb->psm, p_ccb->remote_id);
495 btm_sec_l2cap_access_req (p_ccb->p_lcb->remote_bd_addr, p_ccb->p_rcb->psm,
686 p_ccb->p_rcb->psm,
    [all...]
l2c_int.h 264 UINT16 psm; member in struct:__anon2948
266 /* this is the real PSM that we need to connect to */
531 UINT16 psm; /* PSM of the connection */ member in struct:__anon2952
666 extern tL2C_RCB *l2cu_allocate_rcb (UINT16 psm);
667 extern tL2C_RCB *l2cu_find_rcb_by_psm (UINT16 psm);
    [all...]
  /external/qemu/distrib/sdl-1.2.15/src/video/ps2gs/
SDL_gsvideo.c 202 ((unsigned long long)image->psm << 56);
314 switch (vinfo.psm) {
322 SDL_SetError("Unknown console pixel format: %d", vinfo.psm);
325 vformat->BitsPerPixel = GS_pixelmasks[vinfo.psm].bpp;
326 vformat->Rmask = GS_pixelmasks[vinfo.psm].r;
327 vformat->Gmask = GS_pixelmasks[vinfo.psm].g;
328 vformat->Bmask = GS_pixelmasks[vinfo.psm].b;
428 (GS_pixelmasks[vinfo.psm].bpp != bpp) ) {
454 vinfo.psm = GS_formatmap[bpp/8];
455 if ( vinfo.psm < 0 )
    [all...]
SDL_gsyuv.c 83 int fbp, fbw, psm; local
218 psm = screen_image.psm;
231 ((unsigned long long)psm << 56);
271 ((unsigned long long)psm << 20) +
403 if ( screen_image.psm == PS2_GS_PSMCT16 ) {
  /external/bluetooth/bluedroid/stack/include/
l2c_api.h 40 /* Minimum offset for broadcast needs another two bytes for the PSM */
119 /* Validity check for PSM. PSM values must be odd. Also, all PSM values must
123 #define L2C_INVALID_PSM(psm) (((psm) & 0x0101) != 0x0001)
124 #define L2C_IS_VALID_PSM(psm) (((psm) & 0x0101) == 0x0001)
194 ** PSM that the remote wants to connect to
353 ** Returns PSM to use or zero if error. Typically, the PSM returne
    [all...]
  /external/chromium/chrome/common/net/
x509_certificate_model_nss.cc 24 namespace psm = mozilla_security_manager;
58 return psm::GetOIDText(&algorithm_id->algorithm);
69 psm::ProcessExtensionData(SECOID_FindOIDTag(&extension->id),
123 return psm::GetCertTokenName(cert_handle);
135 return psm::GetCertType(cert_handle);
146 psm::GetCertUsageStrings(cert_handle, usages);
154 key_usage_str = psm::ProcessKeyUsageBitString(&key_usage, ',');
209 return psm::GetCertTitle(cert_handle);
213 return psm::ProcessName(&cert_handle->issuer);
217 return psm::ProcessName(&cert_handle->subject)
    [all...]
  /external/bluetooth/bluedroid/stack/mcap/
mca_l2c.c 34 void mca_l2c_cconn_ind_cback(BD_ADDR bd_addr, UINT16 lcid, UINT16 psm, UINT8 id);
35 void mca_l2c_dconn_ind_cback(BD_ADDR bd_addr, UINT16 lcid, UINT16 psm, UINT8 id);
155 void mca_l2c_cconn_ind_cback(BD_ADDR bd_addr, UINT16 lcid, UINT16 psm, UINT8 id)
157 tMCA_HANDLE handle = mca_handle_by_cpsm(psm);
165 MCA_TRACE_EVENT3 ("mca_l2c_cconn_ind_cback: lcid:x%x psm:x%x id:x%x", lcid, psm, id);
180 rc = btm_sec_mx_access_request (bd_addr, psm, FALSE, BTM_SEC_PROTO_MCA, 0,
231 void mca_l2c_dconn_ind_cback(BD_ADDR bd_addr, UINT16 lcid, UINT16 psm, UINT8 id)
233 tMCA_HANDLE handle = mca_handle_by_dpsm(psm);
242 MCA_TRACE_EVENT2 ("mca_l2c_dconn_ind_cback: lcid:x%x psm:x%x ", lcid, psm)
    [all...]
mca_int.h 212 UINT16 ctrl_vpsm; /* The virtual PSM that peer is listening for control channel */
213 UINT16 data_vpsm; /* The virtual PSM that peer is listening for data channel. */
304 extern tMCA_HANDLE mca_handle_by_cpsm(UINT16 psm);
305 extern tMCA_HANDLE mca_handle_by_dpsm(UINT16 psm);
325 extern void mca_l2c_cconn_ind_cback(BD_ADDR bd_addr, UINT16 lcid, UINT16 psm, UINT8 id);
326 extern void mca_l2c_dconn_ind_cback(BD_ADDR bd_addr, UINT16 lcid, UINT16 psm, UINT8 id);
327 extern UINT16 mca_l2c_open_req(BD_ADDR bd_addr, UINT16 PSM, const tMCA_CHNL_CFG *p_chnl_cfg);
mca_main.c 63 ** channel PSM. 0, if not found.
