/external/qemu/android/ |
D | sdk-controller-socket.c | 349 char* service_name; member 396 sdkctl->service_name, sdkctl->recycler_block_size); in _sdkctl_socket_alloc_recycler() 404 sdkctl->service_name, size); in _sdkctl_socket_alloc_recycler() 501 sdkctl->service_name, query); in _sdkctl_socket_remove_query() 562 sdkctl->service_name, query_id); in _sdkctl_socket_remove_query_id() 637 sdkctl->service_name, packet, type, size); in _sdkctl_packet_new() 651 T("SDKCtl %s: Packet %p is freed.", sdkctl->service_name, packet); in _sdkctl_packet_free() 702 packet->sdkctl->service_name, packet); in _on_sdkctl_packet_send_io() 707 packet->sdkctl->service_name, packet); in _on_sdkctl_packet_send_io() 712 packet->sdkctl->service_name, packet, errno, strerror(errno)); in _on_sdkctl_packet_send_io() [all …]
|
D | hw-qemud.c | 942 const char* service_name ); 984 char *service_name = qemud_service_load_name(f); in qemud_serial_client_load() local 985 if (service_name == NULL) in qemud_serial_client_load() 989 QemudService *sv = qemud_service_find(current_services, service_name); in qemud_serial_client_load() 992 __FUNCTION__, service_name); in qemud_serial_client_load() 1171 qemud_service_find( QemudService* service_list, const char* service_name) in qemud_service_find() argument 1175 if (!strcmp(sv->name, service_name)) { in qemud_service_find() 1200 char *service_name = android_alloc(name_len); in qemud_service_load_name() local 1201 if ((ret = qemu_get_buffer(f, (uint8_t*)service_name, name_len) != name_len)) { in qemud_service_load_name() 1204 AFREE(service_name); in qemud_service_load_name() [all …]
|
D | sdk-controller-socket.h | 498 const char* service_name,
|
/external/chromium/chrome/browser/sync/util/ |
D | user_settings_posix.cc | 17 const std::string& service_name, in SetAuthTokenForService() argument 21 << " for " << email << "for service " << service_name; in SetAuthTokenForService() 36 statement.bind_string(1, service_name); in SetAuthTokenForService() 44 bool UserSettings::GetLastUserAndServiceToken(const std::string& service_name, in GetLastUserAndServiceToken() argument 52 query.bind_string(0, service_name.c_str()); in GetLastUserAndServiceToken() 63 VLOG(1) << "Found service token for:" << *username << " @ " << service_name in GetLastUserAndServiceToken() 69 VLOG(1) << "Couldn't find service token for " << service_name; in GetLastUserAndServiceToken()
|
D | user_settings_win.cc | 19 const string& service_name, const string& long_lived_service_token) { in SetAuthTokenForService() argument 27 statement.bind_string(1, service_name); in SetAuthTokenForService() 36 bool UserSettings::GetLastUserAndServiceToken(const string& service_name, in GetLastUserAndServiceToken() argument 44 query.bind_string(0, service_name.c_str()); in GetLastUserAndServiceToken()
|
D | user_settings.h | 47 const std::string& service_name, 57 bool GetLastUserAndServiceToken(const std::string& service_name,
|
/external/chromium/chrome/browser/password_manager/ |
D | encryptor_password_mac.mm | 20 const std::string& service_name, 27 service_name.size(), 28 service_name.data(), 49 const std::string service_name = "Chrome Safe Storage"; 55 service_name.size(), 56 service_name.data(), 69 return AddRandomPasswordToKeychain(keychain_, service_name, account_name);
