blob: f2bac92b3126dc5278225021e5df471e9d467bd2 [file] [log] [blame] [view] [edit]
<link rel="stylesheet" href="../style.css" />
[TOC]
# fidl.test.dangerous.method.request.arguments.upper4
## **PROTOCOLS**
## DangerousRequestArguments {#DangerousRequestArguments}
*Defined in [fidl.test.dangerous.method.request.arguments.upper4/fidl.test.dangerous.method.request.arguments.upper4.test.fidl](https://cs.opensource.google/fuchsia/fuchsia/+/main:fidling/gen/src/tests/fidl/dangerous_identifiers/fidl.test.dangerous.method.request.arguments.upper4.test.fidl;l=7)*
### Method0 {#DangerousRequestArguments.Method0}
#### Request {#DangerousRequestArguments.Method0_Request}
<table>
<tr><th>Name</th><th>Type</th></tr>
<tr>
<td><code>AND</code></td>
<td>
<code><a class='link' href='#argtype'>argtype</a></code>
</td>
</tr></table>
### Method1 {#DangerousRequestArguments.Method1}
#### Request {#DangerousRequestArguments.Method1_Request}
<table>
<tr><th>Name</th><th>Type</th></tr>
<tr>
<td><code>ASSERT</code></td>
<td>
<code><a class='link' href='#argtype'>argtype</a></code>
</td>
</tr></table>
### Method10 {#DangerousRequestArguments.Method10}
#### Request {#DangerousRequestArguments.Method10_Request}
<table>
<tr><th>Name</th><th>Type</th></tr>
<tr>
<td><code>DECODABLE</code></td>
<td>
<code><a class='link' href='#argtype'>argtype</a></code>
</td>
</tr></table>
### Method11 {#DangerousRequestArguments.Method11}
#### Request {#DangerousRequestArguments.Method11_Request}
<table>
<tr><th>Name</th><th>Type</th></tr>
<tr>
<td><code>DEFERRED</code></td>
<td>
<code><a class='link' href='#argtype'>argtype</a></code>
</td>
</tr></table>
### Method12 {#DangerousRequestArguments.Method12}
#### Request {#DangerousRequestArguments.Method12_Request}
<table>
<tr><th>Name</th><th>Type</th></tr>
<tr>
<td><code>DYNAMIC</code></td>
<td>
<code><a class='link' href='#argtype'>argtype</a></code>
</td>
</tr></table>
### Method13 {#DangerousRequestArguments.Method13}
#### Request {#DangerousRequestArguments.Method13_Request}
<table>
<tr><th>Name</th><th>Type</th></tr>
<tr>
<td><code>ENCODER</code></td>
<td>
<code><a class='link' href='#argtype'>argtype</a></code>
</td>
</tr></table>
### Method14 {#DangerousRequestArguments.Method14}
#### Request {#DangerousRequestArguments.Method14_Request}
<table>
<tr><th>Name</th><th>Type</th></tr>
<tr>
<td><code>ERR</code></td>
<td>
<code><a class='link' href='#argtype'>argtype</a></code>
</td>
</tr></table>
### Method15 {#DangerousRequestArguments.Method15}
#### Request {#DangerousRequestArguments.Method15_Request}
<table>
<tr><th>Name</th><th>Type</th></tr>
<tr>
<td><code>EXTERN</code></td>
<td>
<code><a class='link' href='#argtype'>argtype</a></code>
</td>
</tr></table>
### Method16 {#DangerousRequestArguments.Method16}
#### Request {#DangerousRequestArguments.Method16_Request}
<table>
<tr><th>Name</th><th>Type</th></tr>
<tr>
<td><code>FIDL</code></td>
<td>
<code><a class='link' href='#argtype'>argtype</a></code>
</td>
</tr></table>
### Method17 {#DangerousRequestArguments.Method17}
#### Request {#DangerousRequestArguments.Method17_Request}
<table>
