/external/chromium/net/base/ |
H A D | keygen_handler_nss.cc | 15 namespace psm = mozilla_security_manager; 37 return psm::GenKeyAndSignChallenge(key_size_in_bits_, challenge_, url_,
|
H A D | cert_database_nss.cc | 25 namespace psm = mozilla_security_manager; 31 psm::EnsurePKCS12Init(); 160 int result = psm::nsPKCS12Blob_Import(module->os_module_handle(), 173 return psm::nsPKCS12Blob_Export(output, certs, password); 203 bool success = psm::ImportCACerts(certificates, root, trust_bits, 213 return psm::ImportServerCert(certificates, not_imported); 224 psm::nsNSSCertTrust trust(&nsstrust); 242 bool success = psm::SetCertTrust(cert, type, trusted);
|
H A D | cert_database_nss_unittest.cc | 30 namespace psm = mozilla_security_manager; 210 psm::nsNSSCertTrust trust(cert->os_cert_handle()->trust); 242 psm::nsNSSCertTrust trust(cert->os_cert_handle()->trust); 273 psm::nsNSSCertTrust trust(cert->os_cert_handle()->trust); 459 psm::nsNSSCertTrust goog_trust(goog_cert->os_cert_handle()->trust); 484 psm::nsNSSCertTrust puny_trust(puny_cert->os_cert_handle()->trust);
|
/external/bluetooth/bluedroid/stack/l2cap/ |
H A D | l2c_ucd.c | 93 UINT16 psm; local 99 STREAM_TO_UINT16(psm, p) 104 if ((p_rcb = l2cu_find_rcb_by_psm (psm)) == NULL) 106 L2CAP_TRACE_ERROR1 ("L2CAP - no RCB for l2c_ucd_data_ind_cback, PSM: 0x%04x", psm); 139 is_congested, p_rcb->psm, 202 BOOLEAN L2CA_UcdRegister ( UINT16 psm, tL2CAP_UCD_CB_INFO *p_cb_info ) argument 206 L2CAP_TRACE_API1 ("L2CA_UcdRegister() PSM: 0x%04x", psm); 211 L2CAP_TRACE_ERROR1 ("L2CAP - no callback registering PSM(0x%04x) on UCD", psm); 215 if ((p_rcb = l2cu_find_rcb_by_psm (psm)) == NULL) 217 L2CAP_TRACE_ERROR1 ("L2CAP - no RCB for L2CA_UcdRegister, PSM: 0x%04x", psm); 326 L2CA_UcdDiscover( UINT16 psm, BD_ADDR rem_bda, UINT8 info_type ) argument 392 L2CA_UcdDataWrite(UINT16 psm, BD_ADDR rem_bda, BT_HDR *p_buf, UINT16 flags) argument 755 UINT16 psm; local 832 UINT16 psm; local [all...] |
H A D | l2c_api.c | 52 UINT16 L2CA_Register (UINT16 psm, tL2CAP_APPL_INFO *p_cb_info) argument 55 UINT16 vpsm = psm; 57 L2CAP_TRACE_API1 ("L2CAP - L2CA_Register() called for PSM: 0x%04x", psm); 69 L2CAP_TRACE_ERROR1 ("L2CAP - no cb registering PSM: 0x%04x", psm); 74 if (L2C_INVALID_PSM(psm)) 76 L2CAP_TRACE_ERROR1 ("L2CAP - invalid PSM value, PSM: 0x%04x", psm); 82 if ( (psm >= 0x1001) && (p_cb_info->pL2CA_ConnectInd_Cb == NULL) ) 90 L2CAP_TRACE_API2 ("L2CA_Register - Real PSM: 0x%04x Virtual PSM: 0x%04x", psm, vpsm); 98 L2CAP_TRACE_WARNING2 ("L2CAP - no RCB available, PSM: 0x%04x vPSM: 0x%04x", psm, vpsm); 104 p_rcb->real_psm = psm; 121 L2CA_Deregister(UINT16 psm) argument 171 UINT16 psm = l2cb.dyn_psm; local 212 L2CA_ConnectReq(UINT16 psm, BD_ADDR p_bd_addr) argument 229 L2CA_ErtmConnectReq(UINT16 psm, BD_ADDR p_bd_addr, tL2CAP_ERTM_INFO *p_ertm_info) argument 861 L2CA_LocalLoopbackReq(UINT16 psm, UINT16 handle, BD_ADDR p_bd_addr) argument [all...] |
