/external/bluetooth/bluedroid/stack/pan/ |
D | pan_main.c | 100 tPAN_CONN *pcb; in pan_conn_ind_cb() local 238 pcb = pan_get_pcb_by_handle (handle); in pan_conn_ind_cb() 239 if (pcb) in pan_conn_ind_cb() 252 if (pcb->con_state == PAN_STATE_CONNECTED) in pan_conn_ind_cb() 257 pcb->prv_src_uuid = pcb->src_uuid; in pan_conn_ind_cb() 258 pcb->prv_dst_uuid = pcb->dst_uuid; in pan_conn_ind_cb() 260 if (pcb->src_uuid == UUID_SERVCLASS_NAP && in pan_conn_ind_cb() 265 (*pan_cb.pan_bridge_req_cb) (pcb->rem_bda, FALSE); in pan_conn_ind_cb() 270 pcb->src_uuid = local_uuid->uu.uuid16; in pan_conn_ind_cb() 271 pcb->dst_uuid = remote_uuid->uu.uuid16; in pan_conn_ind_cb() [all …]
|
D | pan_api.c | 299 tPAN_CONN *pcb; in PAN_Connect() local 327 pcb = pan_get_pcb_by_addr (rem_bda); in PAN_Connect() 332 if ((pan_cb.num_conns > 1) || (pan_cb.num_conns && (!pcb))) in PAN_Connect() 364 if (pan_cb.num_conns && pan_cb.active_role == PAN_ROLE_CLIENT && !pcb) in PAN_Connect() 392 if (!pcb) in PAN_Connect() 393 pcb = pan_allocate_pcb (rem_bda, BNEP_INVALID_HANDLE); in PAN_Connect() 394 if (!pcb) in PAN_Connect() 403 if (pcb->con_state == PAN_STATE_IDLE) in PAN_Connect() 407 else if (pcb->con_state == PAN_STATE_CONNECTED) in PAN_Connect() 409 pcb->con_flags |= PAN_FLAGS_CONN_COMPLETED; in PAN_Connect() [all …]
|
D | pan_utils.c | 189 if (pan_cb.pcb[i].con_state != PAN_STATE_IDLE && in pan_allocate_pcb() 190 pan_cb.pcb[i].handle == handle) in pan_allocate_pcb() 196 if (pan_cb.pcb[i].con_state != PAN_STATE_IDLE && in pan_allocate_pcb() 197 memcmp (pan_cb.pcb[i].rem_bda, p_bda, BD_ADDR_LEN) == 0) in pan_allocate_pcb() 203 if (pan_cb.pcb[i].con_state == PAN_STATE_IDLE) in pan_allocate_pcb() 205 memset (&(pan_cb.pcb[i]), 0, sizeof (tPAN_CONN)); in pan_allocate_pcb() 206 memcpy (pan_cb.pcb[i].rem_bda, p_bda, BD_ADDR_LEN); in pan_allocate_pcb() 207 pan_cb.pcb[i].handle = handle; in pan_allocate_pcb() 208 return &(pan_cb.pcb[i]); in pan_allocate_pcb() 230 if (pan_cb.pcb[i].con_state != PAN_STATE_IDLE && in pan_get_pcb_by_handle() [all …]
|
D | pan_int.h | 75 tPAN_CONN pcb[MAX_PAN_CONNS]; member
|
/external/openssl/crypto/dh/ |
D | dh_pmeth.c | 165 BN_GENCB *pcb, cb; in pkey_dh_paramgen() local 169 pcb = &cb; in pkey_dh_paramgen() 170 evp_pkey_set_cb_translate(pcb, ctx); in pkey_dh_paramgen() 173 pcb = NULL; in pkey_dh_paramgen() 178 dctx->prime_len, dctx->generator, pcb); in pkey_dh_paramgen()
|
/external/smack/src/org/jivesoftware/smack/ |
