Searched defs:role (Results 76 - 100 of 182) sorted by relevance

12345678

/external/wpa_supplicant_8/hostapd/src/p2p/
H A Dp2p_invitation.c569 int p2p_invite(struct p2p_data *p2p, const u8 *peer, enum p2p_invite_role role, argument
576 p2p_dbg(p2p, "Request to invite peer " MACSTR " role=%d persistent=%d "
578 MAC2STR(peer), role, persistent_group, force_freq);
605 role != P2P_INVITE_ROLE_CLIENT) < 0)
608 if (persistent_group && role == P2P_INVITE_ROLE_CLIENT && !force_freq &&
629 p2p->inv_role = role;
/external/wpa_supplicant_8/src/p2p/
H A Dp2p_build.c330 enum p2p_role_indication role)
338 wpabuf_put_u8(buf, (u8) role); /* Role indication */
341 oper_class, channel, role);
328 p2p_buf_add_oob_go_neg_channel(struct wpabuf *buf, const char *country, u8 oper_class, u8 channel, enum p2p_role_indication role) argument
H A Dp2p_invitation.c569 int p2p_invite(struct p2p_data *p2p, const u8 *peer, enum p2p_invite_role role, argument
576 p2p_dbg(p2p, "Request to invite peer " MACSTR " role=%d persistent=%d "
578 MAC2STR(peer), role, persistent_group, force_freq);
605 role != P2P_INVITE_ROLE_CLIENT) < 0)
608 if (persistent_group && role == P2P_INVITE_ROLE_CLIENT && !force_freq &&
629 p2p->inv_role = role;
/external/wpa_supplicant_8/wpa_supplicant/src/p2p/
H A Dp2p_build.c330 enum p2p_role_indication role)
338 wpabuf_put_u8(buf, (u8) role); /* Role indication */
341 oper_class, channel, role);
328 p2p_buf_add_oob_go_neg_channel(struct wpabuf *buf, const char *country, u8 oper_class, u8 channel, enum p2p_role_indication role) argument
H A Dp2p_invitation.c569 int p2p_invite(struct p2p_data *p2p, const u8 *peer, enum p2p_invite_role role, argument
576 p2p_dbg(p2p, "Request to invite peer " MACSTR " role=%d persistent=%d "
578 MAC2STR(peer), role, persistent_group, force_freq);
605 role != P2P_INVITE_ROLE_CLIENT) < 0)
608 if (persistent_group && role == P2P_INVITE_ROLE_CLIENT && !force_freq &&
629 p2p->inv_role = role;
/external/bluetooth/bluedroid/bta/gatt/
H A Dbta_gattc_utils.c748 BOOLEAN bta_gattc_check_bg_conn (tBTA_GATTC_IF client_if, BD_ADDR remote_bda, UINT8 role) argument
761 role == HCI_ROLE_MASTER)
765 role == HCI_ROLE_SLAVE)
912 if (p_msg->int_conn.role == HCI_ROLE_SLAVE)
921 if (/*p_msg->int_conn.role == HCI_ROLE_SLAVE || */
924 p_msg->int_conn.role))
/external/bluetooth/bluedroid/bta/pan/
H A Dbta_pan_int.h88 tBTA_PAN_ROLE role; member in struct:__anon965
103 tBTA_PAN_ROLE local_role; /* local role */
104 tBTA_PAN_ROLE peer_role; /* peer role */
148 tBTA_PAN_ROLE local_role; /* local role */
149 tBTA_PAN_ROLE peer_role; /* peer role */
/external/bluetooth/bluedroid/stack/l2cap/
H A Dl2c_ble.c213 ** Description This function returns the connection role.
215 ** Returns link role.
