Home
last modified time | relevance | path

Searched refs:service_name (Results 1 – 25 of 29) sorted by relevance

12

/external/qemu/android/
Dsdk-controller-socket.c349 char* service_name; member
396 sdkctl->service_name, sdkctl->recycler_block_size); in _sdkctl_socket_alloc_recycler()
404 sdkctl->service_name, size); in _sdkctl_socket_alloc_recycler()
501 sdkctl->service_name, query); in _sdkctl_socket_remove_query()
562 sdkctl->service_name, query_id); in _sdkctl_socket_remove_query_id()
637 sdkctl->service_name, packet, type, size); in _sdkctl_packet_new()
651 T("SDKCtl %s: Packet %p is freed.", sdkctl->service_name, packet); in _sdkctl_packet_free()
702 packet->sdkctl->service_name, packet); in _on_sdkctl_packet_send_io()
707 packet->sdkctl->service_name, packet); in _on_sdkctl_packet_send_io()
712 packet->sdkctl->service_name, packet, errno, strerror(errno)); in _on_sdkctl_packet_send_io()
[all …]
Dhw-qemud.c942 const char* service_name );
984 char *service_name = qemud_service_load_name(f); in qemud_serial_client_load() local
985 if (service_name == NULL) in qemud_serial_client_load()
989 QemudService *sv = qemud_service_find(current_services, service_name); in qemud_serial_client_load()
992 __FUNCTION__, service_name); in qemud_serial_client_load()
1171 qemud_service_find( QemudService* service_list, const char* service_name) in qemud_service_find() argument
1175 if (!strcmp(sv->name, service_name)) { in qemud_service_find()
1200 char *service_name = android_alloc(name_len); in qemud_service_load_name() local
1201 if ((ret = qemu_get_buffer(f, (uint8_t*)service_name, name_len) != name_len)) { in qemud_service_load_name()
1204 AFREE(service_name); in qemud_service_load_name()
[all …]
Dsdk-controller-socket.h498 const char* service_name,
/external/chromium/chrome/browser/sync/util/
Duser_settings_posix.cc17 const std::string& service_name, in SetAuthTokenForService() argument
21 << " for " << email << "for service " << service_name; in SetAuthTokenForService()
36 statement.bind_string(1, service_name); in SetAuthTokenForService()
44 bool UserSettings::GetLastUserAndServiceToken(const std::string& service_name, in GetLastUserAndServiceToken() argument
52 query.bind_string(0, service_name.c_str()); in GetLastUserAndServiceToken()
63 VLOG(1) << "Found service token for:" << *username << " @ " << service_name in GetLastUserAndServiceToken()
69 VLOG(1) << "Couldn't find service token for " << service_name; in GetLastUserAndServiceToken()
Duser_settings_win.cc19 const string& service_name, const string& long_lived_service_token) { in SetAuthTokenForService() argument
27 statement.bind_string(1, service_name); in SetAuthTokenForService()
36 bool UserSettings::GetLastUserAndServiceToken(const string& service_name, in GetLastUserAndServiceToken() argument
44 query.bind_string(0, service_name.c_str()); in GetLastUserAndServiceToken()
Duser_settings.h47 const std::string& service_name,
57 bool GetLastUserAndServiceToken(const std::string& service_name,
/external/chromium/chrome/browser/password_manager/
Dencryptor_password_mac.mm20 const std::string& service_name,
27 service_name.size(),
28 service_name.data(),
49 const std::string service_name = "Chrome Safe Storage";
55 service_name.size(),
