Home
last modified time | relevance | path

Searched refs:pcb (Results 1 – 20 of 20) sorted by relevance

/external/bluetooth/bluedroid/stack/pan/
Dpan_main.c100 tPAN_CONN *pcb; in pan_conn_ind_cb() local
238 pcb = pan_get_pcb_by_handle (handle); in pan_conn_ind_cb()
239 if (pcb) in pan_conn_ind_cb()
252 if (pcb->con_state == PAN_STATE_CONNECTED) in pan_conn_ind_cb()
257 pcb->prv_src_uuid = pcb->src_uuid; in pan_conn_ind_cb()
258 pcb->prv_dst_uuid = pcb->dst_uuid; in pan_conn_ind_cb()
260 if (pcb->src_uuid == UUID_SERVCLASS_NAP && in pan_conn_ind_cb()
265 (*pan_cb.pan_bridge_req_cb) (pcb->rem_bda, FALSE); in pan_conn_ind_cb()
270 pcb->src_uuid = local_uuid->uu.uuid16; in pan_conn_ind_cb()
271 pcb->dst_uuid = remote_uuid->uu.uuid16; in pan_conn_ind_cb()
[all …]
Dpan_api.c299 tPAN_CONN *pcb; in PAN_Connect() local
327 pcb = pan_get_pcb_by_addr (rem_bda); in PAN_Connect()
332 if ((pan_cb.num_conns > 1) || (pan_cb.num_conns && (!pcb))) in PAN_Connect()
364 if (pan_cb.num_conns && pan_cb.active_role == PAN_ROLE_CLIENT && !pcb) in PAN_Connect()
392 if (!pcb) in PAN_Connect()
393 pcb = pan_allocate_pcb (rem_bda, BNEP_INVALID_HANDLE); in PAN_Connect()
394 if (!pcb) in PAN_Connect()
403 if (pcb->con_state == PAN_STATE_IDLE) in PAN_Connect()
407 else if (pcb->con_state == PAN_STATE_CONNECTED) in PAN_Connect()
409 pcb->con_flags |= PAN_FLAGS_CONN_COMPLETED; in PAN_Connect()
[all …]
Dpan_utils.c189 if (pan_cb.pcb[i].con_state != PAN_STATE_IDLE && in pan_allocate_pcb()
190 pan_cb.pcb[i].handle == handle) in pan_allocate_pcb()
196 if (pan_cb.pcb[i].con_state != PAN_STATE_IDLE && in pan_allocate_pcb()
197 memcmp (pan_cb.pcb[i].rem_bda, p_bda, BD_ADDR_LEN) == 0) in pan_allocate_pcb()
203 if (pan_cb.pcb[i].con_state == PAN_STATE_IDLE) in pan_allocate_pcb()
205 memset (&(pan_cb.pcb[i]), 0, sizeof (tPAN_CONN)); in pan_allocate_pcb()
206 memcpy (pan_cb.pcb[i].rem_bda, p_bda, BD_ADDR_LEN); in pan_allocate_pcb()
207 pan_cb.pcb[i].handle = handle; in pan_allocate_pcb()
208 return &(pan_cb.pcb[i]); in pan_allocate_pcb()
230 if (pan_cb.pcb[i].con_state != PAN_STATE_IDLE && in pan_get_pcb_by_handle()
[all …]
Dpan_int.h75 tPAN_CONN pcb[MAX_PAN_CONNS]; member
/external/openssl/crypto/dh/
Ddh_pmeth.c165 BN_GENCB *pcb, cb; in pkey_dh_paramgen() local
169 pcb = &cb; in pkey_dh_paramgen()
170 evp_pkey_set_cb_translate(pcb, ctx); in pkey_dh_paramgen()
173 pcb = NULL; in pkey_dh_paramgen()
178 dctx->prime_len, dctx->generator, pcb); in pkey_dh_paramgen()
/external/smack/src/org/jivesoftware/smack/
DXMPPConnection.java809 PasswordCallback pcb = null; in proceedTLSReceived() local