220 UINT8 role = HCI_ROLE_UNKNOWN; local
225 role = p_lcb->link_role;
227 return role;
449 void l2cble_conn_comp(UINT16 handle, UINT8 role, BD_ADDR bda, tBLE_ADDR_TYPE type, argument
452 if (role == HCI_ROLE_MASTER)
/external/chromium_org/chrome/browser/drive/
H A Ddummy_drive_service.cc199 google_apis::drive::PermissionRole role,
196 AddPermission( const std::string& resource_id, const std::string& email, google_apis::drive::PermissionRole role, const EntryActionCallback& callback) argument
H A Ddrive_api_service.cc698 google_apis::drive::PermissionRole role,
708 request->set_role(role);
695 AddPermission( const std::string& resource_id, const std::string& email, google_apis::drive::PermissionRole role, const google_apis::EntryActionCallback& callback) argument
/external/chromium_org/chrome/browser/resources/chromeos/chromevox/chromevox/injected/
H A Dexterns.js5 Node.prototype.role;
/external/chromium_org/chrome/browser/sync_file_system/drive_backend/
H A Ddrive_service_on_worker.cc435 google_apis::drive::PermissionRole role,
432 AddPermission( const std::string& resource_id, const std::string& email, google_apis::drive::PermissionRole role, const google_apis::EntryActionCallback& callback) argument
/external/chromium_org/chrome/browser/ui/views/accessibility/
H A Daccessibility_event_router_views.cc170 !(state.role == ui::AX_ROLE_ALERT ||
171 state.role == ui::AX_ROLE_WINDOW)) {
176 switch (state.role) {
224 // If this is encountered, please file a bug with the role that wasn't
401 if (state.role == ui::AX_ROLE_ALERT)
466 if ((state.role == ui::AX_ROLE_ALERT ||
467 state.role == ui::AX_ROLE_DIALOG ||
468 state.role == ui::AX_ROLE_TOOLBAR) &&
476 if (state.role == ui::AX_ROLE_ALERT ||
477 state.role
494 FindDescendantWithAccessibleRole( views::View* view, ui::AXRole role) argument
[all...]
H A Daccessibility_event_router_views_unittest.cc81 ui::AXRole role)
83 role_(role) {
89 state->role = role_;
80 ViewWithNameAndRole(const base::string16& name, ui::AXRole role) argument
/external/chromium_org/content/browser/accessibility/
H A Daccessibility_win_browsertest.cc69 // IAccessible node and return true if we find one with the given role
80 base::win::ScopedVariant role; local
81 node->get_accRole(childid_self, role.Receive());
82 ASSERT_EQ(VT_I4, role.type());
88 printf("role=%s name=%s\n",
89 base::WideToUTF8(IAccessibleRoleToString(V_I4(&role))).c_str(),
92 if (expected_role == V_I4(&role) && expected_name == name) {
170 // This constructor can be used if the IA2 role will be the same as the MSAA
171 // role.
188 // Check that the name and role o
302 base::win::ScopedVariant role; local
327 base::win::ScopedVariant role; local
386 RoleVariantToString( const base::win::ScopedVariant& role) argument
[all...]
/external/chromium_org/content/renderer/accessibility/
H A Dblink_ax_tree_source.cc60 std::string GetEquivalentAriaRoleString(const ui::AXRole role) { argument
61 switch (role) {
181 dst->role = AXRoleFromBlink(src.role());
195 if (dst->role == ui::AX_ROLE_COLOR_WELL) {
203 if (dst->role == ui::AX_ROLE_INLINE_TEXT_BOX) {
268 if (dst->role == ui::AX_ROLE_HEADING)
270 else if ((dst->role == ui::AX_ROLE_TREE_ITEM ||
271 dst->role == ui::AX_ROLE_ROW) &&
278 if (dst->role
335 std::string role = GetEquivalentAriaRoleString(dst->role); local
[all...]
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/
H A Ddtlstransportchannel.cc189 bool DtlsTransportChannelWrapper::SetSslRole(talk_base::SSLRole role) { argument
191 if (ssl_role_ != role) {
198 ssl_role_ = role;
202 bool DtlsTransportChannelWrapper::GetSslRole(talk_base::SSLRole* role) const {
203 *role = ssl_role_;
H A Ddtlstransportchannel_unittest.cc90 void SetupChannels(int count, cricket::IceRole role) { argument
95 transport_->SetIceRole(role);
97 (role == cricket::ICEROLE_CONTROLLING) ? 1 : 2);
208 void CheckRole(talk_base::SSLRole role) { argument
209 if (role == talk_base::SSL_CLIENT) {
341 // Look at the handshake packets to see what role we played.
