/external/smali/smalidea/src/main/java/org/jf/smalidea/psi/impl/ |
SmaliImplementsList.java | 78 @Override public Role getRole() { 79 return Role.IMPLEMENTS_LIST;
|
/external/webrtc/webrtc/base/ |
sslstreamadapterhelper.cc | 41 void SSLStreamAdapterHelper::SetServerRole(SSLRole role) { 42 role_ = role;
|
/hardware/intel/common/omx-components/videocodec/ |
OMXComponentDefines.h | 103 #define DECLARE_OMX_COMPONENT(NAME, ROLE, CLASS) \ 105 static const char *gRole = (const char *)(ROLE);\
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/setools/diff/ |
roles.py | 42 "Generating role differences from {0.left_policy} to {0.right_policy}".format(self)) 68 self.log.debug("Resetting role differences")
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/setools/ |
rolequery.py | 35 name The role name to match. 37 will be used on the role names.
|
/prebuilts/tools/common/m2/repository/org/apache/maven/reporting/maven-reporting-api/3.0/ |
maven-reporting-api-3.0.pom | 44 <role>Java Developer</role>
|
/system/bt/stack/avct/ |
avct_api.c | 123 ** the p_cc->role parameter. When this function is called to 139 AVCT_TRACE_API("AVCT_CreateConn: %d, control:%d", p_cc->role, p_cc->control); 152 if (p_cc->role == AVCT_INT) 227 ** the role parameter. When this function is called to 237 UINT16 AVCT_CreateBrowse (UINT8 handle, UINT8 role) 245 AVCT_TRACE_API("AVCT_CreateBrowse: %d", role); 262 if (role == AVCT_INT) 296 UNUSED(role);
|
/system/bt/stack/pan/ |
pan_int.h | 31 ** This role is used to shutdown the profile. Used internally 72 UINT8 role; member in struct:__anon72842
|
/external/autotest/server/cros/clique_lib/ |
clique_dut_control.py | 35 which should be derived to define a role to be performed by the DUT. Should 52 # Dummy result error reason to be used when exception is encountered in a role. 53 ROLE_SETUP_EXCEPTION = "Role Setup Exception! " 54 ROLE_EXECUTE_EXCEPTION = "Role Execute Exception! " 55 ROLE_CLEANUP_EXCEPTION = "Role Teardown Exception! " 57 # Dummy result error reason to be used when exception is encountered in a role. 98 """Find the relevant param value for a role from internal dictionary. 140 actions to be taken for the role is executed. 152 taken for the role is executed. 163 """Execute the sequence of actions to be taken for the role on the DU [all...] |
/external/selinux/checkpolicy/test/ |
dismod.c | 416 char *user, *role, *type; local 421 role = p->p_role_val_to_name[cur->context[0].role - 1]; 424 cur->u.name, cur->sid[0], user, role, type); 430 role = p->p_role_val_to_name[cur->context[0].role - 1]; 433 cur->u.name, cur->sid[0], user, role, type); 464 fprintf(fp, "role transition "); 477 fprintf(fp, "role allow "); 499 role_datum_t *role; local [all...] |
/external/selinux/libsepol/include/sepol/policydb/ |
policydb.h | 116 /* Options how a new object user and role should be decided */ 132 /* Role attributes */ 135 ebitmap_t dominates; /* set of roles dominated by this role */ 136 type_set_t types; /* set of authorized types for role */ 138 uint32_t bounds; /* bounds role, if exist */ 139 #define ROLE_ROLE 0 /* regular role in kernel policies */ 146 uint32_t role; /* current role */ member in struct:role_trans 149 uint32_t new_role; /* new role */ 154 uint32_t role; /* current role * member in struct:role_allow [all...] |
/system/bt/bta/jv/ |
bta_jv_api.c | 309 tBTA_JV_STATUS BTA_JvL2capConnectLE(tBTA_SEC sec_mask, tBTA_JV_ROLE role, 323 p_msg->role = role; 362 tBTA_JV_STATUS BTA_JvL2capConnect(int conn_type, tBTA_SEC sec_mask, tBTA_JV_ROLE role, 377 p_msg->role = role; 471 tBTA_JV_STATUS BTA_JvL2capStartServer(int conn_type, tBTA_SEC sec_mask, tBTA_JV_ROLE role, 485 p_msg->role = role; 522 tBTA_JV_STATUS BTA_JvL2capStartServerLE(tBTA_SEC sec_mask, tBTA_JV_ROLE role, [all...] |