817 pcb = null; in proceedTLSReceived()
827 pcb = new PasswordCallback("PKCS11 Password: ",false); in proceedTLSReceived()
828 this.config.getCallbackHandler().handle(new Callback[]{pcb}); in proceedTLSReceived()
829 ks.load(null,pcb.getPassword()); in proceedTLSReceived()
833 pcb = null; in proceedTLSReceived()
845 pcb = new PasswordCallback("Keystore Password: ",false); in proceedTLSReceived()
846 config.getCallbackHandler().handle(new Callback[]{pcb}); in proceedTLSReceived()
847 ks.load(new FileInputStream(config.getKeystorePath()), pcb.getPassword()); in proceedTLSReceived()
851 pcb = null; in proceedTLSReceived()
[all …]
DNonSASLAuthentication.java49 PasswordCallback pcb = new PasswordCallback("Password: ",false); in authenticate() local
51 cbh.handle(new Callback[]{pcb}); in authenticate()
52 return authenticate(username, String.valueOf(pcb.getPassword()),resource); in authenticate()
/external/openssl/crypto/dsa/
Ddsa_pmeth.c245 BN_GENCB *pcb, cb; in pkey_dsa_paramgen() local
249 pcb = &cb; in pkey_dsa_paramgen()
250 evp_pkey_set_cb_translate(pcb, ctx); in pkey_dsa_paramgen()
253 pcb = NULL; in pkey_dsa_paramgen()
258 NULL, 0, NULL, NULL, NULL, pcb); in pkey_dsa_paramgen()
/external/smack/src/org/apache/qpid/management/common/sasl/
DUserPasswordCallbackHandler.java51 PasswordCallback pcb = (PasswordCallback) callbacks[i]; in handle() local
52 pcb.setPassword(pwchars); in handle()
DUsernameHashedPasswordCallbackHandler.java56 PasswordCallback pcb = (PasswordCallback) callbacks[i]; in handle() local
57 pcb.setPassword(pwchars); in handle()
/external/openssl/crypto/rsa/
Drsa_pmeth.c662 BN_GENCB *pcb, cb; in pkey_rsa_keygen() local
675 pcb = &cb; in pkey_rsa_keygen()
676 evp_pkey_set_cb_translate(pcb, ctx); in pkey_rsa_keygen()
679 pcb = NULL; in pkey_rsa_keygen()
680 ret = RSA_generate_key_ex(rsa, rctx->nbits, rctx->pub_exp, pcb); in pkey_rsa_keygen()
/external/bluetooth/bluedroid/btif/include/
Dbtif_hl.h209 btif_hl_pending_chan_cb_t pcb; member
306 #define BTIF_HL_GET_PCB_PTR(app_idx, mcl_idx) &(btif_hl_cb.acb[app_idx].mcb[mcl_idx].pcb)
/external/libnfc-nci/src/include/
Dbt_trace.h1300 #define HSP2_TRACE_ERROR0(pcb,m) {if (pcb->trace_level >= BT_TRACE_LEVEL_ERROR)… argument
1301 #define HSP2_TRACE_ERROR1(pcb,m,p1) {if (pcb->trace_level >= BT_TRACE_LEVEL_ERROR)… argument
1302 #define HSP2_TRACE_ERROR2(pcb,m,p1,p2) {if (pcb->trace_level >= BT_TRACE_LEVEL_ERROR)… argument
1303 #define HSP2_TRACE_ERROR3(pcb,m,p1,p2,p3) {if (pcb->trace_level >= BT_TRACE_LEVEL_ERROR)… argument
1304 #define HSP2_TRACE_ERROR4(pcb,m,p1,p2,p3,p4) {if (pcb->trace_level >= BT_TRACE_LEVEL_ERROR)… argument