<tr><th>Name</th><th>Type</th></tr>
<tr>
<td><code>FLOAT</code></td>
<td>
<code><a class='link' href='#argtype'>argtype</a></code>
</td>
</tr></table>
### Method18 {#DangerousRequestArguments.Method18}
#### Request {#DangerousRequestArguments.Method18_Request}
<table>
<tr><th>Name</th><th>Type</th></tr>
<tr>
<td><code>FRIEND</code></td>
<td>
<code><a class='link' href='#argtype'>argtype</a></code>
</td>
</tr></table>
### Method19 {#DangerousRequestArguments.Method19}
#### Request {#DangerousRequestArguments.Method19_Request}
<table>
<tr><th>Name</th><th>Type</th></tr>
<tr>
<td><code>GET</code></td>
<td>
<code><a class='link' href='#argtype'>argtype</a></code>
</td>
</tr></table>
### Method2 {#DangerousRequestArguments.Method2}
#### Request {#DangerousRequestArguments.Method2_Request}
<table>
<tr><th>Name</th><th>Type</th></tr>
<tr>
<td><code>ATOMIC_NOEXCEPT</code></td>
<td>
<code><a class='link' href='#argtype'>argtype</a></code>
</td>
</tr></table>
### Method20 {#DangerousRequestArguments.Method20}
#### Request {#DangerousRequestArguments.Method20_Request}
<table>
<tr><th>Name</th><th>Type</th></tr>
<tr>
<td><code>HASH_CODE</code></td>
<td>
<code><a class='link' href='#argtype'>argtype</a></code>
</td>
</tr></table>
### Method21 {#DangerousRequestArguments.Method21}
#### Request {#DangerousRequestArguments.Method21_Request}
<table>
<tr><th>Name</th><th>Type</th></tr>
<tr>
<td><code>IMPORT</code></td>
<td>
<code><a class='link' href='#argtype'>argtype</a></code>
</td>
</tr></table>
### Method22 {#DangerousRequestArguments.Method22}
#### Request {#DangerousRequestArguments.Method22_Request}
<table>
<tr><th>Name</th><th>Type</th></tr>
<tr>
<td><code>INT</code></td>
<td>
<code><a class='link' href='#argtype'>argtype</a></code>
</td>
</tr></table>
### Method23 {#DangerousRequestArguments.Method23}
#### Request {#DangerousRequestArguments.Method23_Request}
<table>
<tr><th>Name</th><th>Type</th></tr>
<tr>
<td><code>INT8</code></td>
<td>
<code><a class='link' href='#argtype'>argtype</a></code>
</td>
</tr></table>
### Method24 {#DangerousRequestArguments.Method24}
#### Request {#DangerousRequestArguments.Method24_Request}
<table>
<tr><th>Name</th><th>Type</th></tr>
<tr>
<td><code>LET</code></td>
<td>
<code><a class='link' href='#argtype'>argtype</a></code>
</td>
</tr></table>
### Method25 {#DangerousRequestArguments.Method25}
#### Request {#DangerousRequestArguments.Method25_Request}
<table>
<tr><th>Name</th><th>Type</th></tr>
<tr>
<td><code>LONG</code></td>
<td>
<code><a class='link' href='#argtype'>argtype</a></code>
</td>
</tr></table>
### Method26 {#DangerousRequestArguments.Method26}
#### Request {#DangerousRequestArguments.Method26_Request}
<table>
<tr><th>Name</th><th>Type</th></tr>
<tr>
<td><code>MATCH</code></td>
<td>
<code><a class='link' href='#argtype'>argtype</a></code>
</td>
</tr></table>
### Method27 {#DangerousRequestArguments.Method27}
#### Request {#DangerousRequestArguments.Method27_Request}
<table>
<tr><th>Name</th><th>Type</th></tr>
<tr>
<td><code>MOVE</code></td>
<td>
<code><a class='link' href='#argtype'>argtype</a></code>
