/external/chromium_org/net/base/ |
keygen_handler_nss.cc | 13 // PSM = Mozilla's Personal Security Manager. 14 namespace psm = mozilla_security_manager; 37 return psm::GenKeyAndSignChallenge(key_size_in_bits_, challenge_, url_,
|
/external/bluetooth/bluedroid/stack/l2cap/ |
l2c_ucd.c | 93 UINT16 psm; local 99 STREAM_TO_UINT16(psm, p) 104 if ((p_rcb = l2cu_find_rcb_by_psm (psm)) == NULL) 106 L2CAP_TRACE_ERROR ("L2CAP - no RCB for l2c_ucd_data_ind_cback, PSM: 0x%04x", psm); 138 L2CAP_TRACE_DEBUG ("L2CAP - Calling UCDCongestionStatus_Cb (%d), PSM=0x%04x, BDA: %08x%04x,", 139 is_congested, p_rcb->psm, 195 ** Description Register PSM on UCD. 202 BOOLEAN L2CA_UcdRegister ( UINT16 psm, tL2CAP_UCD_CB_INFO *p_cb_info ) 206 L2CAP_TRACE_API ("L2CA_UcdRegister() PSM: 0x%04x", psm) 755 UINT16 psm; local 832 UINT16 psm; local [all...] |
l2c_api.c | 45 ** Returns PSM to use or zero if error. Typically, the PSM returned 47 ** connection to a dynamic PSM, a "virtual" PSM is returned 52 UINT16 L2CA_Register (UINT16 psm, tL2CAP_APPL_INFO *p_cb_info) 55 UINT16 vpsm = psm; 57 L2CAP_TRACE_API ("L2CAP - L2CA_Register() called for PSM: 0x%04x", psm); 69 L2CAP_TRACE_ERROR ("L2CAP - no cb registering PSM: 0x%04x", psm); 171 UINT16 psm = l2cb.dyn_psm; local [all...] |
l2c_main.c | 63 void l2c_bcst_msg( BT_HDR *p_buf, UINT16 psm ) 98 UINT16_TO_STREAM (p, psm); 126 UINT16 l2cap_len, rcv_cid, psm; local 235 STREAM_TO_UINT16 (psm, p); 236 L2CAP_TRACE_DEBUG( "GOT CONNECTIONLESS DATA PSM:%d", psm ) ; 238 if (psm == TCS_PSM_INTERCOM || psm == TCS_PSM_CORDLESS) 435 STREAM_TO_UINT16 (con_info.psm, p); 437 if ((p_rcb = l2cu_find_rcb_by_psm (con_info.psm)) == NULL [all...] |
l2c_csm.c | 169 btm_sec_l2cap_access_req (p_ccb->p_lcb->remote_bd_addr, p_ccb->p_rcb->psm, 207 if (btm_sec_l2cap_access_req (p_ccb->p_lcb->remote_bd_addr, p_ccb->p_rcb->psm, 264 if (btm_sec_l2cap_access_req (p_ccb->p_lcb->remote_bd_addr, p_ccb->p_rcb->psm, 334 btm_sec_l2cap_access_req (p_ccb->p_lcb->remote_bd_addr, p_ccb->p_rcb->psm, 436 p_ccb->p_rcb->psm, p_ccb->remote_id); 495 btm_sec_l2cap_access_req (p_ccb->p_lcb->remote_bd_addr, p_ccb->p_rcb->psm, 686 p_ccb->p_rcb->psm, [all...] |
l2c_int.h | 265 UINT16 psm; member in struct:__anon6287 267 /* this is the real PSM that we need to connect to */ 537 UINT16 psm; /* PSM of the connection */ member in struct:__anon6291 [all...] |
/external/qemu/distrib/sdl-1.2.15/src/video/ps2gs/ |
SDL_gsvideo.c | 202 ((unsigned long long)image->psm << 56); 314 switch (vinfo.psm) { 322 SDL_SetError("Unknown console pixel format: %d", vinfo.psm); 325 vformat->BitsPerPixel = GS_pixelmasks[vinfo.psm].bpp; 326 vformat->Rmask = GS_pixelmasks[vinfo.psm].r; 327 vformat->Gmask = GS_pixelmasks[vinfo.psm].g; 328 vformat->Bmask = GS_pixelmasks[vinfo.psm].b; 428 (GS_pixelmasks[vinfo.psm].bpp != bpp) ) { 454 vinfo.psm = GS_formatmap[bpp/8]; 455 if ( vinfo.psm < 0 ) [all...] |
SDL_gsyuv.c | 83 int fbp, fbw, psm; local 218 psm = screen_image.psm; 231 ((unsigned long long)psm << 56); 271 ((unsigned long long)psm << 20) + 403 if ( screen_image.psm == PS2_GS_PSMCT16 ) {