56 service_name.data(),
69 return AddRandomPasswordToKeychain(keychain_, service_name, account_name);
/external/bluetooth/bluedroid/btif/src/
Dbtif_sock.c42 static bt_status_t btsock_listen(btsock_type_t type, const char* service_name,
92 static bt_status_t btsock_listen(btsock_type_t type, const char* service_name, in btsock_listen() argument
105 status = btsock_rfc_listen(service_name, service_uuid, channel, sock_fd, flags); in btsock_listen()
Dbtif_sock_sdp.c309 static int add_spp_sdp(const char *service_name, int scn) in add_spp_sdp() argument
315 APPL_TRACE_DEBUG2("scn %d, service name %s", scn, service_name); in add_spp_sdp()
333 TEXT_STR_DESC_TYPE, (UINT32)(strlen(service_name)+1), in add_spp_sdp()
334 (UINT8 *)service_name))) in add_spp_sdp()
Dbtif_sock_rfc.c87 char service_name[256]; member
270 strncpy(rs->service_name, name, sizeof(rs->service_name) -1); in alloc_rfc_slot()
285 …rfc_slot_t *accept_rs = alloc_rfc_slot(addr, srv_rs->service_name, srv_rs->service_uuid, srv_rs->s… in create_srv_accept_rfc_slot()
307 bt_status_t btsock_rfc_listen(const char* service_name, const uint8_t* service_uuid, int channel, in btsock_rfc_listen() argument
311 APPL_TRACE_DEBUG1("btsock_rfc_listen, service_name:%s", service_name); in btsock_rfc_listen()
333 rfc_slot_t* rs = alloc_rfc_slot(NULL, service_name, service_uuid, channel, flags, TRUE); in btsock_rfc_listen()
336 APPL_TRACE_DEBUG1("BTA_JvCreateRecordByUser:%s", service_name); in btsock_rfc_listen()
425 if((rs->sdp_handle = add_rfc_sdp_rec(rs->service_name, rs->service_uuid, rs->scn)) <= 0) in create_server_sdp_record()
/external/libnfc-nci/src/nfa/p2p/
Dnfa_p2p_api.c91 …BCM_STRNCPY_S (p_msg->service_name, sizeof (p_msg->service_name), p_service_name, LLCP_MAX_SN_LEN); in NFA_P2pRegisterServer()
92 p_msg->service_name[LLCP_MAX_SN_LEN] = 0; in NFA_P2pRegisterServer()
410 …BCM_STRNCPY_S (p_msg->service_name, sizeof (p_msg->service_name), p_service_name, LLCP_MAX_SN_LEN); in NFA_P2pConnectByName()
411 p_msg->service_name[LLCP_MAX_SN_LEN] = 0; in NFA_P2pConnectByName()
471 p_msg->service_name[LLCP_MAX_SN_LEN] = 0; in NFA_P2pConnectBySap()
1012 …BCM_STRNCPY_S (p_msg->service_name, sizeof (p_msg->service_name), p_service_name, LLCP_MAX_SN_LEN); in NFA_P2pGetRemoteSap()
1013 p_msg->service_name[LLCP_MAX_SN_LEN] = 0; in NFA_P2pGetRemoteSap()
Dnfa_p2p_act.c683 p_msg->api_reg_server.service_name, in nfa_p2p_reg_server()
690 BCM_STRNCPY_S (evt_data.reg_server.service_name, sizeof (evt_data.reg_server.service_name), in nfa_p2p_reg_server()
691 p_msg->api_reg_server.service_name, LLCP_MAX_SN_LEN); in nfa_p2p_reg_server()
692 evt_data.reg_server.service_name[LLCP_MAX_SN_LEN] = 0; in nfa_p2p_reg_server()
714 BCM_STRNCPY_S (evt_data.reg_server.service_name, sizeof (evt_data.reg_server.service_name), in nfa_p2p_reg_server()
715 p_msg->api_reg_server.service_name, LLCP_MAX_SN_LEN); in nfa_p2p_reg_server()
716 evt_data.reg_server.service_name[LLCP_MAX_SN_LEN] = 0; in nfa_p2p_reg_server()
995 p_msg->api_connect.service_name, LLCP_MAX_SN_LEN); in nfa_p2p_create_data_link_connection()
1184 if (!nfa_p2p_start_sdp (p_msg->api_remote_sap.service_name, in nfa_p2p_get_remote_sap()
/external/bluetooth/bluedroid/bta/ar/