H A D | l2c_main.c | 63 void l2c_bcst_msg( BT_HDR *p_buf, UINT16 psm ) 98 UINT16_TO_STREAM (p, psm); 126 UINT16 l2cap_len, rcv_cid, psm; local 235 STREAM_TO_UINT16 (psm, p); 236 L2CAP_TRACE_DEBUG1( "GOT CONNECTIONLESS DATA PSM:%d", psm ) ; 238 if (psm == TCS_PSM_INTERCOM || psm == TCS_PSM_CORDLESS) 404 STREAM_TO_UINT16 (con_info.psm, p); 406 if ((p_rcb = l2cu_find_rcb_by_psm (con_info.psm)) == NULL) 408 L2CAP_TRACE_WARNING1 ("L2CAP - rcvd conn req for unknown PSM: %d", con_info.psm); [all...] |
H A D | l2c_csm.c | 169 btm_sec_l2cap_access_req (p_ccb->p_lcb->remote_bd_addr, p_ccb->p_rcb->psm, 207 if (btm_sec_l2cap_access_req (p_ccb->p_lcb->remote_bd_addr, p_ccb->p_rcb->psm, 264 if (btm_sec_l2cap_access_req (p_ccb->p_lcb->remote_bd_addr, p_ccb->p_rcb->psm, 334 btm_sec_l2cap_access_req (p_ccb->p_lcb->remote_bd_addr, p_ccb->p_rcb->psm, 436 p_ccb->p_rcb->psm, p_ccb->remote_id); 495 btm_sec_l2cap_access_req (p_ccb->p_lcb->remote_bd_addr, p_ccb->p_rcb->psm, 686 p_ccb->p_rcb->psm,
|
H A D | l2c_int.h | 264 UINT16 psm; member in struct:__anon1499 531 UINT16 psm; /* PSM of the connection */ member in struct:__anon1503 666 extern tL2C_RCB *l2cu_allocate_rcb (UINT16 psm); 667 extern tL2C_RCB *l2cu_find_rcb_by_psm (UINT16 psm);
|
/external/bluetooth/bluedroid/stack/include/ |
H A D | l2c_api.h | 123 #define L2C_INVALID_PSM(psm) (((psm) & 0x0101) != 0x0001) 124 #define L2C_IS_VALID_PSM(psm) (((psm) & 0x0101) == 0x0001) 350 L2C_API extern UINT16 L2CA_Register (UINT16 psm, tL2CAP_APPL_INFO *p_cb_info); 362 L2C_API extern void L2CA_Deregister (UINT16 psm); 388 L2C_API extern UINT16 L2CA_ConnectReq (UINT16 psm, BD_ADDR p_bd_addr); 417 L2C_API extern UINT16 L2CA_ErtmConnectReq (UINT16 psm, BD_ADDR p_bd_addr, 596 L2C_API extern UINT16 L2CA_LocalLoopbackReq (UINT16 psm, UINT16 handle, BD_ADDR p_bd_addr); 835 L2C_API extern BOOLEAN L2CA_UcdRegister ( UINT16 psm, tL2CAP_UCD_CB_INF [all...] |
/external/qemu/distrib/sdl-1.2.15/src/video/ps2gs/ |
H A D | SDL_gsvideo.c | 202 ((unsigned long long)image->psm << 56); 314 switch (vinfo.psm) { 322 SDL_SetError("Unknown console pixel format: %d", vinfo.psm); 325 vformat->BitsPerPixel = GS_pixelmasks[vinfo.psm].bpp; 326 vformat->Rmask = GS_pixelmasks[vinfo.psm].r; 327 vformat->Gmask = GS_pixelmasks[vinfo.psm].g; 328 vformat->Bmask = GS_pixelmasks[vinfo.psm].b; 428 (GS_pixelmasks[vinfo.psm].bpp != bpp) ) { 454 vinfo.psm = GS_formatmap[bpp/8]; 455 if ( vinfo.psm < [all...] |
