/system/bt/bta/jv/ |
bta_jv_int.h | 168 tBTA_JV_ROLE role; member in struct:__anon73624 189 tBTA_JV_ROLE role; member in struct:__anon73626 253 tBTA_JV_ROLE role; member in struct:__anon73632 265 tBTA_JV_ROLE role; member in struct:__anon73633
|
/system/bt/stack/smp/ |
smp_br_main.c | 338 tSMP_BR_ENTRY_TBL entry_table = smp_br_entry_table[p_cb->role]; 347 SMP_TRACE_DEBUG( "SMP Role: %s State: [%s (%d)], Event: [%s (%d)]", 348 (p_cb->role == HCI_ROLE_SLAVE) ? "Slave" : "Master", 366 state_table = smp_br_state_table[curr_state][p_cb->role];
|
/external/libxml2/os400/libxmlrpg/ |
xlink.rpgle | 20 * then the link detection layer will expand role="foo:myrole" 75 * @role: the role string
|
/external/selinux/checkpolicy/ |
policy_scan.l | 79 ROLE | 80 role { return(ROLE); }
|
/external/selinux/libsepol/tests/policies/test-hooks/ |
cmp_policy.conf | 423 role g_b_role_1 types g_b_type_1; 425 role g_b_role_2 types g_b_type_1; 426 role g_b_role_3 types g_b_type_1;
|
small-base.conf | 423 role g_b_role_1 types g_b_type_1; 425 role g_b_role_2 types g_b_type_1; 426 role g_b_role_3 types g_b_type_1;
|
/external/selinux/libsepol/tests/ |
test-expander.c | 23 * - check role, type, bool, user mapping 135 char *role_files[] = { "role-base.conf", "role-module.conf" };
|
/external/webrtc/webrtc/p2p/base/ |
portinterface.h | 47 // Methods to set/get ICE role and tiebreaker values. 48 virtual void SetIceRole(IceRole role) = 0; 107 // Signaled when Port discovers ice role conflict with the peer.
|
/hardware/intel/common/wrs_omxil_core/base/src/ |
cmodule.cpp | 161 bool CModule::QueryHavingThisRole(const OMX_STRING role) 165 if (!roles || !role) 169 if (!strcmp((OMX_STRING)&roles[i][0], role))
|
/prebuilts/tools/common/m2/repository/org/codehaus/gmaven/gmaven/1.5/ |
gmaven-1.5.pom | 139 <role>Maintainer</role> 140 <role>Avid Crack Smoker</role> 149 <role>Developer</role> 159 <role>Developer</role> 169 <role>Emeritus Developer</role> [all...] |
/system/bt/bta/av/ |
bta_av_int.h | 222 BTA_AV_RS_OK, /* the role switch result - successful */ 223 BTA_AV_RS_FAIL, /* the role switch result - failed */ 224 BTA_AV_RS_DONE /* the role switch is done - continue */ 403 /* initiator/acceptor role for adaption */ 454 tBTA_AV_API_OPEN open; /* used only before open and role switch 464 #define BTA_AV_WAIT_ROLE_SW_RES_OPEN 0x04 /* waiting for role switch result after API_OPEN, before STR_OPENED */ 465 #define BTA_AV_WAIT_ROLE_SW_RES_START 0x08 /* waiting for role switch result before streaming */ 466 #define BTA_AV_WAIT_ROLE_SW_STARTED 0x10 /* started while waiting for role switch result */ 468 #define BTA_AV_WAIT_CHECK_RC 0x40 /* set when the timer is used by role switch */ 469 #define BTA_AV_WAIT_ROLE_SW_FAILED 0x80 /* role switch failed * 514 UINT8 role; member in struct:__anon73183 [all...] |
/system/bt/bta/hf_client/ |
bta_hf_client_int.h | 35 /* profile role for connection */ 152 UINT8 role; /* initiator/acceptor role */ member in struct:__anon73326
|
/system/bt/bta/sys/ |
bta_sys.h | 129 #define BTA_SYS_ROLE_CHANGE 0x14 /* role change */ 140 /* conn callback for role / low power manager*/ 143 /* conn callback for role / low power manager*/
|
/external/selinux/libsepol/src/ |
link.c | 82 "common", "class", "role", "type/attribute", "user", 221 ERR(state->handle, "Found conflicting default role definitions"); 351 role_datum_t *role, *base_role, *new_role = NULL; local 354 role = (role_datum_t *) datum; 358 /* role already exists. check that it is what this 360 * modules both declare role foo_r) is checked during 362 if (role->flavor == ROLE_ATTRIB 365 "%s: Expected %s to be a role attribute, but it was already declared as a regular role.", 368 } else if (role->flavor != ROLE_ATTRI 793 role_datum_t *role = (role_datum_t *) datum; local 1097 role_datum_t *role, *dest_role = NULL; local 2412 role_datum_t *role, *sub_attr; local [all...] |
policydb.c | 683 * Initialize the role table by implicitly adding role 'object_r'. If 691 role_datum_t *role; local 693 role = calloc(1, sizeof(role_datum_t)); 694 if (!role) { 704 rc = symtab_insert(p, SYM_ROLES, key, role, 707 &role->s.value); 710 if (role->s.value != OBJECT_R_VAL) { 720 free(role); 784 role_datum_t *role; local 875 role_datum_t *role; local 2187 role_datum_t *role; local [all...] |