Dbta_ar.c245 void bta_ar_reg_avrc(UINT16 service_uuid, char *service_name, char *provider_name, in bta_ar_reg_avrc() argument
260 … AVRC_AddRecord(service_uuid, service_name, provider_name, categories, bta_ar_cb.sdp_tg_handle); in bta_ar_reg_avrc()
275 … AVRC_AddRecord(service_uuid, service_name, provider_name, categories, bta_ar_cb.sdp_ct_handle); in bta_ar_reg_avrc()
/external/libnfc-nci/src/nfa/int/
Dnfa_p2p_int.h76 char service_name[LLCP_MAX_SN_LEN + 1]; member
124 char service_name[LLCP_MAX_SN_LEN + 1]; member
167 char service_name[LLCP_MAX_SN_LEN + 1]; member
Dnfa_snep_int.h77 char service_name[LLCP_MAX_SN_LEN + 1]; member
100 char service_name[LLCP_MAX_SN_LEN + 1]; member
/external/openssl/ssl/
Dkssl.c1099 (kssl_ctx->service_name)? kssl_ctx->service_name: KRB5SVC, in kssl_cget_tkt()
1105 (kssl_ctx->service_name)? kssl_ctx->service_name: in kssl_cget_tkt()
1335 printf("in kssl_sget_tkt(%s)\n", kstring(kssl_ctx->service_name)); in kssl_sget_tkt()
1370 (kssl_ctx->service_name)? kssl_ctx->service_name: KRB5SVC, in kssl_sget_tkt()
1583 if (kssl_ctx->service_name) kssl_free(kssl_ctx->service_name); in kssl_ctx_free()
1661 case KSSL_SERVICE: string = &kssl_ctx->service_name; break; in kssl_ctx_setstring()
1754 (kssl_ctx->service_name)? kssl_ctx->service_name: "NULL"); in kssl_ctx_show()
1803 kssl_ctx->service_name ? kssl_ctx->service_name: KRB5SVC, in kssl_keytab_is_available()
1852 … (kssl_ctx->service_name)? kssl_ctx->service_name: KRB5SVC, in kssl_tgt_is_available()
Dkssl.h133 char *service_name; /* C,S default ok (kssl) */ member
/external/bluetooth/bluedroid/stack/include/
Dwbt_api.h63 BT_API extern UINT32 wbt_sdp_show_ext(UINT8 scn, char *service_name,
/external/openssl/include/openssl/
Dkssl.h133 char *service_name; /* C,S default ok (kssl) */ member
/external/libnfc-nci/src/nfa/include/
Dnfa_snep_api.h80 char service_name[LLCP_MAX_SN_LEN + 1]; /* only for server */ member
Dnfa_p2p_api.h79 char service_name[LLCP_MAX_SN_LEN + 1]; member
/external/valgrind/main/coregrind/
Dpub_core_threadstate.h259 char *service_name; member
/external/bluetooth/bluedroid/bta/hh/
Dbta_hh_int.h96 UINT8 service_name[BTA_SERVICE_NAME_LEN+1]; member
/external/chromium/chrome/browser/chromeos/cros/
Dnetwork_library.cc2733 connect_data_.service_name = ssid; in ConnectToWifiNetwork()
2764 if (wifi->name() != data.service_name) { in ConnectToWifiNetworkUsingConnectData()
2766 << wifi->name() << " != " << data.service_name; in ConnectToWifiNetworkUsingConnectData()
2799 const std::string& service_name, in ConnectToVirtualNetworkPSK() argument
2807 connect_data_.service_name = service_name; in ConnectToVirtualNetworkPSK()
2812 RequestVirtualNetwork(service_name.c_str(), in ConnectToVirtualNetworkPSK()
2841 if (vpn->name() != data.service_name) { in ConnectToVirtualNetworkUsingConnectData()
2843 << vpn->name() << " != " << data.service_name; in ConnectToVirtualNetworkUsingConnectData()
4322 std::string service_name; member
4460 const std::string& service_name, in ConnectToVirtualNetworkPSK() argument
/external/protobuf/src/google/protobuf/compiler/python/
Dpython_generator.cc436 string service_name = ModuleLevelServiceDescriptorName(descriptor); in PrintServiceDescriptor() local
442 "service_name", service_name); in PrintServiceDescriptor()

12