1305 #define HSP2_TRACE_ERROR5(pcb,m,p1,p2,p3,p4,p5) {if (pcb->trace_level >= BT_TRACE_LEVEL_ERROR)… argument
1306 #define HSP2_TRACE_ERROR6(pcb,m,p1,p2,p3,p4,p5,p6) {if (pcb->trace_level >= BT_TRACE_LEVEL_ERROR)… argument
1308 #define HSP2_TRACE_WARNING0(pcb,m) {if (pcb->trace_level >= BT_TRACE_LEVEL_WARNIN… argument
1309 #define HSP2_TRACE_WARNING1(pcb,m,p1) {if (pcb->trace_level >= BT_TRACE_LEVEL_WARNIN… argument
1310 #define HSP2_TRACE_WARNING2(pcb,m,p1,p2) {if (pcb->trace_level >= BT_TRACE_LEVEL_WARNIN… argument
[all …]
/external/smack/src/org/jivesoftware/smack/sasl/
DSASLMechanism.java177 PasswordCallback pcb = (PasswordCallback)callbacks[i]; in handle() local
178 pcb.setPassword(password.toCharArray()); in handle()
/external/bluetooth/bluedroid/btif/src/
Dbtif_hl.c204 p_mcb->is_connected && p_mcb->pcb.channel_id == channel_id ) in btif_hl_if_channel_setup_pending()
887 p_mcb->pcb.abort_pending = TRUE; in btif_hl_dch_abort()
3450 pending_op = p_mcb->pcb.op; in btif_hl_upstreams_evt()
3501 pending_op = p_mcb->pcb.op; in btif_hl_upstreams_evt()
3544 pending_op = p_mcb->pcb.op; in btif_hl_upstreams_evt()
3649 pending_op = p_mcb->pcb.op; in btif_hl_upstreams_evt()
4361 if (p_mcb->pcb.in_use) in btif_hl_save_mdl_cfg()
4362 *p_channel_id = p_mcb->pcb.channel_id; in btif_hl_save_mdl_cfg()
4365 p_mdl->extra.mdep_cfg_idx = p_mcb->pcb.mdep_cfg_idx; in btif_hl_save_mdl_cfg()
4366 …p_mdl->extra.data_type = p_acb->sup_feature.mdep[p_mcb->pcb.mdep_cfg_idx].mdep_cfg.data_cfg[0].dat… in btif_hl_save_mdl_cfg()
[all …]
/external/pdfium/core/src/fxge/Microsoft SDK/include/
DGdiPlusImaging.h86 OUT UINT *pcb
/external/bluetooth/bluedroid/bta/jv/
Dbta_jv_act.c2079 static int find_rfc_pcb(void* user_data, tBTA_JV_RFC_CB **cb, tBTA_JV_PCB **pcb) in find_rfc_pcb() argument
2082 *pcb = NULL; in find_rfc_pcb()
2090 *pcb = &bta_jv_cb.port_cb[i]; in find_rfc_pcb()
2093 " 0x%x, state: %d, rfc_cb->handle: 0x%x", rfc_handle, (*pcb)->handle, in find_rfc_pcb()
2094 (*pcb)->state, (*cb)->handle); in find_rfc_pcb()
/external/llvm/test/Analysis/ScalarEvolution/
Davoid-infinite-recursion-1.ll107 %struct.pcb = type opaque
138 …ruct.file*, i32, i32, %struct.osd, i8, i8, i8, i8, i8, i8, i8, i8, %struct.pcb*, i32, i8, i8, i8, …
/external/owasp/sanitizer/tools/findbugs/lib/
Dfindbugs.jarMETA-INF/ META-INF/MANIFEST.MF default.xsl edu/ edu/umd ...
/external/chromium_org/third_party/WebKit/PerformanceTests/Parser/resources/
Dfinal-url-en28471 http://www.bluewatersys.com/consulting/doc/tools/pcb.php
39789 http://www.epa.gov/opptintr/pcb/effects.html