</td>
</tr></table>
### Method28 {#DangerousRequestArguments.Method28}
#### Request {#DangerousRequestArguments.Method28_Request}
<table>
<tr><th>Name</th><th>Type</th></tr>
<tr>
<td><code>NEVER</code></td>
<td>
<code><a class='link' href='#argtype'>argtype</a></code>
</td>
</tr></table>
### Method29 {#DangerousRequestArguments.Method29}
#### Request {#DangerousRequestArguments.Method29_Request}
<table>
<tr><th>Name</th><th>Type</th></tr>
<tr>
<td><code>NONE</code></td>
<td>
<code><a class='link' href='#argtype'>argtype</a></code>
</td>
</tr></table>
### Method3 {#DangerousRequestArguments.Method3}
#### Request {#DangerousRequestArguments.Method3_Request}
<table>
<tr><th>Name</th><th>Type</th></tr>
<tr>
<td><code>BITAND</code></td>
<td>
<code><a class='link' href='#argtype'>argtype</a></code>
</td>
</tr></table>
### Method30 {#DangerousRequestArguments.Method30}
#### Request {#DangerousRequestArguments.Method30_Request}
<table>
<tr><th>Name</th><th>Type</th></tr>
<tr>
<td><code>NULLPTR</code></td>
<td>
<code><a class='link' href='#argtype'>argtype</a></code>
</td>
</tr></table>
### Method31 {#DangerousRequestArguments.Method31}
#### Request {#DangerousRequestArguments.Method31_Request}
<table>
<tr><th>Name</th><th>Type</th></tr>
<tr>
<td><code>OFFSETOF</code></td>
<td>
<code><a class='link' href='#argtype'>argtype</a></code>
</td>
</tr></table>
### Method32 {#DangerousRequestArguments.Method32}
#### Request {#DangerousRequestArguments.Method32_Request}
<table>
<tr><th>Name</th><th>Type</th></tr>
<tr>
<td><code>OPTION</code></td>
<td>
<code><a class='link' href='#argtype'>argtype</a></code>
</td>
</tr></table>
### Method33 {#DangerousRequestArguments.Method33}
#### Request {#DangerousRequestArguments.Method33_Request}
<table>
<tr><th>Name</th><th>Type</th></tr>
<tr>
<td><code>PACKAGE</code></td>
<td>
<code><a class='link' href='#argtype'>argtype</a></code>
</td>
</tr></table>
### Method34 {#DangerousRequestArguments.Method34}
#### Request {#DangerousRequestArguments.Method34_Request}
<table>
<tr><th>Name</th><th>Type</th></tr>
<tr>
<td><code>PROC</code></td>
<td>
<code><a class='link' href='#argtype'>argtype</a></code>
</td>
</tr></table>
### Method35 {#DangerousRequestArguments.Method35}
#### Request {#DangerousRequestArguments.Method35_Request}
<table>
<tr><th>Name</th><th>Type</th></tr>
<tr>
<td><code>PUBLIC</code></td>
<td>
<code><a class='link' href='#argtype'>argtype</a></code>
</td>
</tr></table>
### Method36 {#DangerousRequestArguments.Method36}
#### Request {#DangerousRequestArguments.Method36_Request}
<table>
<tr><th>Name</th><th>Type</th></tr>
<tr>
<td><code>REGISTER</code></td>
<td>
<code><a class='link' href='#argtype'>argtype</a></code>
</td>
</tr></table>
### Method37 {#DangerousRequestArguments.Method37}
#### Request {#DangerousRequestArguments.Method37_Request}
<table>
<tr><th>Name</th><th>Type</th></tr>
<tr>
<td><code>RETHROW</code></td>
<td>
<code><a class='link' href='#argtype'>argtype</a></code>
</td>
</tr></table>
### Method38 {#DangerousRequestArguments.Method38}
#### Request {#DangerousRequestArguments.Method38_Request}
<table>