D | XMPPConnection.java | 809 PasswordCallback pcb = null; in proceedTLSReceived() local 817 pcb = null; in proceedTLSReceived() 827 pcb = new PasswordCallback("PKCS11 Password: ",false); in proceedTLSReceived() 828 this.config.getCallbackHandler().handle(new Callback[]{pcb}); in proceedTLSReceived() 829 ks.load(null,pcb.getPassword()); in proceedTLSReceived() 833 pcb = null; in proceedTLSReceived() 845 pcb = new PasswordCallback("Keystore Password: ",false); in proceedTLSReceived() 846 config.getCallbackHandler().handle(new Callback[]{pcb}); in proceedTLSReceived() 847 ks.load(new FileInputStream(config.getKeystorePath()), pcb.getPassword()); in proceedTLSReceived() 851 pcb = null; in proceedTLSReceived() [all …]
|
D | NonSASLAuthentication.java | 49 PasswordCallback pcb = new PasswordCallback("Password: ",false); in authenticate() local 51 cbh.handle(new Callback[]{pcb}); in authenticate() 52 return authenticate(username, String.valueOf(pcb.getPassword()),resource); in authenticate()
|
/external/openssl/crypto/dsa/ |
D | dsa_pmeth.c | 245 BN_GENCB *pcb, cb; in pkey_dsa_paramgen() local 249 pcb = &cb; in pkey_dsa_paramgen() 250 evp_pkey_set_cb_translate(pcb, ctx); in pkey_dsa_paramgen() 253 pcb = NULL; in pkey_dsa_paramgen() 258 NULL, 0, NULL, NULL, NULL, pcb); in pkey_dsa_paramgen()
|
/external/smack/src/org/apache/qpid/management/common/sasl/ |
D | UserPasswordCallbackHandler.java | 51 PasswordCallback pcb = (PasswordCallback) callbacks[i]; in handle() local 52 pcb.setPassword(pwchars); in handle()
|
D | UsernameHashedPasswordCallbackHandler.java | 56 PasswordCallback pcb = (PasswordCallback) callbacks[i]; in handle() local 57 pcb.setPassword(pwchars); in handle()
|
/external/openssl/crypto/rsa/ |
D | rsa_pmeth.c | 662 BN_GENCB *pcb, cb; in pkey_rsa_keygen() local 675 pcb = &cb; in pkey_rsa_keygen() 676 evp_pkey_set_cb_translate(pcb, ctx); in pkey_rsa_keygen() 679 pcb = NULL; in pkey_rsa_keygen() 680 ret = RSA_generate_key_ex(rsa, rctx->nbits, rctx->pub_exp, pcb); in pkey_rsa_keygen()
|
/external/bluetooth/bluedroid/btif/include/ |
D | btif_hl.h | 209 btif_hl_pending_chan_cb_t pcb; member 306 #define BTIF_HL_GET_PCB_PTR(app_idx, mcl_idx) &(btif_hl_cb.acb[app_idx].mcb[mcl_idx].pcb)
|
/external/libnfc-nci/src/include/ |
D | bt_trace.h | 1300 #define HSP2_TRACE_ERROR0(pcb,m) {if (pcb->trace_level >= BT_TRACE_LEVEL_ERROR)… argument 1301 #define HSP2_TRACE_ERROR1(pcb,m,p1) {if (pcb->trace_level >= BT_TRACE_LEVEL_ERROR)… argument 1302 #define HSP2_TRACE_ERROR2(pcb,m,p1,p2) {if (pcb->trace_level >= BT_TRACE_LEVEL_ERROR)… argument 1303 #define HSP2_TRACE_ERROR3(pcb,m,p1,p2,p3) {if (pcb->trace_level >= BT_TRACE_LEVEL_ERROR)… argument 1304 #define HSP2_TRACE_ERROR4(pcb,m,p1,p2,p3,p4) {if (pcb->trace_level >= BT_TRACE_LEVEL_ERROR)… argument 1305 #define HSP2_TRACE_ERROR5(pcb,m,p1,p2,p3,p4,p5) {if (pcb->trace_level >= BT_TRACE_LEVEL_ERROR)… argument 1306 #define HSP2_TRACE_ERROR6(pcb,m,p1,p2,p3,p4,p5,p6) {if (pcb->trace_level >= BT_TRACE_LEVEL_ERROR)… argument 1308 #define HSP2_TRACE_WARNING0(pcb,m) {if (pcb->trace_level >= BT_TRACE_LEVEL_WARNIN… argument 1309 #define HSP2_TRACE_WARNING1(pcb,m,p1) {if (pcb->trace_level >= BT_TRACE_LEVEL_WARNIN… argument 1310 #define HSP2_TRACE_WARNING2(pcb,m,p1,p2) {if (pcb->trace_level >= BT_TRACE_LEVEL_WARNIN… argument [all …]
|
/external/smack/src/org/jivesoftware/smack/sasl/ |
D | SASLMechanism.java | 177 PasswordCallback pcb = (PasswordCallback)callbacks[i]; in handle() local 178 pcb.setPassword(password.toCharArray()); in handle()
|
/external/bluetooth/bluedroid/btif/src/ |
D | btif_hl.c | 204 p_mcb->is_connected && p_mcb->pcb.channel_id == channel_id ) in btif_hl_if_channel_setup_pending() 887 p_mcb->pcb.abort_pending = TRUE; in btif_hl_dch_abort() 3450 pending_op = p_mcb->pcb.op; in btif_hl_upstreams_evt() 3501 pending_op = p_mcb->pcb.op; in btif_hl_upstreams_evt() 3544 pending_op = p_mcb->pcb.op; in btif_hl_upstreams_evt() 3649 pending_op = p_mcb->pcb.op; in btif_hl_upstreams_evt() 4361 if (p_mcb->pcb.in_use) in btif_hl_save_mdl_cfg() 4362 *p_channel_id = p_mcb->pcb.channel_id; in btif_hl_save_mdl_cfg() 4365 p_mdl->extra.mdep_cfg_idx = p_mcb->pcb.mdep_cfg_idx; in btif_hl_save_mdl_cfg() 4366 …p_mdl->extra.data_type = p_acb->sup_feature.mdep[p_mcb->pcb.mdep_cfg_idx].mdep_cfg.data_cfg[0].dat… in btif_hl_save_mdl_cfg() [all …]
|
/external/pdfium/core/src/fxge/Microsoft SDK/include/ |
D | GdiPlusImaging.h | 86 OUT UINT *pcb
|
/external/bluetooth/bluedroid/bta/jv/ |
D | bta_jv_act.c | 2079 static int find_rfc_pcb(void* user_data, tBTA_JV_RFC_CB **cb, tBTA_JV_PCB **pcb) in find_rfc_pcb() argument 2082 *pcb = NULL; in find_rfc_pcb() 2090 *pcb = &bta_jv_cb.port_cb[i]; in find_rfc_pcb() 2093 " 0x%x, state: %d, rfc_cb->handle: 0x%x", rfc_handle, (*pcb)->handle, in find_rfc_pcb() 2094 (*pcb)->state, (*cb)->handle); in find_rfc_pcb()
|
/external/llvm/test/Analysis/ScalarEvolution/ |
D | avoid-infinite-recursion-1.ll | 107 %struct.pcb = type opaque 138 …ruct.file*, i32, i32, %struct.osd, i8, i8, i8, i8, i8, i8, i8, i8, %struct.pcb*, i32, i8, i8, i8, …
|
/external/owasp/sanitizer/tools/findbugs/lib/ |
D | findbugs.jar | META-INF/
META-INF/MANIFEST.MF
default.xsl
edu/
edu/umd ... |
/external/chromium_org/third_party/WebKit/PerformanceTests/Parser/resources/ |
D | final-url-en | 28471 http://www.bluewatersys.com/consulting/doc/tools/pcb.php 39789 http://www.epa.gov/opptintr/pcb/effects.html
|