Searched defs:reason (Results 176 - 200 of 644) sorted by relevance

1234567891011>>

/external/openssl/include/openssl/
H A Dkssl.h121 int reason; member in struct:kssl_err_st
164 void kssl_err_set(KSSL_ERR *kssl_err, int reason, char *text);
/external/openssl/ssl/
H A Dkssl.h121 int reason; member in struct:kssl_err_st
164 void kssl_err_set(KSSL_ERR *kssl_err, int reason, char *text);
/external/qemu/
H A Dcpus.c60 static void do_vm_stop(int reason) argument
66 vm_state_notify(0, reason);
261 void vm_stop(int reason)
263 do_vm_stop(reason);
560 void vm_stop(int reason)
566 qemu_system_vmstop_request(reason);
577 do_vm_stop(reason);
/external/smack/src/org/jivesoftware/smackx/packet/
H A DMUCOwner.java113 private String reason; field in class:MUCOwner.Item
138 * Returns the reason for the item child. The reason is optional and could be used to
139 * explain the reason why a user (occupant) was kicked or banned.
141 * @return the reason for the item child.
144 return reason;
201 * Sets the reason for the item child. The reason is optional and could be used to
202 * explain the reason why a user (occupant) was kicked or banned.
204 * @param reason th
206 setReason(String reason) argument
282 private String reason; field in class:MUCOwner.Destroy
318 setReason(String reason) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/rsn_supp/
H A Dpmksa_cache.h51 void *ctx, enum pmksa_free_reason reason),
76 void *ctx, enum pmksa_free_reason reason),
75 pmksa_cache_init(void (*free_cb)(struct rsn_pmksa_cache_entry *entry, void *ctx, enum pmksa_free_reason reason), void *ctx, struct wpa_sm *sm) argument
/external/wpa_supplicant_8/hostapd/src/tls/
H A Dtlsv1_client_read.c221 int reason; local
369 &reason, conn->disable_time_checks)
373 "validation failed (reason=%d)", reason);
374 switch (reason) {
/external/wpa_supplicant_8/src/rsn_supp/
H A Dpmksa_cache.h51 void *ctx, enum pmksa_free_reason reason),
76 void *ctx, enum pmksa_free_reason reason),
75 pmksa_cache_init(void (*free_cb)(struct rsn_pmksa_cache_entry *entry, void *ctx, enum pmksa_free_reason reason), void *ctx, struct wpa_sm *sm) argument
/external/wpa_supplicant_8/src/tls/
H A Dtlsv1_client_read.c221 int reason; local
369 &reason, conn->disable_time_checks)
373 "validation failed (reason=%d)", reason);
374 switch (reason) {
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/
H A Dpmksa_cache.h51 void *ctx, enum pmksa_free_reason reason),
76 void *ctx, enum pmksa_free_reason reason),
75 pmksa_cache_init(void (*free_cb)(struct rsn_pmksa_cache_entry *entry, void *ctx, enum pmksa_free_reason reason), void *ctx, struct wpa_sm *sm) argument
/external/wpa_supplicant_8/wpa_supplicant/src/tls/
H A Dtlsv1_client_read.c221 int reason; local
369 &reason, conn->disable_time_checks)
373 "validation failed (reason=%d)", reason);
374 switch (reason) {
/external/bluetooth/bluedroid/bta/gatt/
H A Dbta_gatts_act.c42 static void bta_gatts_conn_cback (tGATT_IF gatt_if, BD_ADDR bda, UINT16 conn_id, BOOLEAN connected, tGATT_DISCONN_REASON reason);
879 BOOLEAN connected, tGATT_DISCONN_REASON reason)
885 APPL_TRACE_DEBUG4 ("bta_gatts_conn_cback gatt_if=%d conn_id=%d connected=%d reason = 0x%04d",
886 gatt_if, conn_id, connected, reason);
905 cb_data.conn.reason = reason;
878 bta_gatts_conn_cback(tGATT_IF gatt_if, BD_ADDR bda, UINT16 conn_id, BOOLEAN connected, tGATT_DISCONN_REASON reason) argument
/external/bluetooth/bluedroid/bta/hh/
H A Dbta_hh_act.c823 UINT32 reason = p_data->hid_cback.data; /* Reason for closing (32-bit) */ local
827 conn_dat.status = (reason == HID_ERR_AUTH_FAILED) ?
