/external/openssl/include/openssl/ |
H A D | kssl.h | 121 int reason; member in struct:kssl_err_st 164 void kssl_err_set(KSSL_ERR *kssl_err, int reason, char *text);
|
/external/openssl/ssl/ |
H A D | kssl.h | 121 int reason; member in struct:kssl_err_st 164 void kssl_err_set(KSSL_ERR *kssl_err, int reason, char *text);
|
/external/qemu/ |
H A D | cpus.c | 60 static void do_vm_stop(int reason) argument 66 vm_state_notify(0, reason); 261 void vm_stop(int reason) 263 do_vm_stop(reason); 560 void vm_stop(int reason) 566 qemu_system_vmstop_request(reason); 577 do_vm_stop(reason);
|
/external/smack/src/org/jivesoftware/smackx/packet/ |
H A D | MUCOwner.java | 113 private String reason; field in class:MUCOwner.Item 138 * Returns the reason for the item child. The reason is optional and could be used to 139 * explain the reason why a user (occupant) was kicked or banned. 141 * @return the reason for the item child. 144 return reason; 201 * Sets the reason for the item child. The reason is optional and could be used to 202 * explain the reason why a user (occupant) was kicked or banned. 204 * @param reason th 206 setReason(String reason) argument 282 private String reason; field in class:MUCOwner.Destroy 318 setReason(String reason) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | pmksa_cache.h | 51 void *ctx, enum pmksa_free_reason reason), 76 void *ctx, enum pmksa_free_reason reason), 75 pmksa_cache_init(void (*free_cb)(struct rsn_pmksa_cache_entry *entry, void *ctx, enum pmksa_free_reason reason), void *ctx, struct wpa_sm *sm) argument
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_client_read.c | 221 int reason; local 369 &reason, conn->disable_time_checks) 373 "validation failed (reason=%d)", reason); 374 switch (reason) {
|
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | pmksa_cache.h | 51 void *ctx, enum pmksa_free_reason reason), 76 void *ctx, enum pmksa_free_reason reason), 75 pmksa_cache_init(void (*free_cb)(struct rsn_pmksa_cache_entry *entry, void *ctx, enum pmksa_free_reason reason), void *ctx, struct wpa_sm *sm) argument
|
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_client_read.c | 221 int reason; local 369 &reason, conn->disable_time_checks) 373 "validation failed (reason=%d)", reason); 374 switch (reason) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | pmksa_cache.h | 51 void *ctx, enum pmksa_free_reason reason), 76 void *ctx, enum pmksa_free_reason reason), 75 pmksa_cache_init(void (*free_cb)(struct rsn_pmksa_cache_entry *entry, void *ctx, enum pmksa_free_reason reason), void *ctx, struct wpa_sm *sm) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_client_read.c | 221 int reason; local 369 &reason, conn->disable_time_checks) 373 "validation failed (reason=%d)", reason); 374 switch (reason) {
|
/external/bluetooth/bluedroid/bta/gatt/ |
H A D | bta_gatts_act.c | 42 static void bta_gatts_conn_cback (tGATT_IF gatt_if, BD_ADDR bda, UINT16 conn_id, BOOLEAN connected, tGATT_DISCONN_REASON reason); 879 BOOLEAN connected, tGATT_DISCONN_REASON reason) 885 APPL_TRACE_DEBUG4 ("bta_gatts_conn_cback gatt_if=%d conn_id=%d connected=%d reason = 0x%04d", 886 gatt_if, conn_id, connected, reason); 905 cb_data.conn.reason = reason; 878 bta_gatts_conn_cback(tGATT_IF gatt_if, BD_ADDR bda, UINT16 conn_id, BOOLEAN connected, tGATT_DISCONN_REASON reason) argument
