/external/wpa_supplicant_8/hostapd/src/p2p/ |
H A D | p2p_invitation.c | 569 int p2p_invite(struct p2p_data *p2p, const u8 *peer, enum p2p_invite_role role, argument 576 p2p_dbg(p2p, "Request to invite peer " MACSTR " role=%d persistent=%d " 578 MAC2STR(peer), role, persistent_group, force_freq); 605 role != P2P_INVITE_ROLE_CLIENT) < 0) 608 if (persistent_group && role == P2P_INVITE_ROLE_CLIENT && !force_freq && 629 p2p->inv_role = role;
|
/external/wpa_supplicant_8/src/p2p/ |
H A D | p2p_build.c | 330 enum p2p_role_indication role) 338 wpabuf_put_u8(buf, (u8) role); /* Role indication */ 341 oper_class, channel, role); 328 p2p_buf_add_oob_go_neg_channel(struct wpabuf *buf, const char *country, u8 oper_class, u8 channel, enum p2p_role_indication role) argument
|
H A D | p2p_invitation.c | 569 int p2p_invite(struct p2p_data *p2p, const u8 *peer, enum p2p_invite_role role, argument 576 p2p_dbg(p2p, "Request to invite peer " MACSTR " role=%d persistent=%d " 578 MAC2STR(peer), role, persistent_group, force_freq); 605 role != P2P_INVITE_ROLE_CLIENT) < 0) 608 if (persistent_group && role == P2P_INVITE_ROLE_CLIENT && !force_freq && 629 p2p->inv_role = role;
|
/external/wpa_supplicant_8/wpa_supplicant/src/p2p/ |
H A D | p2p_build.c | 330 enum p2p_role_indication role) 338 wpabuf_put_u8(buf, (u8) role); /* Role indication */ 341 oper_class, channel, role); 328 p2p_buf_add_oob_go_neg_channel(struct wpabuf *buf, const char *country, u8 oper_class, u8 channel, enum p2p_role_indication role) argument
|
H A D | p2p_invitation.c | 569 int p2p_invite(struct p2p_data *p2p, const u8 *peer, enum p2p_invite_role role, argument 576 p2p_dbg(p2p, "Request to invite peer " MACSTR " role=%d persistent=%d " 578 MAC2STR(peer), role, persistent_group, force_freq); 605 role != P2P_INVITE_ROLE_CLIENT) < 0) 608 if (persistent_group && role == P2P_INVITE_ROLE_CLIENT && !force_freq && 629 p2p->inv_role = role;
|
/external/bluetooth/bluedroid/bta/gatt/ |
H A D | bta_gattc_utils.c | 748 BOOLEAN bta_gattc_check_bg_conn (tBTA_GATTC_IF client_if, BD_ADDR remote_bda, UINT8 role) argument 761 role == HCI_ROLE_MASTER) 765 role == HCI_ROLE_SLAVE) 912 if (p_msg->int_conn.role == HCI_ROLE_SLAVE) 921 if (/*p_msg->int_conn.role == HCI_ROLE_SLAVE || */ 924 p_msg->int_conn.role))
|
/external/bluetooth/bluedroid/bta/pan/ |
H A D | bta_pan_int.h | 88 tBTA_PAN_ROLE role; member in struct:__anon965 103 tBTA_PAN_ROLE local_role; /* local role */ 104 tBTA_PAN_ROLE peer_role; /* peer role */ 148 tBTA_PAN_ROLE local_role; /* local role */ 149 tBTA_PAN_ROLE peer_role; /* peer role */
|
/external/bluetooth/bluedroid/stack/l2cap/ |
H A D | l2c_ble.c | 213 ** Description This function returns the connection role. 215 ** Returns link role. 220 UINT8 role = HCI_ROLE_UNKNOWN; local 225 role = p_lcb->link_role; 227 return role; 449 void l2cble_conn_comp(UINT16 handle, UINT8 role, BD_ADDR bda, tBLE_ADDR_TYPE type, argument 452 if (role == HCI_ROLE_MASTER)
|
/external/chromium_org/chrome/browser/drive/ |
H A D | dummy_drive_service.cc | 199 google_apis::drive::PermissionRole role, 196 AddPermission( const std::string& resource_id, const std::string& email, google_apis::drive::PermissionRole role, const EntryActionCallback& callback) argument
|
