/packages/apps/Exchange/exchange2/tests/src/com/android/exchange/adapter/ |
CalendarSyncAdapterTests.java | 440 // The organizer should be "accepted", the unknown attendee "none" 453 // The organizer should be "accepted", and our user/attendee should be "done" even though 467 // The organizer should be "accepted", and our user/attendee should be "accepted" (because
|
/packages/apps/Exchange/tests/src/com/android/exchange/adapter/ |
CalendarSyncAdapterTests.java | 440 // The organizer should be "accepted", the unknown attendee "none" 453 // The organizer should be "accepted", and our user/attendee should be "done" even though 467 // The organizer should be "accepted", and our user/attendee should be "accepted" (because
|
/packages/apps/Gallery2/jni_mosaic/feature_mos/src/mosaic/ |
Blend.h | 37 // of the input image frames for them to be accepted for blending in the
|
/packages/apps/LegacyCamera/jni/feature_mos/src/mosaic/ |
Blend.h | 37 // of the input image frames for them to be accepted for blending in the
|
/sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/editors/layout/configuration/ |
ConfigurationClient.java | 54 * @return true if the change was accepted, false if it was rejected.
|
/external/ceres-solver/include/ceres/ |
iteration_callback.h | 70 // sufficiently, but it was accepted because of the relaxed 77 // Whether or not the minimizer accepted this step or not. If the
|
/external/chromium/chrome/browser/chromeos/login/ |
wizard_controller.h | 62 // Returns true if EULA has been accepted. 68 // Marks EULA status as accepted.
|
/external/chromium/chrome/browser/sync/ |
profile_sync_service_harness.h | 96 // will wait until the passphrase has been accepted. 154 // The sync client is waiting for its passphrase to be accepted by the
|
profile_sync_service_harness.cc | 247 // The passphrase has been accepted, and sync has been restarted. 302 // Passphrase is already accepted; don't wait. 308 "Waiting for passphrase accepted.");
|
/external/wpa_supplicant_8/src/ap/ |
ap_drv_ops.h | 185 const u8 *mac, int accepted, 190 return hapd->driver->set_radius_acl_auth(hapd->drv_priv, mac, accepted,
|
/external/xmp_toolkit/XMPCore/src/com/adobe/xmp/impl/ |
Base64.java | 25 /** marker for accepted whitespace bytes */ 183 * beside the bas64 chars, LF, CR, tab and space are accepted.
|
Utils.java | 300 * are accepted, above all characters (which is not entirely 451 * are accepted, above all characters (which is not entirely 468 * are accepted, above all characters (which is not entirely
|
/frameworks/base/docs/html/guide/topics/manifest/ |
compatible-screens-element.jd | 78 <p>Accepted values:</p> 90 <p>Accepted values:</p>
|
/libcore/luni/src/test/java/libcore/java/net/ |
OldServerSocketTest.java | 218 Socket accepted = newSocket.accept(); local 219 fail("SocketTimeoutException was not thrown: " + accepted);
|
/external/bluetooth/bluedroid/stack/include/ |
l2c_api.h | 488 ** Returns L2CAP_DW_SUCCESS, if data accepted, else FALSE 489 ** L2CAP_DW_CONGESTED, if data accepted and the channel is congested 724 ** Returns L2CAP_DW_SUCCESS, if data accepted, else FALSE 725 ** L2CAP_DW_CONGESTED, if data accepted and the channel is congested [all...] |
/external/oprofile/events/mips/74K/ |
events | 83 event:0x44 counters:0,2 um:zero minimum:500 name:OCP_ALL_REQUESTS : 68-0 All OCP requests accepted 84 event:0x45 counters:0,2 um:zero minimum:500 name:OCP_READ_REQUESTS : 69-0 OCP read requests accepted 85 event:0x46 counters:0,2 um:zero minimum:500 name:OCP_WRITE_REQUESTS : 70-0 OCP write requests accepted 153 event:0x444 counters:0,2 um:zero minimum:500 name:OCP_ALL_CACHEABLE_REQUESTS : 68-1 All OCP cacheable requests accepted 154 event:0x445 counters:0,2 um:zero minimum:500 name:OCP_READ_CACHEABLE_REQUESTS : 69-1 OCP cacheable read request accepted 155 event:0x446 counters:0,2 um:zero minimum:500 name:OCP_WRITE_CACHEABLE_REQUESTS : 70-1 OCP cacheable write request accepted