H A D | SDL_gsyuv.c | 83 int fbp, fbw, psm; local 218 psm = screen_image.psm; 231 ((unsigned long long)psm << 56); 271 ((unsigned long long)psm << 20) + 403 if ( screen_image.psm == PS2_GS_PSMCT16 ) {
|
/external/bluetooth/bluedroid/stack/mcap/ |
H A D | mca_l2c.c | 148 void mca_l2c_cconn_ind_cback(BD_ADDR bd_addr, UINT16 lcid, UINT16 psm, UINT8 id) argument 150 tMCA_HANDLE handle = mca_handle_by_cpsm(psm); 158 MCA_TRACE_EVENT3 ("mca_l2c_cconn_ind_cback: lcid:x%x psm:x%x id:x%x", lcid, psm, id); 173 rc = btm_sec_mx_access_request (bd_addr, psm, FALSE, BTM_SEC_PROTO_MCA, 0, 224 void mca_l2c_dconn_ind_cback(BD_ADDR bd_addr, UINT16 lcid, UINT16 psm, UINT8 id) argument 226 tMCA_HANDLE handle = mca_handle_by_dpsm(psm); 235 MCA_TRACE_EVENT2 ("mca_l2c_dconn_ind_cback: lcid:x%x psm:x%x ", lcid, psm); 558 UINT16 mca_l2c_open_req(BD_ADDR bd_addr, UINT16 psm, cons argument [all...] |
H A D | mca_int.h | 304 extern tMCA_HANDLE mca_handle_by_cpsm(UINT16 psm); 305 extern tMCA_HANDLE mca_handle_by_dpsm(UINT16 psm); 328 extern void mca_l2c_cconn_ind_cback(BD_ADDR bd_addr, UINT16 lcid, UINT16 psm, UINT8 id); 329 extern void mca_l2c_dconn_ind_cback(BD_ADDR bd_addr, UINT16 lcid, UINT16 psm, UINT8 id);
|
H A D | mca_main.c | 68 tMCA_HANDLE mca_handle_by_cpsm(UINT16 psm) argument 76 if (p_rcb->p_cback && p_rcb->reg.ctrl_psm == psm) 95 tMCA_HANDLE mca_handle_by_dpsm(UINT16 psm) argument 103 if (p_rcb->p_cback && p_rcb->reg.data_psm == psm)
|
/external/chromium/chrome/common/net/ |
H A D | x509_certificate_model_nss.cc | 24 namespace psm = mozilla_security_manager; 58 return psm::GetOIDText(&algorithm_id->algorithm); 69 psm::ProcessExtensionData(SECOID_FindOIDTag(&extension->id), 123 return psm::GetCertTokenName(cert_handle); 135 return psm::GetCertType(cert_handle); 146 psm::GetCertUsageStrings(cert_handle, usages); 154 key_usage_str = psm::ProcessKeyUsageBitString(&key_usage, ','); 209 return psm::GetCertTitle(cert_handle); 213 return psm::ProcessName(&cert_handle->issuer); 217 return psm [all...] |
/external/bluetooth/bluedroid/stack/gap/ |