|
/external/bluetooth/bluedroid/btif/src/ |
D | btif_sock.c | 42 static bt_status_t btsock_listen(btsock_type_t type, const char* service_name, 92 static bt_status_t btsock_listen(btsock_type_t type, const char* service_name, in btsock_listen() argument 105 status = btsock_rfc_listen(service_name, service_uuid, channel, sock_fd, flags); in btsock_listen()
|
D | btif_sock_sdp.c | 309 static int add_spp_sdp(const char *service_name, int scn) in add_spp_sdp() argument 315 APPL_TRACE_DEBUG2("scn %d, service name %s", scn, service_name); in add_spp_sdp() 333 TEXT_STR_DESC_TYPE, (UINT32)(strlen(service_name)+1), in add_spp_sdp() 334 (UINT8 *)service_name))) in add_spp_sdp()
|
D | btif_sock_rfc.c | 87 char service_name[256]; member 270 strncpy(rs->service_name, name, sizeof(rs->service_name) -1); in alloc_rfc_slot() 285 …rfc_slot_t *accept_rs = alloc_rfc_slot(addr, srv_rs->service_name, srv_rs->service_uuid, srv_rs->s… in create_srv_accept_rfc_slot() 307 bt_status_t btsock_rfc_listen(const char* service_name, const uint8_t* service_uuid, int channel, in btsock_rfc_listen() argument 311 APPL_TRACE_DEBUG1("btsock_rfc_listen, service_name:%s", service_name); in btsock_rfc_listen() 333 rfc_slot_t* rs = alloc_rfc_slot(NULL, service_name, service_uuid, channel, flags, TRUE); in btsock_rfc_listen() 336 APPL_TRACE_DEBUG1("BTA_JvCreateRecordByUser:%s", service_name); in btsock_rfc_listen() 425 if((rs->sdp_handle = add_rfc_sdp_rec(rs->service_name, rs->service_uuid, rs->scn)) <= 0) in create_server_sdp_record()
|
/external/libnfc-nci/src/nfa/p2p/ |
D | nfa_p2p_api.c | 91 …BCM_STRNCPY_S (p_msg->service_name, sizeof (p_msg->service_name), p_service_name, LLCP_MAX_SN_LEN); in NFA_P2pRegisterServer() 92 p_msg->service_name[LLCP_MAX_SN_LEN] = 0; in NFA_P2pRegisterServer() 410 …BCM_STRNCPY_S (p_msg->service_name, sizeof (p_msg->service_name), p_service_name, LLCP_MAX_SN_LEN); in NFA_P2pConnectByName() 411 p_msg->service_name[LLCP_MAX_SN_LEN] = 0; in NFA_P2pConnectByName() 471 p_msg->service_name[LLCP_MAX_SN_LEN] = 0; in NFA_P2pConnectBySap() 1012 …BCM_STRNCPY_S (p_msg->service_name, sizeof (p_msg->service_name), p_service_name, LLCP_MAX_SN_LEN); in NFA_P2pGetRemoteSap() 1013 p_msg->service_name[LLCP_MAX_SN_LEN] = 0; in NFA_P2pGetRemoteSap()
|
D | nfa_p2p_act.c | 683 p_msg->api_reg_server.service_name, in nfa_p2p_reg_server() 690 BCM_STRNCPY_S (evt_data.reg_server.service_name, sizeof (evt_data.reg_server.service_name), in nfa_p2p_reg_server() 691 p_msg->api_reg_server.service_name, LLCP_MAX_SN_LEN); in nfa_p2p_reg_server() 692 evt_data.reg_server.service_name[LLCP_MAX_SN_LEN] = 0; in nfa_p2p_reg_server() 714 BCM_STRNCPY_S (evt_data.reg_server.service_name, sizeof (evt_data.reg_server.service_name), in nfa_p2p_reg_server() 715 p_msg->api_reg_server.service_name, LLCP_MAX_SN_LEN); in nfa_p2p_reg_server() 716 evt_data.reg_server.service_name[LLCP_MAX_SN_LEN] = 0; in nfa_p2p_reg_server() 995 p_msg->api_connect.service_name, LLCP_MAX_SN_LEN); in nfa_p2p_create_data_link_connection() 1184 if (!nfa_p2p_start_sdp (p_msg->api_remote_sap.service_name, in nfa_p2p_get_remote_sap()
|
/external/bluetooth/bluedroid/bta/ar/ |