/docs/source.android.com/src/devices/audio/ |
tv.jd | 114 audio_port_role_t role; /* sink or source */ 129 audio_port_role_t role; /* sink or source */ 172 * As input, "port" contains the information (type, role, address etc...) 211 && audioPort.role() == AudioPort.ROLE_SOURCE 221 && audioPort.role() == AudioPort.ROLE_SINK
|
/external/autotest/site_utils/ |
deploy_production.py | 241 # Pick on server per role in the group to update first. Abort if any update 244 # Each server can be used to qualify only one role. 247 for role in roles: 248 if not role in server_per_role and not server in server_picked: 249 server_per_role[role] = (server, status, roles)
|
/frameworks/base/core/tests/bluetoothtests/src/android/bluetooth/ |
BluetoothStressTest.java | 185 * In this test, the local device plays the role of an A2DP sink, and initiates connections and 215 * In this test, the local device plays the role of an HFP audio gateway, and initiates 245 * In this test, the local device plays the role of a HID host, and initiates connections and 275 * In this test, the local device plays the role of a PANU, and initiates connections and 302 * In this test, the local device plays the role of a NAP which a remote PANU connects and
|
/external/selinux/libsepol/cil/src/ |
cil_binary.h | 87 * Insert cil role structure into sepol policydb. 89 * @param[in] pdb The policy database to insert the role into. 105 int cil_roletype_to_policydb(policydb_t *pdb, const struct cil_db *db, struct cil_role *role); 269 * Insert cil role transition structure into sepol policydb. 271 * @param[in] pdb The policy database to insert the role transition into. 279 * Insert cil role allow structure into sepol policydb. 281 * @param[in] pdb The policy database to insert the role allow into.
|
cil_internal.h | 449 void *role; member in struct:cil_userrole 499 void *role; /* role or attribute */ member in struct:cil_roletype 628 void *src; /* role or attribute */ 630 void *tgt; /* role or attribute */ 689 struct cil_role *role; member in struct:cil_context 1004 void cil_role_init(struct cil_role **role);
|
/frameworks/support/samples/Support4Demos/res/values/ |
strings.xml | 142 <string name="accessibility_roledescription_title">Accessibility/Role Description</string> 148 \n5. The first item has a role description, but the second item does not.</string> 150 <string name="accessibility_roledescription_role">Custom role description</string> 152 One possible use of role description is to notate heading levels in structured text:</string> 160 Do not set the role description for standard widgets. 161 \nThe following button has a role description, which is incorrect. 164 <string name="accessibility_roledescription_button_role">Button with incorrect role description</string>
|
/hardware/broadcom/wlan/bcmdhd/dhdutil/include/proto/ |
bcmevent.h | 190 #define WLC_E_AWDL_ROLE 97 /* AWDL Master/Slave/NE master role event */ 211 #define WLC_E_AWDL_SYNC_STATE_CHANGED 116 /* AWDL sync role changed */ 332 uint8 role; /* see I/F role */ member in struct:wl_event_data_if 338 #define WLC_E_IF_CHANGE 3 /* bsscfg role change */ 340 /* I/F role code in WLC_E_IF event */ 424 uint8 aw_role; /* AW role */
|
/system/bt/bta/pan/ |
bta_pan_act.c | 370 status = PAN_SetRole(p_data->api_set_role.role, sec, 375 set_role.role = p_data->api_set_role.role; 378 if(p_data->api_set_role.role & PAN_ROLE_NAP_SERVER ) 383 if(p_data->api_set_role.role & PAN_ROLE_GN_SERVER ) 388 if(p_data->api_set_role.role & PAN_ROLE_CLIENT ) 567 If there are, provide a special app_id to dm to enforce master role only. */
|
/external/wpa_supplicant_8/wpa_supplicant/ |
p2p_supplicant_sd.c | 482 u8 role; local 496 "Role"); 504 role = *pos++; 505 wpa_printf(MSG_DEBUG, "P2P: WSD for device role 0x%x", role); 507 /* TODO: role specific handling */ 1033 static void wfd_add_sd_req_role(struct wpabuf *tlvs, u8 id, u8 role, 1045 wpabuf_put_u8(tlvs, role); 1067 const u8 *dst, const char *role) 1074 subelems = os_strchr(role, ' '); [all...] |
/system/bt/include/ |
bt_target.h | 339 ** issued while there is a role switch in progress 1096 ** we will do an authentication check again on the new role 1194 /* This will enable the PANU role */ 1199 /* This will enable the GN role */ [all...] |