/prebuilts/tools/common/m2/repository/org/apache/httpcomponents/project/7/ |
project-7.pom | 128 <role>Emeritus PMC</role> 138 <role>Committer</role> 139 <role>PMC</role> 148 <role>Committer</role> 149 <role>PMC Chair</role> [all...] |
/external/autotest/client/tests/netpipe/ |
netpipe.py | 34 def run_once(self, server_ip, client_ip, role, bidirectional=False, 37 self.role = role 53 if role == 'server': 60 elif role == 'client': 69 raise error.TestError('invalid role specified') 101 if self.role == 'client':
|
/external/autotest/contrib/ |
deploy_puppet.sh | 11 given the server role and status and/or server name.\n\ 21 -r server role as in server db, e.g. 'drone'.\n\ 27 ROLE= 37 ROLE=$OPTARG 65 if [ -n "${ROLE}" ]; then 66 ROLE_OPT="-r ${ROLE}" 73 if [ -z "${ROLE}" ] && [ -z "${STATUS}" ] && [ -z "${HOSTNAME}"]; then
|
/external/selinux/libselinux/man/man5/ |
secolor.conf.5 | 54 user, role, type or range 69 A wildcard '*' may be used to match any undefined string for the user, role and type 110 role * = white black 150 role unconfined_r = red #ffffff 156 role user_r = white black 162 role xguest_r = black red 172 role * = black white
|
/external/selinux/libsepol/tests/ |
test-common.h | 30 * scope_type what scope the role should have (eg., SCOPE_DECL or SCOPE_REQ) 31 * decls integer array of decl id's that we expect the role to have in the scope table 56 * id string role identifier 57 * decl the decl block which we are looking in for the role datum 58 * types the array of string types which we expect the role has in its type ebitmap 60 * flags the expected flags in the role typeset (eg., * or ~) 62 * This is a utility function to test whether the type set associated with a role in a specific
|
/external/webrtc/webrtc/p2p/base/ |
transportdescriptionfactory.cc | 42 // If we are the initiator set role to "actpass". 78 // Setting DTLS role to active. 79 ConnectionRole role = (options.prefer_passive_role) ? local 82 if (!SetSecurityInfo(desc.get(), role)) { 97 TransportDescription* desc, ConnectionRole role) const { 121 // Assign security role. 122 desc->connection_role = role;
|
/frameworks/base/core/java/android/bluetooth/ |
BluetoothHealthAppConfiguration.java | 37 * Constructor to register the SINK role 55 * @param role {@link BluetoothHealth#SOURCE_ROLE} or 59 BluetoothHealthAppConfiguration(String name, int dataType, int role, int 63 mRole = role; 120 * Return the role associated with this application configuration. 147 int role = in.readInt(); 149 return new BluetoothHealthAppConfiguration(name, type, role,
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/setools/ |
contextquery.py | 39 role The role to match in the context. 41 will be used on the role. 59 role = CriteriaDescriptor("role_regex", "lookup_role") variable in class:ContextQuery 77 if self.role and not query.PolicyQuery._match_regex( 78 context.role, 79 self.role,
|
/prebuilts/tools/common/m2/repository/org/apache/commons/commons-lang3/3.2.1/ |
commons-lang3-3.2.1.pom | 60 <role>Java Developer</role> 70 <role>Java Developer</role> 79 <role>Java Developer</role> 88 <role>Java Developer</role> 98 <role>Java Developer</role> [all...] |
/system/bt/bta/include/ |
bta_pan_api.h | 62 char *p_srv_name; /* service name for the PAN role */ 64 tBTA_SEC sec_mask; /* security setting for the role */ 72 tBTA_PAN_STATUS status; /* status of set role event */ 73 tBTA_PAN_ROLE role; /* PAN roles successfully registered */ member in struct:__anon72077 91 tBTA_PAN_ROLE local_role; /* Local device PAN role for the connection */ 92 tBTA_PAN_ROLE peer_role; /* Peer device PAN role for the connection */ 163 void BTA_PanSetRole(tBTA_PAN_ROLE role, tBTA_PAN_ROLE_INFO *p_user_info, tBTA_PAN_ROLE_INFO *p_gn_info,
|
/prebuilts/tools/common/m2/repository/net/sourceforge/pmd/pmd/5.1.1/ |
pmd-5.1.1.pom | 66 <role>Developer</role> 75 <role>Developer</role> 84 <role>Developer</role> 92 <role>Developer</role> 100 <role>Developer</role> [all...] |