H A D | drive_api_service.cc | 698 google_apis::drive::PermissionRole role, 708 request->set_role(role); 695 AddPermission( const std::string& resource_id, const std::string& email, google_apis::drive::PermissionRole role, const google_apis::EntryActionCallback& callback) argument
|
/external/chromium_org/chrome/browser/resources/chromeos/chromevox/chromevox/injected/ |
H A D | externs.js | 5 Node.prototype.role;
|
/external/chromium_org/chrome/browser/sync_file_system/drive_backend/ |
H A D | drive_service_on_worker.cc | 435 google_apis::drive::PermissionRole role, 432 AddPermission( const std::string& resource_id, const std::string& email, google_apis::drive::PermissionRole role, const google_apis::EntryActionCallback& callback) argument
|
/external/chromium_org/chrome/browser/ui/views/accessibility/ |
H A D | accessibility_event_router_views.cc | 170 !(state.role == ui::AX_ROLE_ALERT || 171 state.role == ui::AX_ROLE_WINDOW)) { 176 switch (state.role) { 224 // If this is encountered, please file a bug with the role that wasn't 401 if (state.role == ui::AX_ROLE_ALERT) 466 if ((state.role == ui::AX_ROLE_ALERT || 467 state.role == ui::AX_ROLE_DIALOG || 468 state.role == ui::AX_ROLE_TOOLBAR) && 476 if (state.role == ui::AX_ROLE_ALERT || 477 state.role 494 FindDescendantWithAccessibleRole( views::View* view, ui::AXRole role) argument [all...] |
H A D | accessibility_event_router_views_unittest.cc | 81 ui::AXRole role) 83 role_(role) { 89 state->role = role_; 80 ViewWithNameAndRole(const base::string16& name, ui::AXRole role) argument
|
/external/chromium_org/content/browser/accessibility/ |
H A D | accessibility_win_browsertest.cc | 69 // IAccessible node and return true if we find one with the given role 80 base::win::ScopedVariant role; local 81 node->get_accRole(childid_self, role.Receive()); 82 ASSERT_EQ(VT_I4, role.type()); 88 printf("role=%s name=%s\n", 89 base::WideToUTF8(IAccessibleRoleToString(V_I4(&role))).c_str(), 92 if (expected_role == V_I4(&role) && expected_name == name) { 170 // This constructor can be used if the IA2 role will be the same as the MSAA 171 // role. 188 // Check that the name and role o 302 base::win::ScopedVariant role; local 327 base::win::ScopedVariant role; local 386 RoleVariantToString( const base::win::ScopedVariant& role) argument [all...] |
/external/chromium_org/content/renderer/accessibility/ |
H A D | blink_ax_tree_source.cc | 60 std::string GetEquivalentAriaRoleString(const ui::AXRole role) { argument 61 switch (role) { 181 dst->role = AXRoleFromBlink(src.role()); 195 if (dst->role == ui::AX_ROLE_COLOR_WELL) { 203 if (dst->role == ui::AX_ROLE_INLINE_TEXT_BOX) { 268 if (dst->role == ui::AX_ROLE_HEADING) 270 else if ((dst->role == ui::AX_ROLE_TREE_ITEM || 271 dst->role == ui::AX_ROLE_ROW) && 278 if (dst->role 335 std::string role = GetEquivalentAriaRoleString(dst->role); local [all...] |
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/ |
H A D | dtlstransportchannel.cc | 189 bool DtlsTransportChannelWrapper::SetSslRole(talk_base::SSLRole role) { argument 191 if (ssl_role_ != role) { 198 ssl_role_ = role; 202 bool DtlsTransportChannelWrapper::GetSslRole(talk_base::SSLRole* role) const { 203 *role = ssl_role_;
|
