/external/autotest/client/cros/chameleon/ |
chameleon_audio_helper.py | 29 role: The role of this audio port, that is, 'source' or 45 self.role = ids.get_role(port_id) 53 host, interface, and role. 57 self.host, self.interface, self.role) 259 role of audio_port. 262 if audio_port.role == 'sink': 280 role of audio_port. 298 if audio_port.role == 'sink': 313 Creates an AudioWidget with the role of audio_port. Pu [all...] |
/external/chromium-trace/catapult/third_party/gsutil/gslib/addlhelp/ |
projects.py | 55 "role": "OWNER" 60 "role": "OWNER" 65 "role": "READER"
|
/external/jetty/src/java/org/eclipse/jetty/security/ |
ConstraintAware.java | 49 /** Add a Role definition. 51 * @param role 53 void addRole(String role);
|
RoleInfo.java | 26 * Badly named class that holds the role and user data constraint info for a 116 public void addRole(String role) 118 _roles.add(role);
|
SpnegoUserIdentity.java | 52 public boolean isUserInRole(String role, Scope scope) 54 return _roles.contains(role);
|
/external/libweave/src/ |
mock_component_manager.h | 46 UserRole role, 113 UserRole role, 117 MockParseCommandInstance(command, command_origin, role, id, error)};
|
/external/selinux/libsemanage/src/ |
user_internal.h | 116 const char *role); 119 const char *role); 122 const char *role);
|
/external/selinux/policycoreutils/secon/ |
secon.1 | 39 \fB\-r\fR, \fB\-\-role\fR 40 show the role of the security context 114 If none of \fB\-\-user\fR, \fB\-\-role\fR, \fB\-\-type\fR, \fB\-\-level\fR or
|
/external/selinux/secilc/docs/ |
cil_context_statement.md | 8 - Anonymous - They are defined within the CIL labeling statement using user, role etc. identifiers. 43 <td align="left"><p>A single previously declared <code>role</code> identifier.</p></td> 68 This example uses an anonymous context where the previously declared `user role type levelrange` identifiers are used to specifiy two [`portcon`](cil_network_labeling_statements.md#portcon) statements:
|
/external/webrtc/webrtc/p2p/base/ |
faketransportcontroller.h | 85 void SetIceRole(IceRole role) override { role_ = role; } 108 bool SetSslRole(rtc::SSLRole role) override { 109 ssl_role_ = role; 112 bool GetSslRole(rtc::SSLRole* role) const override { 113 *role = ssl_role_; 391 bool GetSslRole(rtc::SSLRole* role) const override { 395 return channels_.begin()->second->GetSslRole(role); 473 explicit FakeTransportController(IceRole role) 478 SetIceRole(role); [all...] |
transportchannelimpl.h | 44 virtual void SetIceRole(IceRole role) = 0; 96 virtual bool SetSslRole(rtc::SSLRole role) = 0; 98 // Invoked when there is conflict in the ICE role between local and remote
|
transport_unittest.cc | 60 // role, tiebreaker and remote ice mode and credentials after offer and 83 // Changing the transport role from CONTROLLING to CONTROLLED. 100 // This test verifies that the callee's ICE role changes from controlled to 123 // This test verifies that the caller's ICE role changes from controlling to 146 // This test verifies that the caller's ICE role is still controlling after the 175 // Tests channel role is reversed after receiving ice-lite from remote.
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/setools/policyrep/ |
default.py | 67 role = sym.role_default(policy) 77 if role: 80 obj.default = role
|
/prebuilts/tools/common/m2/repository/com/thoughtworks/qdox/qdox/1.12/ |
qdox-1.12.pom | 70 <role>project lead</role>
77 <role>project founder</role>
84 <role>developer</role>
91 <role>developer</role>
98 <role>developer</role>
[all...] |
/external/selinux/sepolgen/ |
ChangeLog | 27 * understand role attributes 32 * audit2allow: one role/type pair per line 97 * fix to return length of role dict for len(roles) from Dan Walsh. 106 * Fix generation of role-type and role allow rules from Karl MacMillan. 121 calls with list parameters, support for role transition rules,
|
/external/webrtc/webrtc/libjingle/xmpp/ |
chatroommodule_unittest.cc | 206 "<item affiliation=\"owner\" role=\"participant\"/>" 215 "<item affiliation=\"member\" role=\"participant\"/>" 224 "<item affiliation=\"member\" role=\"participant\"/>" 235 "<item affiliation=\"member\" role=\"participant\"/>" 245 "<item affiliation=\"member\" role=\"participant\"/>" 262 "<item affiliation=\"member\" role=\"participant\"/>"
|
/prebuilts/go/darwin-x86/src/net/http/fcgi/ |
fcgi.go | 6 // Currently only the responder role is supported. 73 role uint16 82 br.role = binary.BigEndian.Uint16(content) 161 func (c *conn) writeBeginRequest(reqId uint16, role uint16, flags uint8) error { 162 b := [8]byte{byte(role >> 8), byte(role), flags}
|
/prebuilts/go/linux-x86/src/net/http/fcgi/ |
fcgi.go | 6 // Currently only the responder role is supported. 73 role uint16 82 br.role = binary.BigEndian.Uint16(content) 161 func (c *conn) writeBeginRequest(reqId uint16, role uint16, flags uint8) error { 162 b := [8]byte{byte(role >> 8), byte(role), flags}
|
/external/antlr/antlr-3.4/antlr3-maven-plugin/ |
pom.xml | 166 <role>Originator, version 3.1.3+</role> 174 <role>Project lead - ANTLR</role> 182 <role>Originator - prior version</role> 190 <role>Contributor - prior versions</role>
|
/external/antlr/antlr-3.4/runtime/Perl5/lib/ANTLR/Runtime/ |
Token.pm | 10 use Moose::Role; 79 no Moose::Role;
|
/external/chromium-trace/catapult/third_party/polymer/components/paper-icon-button/test/ |
a11y.html | 37 test('aria role is a button', function() { 38 assert.strictEqual(f1.getAttribute('role'), 'button');
|
/external/jetty/src/config/etc/ |
README.spnego | 26 <role-name>MORTBAY.ORG</role-name> <-- this is the domain that the user is a member of
|
/external/jsr330/ |
pom.xml | 77 <role>developer</role>
|
tck-pom.xml | 80 <role>developer</role>
|
/external/selinux/policycoreutils/semanage/ |
semanage.8 | 51 assigned to Linux users when they login and bounds their authorized role set) 58 user identities to authorized role sets. In most cases, only the
|