|
/external/chromium_org/chrome/common/net/ |
x509_certificate_model_nss.cc | 25 namespace psm = mozilla_security_manager; 59 return psm::GetOIDText(&algorithm_id->algorithm); 69 return criticality + "\n" + psm::ProcessExtensionData(extension); 119 return psm::GetCertTokenName(cert_handle); 134 return psm::GetCertType(cert_handle); 139 psm::GetCertUsageStrings(cert_handle, usages); 191 return psm::GetCertTitle(cert_handle); 195 return psm::ProcessName(&cert_handle->issuer); 199 return psm::ProcessName(&cert_handle->subject); 210 extension.name = psm::GetOIDText(&cert_handle->extensions[i]->id) [all...] |
/external/bluetooth/bluedroid/stack/include/ |
l2c_api.h | 40 /* Minimum offset for broadcast needs another two bytes for the PSM */ 119 /* Validity check for PSM. PSM values must be odd. Also, all PSM values must 123 #define L2C_INVALID_PSM(psm) (((psm) & 0x0101) != 0x0001) 124 #define L2C_IS_VALID_PSM(psm) (((psm) & 0x0101) == 0x0001) 184 ** PSM that the remote wants to connect to 343 ** Returns PSM to use or zero if error. Typically, the PSM returne [all...] |
/external/bluetooth/bluedroid/stack/mcap/ |
mca_l2c.c | 153 void mca_l2c_cconn_ind_cback(BD_ADDR bd_addr, UINT16 lcid, UINT16 psm, UINT8 id) 155 tMCA_HANDLE handle = mca_handle_by_cpsm(psm); 163 MCA_TRACE_EVENT ("mca_l2c_cconn_ind_cback: lcid:x%x psm:x%x id:x%x", lcid, psm, id); 178 rc = btm_sec_mx_access_request (bd_addr, psm, FALSE, BTM_SEC_PROTO_MCA, 0, 229 void mca_l2c_dconn_ind_cback(BD_ADDR bd_addr, UINT16 lcid, UINT16 psm, UINT8 id) 231 tMCA_HANDLE handle = mca_handle_by_dpsm(psm); 240 MCA_TRACE_EVENT ("mca_l2c_dconn_ind_cback: lcid:x%x psm:x%x ", lcid, psm); 563 UINT16 mca_l2c_open_req(BD_ADDR bd_addr, UINT16 psm, const tMCA_CHNL_CFG *p_chnl_cfg [all...] |
mca_int.h | 212 UINT16 ctrl_vpsm; /* The virtual PSM that peer is listening for control channel */ 213 UINT16 data_vpsm; /* The virtual PSM that peer is listening for data channel. */ 304 extern tMCA_HANDLE mca_handle_by_cpsm(UINT16 psm); 305 extern tMCA_HANDLE mca_handle_by_dpsm(UINT16 psm); 325 extern UINT16 mca_l2c_open_req(BD_ADDR bd_addr, UINT16 PSM, const tMCA_CHNL_CFG *p_chnl_cfg); 328 extern void mca_l2c_cconn_ind_cback(BD_ADDR bd_addr, UINT16 lcid, UINT16 psm, UINT8 id); 329 extern void mca_l2c_dconn_ind_cback(BD_ADDR bd_addr, UINT16 lcid, UINT16 psm, UINT8 id);
|
mca_main.c | 63 ** channel PSM. 0, if not found. 68 tMCA_HANDLE mca_handle_by_cpsm(UINT16 psm) 76 if (p_rcb->p_cback && p_rcb->reg.ctrl_psm == psm) 90 ** channel PSM. 0, if not found. 95 tMCA_HANDLE mca_handle_by_dpsm(UINT16 psm) 103 if (p_rcb->p_cback && p_rcb->reg.data_psm == psm)
|
/external/chromium_org/device/bluetooth/ |
bluetooth_l2cap_channel_mac.h | 36 BluetoothL2CAPPSM psm,
|
/external/chromium_org/extensions/browser/api/bluetooth_socket/ |
bluetooth_socket_api.cc | 33 const char kInvalidPsmError[] = "Invalid PSM"; 89 // Returns |true| if |psm| is a valid PSM. 90 // Per the Bluetooth specification, the PSM field must be at least two octets in 93 bool IsValidPsm(int psm) { 94 if (psm <= 0) 98 while (psm > 0) { 99 octets.push_back(psm & 0xFF); 100 psm = psm >> 8 422 int psm = *options->psm; local [all...] |