719 // Initial role for client1 is ACTPASS and client2 is ACTIVE.
736 // Initial role for client1 is ACTPASS and client2 is ACTIVE.
748 // Test that any change in role after the intial setup will result in failure.
764 // role a
[all...]
H A Dp2ptransportchannel.h79 virtual void SetIceRole(IceRole role);
115 virtual bool GetSslRole(talk_base::SSLRole* role) const {
119 virtual bool SetSslRole(talk_base::SSLRole role) { argument
/external/clang/test/CXX/temp/temp.decls/temp.friend/
H A Dp1.cpp289 void foo(Role<N, test13::Foo> &role) { argument
290 (void) role.x;
/external/bluetooth/bluedroid/bta/av/
H A Dbta_av_main.c58 /* the delay time in milliseconds to retry role switch */
422 if (/*((p_scb && (p_scb->role & BTA_AV_ROLE_AD_ACP)) ||
436 APPL_TRACE_DEBUG("scb hndl x%x, role x%x", p_scb->hndl, p_scb->role);
701 /* if the AV and AVK are both supported, it cannot support the CT role */
849 ((0 == (p_scb->role & BTA_AV_ROLE_AD_ACP)) || /* Outgoing connection or */
908 ** Description Receives the role change event from dm
925 /* loop through all the SCBs to find matching peer addresses and report the role change event */
948 /* restore role switch policy, if role switc
1050 UINT8 role; local
1098 UINT8 role; local
[all...]
/external/bluetooth/bluedroid/bta/hf_client/
H A Dbta_hf_client_int.h35 /* profile role for connection */
152 UINT8 role; /* initiator/acceptor role */ member in struct:__anon608
/external/bluetooth/bluedroid/bta/jv/
H A Dbta_jv_api.c1021 tBTA_JV_ROLE role, UINT16 remote_psm, UINT16 rx_mtu,
1033 p_msg->role = role;
1088 tBTA_JV_STATUS BTA_JvL2capStartServer(tBTA_SEC sec_mask, tBTA_JV_ROLE role, argument
1101 p_msg->role = role;
1355 tBTA_JV_ROLE role, UINT8 remote_scn, BD_ADDR peer_bd_addr,
1367 p_msg->role = role;
1429 tBTA_JV_ROLE role, UINT
1020 BTA_JvL2capConnect(tBTA_SEC sec_mask, tBTA_JV_ROLE role, UINT16 remote_psm, UINT16 rx_mtu, BD_ADDR peer_bd_addr, tBTA_JV_L2CAP_CBACK *p_cback) argument
1354 BTA_JvRfcommConnect(tBTA_SEC sec_mask, tBTA_JV_ROLE role, UINT8 remote_scn, BD_ADDR peer_bd_addr, tBTA_JV_RFCOMM_CBACK *p_cback, void* user_data) argument
1428 BTA_JvRfcommStartServer(tBTA_SEC sec_mask, tBTA_JV_ROLE role, UINT8 local_scn, UINT8 max_session, tBTA_JV_RFCOMM_CBACK *p_cback, void* user_data) argument
[all...]
/external/checkpolicy/test/
H A Ddismod.c416 char *user, *role, *type; local
421 role = p->p_role_val_to_name[cur->context[0].role - 1];
424 cur->u.name, cur->sid[0], user, role, type);
430 role = p->p_role_val_to_name[cur->context[0].role - 1];
433 cur->u.name, cur->sid[0], user, role, type);
464 fprintf(fp, "role transition ");
477 fprintf(fp, "role allow ");
499 role_datum_t *role; local
[all...]
/external/chromium_org/chrome/browser/chromeos/drive/
H A Dfake_file_system.cc220 google_apis::drive::PermissionRole role,
218 AddPermission(const base::FilePath& drive_file_path, const std::string& email, google_apis::drive::PermissionRole role, const FileOperationCallback& callback) argument

Completed in 1906 milliseconds

12345678