/external/chromium_org/v8/tools/testrunner/network/ |
H A D | distro.py | 43 def Assign(suites, peers): 49 for p in peers: 52 for p in peers: 67 # Sort peers, least needed_work first. 68 peers.sort(cmp=lambda x, y: cmp(x.needed_work, y.needed_work)) 72 while peers[index].needed_work <= 0: 74 if index == len(peers): 75 print("BIG FAT WARNING: Assigning tests to peers failed. " 79 peers.sort(cmp=lambda x, y: cmp(x.needed_work, y.needed_work)) 80 peers[ [all...] |
H A D | network_execution.py | 53 def __init__(self, suites, progress_indicator, context, peers, workspace): 68 self.peers = peers 142 distro.Assign(self.suites, self.peers) 145 for p in self.peers: 243 for p in self.peers: 248 for p in self.peers:
|
/external/chromium_org/v8/tools/testrunner/server/ |
H A D | main.py | 59 self.peers = [] 105 time.sleep(0.5) # Give those peers some time to reply. 108 for p in self.peers: 137 # If we know peers we don't trust, see if someone else trusts them. 139 for p in self.peers: 145 for p2 in self.peers: 148 # TODO: Ping for more peers waiting to be discovered. 153 for p in self.peers: 156 self.peers.append(peer) 162 for i in xrange(len(self.peers)) [all...] |
H A D | local_handler.py | 63 response = [ p.Pack() for p in self.server.daemon.peers 100 for p in self.server.daemon.peers:
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | ibss_rsn.h | 49 struct ibss_rsn_peer *peers; member in struct:ibss_rsn
|
H A D | ibss_rsn.c | 32 for (peer = ibss_rsn->peers; peer; peer = peer->next) 350 for (peer = ibss_rsn->peers; peer; peer = peer->next) { 545 peer->next = ibss_rsn->peers; 546 ibss_rsn->peers = peer; 633 /* remove all peers */ 634 wpa_printf(MSG_DEBUG, "%s: Remove all peers", __func__); 635 peer = ibss_rsn->peers; 640 ibss_rsn->peers = peer; 647 for (prev = NULL, peer = ibss_rsn->peers; peer != NULL; 651 ibss_rsn->peers [all...] |
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/ |
H A D | wpagui.cpp | 127 peers = NULL; 200 if (peers) { 201 peers->close(); 202 delete peers; 203 peers = NULL; 848 if (peers) 849 peers->event_notify(wm); 1424 if (peers) { 1425 peers->close(); 1426 delete peers; [all...] |
H A D | wpagui.h | 93 Peers *peers; member in class:WpaGui
|
H A D | peers.cpp | 16 #include "peers.h" 85 peers->setModel(&model); 86 peers->setResizeMode(QListView::Adjust); 87 peers->setDragEnabled(false); 88 peers->setSelectionMode(QAbstractItemView::NoSelection); 90 peers->setContextMenuPolicy(Qt::CustomContextMenu); 91 connect(peers, SIGNAL(customContextMenuRequested(const QPoint &)), 179 QModelIndex idx = peers->indexAt(pos); 299 menu->exec(peers->mapToGlobal(pos));
|
/external/chromium_org/third_party/libjingle/source/talk/examples/peerconnection/client/ |
H A D | main_wnd.h | 75 virtual void SwitchToPeerList(const Peers& peers) = 0; 106 virtual void SwitchToPeerList(const Peers& peers);
|
H A D | conductor.cc | 183 main_wnd_->SwitchToPeerList(client_->peers()); 199 main_wnd_->SwitchToPeerList(client_->peers()); 210 main_wnd_->SwitchToPeerList(client_->peers()); 394 main_wnd_->SwitchToPeerList(client_->peers()); 407 main_wnd_->SwitchToPeerList(client_->peers());
|
H A D | peer_connection_client.h | 73 const Peers& peers() const;
|
H A D | main_wnd.cc | 173 void MainWnd::SwitchToPeerList(const Peers& peers) { argument 178 AddListBoxItem(listbox_, "List of currently connected peers:", -1); 179 Peers::const_iterator i = peers.begin(); 180 for (; i != peers.end(); ++i) 187 if (auto_call_ && peers.begin() != peers.end()) {
|
H A D | peer_connection_client.cc | 100 const Peers& PeerConnectionClient::peers() const { function in class:PeerConnectionClient 362 // The body of the response will be a list of already connected peers.
|
/external/chromium_org/third_party/libjingle/source/talk/examples/peerconnection/client/linux/ |
H A D | main_wnd.cc | 96 // Creates a tree view, that we use to display the list of peers. 285 void GtkMainWnd::SwitchToPeerList(const Peers& peers) { argument 314 AddToList(peer_list_, "List of currently connected peers:", -1); 315 for (Peers::const_iterator i = peers.begin(); i != peers.end(); ++i) 318 if (autocall_ && peers.begin() != peers.end())
|
H A D | main_wnd.h | 54 virtual void SwitchToPeerList(const Peers& peers); 126 GtkWidget* peer_list_; // The list of peers.