68 tMCA_HANDLE mca_handle_by_cpsm(UINT16 psm)
76 if (p_rcb->p_cback && p_rcb->reg.ctrl_psm == psm)
90 ** channel PSM. 0, if not found.
95 tMCA_HANDLE mca_handle_by_dpsm(UINT16 psm)
103 if (p_rcb->p_cback && p_rcb->reg.data_psm == psm)
  /external/bluetooth/bluedroid/stack/btm/
btm_sec.c 50 static tBTM_SEC_SERV_REC *btm_sec_find_first_serv (BOOLEAN is_originator, UINT16 psm);
52 static tBTM_SEC_SERV_REC *btm_sec_find_mx_serv (UINT8 is_originator, UINT16 psm,
71 static BOOLEAN btm_sec_queue_mx_request (BD_ADDR bd_addr, UINT16 psm, BOOLEAN is_orig,
85 UINT16 sec_level, UINT16 psm, UINT32 mx_proto_id,
412 ** psm - L2CAP PSM
420 UINT16 sec_level, UINT16 psm, UINT32 mx_proto_id,
432 sec_level, psm, mx_proto_id, mx_chan_id));
450 ** psm - L2CAP PSM
    [all...]
btm_int.h 430 UINT16 psm; /* L2CAP PSM value */ member in struct:__anon2575
684 UINT16 psm; member in struct:__anon2590
    [all...]
  /external/qemu/hw/
bt-l2cap.c 98 int psm; member in struct:bt_l2cap_psm_s
389 struct bt_l2cap_device_s *device, int psm)
393 while (ret && ret->psm != psm)
400 int psm, int source_cid)
409 psm_info = l2cap_psm(l2cap->dev, psm);
744 int psm, int source_cid)
746 struct l2cap_chan_s *ch = l2cap_channel_open(l2cap, psm, source_cid);
826 le16_to_cpu(((l2cap_conn_req *) params)->psm),
    [all...]
  /external/bluetooth/bluedroid/stack/avct/
avct_l2c.c 38 void avct_l2c_connect_ind_cback(BD_ADDR bd_addr, UINT16 lcid, UINT16 psm, UINT8 id);
103 void avct_l2c_connect_ind_cback(BD_ADDR bd_addr, UINT16 lcid, UINT16 psm, UINT8 id)
  /external/bluetooth/bluedroid/stack/rfcomm/
rfc_l2cap_if.c 39 static void RFCOMM_ConnectInd (BD_ADDR bd_addr, UINT16 lcid, UINT16 psm, UINT8 id);
87 void RFCOMM_ConnectInd (BD_ADDR bd_addr, UINT16 lcid, UINT16 psm, UINT8 id)
  /system/bluetooth/bluez-clean-headers/bluetooth/
l2cap.h 96 uint16_t psm; member in struct:__anon43967
  /external/bluetooth/bluedroid/stack/avdt/
avdt_l2c.c 38 void avdt_l2c_connect_ind_cback(BD_ADDR bd_addr, UINT16 lcid, UINT16 psm, UINT8 id);
170 void avdt_l2c_connect_ind_cback(BD_ADDR bd_addr, UINT16 lcid, UINT16 psm, UINT8 id)
  /external/bluetooth/bluedroid/stack/hid/
hidh_conn.c 52 UINT16 psm, UINT8 l2cap_id);
200 static void hidh_l2cif_connect_ind (BD_ADDR bd_addr, UINT16 l2cap_cid, UINT16 psm, UINT8 l2cap_id)
207 HIDH_TRACE_EVENT2 ("HID - Rcvd L2CAP conn ind, PSM: 0x%04x CID 0x%x", psm, l2cap_cid);
225 if (psm == HID_PSM_INTERRUPT)
258 if (psm == HID_PSM_CONTROL)
287 HIDH_TRACE_EVENT2 ("HID - Rcvd L2CAP conn ind, sent config req, PSM: 0x%04x CID 0x%x", psm, l2cap_cid);
    [all...]
  /external/bluetooth/bluedroid/bta/jv/
bta_jv_act.c 368 p_cb->psm = 0;
446 ** Description for now use only the legal PSM per JSR82 spec
451 BOOLEAN bta_jv_check_psm(UINT16 psm)
455 if(L2C_IS_VALID_PSM(psm) )
457 if(psm < 0x1001)
460 switch(psm)
    [all...]
  /external/bluetooth/bluedroid/stack/sdp/
sdp_main.c 55 static void sdp_connect_ind (BD_ADDR bd_addr, UINT16 l2cap_cid, UINT16 psm,
171 static void sdp_connect_ind (BD_ADDR bd_addr, UINT16 l2cap_cid, UINT16 psm, UINT8 l2cap_id)

Completed in 569 milliseconds

1 2