<tr><th>Name</th><th>Type</th></tr>
<tr>
<td><code>RUNTIME_TYPE</code></td>
<td>
<code><a class='link' href='#argtype'>argtype</a></code>
</td>
</tr></table>
### Method39 {#DangerousRequestArguments.Method39}
#### Request {#DangerousRequestArguments.Method39_Request}
<table>
<tr><th>Name</th><th>Type</th></tr>
<tr>
<td><code>SET</code></td>
<td>
<code><a class='link' href='#argtype'>argtype</a></code>
</td>
</tr></table>
### Method4 {#DangerousRequestArguments.Method4}
#### Request {#DangerousRequestArguments.Method4_Request}
<table>
<tr><th>Name</th><th>Type</th></tr>
<tr>
<td><code>BYTE</code></td>
<td>
<code><a class='link' href='#argtype'>argtype</a></code>
</td>
</tr></table>
### Method40 {#DangerousRequestArguments.Method40}
#### Request {#DangerousRequestArguments.Method40_Request}
<table>
<tr><th>Name</th><th>Type</th></tr>
<tr>
<td><code>SIZEOF</code></td>
<td>
<code><a class='link' href='#argtype'>argtype</a></code>
</td>
</tr></table>
### Method41 {#DangerousRequestArguments.Method41}
#### Request {#DangerousRequestArguments.Method41_Request}
<table>
<tr><th>Name</th><th>Type</th></tr>
<tr>
<td><code>STATIC_CAST</code></td>
<td>
<code><a class='link' href='#argtype'>argtype</a></code>
</td>
</tr></table>
### Method42 {#DangerousRequestArguments.Method42}
#### Request {#DangerousRequestArguments.Method42_Request}
<table>
<tr><th>Name</th><th>Type</th></tr>
<tr>
<td><code>STUB</code></td>
<td>
<code><a class='link' href='#argtype'>argtype</a></code>
</td>
</tr></table>
### Method43 {#DangerousRequestArguments.Method43}
#### Request {#DangerousRequestArguments.Method43_Request}
<table>
<tr><th>Name</th><th>Type</th></tr>
<tr>
<td><code>TEMPLATE</code></td>
<td>
<code><a class='link' href='#argtype'>argtype</a></code>
</td>
</tr></table>
### Method44 {#DangerousRequestArguments.Method44}
#### Request {#DangerousRequestArguments.Method44_Request}
<table>
<tr><th>Name</th><th>Type</th></tr>
<tr>
<td><code>TO_STRING</code></td>
<td>
<code><a class='link' href='#argtype'>argtype</a></code>
</td>
</tr></table>
### Method45 {#DangerousRequestArguments.Method45}
#### Request {#DangerousRequestArguments.Method45_Request}
<table>
<tr><th>Name</th><th>Type</th></tr>
<tr>
<td><code>TYPEDEF</code></td>
<td>
<code><a class='link' href='#argtype'>argtype</a></code>
</td>
</tr></table>
### Method46 {#DangerousRequestArguments.Method46}
#### Request {#DangerousRequestArguments.Method46_Request}
<table>
<tr><th>Name</th><th>Type</th></tr>
<tr>
<td><code>UINT16</code></td>
<td>
<code><a class='link' href='#argtype'>argtype</a></code>
</td>
</tr></table>
### Method47 {#DangerousRequestArguments.Method47}
#### Request {#DangerousRequestArguments.Method47_Request}
<table>
<tr><th>Name</th><th>Type</th></tr>
<tr>
<td><code>UNION</code></td>
<td>
<code><a class='link' href='#argtype'>argtype</a></code>
</td>
</tr></table>
### Method48 {#DangerousRequestArguments.Method48}
#### Request {#DangerousRequestArguments.Method48_Request}
<table>
<tr><th>Name</th><th>Type</th></tr>
<tr>
<td><code>UNSAFE</code></td>
<td>
<code><a class='link' href='#argtype'>argtype</a></code>