H A D | gap_conn.c | 32 static void gap_connect_ind (BD_ADDR bd_addr, UINT16 l2cap_cid, UINT16 psm, UINT8 l2cap_id); 107 ** psm - the PSM used for the connection 122 BD_ADDR p_rem_bda, UINT16 psm, tL2CAP_CFG_INFO *p_cfg, 178 if ((p_ccb->psm = L2CA_REGISTER (psm, &gap_cb.conn.reg_info, AMP_AUTOSWITCH_ALLOWED|AMP_USE_AMP_IF_POSSIBLE)) == 0) 180 GAP_TRACE_ERROR1 ("GAP_ConnOpen: Failure registering PSM 0x%04x", psm); 187 if (!BTM_SetSecurityLevel ((UINT8)!is_server, p_serv_name, p_ccb->service_id, security, p_ccb->psm, 0, 0)) 226 if (p_rem_bda && ((cid = L2CA_CONNECT_REQ (p_ccb->psm, p_rem_bda, &p_ccb->ertm_info, &bt_uuid)) != 0)) 726 static void gap_connect_ind (BD_ADDR bd_addr, UINT16 l2cap_cid, UINT16 psm, UINT8 l2cap_id) argument 736 && (p_ccb->psm 121 GAP_ConnOpen(char *p_serv_name, UINT8 service_id, BOOLEAN is_server, BD_ADDR p_rem_bda, UINT16 psm, tL2CAP_CFG_INFO *p_cfg, UINT16 security, UINT8 chan_mode_mask, tGAP_CONN_CALLBACK *p_cb) argument 1167 UINT16 psm = p_ccb->psm; local [all...] |
H A D | gap_int.h | 95 UINT16 psm; member in struct:__anon1129
|
/external/bluetooth/bluedroid/stack/btm/ |
H A D | btm_sec.c | 50 static tBTM_SEC_SERV_REC *btm_sec_find_first_serv (BOOLEAN is_originator, UINT16 psm); 52 static tBTM_SEC_SERV_REC *btm_sec_find_mx_serv (UINT8 is_originator, UINT16 psm, 71 static BOOLEAN btm_sec_queue_mx_request (BD_ADDR bd_addr, UINT16 psm, BOOLEAN is_orig, 85 UINT16 sec_level, UINT16 psm, UINT32 mx_proto_id, 412 ** psm - L2CAP PSM 420 UINT16 sec_level, UINT16 psm, UINT32 mx_proto_id, 432 sec_level, psm, mx_proto_id, mx_chan_id)); 450 ** psm - L2CAP PSM 458 UINT16 sec_level, UINT16 psm, UINT32 mx_proto_id, 470 sec_level, psm, mx_proto_i 419 BTM_SetUCDSecurityLevel(BOOLEAN is_originator, char *p_name, UINT8 service_id, UINT16 sec_level, UINT16 psm, UINT32 mx_proto_id, UINT32 mx_chan_id) argument 457 BTM_SetSecurityLevel(BOOLEAN is_originator, char *p_name, UINT8 service_id, UINT16 sec_level, UINT16 psm, UINT32 mx_proto_id, UINT32 mx_chan_id) argument 496 btm_sec_set_security_level(CONNECTION_TYPE conn_type, char *p_name, UINT8 service_id, UINT16 sec_level, UINT16 psm, UINT32 mx_proto_id, UINT32 mx_chan_id) argument 757 btm_sec_clr_service_by_psm(UINT16 psm) argument 2082 btm_sec_l2cap_access_req(BD_ADDR bd_addr, UINT16 psm, UINT16 handle, CONNECTION_TYPE conn_type, tBTM_SEC_CALLBACK *p_callback, void *p_ref_data) argument 2404 btm_sec_mx_access_request(BD_ADDR bd_addr, UINT16 psm, BOOLEAN is_originator, UINT32 mx_proto_id, UINT32 mx_chan_id, tBTM_SEC_CALLBACK *p_callback, void *p_ref_data) argument 5292 btm_sec_find_first_serv(CONNECTION_TYPE conn_type, UINT16 psm) argument 5365 btm_sec_find_mx_serv(UINT8 is_originator, UINT16 psm, UINT32 mx_proto_id, UINT32 mx_chan_id) argument 5667 btm_sec_queue_mx_request(BD_ADDR bd_addr, UINT16 psm, BOOLEAN is_orig, UINT32 mx_proto_id, UINT32 mx_chan_id, tBTM_SEC_CALLBACK *p_callback, void *p_ref_data) argument [all...] |