|
/packages/apps/Launcher2/src/com/android/launcher2/ |
DragController.java | 656 boolean accepted = false; 665 accepted = true; 668 accepted); 677 boolean accepted = false; 683 accepted = true; 686 mDragObject.dragSource.onDropCompleted((View) dropTarget, mDragObject, false, accepted);
|
/external/openssh/ |
sshd.0 | 378 principals for the certificate to be accepted. This option is 414 on the line is revoked and must not ever be accepted. Only one marker 422 accepted (by that line) even if it matched another pattern on the line. 438 When performing host authentication, authentication is accepted if any 448 at the beginning of the key line, and are never accepted for 456 authentication is accepted if valid information can be found from either 477 # A CA key, accepted for any host in *.mydomain.com or *.mydomain.org [all...] |
sshconnect1.c | 138 /* The server returns success if it accepted the authentication. */ 142 debug("RSA authentication accepted by server."); 312 debug("RSA authentication accepted by server."); 372 debug("Rhosts or /etc/hosts.equiv with RSA host authentication accepted by server."); 693 /* check whether the connection was accepted without authentication. */
|
/external/chromium/chrome/browser/autocomplete/ |
autocomplete_edit_view_browsertest.cc | 733 // Keyword should also be accepted by typing an ideographic space. 748 // Keyword shouldn't be accepted by pasting. 759 // Keyword shouldn't be accepted by pressing space with a trailing 766 // Keyword shouldn't be accepted by deleting the trailing space. 772 // Keyword shouldn't be accepted by pressing space before a trailing space. 779 // Keyword should be accepted by pressing space in the middle of context and 789 // Keyword shouldn't be accepted by pasting "foo bar". 803 // Keyword shouldn't be accepted for case like: "foo b|ar" -> "foo b |ar". 811 // Keyword could be accepted by pressing space with a selected range at the [all...] |
/external/wpa_supplicant_8/hostapd/ |
README | 160 Unauthorized state and only IEEE 802.1X frames are accepted at this 164 station are accepted. 338 # Set of accepted key management algorithms (WPA-PSK, WPA-EAP, or both). The 342 # Set of accepted cipher suites (encryption algorithms) for pairwise keys 366 # accepted (e.g., 'eth0' or 'eth0 wlan0wds0'. This list should include all
|
/external/okhttp/src/main/java/com/squareup/okhttp/internal/spdy/ |
SpdyConnection.java | 292 * locally, nor accepted from the remote peer. Existing streams are not 392 * this peer accepted the connection. 400 * peer accepted the connection.
|
/external/wpa_supplicant_8/wpa_supplicant/ |
wpa_supplicant.conf | 544 # proto: list of accepted protocols 549 # key_mgmt: list of accepted authenticated key management protocols 576 # pairwise: list of accepted pairwise (unicast) ciphers for WPA 583 # group: list of accepted group (broadcast/multicast) ciphers for WPA 635 # eap: space-separated list of accepted EAP methods [all...] |
/libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/ |
ServerHandshakeImpl.java | 577 X509Certificate[] accepted; local 580 accepted = tm.getAcceptedIssuers(); 588 requestedClientCertTypes, accepted);
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/ |
tipc_config.h | 66 * Accepted by own node, or by remote node only if remote management enabled. 88 * Accepted by own node, or by remote node only if remote management enabled 121 * Accepted by own node only; cannot be used on a remote node.
|