864 UINT32 reason = p_data->hid_cback.data; /* Reason for closing (32-bit) */ local
872 /* Check reason for closing */
873 if ((reason & (HID_L2CAP_CONN_FAIL|HID_L2CAP_REQ_FAIL)) || /* Failure to initialize connection (page timeout or l2cap error) */
874 (reason == HID_ERR_AUTH_FAILED) || /* Authenication error (while initiating) */
875 (reason == HID_ERR_L2CAP_FAILED)) /* Failure creating l2cap connection */
879 conn_dat.status = (reason == HID_ERR_AUTH_FAILED) ? BTA_HH_ERR_AUTH_FAILED : BTA_HH_ERR;
/external/bluetooth/bluedroid/hci/src/
H A Duserial.c173 char reason = 0; local
190 reason = reset_signal();
191 if (reason == USERIAL_RX_EXIT)
196 else if (reason == USERIAL_RX_FLOW_OFF)
201 else if (reason == USERIAL_RX_FLOW_ON)
H A Duserial_mct.c145 char reason = 0; local
173 reason = reset_signal();
174 if (reason == USERIAL_RX_EXIT)
180 else if (reason == USERIAL_RX_FLOW_OFF)
185 else if (reason == USERIAL_RX_FLOW_ON)
/external/bluetooth/bluedroid/stack/gatt/
H A Datt_protocol.c107 BT_HDR *attp_build_err_cmd(UINT8 cmd_code, UINT16 err_handle, UINT8 reason) argument
119 UINT8_TO_STREAM (p, reason);
417 p_cmd = attp_build_err_cmd(p_msg->error.cmd_code, p_msg->error.handle, p_msg->error.reason);
/external/bluetooth/bluedroid/stack/hid/
H A Dhidh_conn.c183 p_dev->conn.disc_reason = HID_ERR_AUTH_FAILED; /* Save reason for disconnecting */
260 p_hcon->disc_reason = HID_L2CAP_CONN_FAIL; /* In case disconnection occurs before security is completed, then set CLOSE_EVT reason code to 'connection failure' */
322 UINT32 reason; local
334 reason = HID_L2CAP_REQ_FAIL ;
336 hh_cb.callback( dhandle, hh_cb.devices[dhandle].addr, HID_HDEV_EVT_CLOSE, reason, NULL ) ;
360 p_dev->conn.disc_reason = HID_ERR_AUTH_FAILED; /* Save reason for disconnecting */
381 UINT32 reason; local
419 reason = HID_L2CAP_CONN_FAIL | (UINT32) result ;
420 hh_cb.callback( dhandle, hh_cb.devices[dhandle].addr, HID_HDEV_EVT_CLOSE, reason, NULL ) ;
429 p_hcon->disc_reason = HID_L2CAP_CONN_FAIL; /* In case disconnection occurs before security is completed, then set CLOSE_EVT reason cod
523 UINT32 reason; local
[all...]
/external/bluetooth/bluedroid/stack/l2cap/
H A Dl2c_ble.c223 ** Description This function returns the disconnect reason code.
