/external/snakeyaml/src/test/java/examples/collections/ |
ListFileldBeanTest.java | 95 private String role; field in class:ListFileldBeanTest.Developer 100 public Developer(String name, String role) { 102 this.role = role; 114 return role; 117 public void setRole(String role) { 118 this.role = role;
|
TypeSafeListNoGerericsTest.java | 64 assertEquals("creator", fred.get("role")); 104 private String role; field in class:TypeSafeListNoGerericsTest.Developer 109 public Developer(String name, String role) { 111 this.role = role; 123 return role; 126 public void setRole(String role) { 127 this.role = role;
|
TypeSafeListTest.java | 102 private String role; field in class:TypeSafeListTest.Developer 107 public Developer(String name, String role) { 109 this.role = role; 121 return role; 124 public void setRole(String role) { 125 this.role = role;
|
TypeSafeMapTest.java | 123 private String role; field in class:TypeSafeMapTest.Developer2 128 public Developer2(String name, String role) { 130 this.role = role; 142 return role; 145 public void setRole(String role) { 146 this.role = role; 155 public Developer222(String name, String role) { 156 super(name, role); [all...] |
TypeSafeListWithInterfaceTest.java | 126 private String role; field in class:TypeSafeListWithInterfaceTest.Developer 131 public Developer(String name, String role) { 133 this.role = role; 145 return role; 148 public void setRole(String role) { 149 this.role = role;
|
TypeSafeMap2Test.java | 154 private String role; field in class:TypeSafeMap2Test.Developer2 159 private Developer2(String name, String role) { 161 this.role = role; 173 return role; 176 public void setRole(String role) { 177 this.role = role; 200 return "Developer " + name + " " + role; 212 private SuperMan(String name, String role, boolean smart) [all...] |
TypeSafeSetImplementationsTest.java | 147 private String role; field in class:TypeSafeSetImplementationsTest.Developer 152 public Developer(String name, String role) { 154 this.role = role; 166 return role; 169 public void setRole(String role) { 170 this.role = role;
|
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
dbus_new_handlers_wps.c | 25 int role; /* 0 - not set, 1 - enrollee, 2 - registrar */ member in struct:wps_start_params 45 "dbus: WPS.Start - Wrong Role type, string required"); 47 "Role must be a string"); 52 params->role = 1; 54 params->role = 2; 56 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Unknown role %s", val); 186 if (os_strcmp(key, "Role") == 0) 217 * information about role (enrollee or registrar), authorization method 254 "dbus: WPS.Start - Pin required for registrar role"); 256 message, "Pin required for registrar role.") [all...] |
/frameworks/base/media/java/android/media/ |
AudioPort.java | 79 AudioPort(AudioHandle handle, int role, String name, 84 mRole = role; 106 * Get the audio port role 108 public int role() { method in class:AudioPort 210 String role = Integer.toString(mRole); local 213 role = "NONE"; 216 role = "SOURCE"; 219 role = "SINK"; 223 + ", mRole: " + role
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/setools/policyrep/ |
constraint.py | 21 from . import role namespace 231 return set(self._get_symbols(role_syms, role.role_factory))
|
/system/bt/bta/include/ |
bta_pan_api.h | 62 char *p_srv_name; /* service name for the PAN role */ 64 tBTA_SEC sec_mask; /* security setting for the role */ 72 tBTA_PAN_STATUS status; /* status of set role event */ 73 tBTA_PAN_ROLE role; /* PAN roles successfully registered */ member in struct:__anon73198 91 tBTA_PAN_ROLE local_role; /* Local device PAN role for the connection */ 92 tBTA_PAN_ROLE peer_role; /* Peer device PAN role for the connection */ 163 void BTA_PanSetRole(tBTA_PAN_ROLE role, tBTA_PAN_ROLE_INFO *p_user_info, tBTA_PAN_ROLE_INFO *p_gn_info,
|
/prebuilts/eclipse/maven/apache-maven-3.2.1/lib/ |
org.eclipse.sisu.plexus-0.0.0.M5.jar | |
/prebuilts/tools/common/m2/repository/org/eclipse/sisu/org.eclipse.sisu.plexus/0.0.0.M5/ |
org.eclipse.sisu.plexus-0.0.0.M5.jar | |
/external/google-tv-pairing-protocol/cpp/src/polo/wire/protobuf/ |
protobufwireadapter.cc | 240 pairing::message::OptionsMessage::ProtocolRole role = local 243 pairing::message::ConfigurationMessage message(encoding, role); 449 pairing::message::OptionsMessage::ProtocolRole role) { 450 switch (role) { 461 ProtobufWireAdapter::RoleFromProto(Options_RoleType role) { 462 switch (role) {
|
/external/google-tv-pairing-protocol/java/src/com/google/polo/pairing/message/ |