</td>
</tr></table>
### Method49 {#DangerousRequestArguments.Method49}
#### Request {#DangerousRequestArguments.Method49_Request}
<table>
<tr><th>Name</th><th>Type</th></tr>
<tr>
<td><code>USING</code></td>
<td>
<code><a class='link' href='#argtype'>argtype</a></code>
</td>
</tr></table>
### Method5 {#DangerousRequestArguments.Method5}
#### Request {#DangerousRequestArguments.Method5_Request}
<table>
<tr><th>Name</th><th>Type</th></tr>
<tr>
<td><code>CHAN</code></td>
<td>
<code><a class='link' href='#argtype'>argtype</a></code>
</td>
</tr></table>
### Method50 {#DangerousRequestArguments.Method50}
#### Request {#DangerousRequestArguments.Method50_Request}
<table>
<tr><th>Name</th><th>Type</th></tr>
<tr>
<td><code>VALUES_MAP</code></td>
<td>
<code><a class='link' href='#argtype'>argtype</a></code>
</td>
</tr></table>
### Method51 {#DangerousRequestArguments.Method51}
#### Request {#DangerousRequestArguments.Method51_Request}
<table>
<tr><th>Name</th><th>Type</th></tr>
<tr>
<td><code>VOID</code></td>
<td>
<code><a class='link' href='#argtype'>argtype</a></code>
</td>
</tr></table>
### Method52 {#DangerousRequestArguments.Method52}
#### Request {#DangerousRequestArguments.Method52_Request}
<table>
<tr><th>Name</th><th>Type</th></tr>
<tr>
<td><code>WHICH</code></td>
<td>
<code><a class='link' href='#argtype'>argtype</a></code>
</td>
</tr></table>
### Method53 {#DangerousRequestArguments.Method53}
#### Request {#DangerousRequestArguments.Method53_Request}
<table>
<tr><th>Name</th><th>Type</th></tr>
<tr>
<td><code>XOR_EQ</code></td>
<td>
<code><a class='link' href='#argtype'>argtype</a></code>
</td>
</tr></table>
### Method6 {#DangerousRequestArguments.Method6}
#### Request {#DangerousRequestArguments.Method6_Request}
<table>
<tr><th>Name</th><th>Type</th></tr>
<tr>
<td><code>CLASS</code></td>
<td>
<code><a class='link' href='#argtype'>argtype</a></code>
</td>
</tr></table>
### Method7 {#DangerousRequestArguments.Method7}
#### Request {#DangerousRequestArguments.Method7_Request}
<table>
<tr><th>Name</th><th>Type</th></tr>
<tr>
<td><code>CO_YIELD</code></td>
<td>
<code><a class='link' href='#argtype'>argtype</a></code>
</td>
</tr></table>
### Method8 {#DangerousRequestArguments.Method8}
#### Request {#DangerousRequestArguments.Method8_Request}
<table>
<tr><th>Name</th><th>Type</th></tr>
<tr>
<td><code>CONST</code></td>
<td>
<code><a class='link' href='#argtype'>argtype</a></code>
</td>
</tr></table>
### Method9 {#DangerousRequestArguments.Method9}
#### Request {#DangerousRequestArguments.Method9_Request}
<table>
<tr><th>Name</th><th>Type</th></tr>
<tr>
<td><code>CONTROLLER</code></td>
<td>
<code><a class='link' href='#argtype'>argtype</a></code>
</td>
</tr></table>
## **STRUCTS**
## **TYPE ALIASES**
<table>
<tr><th>Name</th><th>Value</th><th>Description</th></tr><tr id="argtype">
<td><a href="https://cs.opensource.google/fuchsia/fuchsia/+/main:fidling/gen/src/tests/fidl/dangerous_identifiers/fidl.test.dangerous.method.request.arguments.upper4.test.fidl;l=6">argtype</a></td>
<td>
<code>uint32</code></td>
<td>
</td>
</tr></table>