/external/selinux/checkpolicy/ |
policy_define.c | 413 yyerror2("conflicting default role information for class %s", id); 2586 role_datum_t *role; local 2837 role_datum_t *role; local 3008 role_datum_t *role; local 3664 role_datum_t *role; local 4283 role_datum_t *role; local [all...] |
/external/selinux/sepolgen/src/sepolgen/ |
refpolicy.py | 42 ROLE = 4 46 field_to_str = ["source", "target", "object", "permission", "role", "destination" ] 48 "permission" : PERMS, "role" : ROLE, "destination" : DEST_TYPE } 127 return filter(lambda x: isinstance(x, Role), walktree(self)) 270 self.role = "" 280 'user:role:type:level'. 289 self.role = fields[1] 304 self.role == other.role and [all...] |
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/sepolgen/ |
refpolicy.py | 42 ROLE = 4 46 field_to_str = ["source", "target", "object", "permission", "role", "destination" ] 48 "permission" : PERMS, "role" : ROLE, "destination" : DEST_TYPE } 127 return filter(lambda x: isinstance(x, Role), walktree(self)) 270 self.role = "" 280 'user:role:type:level'. 289 self.role = fields[1] 304 self.role == other.role and [all...] |
/system/bt/bta/av/ |
bta_av_aact.c | 323 /* if start failed, clear role */ 324 p_scb->role &= ~BTA_AV_ROLE_START_INT; 352 (p_scb->use_rc == TRUE || (p_scb->role & BTA_AV_ROLE_AD_ACP))) 761 ** Description Switch role was not started and a timer was started. 762 ** another attempt to switch role now - still opening. 816 ** Description Handle the role changed event 828 APPL_TRACE_DEBUG("bta_av_role_res q_tag:%d, wait:x%x, role:x%x", p_scb->q_tag, p_scb->wait, p_scb->role); 829 if (p_scb->role & BTA_AV_ROLE_START_INT) 839 p_scb->role &= ~BTA_AV_ROLE_START_INT 1051 UINT8 role = BTA_AV_ROLE_AD_INT; local [all...] |
/external/jetty/src/java/org/eclipse/jetty/security/ |
ConstraintSecurityHandler.java | 157 //Equivalent to <auth-constraint> with list of <security-role-name>s 289 * <li>All users do not need to have a role defined in the deployment descriptor 290 * <li>The * role in a constraint applies to ANY role rather than all roles defined in 408 for (String role : mapping.getConstraint().getRoles()) 409 addRole(role); 421 public void addRole(String role) 423 boolean modified = _roles.add(role); 426 // Add the new role to currently defined any role role info [all...] |
SpnegoLoginService.java | 140 String role = clientName.substring(clientName.indexOf('@') + 1); local 145 LOG.debug("Client Default Role: " + role); 152 return _identityService.newUserIdentity(subject,user, new String[]{role});
|
/external/autotest/server/site_tests/firmware_PDPowerSwap/ |
control | 9 PURPOSE = "Servo based PD power role swap test"
|
/external/autotest/server/site_tests/firmware_PDVbusRequest/ |
control | 18 - PD Dual role mode is operational in the DUT
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/ |
ASN1Choice.java | 4 * Marker interface for CHOICE objects - if you implement this in a role your
|
/external/chromium-trace/catapult/firefighter/default/common/ |
query_filter.py | 27 'role',
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/integration/elastictranscoder/ |
test_layer1.py | 43 self.role_name = 'boto-ets-role-%s' % self.timestamp 49 self.role = self.iam.create_role(self.role_name) 50 self.role_arn = self.role['create_role_response']['create_role_result']\ 51 ['role']['arn']
|
/external/google-tv-pairing-protocol/cpp/src/polo/wire/protobuf/ |
protobufwireadapter.h | 133 // Converts a role type from the internal representation to the protobuf 136 pairing::message::OptionsMessage::ProtocolRole role); 138 // Converts a role type from the protobuf representation to the internal 141 Options_RoleType role);
|
/external/guava/ |
pom.xml | 52 <role>owner</role> 53 <role>developer</role>
|