/external/bluetooth/bluedroid/stack/gap/ |
gap_conn.c | 33 static void gap_connect_ind (BD_ADDR bd_addr, UINT16 l2cap_cid, UINT16 psm, UINT8 l2cap_id); 108 ** psm - the PSM used for the connection 123 BD_ADDR p_rem_bda, UINT16 psm, tL2CAP_CFG_INFO *p_cfg, 165 /* If originator, use a dynamic PSM */ 178 /* Register the PSM with L2CAP */ 179 if ((p_ccb->psm = L2CA_REGISTER (psm, &gap_cb.conn.reg_info, AMP_AUTOSWITCH_ALLOWED|AMP_USE_AMP_IF_POSSIBLE)) == 0) 181 GAP_TRACE_ERROR ("GAP_ConnOpen: Failure registering PSM 0x%04x", psm); 1170 UINT16 psm = p_ccb->psm; local [all...] |
gap_int.h | 95 UINT16 psm; member in struct:__anon5892
|
/external/chromium_org/chromeos/dbus/ |
bluetooth_profile_manager_client.h | 50 // PSM number. 51 scoped_ptr<uint16> psm; member in struct:chromeos::BluetoothProfileManagerClient::Options
|
bluetooth_profile_manager_client.cc | 97 // Send PSM if provided. 98 if (options.psm.get() != NULL) { 102 dict_writer.AppendVariantOfUint16(*(options.psm));
|
/external/chromium_org/net/cert/ |
nss_cert_database.cc | 35 // PSM = Mozilla's Personal Security Manager. 36 namespace psm = mozilla_security_manager; 94 psm::EnsurePKCS12Init(); 190 int result = psm::nsPKCS12Blob_Import(module->os_module_handle(), 205 return psm::nsPKCS12Blob_Export(output, certs, password); 236 bool success = psm::ImportCACerts( 248 return psm::ImportServerCert( 355 bool success = psm::SetCertTrust(cert, type, trust_bits);
|
/external/bluetooth/bluedroid/stack/btm/ |
btm_sec.c | 52 static tBTM_SEC_SERV_REC *btm_sec_find_first_serv (BOOLEAN is_originator, UINT16 psm); 54 static tBTM_SEC_SERV_REC *btm_sec_find_mx_serv (UINT8 is_originator, UINT16 psm, 73 static BOOLEAN btm_sec_queue_mx_request (BD_ADDR bd_addr, UINT16 psm, BOOLEAN is_orig, 88 UINT16 sec_level, UINT16 psm, UINT32 mx_proto_id, 520 ** psm - L2CAP PSM 528 UINT16 sec_level, UINT16 psm, UINT32 mx_proto_id, 540 sec_level, psm, mx_proto_id, mx_chan_id)); 546 UNUSED(psm); 565 ** psm - L2CAP PS [all...] |
/external/bluetooth/bluedroid/stack/avct/ |
avct_l2c.c | 39 void avct_l2c_connect_ind_cback(BD_ADDR bd_addr, UINT16 lcid, UINT16 psm, UINT8 id); 104 void avct_l2c_connect_ind_cback(BD_ADDR bd_addr, UINT16 lcid, UINT16 psm, UINT8 id) 109 UNUSED(psm);
|
/external/bluetooth/bluedroid/stack/rfcomm/ |
rfc_l2cap_if.c | 40 static void RFCOMM_ConnectInd (BD_ADDR bd_addr, UINT16 lcid, UINT16 psm, UINT8 id); 88 void RFCOMM_ConnectInd (BD_ADDR bd_addr, UINT16 lcid, UINT16 psm, UINT8 id) 91 UNUSED(psm);
|
/external/bluetooth/bluedroid/stack/avdt/ |
avdt_l2c.c | 39 void avdt_l2c_connect_ind_cback(BD_ADDR bd_addr, UINT16 lcid, UINT16 psm, UINT8 id); 175 void avdt_l2c_connect_ind_cback(BD_ADDR bd_addr, UINT16 lcid, UINT16 psm, UINT8 id) 182 UNUSED(psm);
|
/external/bluetooth/bluedroid/stack/sdp/ |
sdp_main.c | 56 static void sdp_connect_ind (BD_ADDR bd_addr, UINT16 l2cap_cid, UINT16 psm, 172 static void sdp_connect_ind (BD_ADDR bd_addr, UINT16 l2cap_cid, UINT16 psm, UINT8 l2cap_id) 174 UNUSED(psm);
|