OptionsMessage.java | 30 * Representation of a specific role type. The numeric values 46 for (ProtocolRole role : ProtocolRole.values()) { 47 if (role.getAsInt() == intVal) { 48 return role; 60 * The preferred protocol role of the sender. 132 ProtocolRole role; local 147 role = ProtocolRole.DISPLAY_DEVICE; 150 role = ProtocolRole.INPUT_DEVICE; 156 role = ProtocolRole.INPUT_DEVICE; 159 role = ProtocolRole.DISPLAY_DEVICE [all...] |
/external/google-tv-pairing-protocol/java/src/com/google/polo/wire/protobuf/ |
ProtobufWireAdapter.java | 400 private int toProto(OptionsMessage.ProtocolRole role) { 401 switch (role) { 516 OptionsMessage.ProtocolRole role = OptionsMessage.ProtocolRole.UNKNOWN; local 520 role = OptionsMessage.ProtocolRole.INPUT_DEVICE; 523 role = OptionsMessage.ProtocolRole.DISPLAY_DEVICE; 527 return new ConfigurationMessage(enc, role);
|
/external/mp4parser/isoparser/src/main/java/com/coremedia/iso/boxes/threegpp26244/ |
LocationInformationBox.java | 18 private int role; field in class:LocationInformationBox 46 return role; 49 public void setRole(int role) { 50 this.role = role; 102 role = IsoTypeReader.readUInt8(content); 117 IsoTypeWriter.writeUInt8(byteBuffer, role);
|
/external/webrtc/webrtc/p2p/base/ |
transportcontroller_unittest.cc | 243 // Test that when one channel encounters a role conflict, the ICE role is 264 rtc::SSLRole role; local 265 EXPECT_FALSE(transport_controller_->GetSslRole("video", &role)); 266 EXPECT_TRUE(transport_controller_->GetSslRole("audio", &role)); 267 EXPECT_EQ(rtc::SSL_CLIENT, role); 425 // Need controlling ICE role to get in failed state.
|
/frameworks/av/services/audiopolicy/common/managerdefinitions/include/ |
Serializer.h | 93 static const char role[]; member in struct:android::MixPortTraits::Attributes 117 static const char role[]; /**< <device role: sink or source>. */ member in struct:android::DevicePortTraits::Attributes 118 static const char roleSource[]; /**< <attribute role source value>. */
|
/system/bt/stack/include/ |
avct_api.h | 66 /* Connection role. */ 70 /* Control role. */ 116 UINT8 role; /* Initiator/acceptor role */ member in struct:__anon73642 117 UINT8 control; /* Control role (Control/Target) */ 166 ** the p_cc->role parameter. When this function is called to 200 ** the p_cc->role parameter. When this function is called to 210 extern UINT16 AVCT_CreateBrowse(UINT8 handle, UINT8 role);
|
/system/bt/stack/pan/ |
pan_int.h | 31 ** This role is used to shutdown the profile. Used internally 72 UINT8 role; member in struct:__anon73963
|
/external/google-tv-pairing-protocol/java/src/com/google/polo/wire/json/ |
JsonMessageBuilder.java | 235 // Role 236 ProtocolRole role = ProtocolRole.fromIntVal( local 238 options.setProtocolRolePreference(role); 258 ProtocolRole role = ProtocolRole.fromIntVal( local 260 return new ConfigurationMessage(encoding, role);
|
/external/libweave/src/ |
component_manager_unittest.cc | 425 UserRole role; local 426 ASSERT_TRUE(manager_.GetMinimalRole("trait1.command1", &role, nullptr)); 427 EXPECT_EQ(UserRole::kUser, role); 429 ASSERT_TRUE(manager_.GetMinimalRole("trait1.command2", &role, nullptr)); 430 EXPECT_EQ(UserRole::kViewer, role); 432 ASSERT_TRUE(manager_.GetMinimalRole("trait2.command1", &role, nullptr)); 433 EXPECT_EQ(UserRole::kManager, role); 435 ASSERT_TRUE(manager_.GetMinimalRole("trait2.command2", &role, nullptr)); 436 EXPECT_EQ(UserRole::kOwner, role); 438 EXPECT_FALSE(manager_.GetMinimalRole("trait1.command3", &role, nullptr)) [all...] |
/external/selinux/checkpolicy/test/ |
dismod.c | 416 char *user, *role, *type; local 421 role = p->p_role_val_to_name[cur->context[0].role - 1]; 424 cur->u.name, cur->sid[0], user, role, type); 430 role = p->p_role_val_to_name[cur->context[0].role - 1]; 433 cur->u.name, cur->sid[0], user, role, type); 464 fprintf(fp, "role transition "); 477 fprintf(fp, "role allow "); 499 role_datum_t *role; local [all...] |
/external/tpm2/ |
SessionProcess.c | 192 // Checks if a policy session is required for a command. If a command requires DUP or ADMIN role 193 // authorization, then the handle that requires that role is the first handle in the command. This simplifies 194 // this checking. If a new command is created that requires multiple ADMIN role authorizations, then it will 196 // a) the command requires the DUP role, 197 // b) the command requires the ADMIN role and the authorized entity is an object and its adminWithPolicy 199 // c) the command requires the ADMIN role and the authorized entity is a permanent handle or an NV 214 AUTH_ROLE role = CommandAuthRole(commandCode, sessionIndex); local 216 if(role == AUTH_DUP) 218 if(role == AUTH_ADMIN) 247 // This function indicates if authValue is available and allowed for USER role authorization of an entity 781 AUTH_ROLE role = CommandAuthRole(commandCode, sessionIndex); local [all...] |