|
/external/bluetooth/bluedroid/bta/hh/ |
H A D | bta_hh_act.c | 823 UINT32 reason = p_data->hid_cback.data; /* Reason for closing (32-bit) */ local 827 conn_dat.status = (reason == HID_ERR_AUTH_FAILED) ? 864 UINT32 reason = p_data->hid_cback.data; /* Reason for closing (32-bit) */ local 872 /* Check reason for closing */ 873 if ((reason & (HID_L2CAP_CONN_FAIL|HID_L2CAP_REQ_FAIL)) || /* Failure to initialize connection (page timeout or l2cap error) */ 874 (reason == HID_ERR_AUTH_FAILED) || /* Authenication error (while initiating) */ 875 (reason == HID_ERR_L2CAP_FAILED)) /* Failure creating l2cap connection */ 879 conn_dat.status = (reason == HID_ERR_AUTH_FAILED) ? BTA_HH_ERR_AUTH_FAILED : BTA_HH_ERR;
|
/external/bluetooth/bluedroid/hci/src/ |
H A D | userial.c | 173 char reason = 0; local 190 reason = reset_signal(); 191 if (reason == USERIAL_RX_EXIT) 196 else if (reason == USERIAL_RX_FLOW_OFF) 201 else if (reason == USERIAL_RX_FLOW_ON)
|
H A D | userial_mct.c | 145 char reason = 0; local 173 reason = reset_signal(); 174 if (reason == USERIAL_RX_EXIT) 180 else if (reason == USERIAL_RX_FLOW_OFF) 185 else if (reason == USERIAL_RX_FLOW_ON)
|
/external/bluetooth/bluedroid/stack/gatt/ |
H A D | att_protocol.c | 107 BT_HDR *attp_build_err_cmd(UINT8 cmd_code, UINT16 err_handle, UINT8 reason) argument 119 UINT8_TO_STREAM (p, reason); 417 p_cmd = attp_build_err_cmd(p_msg->error.cmd_code, p_msg->error.handle, p_msg->error.reason);
|
/external/bluetooth/bluedroid/stack/hid/ |
H A D | hidh_conn.c | 183 p_dev->conn.disc_reason = HID_ERR_AUTH_FAILED; /* Save reason for disconnecting */ 260 p_hcon->disc_reason = HID_L2CAP_CONN_FAIL; /* In case disconnection occurs before security is completed, then set CLOSE_EVT reason code to 'connection failure' */ 322 UINT32 reason; local 334 reason = HID_L2CAP_REQ_FAIL ; 336 hh_cb.callback( dhandle, hh_cb.devices[dhandle].addr, HID_HDEV_EVT_CLOSE, reason, NULL ) ; 360 p_dev->conn.disc_reason = HID_ERR_AUTH_FAILED; /* Save reason for disconnecting */ 381 UINT32 reason; local 419 reason = HID_L2CAP_CONN_FAIL | (UINT32) result ; 420 hh_cb.callback( dhandle, hh_cb.devices[dhandle].addr, HID_HDEV_EVT_CLOSE, reason, NULL ) ; 429 p_hcon->disc_reason = HID_L2CAP_CONN_FAIL; /* In case disconnection occurs before security is completed, then set CLOSE_EVT reason cod 523 UINT32 reason; local [all...] |
/external/bluetooth/bluedroid/stack/l2cap/ |
H A D | l2c_ble.c | 223 ** Description This function returns the disconnect reason code. 225 ** Returns disconnect reason 231 UINT16 reason = 0; local 234 reason = p_lcb->disc_reason; 236 L2CAP_TRACE_DEBUG1 ("L2CA_GetDisconnectReason=%d ",reason); 238 return reason;
|
/external/bluetooth/bluedroid/stack/mcap/ |
H A D | mca_main.c | 289 ** the channel and sends it a close event. The reason 296 void mca_tc_close_ind(tMCA_TC_TBL *p_tbl, UINT16 reason) argument 303 close.reason = reason;
|
/external/bluetooth/bluedroid/stack/srvc/ |
H A D | srvc_eng.c | 33 static void srvc_eng_connect_cback (tGATT_IF gatt_if, BD_ADDR bda, UINT16 conn_id, BOOLEAN connected, tGATT_DISCONN_REASON reason); 342 BOOLEAN connected, tGATT_DISCONN_REASON reason) 344 GATT_TRACE_EVENT5 ("srvc_eng_connect_cback: from %08x%04x connected:%d conn_id=%d reason = 0x%04x", 346 (bda[4]<<8)+bda[5], connected, conn_id, reason); 341 srvc_eng_connect_cback(tGATT_IF gatt_if, BD_ADDR bda, UINT16 conn_id, BOOLEAN connected, tGATT_DISCONN_REASON reason) argument