H A D | btm_int.h | 452 UINT16 psm; /* L2CAP PSM value */ member in struct:__anon1109 713 UINT16 psm; member in struct:__anon1124 1081 extern tBTM_STATUS btm_sec_l2cap_access_req (BD_ADDR bd_addr, UINT16 psm, 1084 extern tBTM_STATUS btm_sec_mx_access_request (BD_ADDR bd_addr, UINT16 psm, BOOLEAN is_originator, 1135 extern UINT8 btm_sec_clr_service_by_psm (UINT16 psm);
|
/external/qemu/hw/ |
H A D | bt-l2cap.c | 98 int psm; member in struct:bt_l2cap_psm_s 389 struct bt_l2cap_device_s *device, int psm) 393 while (ret && ret->psm != psm) 400 int psm, int source_cid) 409 psm_info = l2cap_psm(l2cap->dev, psm); 744 int psm, int source_cid) 746 struct l2cap_chan_s *ch = l2cap_channel_open(l2cap, psm, source_cid); 826 le16_to_cpu(((l2cap_conn_req *) params)->psm), 1344 void bt_l2cap_psm_register(struct bt_l2cap_device_s *dev, int psm, in argument 388 l2cap_psm( struct bt_l2cap_device_s *device, int psm) argument 399 l2cap_channel_open(struct l2cap_instance_s *l2cap, int psm, int source_cid) argument 743 l2cap_channel_open_req_msg(struct l2cap_instance_s *l2cap, int psm, int source_cid) argument [all...] |
/external/bluetooth/bluedroid/stack/avct/ |
H A D | avct_l2c.c | 38 void avct_l2c_connect_ind_cback(BD_ADDR bd_addr, UINT16 lcid, UINT16 psm, UINT8 id); 103 void avct_l2c_connect_ind_cback(BD_ADDR bd_addr, UINT16 lcid, UINT16 psm, UINT8 id) argument
|
/external/bluetooth/bluedroid/stack/rfcomm/ |
H A D | rfc_l2cap_if.c | 39 static void RFCOMM_ConnectInd (BD_ADDR bd_addr, UINT16 lcid, UINT16 psm, UINT8 id); 87 void RFCOMM_ConnectInd (BD_ADDR bd_addr, UINT16 lcid, UINT16 psm, UINT8 id) argument
|
/external/bluetooth/bluedroid/stack/avdt/ |
H A D | avdt_l2c.c | 38 void avdt_l2c_connect_ind_cback(BD_ADDR bd_addr, UINT16 lcid, UINT16 psm, UINT8 id); 170 void avdt_l2c_connect_ind_cback(BD_ADDR bd_addr, UINT16 lcid, UINT16 psm, UINT8 id) argument
|
/external/bluetooth/bluedroid/stack/hid/ |
H A D | hidh_conn.c | 52 UINT16 psm, UINT8 l2cap_id); 200 static void hidh_l2cif_connect_ind (BD_ADDR bd_addr, UINT16 l2cap_cid, UINT16 psm, UINT8 l2cap_id) argument 207 HIDH_TRACE_EVENT2 ("HID - Rcvd L2CAP conn ind, PSM: 0x%04x CID 0x%x", psm, l2cap_cid); 225 if (psm == HID_PSM_INTERRUPT) 258 if (psm == HID_PSM_CONTROL) 287 HIDH_TRACE_EVENT2 ("HID - Rcvd L2CAP conn ind, sent config req, PSM: 0x%04x CID 0x%x", psm, l2cap_cid);
|
/external/bluetooth/bluedroid/stack/sdp/ |
H A D | sdp_main.c | 55 static void sdp_connect_ind (BD_ADDR bd_addr, UINT16 l2cap_cid, UINT16 psm, 171 static void sdp_connect_ind (BD_ADDR bd_addr, UINT16 l2cap_cid, UINT16 psm, UINT8 l2cap_id) argument
|