D | bta_ar.c | 245 void bta_ar_reg_avrc(UINT16 service_uuid, char *service_name, char *provider_name, in bta_ar_reg_avrc() argument 260 … AVRC_AddRecord(service_uuid, service_name, provider_name, categories, bta_ar_cb.sdp_tg_handle); in bta_ar_reg_avrc() 275 … AVRC_AddRecord(service_uuid, service_name, provider_name, categories, bta_ar_cb.sdp_ct_handle); in bta_ar_reg_avrc()
|
/external/libnfc-nci/src/nfa/int/ |
D | nfa_p2p_int.h | 76 char service_name[LLCP_MAX_SN_LEN + 1]; member 124 char service_name[LLCP_MAX_SN_LEN + 1]; member 167 char service_name[LLCP_MAX_SN_LEN + 1]; member
|
D | nfa_snep_int.h | 77 char service_name[LLCP_MAX_SN_LEN + 1]; member 100 char service_name[LLCP_MAX_SN_LEN + 1]; member
|
/external/openssl/ssl/ |
D | kssl.c | 1099 (kssl_ctx->service_name)? kssl_ctx->service_name: KRB5SVC, in kssl_cget_tkt() 1105 (kssl_ctx->service_name)? kssl_ctx->service_name: in kssl_cget_tkt() 1335 printf("in kssl_sget_tkt(%s)\n", kstring(kssl_ctx->service_name)); in kssl_sget_tkt() 1370 (kssl_ctx->service_name)? kssl_ctx->service_name: KRB5SVC, in kssl_sget_tkt() 1583 if (kssl_ctx->service_name) kssl_free(kssl_ctx->service_name); in kssl_ctx_free() 1661 case KSSL_SERVICE: string = &kssl_ctx->service_name; break; in kssl_ctx_setstring() 1754 (kssl_ctx->service_name)? kssl_ctx->service_name: "NULL"); in kssl_ctx_show() 1803 kssl_ctx->service_name ? kssl_ctx->service_name: KRB5SVC, in kssl_keytab_is_available() 1852 … (kssl_ctx->service_name)? kssl_ctx->service_name: KRB5SVC, in kssl_tgt_is_available()
|
D | kssl.h | 133 char *service_name; /* C,S default ok (kssl) */ member
|
/external/bluetooth/bluedroid/stack/include/ |
D | wbt_api.h | 63 BT_API extern UINT32 wbt_sdp_show_ext(UINT8 scn, char *service_name,
|
/external/openssl/include/openssl/ |
D | kssl.h | 133 char *service_name; /* C,S default ok (kssl) */ member
|
/external/libnfc-nci/src/nfa/include/ |
D | nfa_snep_api.h | 80 char service_name[LLCP_MAX_SN_LEN + 1]; /* only for server */ member
|
D | nfa_p2p_api.h | 79 char service_name[LLCP_MAX_SN_LEN + 1]; member
|
/external/valgrind/main/coregrind/ |
D | pub_core_threadstate.h | 259 char *service_name; member
|
/external/bluetooth/bluedroid/bta/hh/ |
D | bta_hh_int.h | 96 UINT8 service_name[BTA_SERVICE_NAME_LEN+1]; member
|
/external/chromium/chrome/browser/chromeos/cros/ |
D | network_library.cc | 2733 connect_data_.service_name = ssid; in ConnectToWifiNetwork() 2764 if (wifi->name() != data.service_name) { in ConnectToWifiNetworkUsingConnectData() 2766 << wifi->name() << " != " << data.service_name; in ConnectToWifiNetworkUsingConnectData() 2799 const std::string& service_name, in ConnectToVirtualNetworkPSK() argument 2807 connect_data_.service_name = service_name; in ConnectToVirtualNetworkPSK() 2812 RequestVirtualNetwork(service_name.c_str(), in ConnectToVirtualNetworkPSK() 2841 if (vpn->name() != data.service_name) { in ConnectToVirtualNetworkUsingConnectData() 2843 << vpn->name() << " != " << data.service_name; in ConnectToVirtualNetworkUsingConnectData() 4322 std::string service_name; member 4460 const std::string& service_name, in ConnectToVirtualNetworkPSK() argument
|
/external/protobuf/src/google/protobuf/compiler/python/ |
D | python_generator.cc | 436 string service_name = ModuleLevelServiceDescriptorName(descriptor); in PrintServiceDescriptor() local 442 "service_name", service_name); in PrintServiceDescriptor()
|