|
/external/chromium_org/chrome/browser/ui/webui/chromeos/ |
H A D | nfc_debug_ui.cc | 36 const char kAdapterPeersProperty[] = "peers"; 542 NfcAdapter::PeerList peers; local 543 nfc_adapter_->GetPeers(&peers); 544 for (NfcAdapter::PeerList::const_iterator iter = peers.begin(); 545 iter != peers.end(); ++iter) { 567 NfcAdapter::PeerList peers; local 568 nfc_adapter_->GetPeers(&peers); 569 out->SetInteger(kAdapterPeersProperty, static_cast<int>(peers.size()));
|
/external/chromium_org/device/nfc/ |
H A D | nfc_adapter_chromeos.cc | 130 // peers and tags. 265 // Create peer objects for peers that were added before the adapter was set. 308 // Copy the tags and peers here and clear the original containers so that 310 PeerList peers; local 312 GetPeers(&peers); 317 for (PeerList::iterator iter = peers.begin(); 318 iter != peers.end(); ++iter) {
|
H A D | nfc_chromeos_unittest.cc | 321 // Tests that peer and record objects are created for all peers and records 361 NfcAdapter::PeerList peers; local 362 adapter_->GetPeers(&peers); 363 EXPECT_EQ(static_cast<size_t>(1), peers.size()); 365 NfcPeer* peer = peers[0];
|
/external/chromium_org/v8/tools/ |
H A D | run-tests.py | 558 peers = [] 560 peers = network_execution.GetPeers() 561 if not peers: 564 elif len(peers) == 1: 565 print("No other peers on the network; running tests locally.") 573 ctx, peers, workspace)
|
/external/bluetooth/bluedroid/btif/co/ |
H A D | bta_av_co.c | 156 tBTA_AV_CO_PEER peers[BTA_AV_NUM_STRS]; member in struct:__anon988 255 if (index >= BTA_AV_CO_NUM_ELEMENTS(bta_av_co_cb.peers)) 261 return &bta_av_co_cb.peers[index]; 1493 for (index = 0; index < BTA_AV_CO_NUM_ELEMENTS(bta_av_co_cb.peers); index++) 1495 p_peer = &bta_av_co_cb.peers[index]; 1698 for (index = 0; index < BTA_AV_CO_NUM_ELEMENTS(bta_av_co_cb.peers); index++) 1700 p_peer = &bta_av_co_cb.peers[index];
|
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
H A D | org.eclipse.ui.forms_3.5.2.r36_v20100702.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
/external/wpa_supplicant_8/hostapd/src/pae/ |
H A D | ieee802_1x_kay.c | 288 static struct ieee802_1x_kay_peer * get_peer_mi(struct dl_list *peers, argument 293 dl_list_for_each(peer, peers, struct ieee802_1x_kay_peer, list) { 1556 "KaY: The key server is not in my live peers list"); 1956 "KaY: Live peers list must not empty when generating fresh SAK"); 2076 * when to elect: whenever the live peers list changes 2094 /* elect the key server among the peers */ 2186 * protectFrames will be advised if the key server and one of its live peers are 2212 /* at least one of peers is MACsec-desired and requesting MACsec */ 2362 /* should delete MKA instance if there are not live peers
|
/external/wpa_supplicant_8/src/pae/ |
H A D | ieee802_1x_kay.c | 288 static struct ieee802_1x_kay_peer * get_peer_mi(struct dl_list *peers, argument 293 dl_list_for_each(peer, peers, struct ieee802_1x_kay_peer, list) { 1556 "KaY: The key server is not in my live peers list"); 1956 "KaY: Live peers list must not empty when generating fresh SAK"); 2076 * when to elect: whenever the live peers list changes 2094 /* elect the key server among the peers */ 2186 * protectFrames will be advised if the key server and one of its live peers are 2212 /* at least one of peers is MACsec-desired and requesting MACsec */ 2362 /* should delete MKA instance if there are not live peers
|
/external/wpa_supplicant_8/wpa_supplicant/src/pae/ |
H A D | ieee802_1x_kay.c | 288 static struct ieee802_1x_kay_peer * get_peer_mi(struct dl_list *peers, argument 293 dl_list_for_each(peer, peers, struct ieee802_1x_kay_peer, list) { 1556 "KaY: The key server is not in my live peers list"); 1956 "KaY: Live peers list must not empty when generating fresh SAK"); 2076 * when to elect: whenever the live peers list changes 2094 /* elect the key server among the peers */ 2186 * protectFrames will be advised if the key server and one of its live peers are 2212 /* at least one of peers is MACsec-desired and requesting MACsec */ 2362 /* should delete MKA instance if there are not live peers
|