225 ** Returns disconnect reason
231 UINT16 reason = 0; local
234 reason = p_lcb->disc_reason;
236 L2CAP_TRACE_DEBUG1 ("L2CA_GetDisconnectReason=%d ",reason);
238 return reason;
/external/bluetooth/bluedroid/stack/mcap/
H A Dmca_main.c289 ** the channel and sends it a close event. The reason
296 void mca_tc_close_ind(tMCA_TC_TBL *p_tbl, UINT16 reason) argument
303 close.reason = reason;
/external/bluetooth/bluedroid/stack/srvc/
H A Dsrvc_eng.c33 static void srvc_eng_connect_cback (tGATT_IF gatt_if, BD_ADDR bda, UINT16 conn_id, BOOLEAN connected, tGATT_DISCONN_REASON reason);
342 BOOLEAN connected, tGATT_DISCONN_REASON reason)
344 GATT_TRACE_EVENT5 ("srvc_eng_connect_cback: from %08x%04x connected:%d conn_id=%d reason = 0x%04x",
346 (bda[4]<<8)+bda[5], connected, conn_id, reason);
341 srvc_eng_connect_cback(tGATT_IF gatt_if, BD_ADDR bda, UINT16 conn_id, BOOLEAN connected, tGATT_DISCONN_REASON reason) argument
/external/chromium/chrome/browser/chromeos/login/
H A Dupdate_screen.cc206 void UpdateScreen::ExitUpdate(UpdateScreen::ExitReason reason) { argument
211 switch(reason) {
/external/chromium/chrome/browser/extensions/
H A Dsandboxed_extension_unpacker.cc406 void SandboxedExtensionUnpacker::ReportFailure(FailureReason reason, argument
410 reason, NUM_FAILURE_REASONS);
/external/chromium/chrome/browser/sync/
H A Dprofile_sync_service_harness.cc312 const std::string& reason) {
326 AwaitStatusChangeWithTimeout(kLiveSyncOperationTimeoutMs, reason);
328 return AwaitStatusChangeWithTimeout(kLiveSyncOperationTimeoutMs, reason);
332 AwaitStatusChangeWithTimeout(kLiveSyncOperationTimeoutMs, reason);
387 ProfileSyncServiceHarness* partner, const std::string& reason) {
403 return AwaitStatusChangeWithTimeout(kLiveSyncOperationTimeoutMs, reason);
408 const std::string& reason) {
415 new StateChangeTimeoutEvent(this, reason));
612 std::string reason = "Waiting for encryption."; local
616 if (!AwaitStatusChangeWithTimeout(kLiveSyncOperationTimeoutMs, reason)) {
311 AwaitSyncCycleCompletion( const std::string& reason) argument
386 WaitUntilTimestampMatches( ProfileSyncServiceHarness* partner, const std::string& reason) argument
406 AwaitStatusChangeWithTimeout( int timeout_milliseconds, const std::string& reason) argument
[all...]
/external/chromium/chrome/browser/ui/gtk/
H A Dcrypto_module_password_dialog.cc26 CryptoModuleBlockingDialogDelegate(browser::CryptoModulePasswordReason reason, argument
29 reason_(reason),
85 browser::CryptoModulePasswordReason reason,
106 browser::CryptoModulePasswordReason reason,
126 // Select an appropriate text for the reason.
130 switch (reason) {
216 CryptoModulePasswordReason reason,
219 (new CryptoModulePasswordDialog(slot_name, retry, reason, server,
225 CryptoModulePasswordReason reason,
227 return new CryptoModuleBlockingDialogDelegate(reason, serve
103 CryptoModulePasswordDialog( const std::string& slot_name, bool retry, browser::CryptoModulePasswordReason reason, const std::string& server, browser::CryptoModulePasswordCallback* callback) argument
214 ShowCryptoModulePasswordDialog(const std::string& slot_name, bool retry, CryptoModulePasswordReason reason, const std::string& server, CryptoModulePasswordCallback* callback) argument
224 NewCryptoModuleBlockingDialogDelegate( CryptoModulePasswordReason reason, const std::string& server) argument
[all...]
/external/chromium/net/http/
H A Dhttp_auth_handler_digest.cc93 CreateReason reason,
89 CreateAuthHandler( HttpAuth::ChallengeTokenizer* challenge, HttpAuth::Target target, const GURL& origin, CreateReason reason, int digest_nonce_count, const BoundNetLog& net_log, scoped_ptr<HttpAuthHandler>* handler) argument
H A Dhttp_auth_handler_negotiate.cc42 CreateReason reason,
47 if (is_unsupported_ || reason == CREATE_PREEMPTIVE)
119 // http://blog.michelbarneveld.nl/michel/archive/2009/11/14/the-reason-why-kb911149-and-kb908209-are-not-the-soluton.aspx
38 CreateAuthHandler( HttpAuth::ChallengeTokenizer* challenge, HttpAuth::Target target, const GURL& origin, CreateReason reason, int digest_nonce_count, const BoundNetLog& net_log, scoped_ptr<HttpAuthHandler>* handler) argument

Completed in 626 milliseconds

1234567891011>>