H A D | dtlstransportchannel_unittest.cc | 90 void SetupChannels(int count, cricket::IceRole role) { argument 95 transport_->SetIceRole(role); 97 (role == cricket::ICEROLE_CONTROLLING) ? 1 : 2); 208 void CheckRole(talk_base::SSLRole role) { argument 209 if (role == talk_base::SSL_CLIENT) { 341 // Look at the handshake packets to see what role we played. 719 // Initial role for client1 is ACTPASS and client2 is ACTIVE. 736 // Initial role for client1 is ACTPASS and client2 is ACTIVE. 748 // Test that any change in role after the intial setup will result in failure. 764 // role a [all...] |
H A D | p2ptransportchannel.h | 79 virtual void SetIceRole(IceRole role); 115 virtual bool GetSslRole(talk_base::SSLRole* role) const { 119 virtual bool SetSslRole(talk_base::SSLRole role) { argument
|
/external/clang/test/CXX/temp/temp.decls/temp.friend/ |
H A D | p1.cpp | 289 void foo(Role<N, test13::Foo> &role) { argument 290 (void) role.x;
|
/external/bluetooth/bluedroid/bta/av/ |
H A D | bta_av_main.c | 58 /* the delay time in milliseconds to retry role switch */ 422 if (/*((p_scb && (p_scb->role & BTA_AV_ROLE_AD_ACP)) || 436 APPL_TRACE_DEBUG("scb hndl x%x, role x%x", p_scb->hndl, p_scb->role); 701 /* if the AV and AVK are both supported, it cannot support the CT role */ 849 ((0 == (p_scb->role & BTA_AV_ROLE_AD_ACP)) || /* Outgoing connection or */ 908 ** Description Receives the role change event from dm 925 /* loop through all the SCBs to find matching peer addresses and report the role change event */ 948 /* restore role switch policy, if role switc 1050 UINT8 role; local 1098 UINT8 role; local [all...] |
/external/bluetooth/bluedroid/bta/hf_client/ |
H A D | bta_hf_client_int.h | 35 /* profile role for connection */ 152 UINT8 role; /* initiator/acceptor role */ member in struct:__anon608
|
/external/bluetooth/bluedroid/bta/jv/ |
H A D | bta_jv_api.c | 1021 tBTA_JV_ROLE role, UINT16 remote_psm, UINT16 rx_mtu, 1033 p_msg->role = role; 1088 tBTA_JV_STATUS BTA_JvL2capStartServer(tBTA_SEC sec_mask, tBTA_JV_ROLE role, argument 1101 p_msg->role = role; 1355 tBTA_JV_ROLE role, UINT8 remote_scn, BD_ADDR peer_bd_addr, 1367 p_msg->role = role; 1429 tBTA_JV_ROLE role, UINT 1020 BTA_JvL2capConnect(tBTA_SEC sec_mask, tBTA_JV_ROLE role, UINT16 remote_psm, UINT16 rx_mtu, BD_ADDR peer_bd_addr, tBTA_JV_L2CAP_CBACK *p_cback) argument 1354 BTA_JvRfcommConnect(tBTA_SEC sec_mask, tBTA_JV_ROLE role, UINT8 remote_scn, BD_ADDR peer_bd_addr, tBTA_JV_RFCOMM_CBACK *p_cback, void* user_data) argument 1428 BTA_JvRfcommStartServer(tBTA_SEC sec_mask, tBTA_JV_ROLE role, UINT8 local_scn, UINT8 max_session, tBTA_JV_RFCOMM_CBACK *p_cback, void* user_data) argument [all...] |
/external/checkpolicy/test/ |
H A D | dismod.c | 416 char *user, *role, *type; local 421 role = p->p_role_val_to_name[cur->context[0].role - 1]; 424 cur->u.name, cur->sid[0], user, role, type); 430 role = p->p_role_val_to_name[cur->context[0].role - 1]; 433 cur->u.name, cur->sid[0], user, role, type); 464 fprintf(fp, "role transition "); 477 fprintf(fp, "role allow "); 499 role_datum_t *role; local [all...] |
/external/chromium_org/chrome/browser/chromeos/drive/ |
H A D | fake_file_system.cc | 220 google_apis::drive::PermissionRole role, 218 AddPermission(const base::FilePath& drive_file_path, const std::string& email, google_apis::drive::PermissionRole role, const FileOperationCallback& callback) argument
|