|
/external/chromium/chrome/browser/chromeos/login/ |
H A D | update_screen.cc | 206 void UpdateScreen::ExitUpdate(UpdateScreen::ExitReason reason) { argument 211 switch(reason) {
|
/external/chromium/chrome/browser/extensions/ |
H A D | sandboxed_extension_unpacker.cc | 406 void SandboxedExtensionUnpacker::ReportFailure(FailureReason reason, argument 410 reason, NUM_FAILURE_REASONS);
|
/external/chromium/chrome/browser/sync/ |
H A D | profile_sync_service_harness.cc | 312 const std::string& reason) { 326 AwaitStatusChangeWithTimeout(kLiveSyncOperationTimeoutMs, reason); 328 return AwaitStatusChangeWithTimeout(kLiveSyncOperationTimeoutMs, reason); 332 AwaitStatusChangeWithTimeout(kLiveSyncOperationTimeoutMs, reason); 387 ProfileSyncServiceHarness* partner, const std::string& reason) { 403 return AwaitStatusChangeWithTimeout(kLiveSyncOperationTimeoutMs, reason); 408 const std::string& reason) { 415 new StateChangeTimeoutEvent(this, reason)); 612 std::string reason = "Waiting for encryption."; local 616 if (!AwaitStatusChangeWithTimeout(kLiveSyncOperationTimeoutMs, reason)) { 311 AwaitSyncCycleCompletion( const std::string& reason) argument 386 WaitUntilTimestampMatches( ProfileSyncServiceHarness* partner, const std::string& reason) argument 406 AwaitStatusChangeWithTimeout( int timeout_milliseconds, const std::string& reason) argument [all...] |
/external/chromium/chrome/browser/ui/gtk/ |
H A D | crypto_module_password_dialog.cc | 26 CryptoModuleBlockingDialogDelegate(browser::CryptoModulePasswordReason reason, argument 29 reason_(reason), 85 browser::CryptoModulePasswordReason reason, 106 browser::CryptoModulePasswordReason reason, 126 // Select an appropriate text for the reason. 130 switch (reason) { 216 CryptoModulePasswordReason reason, 219 (new CryptoModulePasswordDialog(slot_name, retry, reason, server, 225 CryptoModulePasswordReason reason, 227 return new CryptoModuleBlockingDialogDelegate(reason, serve 103 CryptoModulePasswordDialog( const std::string& slot_name, bool retry, browser::CryptoModulePasswordReason reason, const std::string& server, browser::CryptoModulePasswordCallback* callback) argument 214 ShowCryptoModulePasswordDialog(const std::string& slot_name, bool retry, CryptoModulePasswordReason reason, const std::string& server, CryptoModulePasswordCallback* callback) argument 224 NewCryptoModuleBlockingDialogDelegate( CryptoModulePasswordReason reason, const std::string& server) argument [all...] |
/external/chromium/net/http/ |
H A D | http_auth_handler_digest.cc | 93 CreateReason reason, 89 CreateAuthHandler( HttpAuth::ChallengeTokenizer* challenge, HttpAuth::Target target, const GURL& origin, CreateReason reason, int digest_nonce_count, const BoundNetLog& net_log, scoped_ptr<HttpAuthHandler>* handler) argument
|
H A D | http_auth_handler_negotiate.cc | 42 CreateReason reason, 47 if (is_unsupported_ || reason == CREATE_PREEMPTIVE) 119 // http://blog.michelbarneveld.nl/michel/archive/2009/11/14/the-reason-why-kb911149-and-kb908209-are-not-the-soluton.aspx 38 CreateAuthHandler( HttpAuth::ChallengeTokenizer* challenge, HttpAuth::Target target, const GURL& origin, CreateReason reason, int digest_nonce_count, const BoundNetLog& net_log, scoped_ptr<HttpAuthHandler>* handler) argument
|