/packages/apps/Contacts/src/com/android/contacts/ |
ContactPresenceIconUtil.java | 24 * Define the contact present show policy in Contacts
|
/packages/apps/Email/src/com/android/email/ |
SecurityPolicy.java | 87 * Get the security policy instance 114 * Compute the aggregate policy for all accounts that require it, and record it. 123 * @return a policy representing the strongest aggregate. If no policy sets are defined, 124 * a lightweight "nothing required" policy will be returned. Never null. 172 * Return updated aggregate policy, from cached value if possible 192 * API: Query used to determine if a given policy is "possible" (irrespective of current 229 * Typically used when deleting accounts, although we may use it for server-side policy 238 * API: Query used to determine if a given policy is "active" (the device is operating at 261 // check each policy explicitl [all...] |
/external/ipsec-tools/src/libipsec/ |
test-policy.c | 1 /* $NetBSD: test-policy.c,v 1.4 2006/09/09 16:22:09 manu Exp $ */ 3 /* $KAME: test-policy.c,v 1.16 2003/08/26 03:24:08 itojun Exp $ */ 151 test1sub2(policy, family) 152 char *policy; 174 len = ipsec_get_policylen(policy); 179 if (setsockopt(so, proto, optname, policy, len) < 0) { 186 memcpy(getbuf, policy, sizeof(struct sadb_x_policy));
|
ipsec_strerror.3 | 38 .Nd error messages for the IPsec policy manipulation library 53 which is used to pass an error code from the IPsec policy manipulation
|
ipsec_strerror.c | 54 "Invalid security policy", /*EIPSEC_INVAL_POLICY*/ 78 "Policy priority not compiled in", /*EIPSEC_PRIORITY_NOT_COMPILED*/
|
policy_parse.y | 35 * IN/OUT bound policy configuration take place such below: 36 * in <priority> <policy> 37 * out <priority> <policy> 51 * <policy> is one of following: 623 caddr_t policy; 625 policy = policy_parse(msg, msglen); 626 if (policy == NULL) { 633 return policy;
|
/frameworks/base/media/libmedia/ |
IMediaMetadataRetriever.cpp | 61 SchedPolicy policy; local 62 get_sched_policy(myTid(), &policy); local 63 data.writeInt32(policy); 68 SchedPolicy policy = (SchedPolicy) data.readInt32(); local 69 set_sched_policy(myTid(), policy); local
|
/dalvik/libcore/security/src/main/java/org/apache/harmony/security/fortress/ |
PolicyUtils.java | 49 * for various policy and configuration providers. 342 * Such functionality is applicable to security policy files, for example. 398 * dynamic policy location via system properties is allowed. 401 public static final String POLICY_ALLOW_DYNAMIC = "policy.allowSystemProperty"; //$NON-NLS-1$ 406 * (in security properties values, policy files, etc). 409 public static final String POLICY_EXPAND = "policy.expandProperties"; //$NON-NLS-1$ 432 * Obtains a list of locations for a policy or configuration provider. 443 * {@link #POLICY_ALLOW_DYNAMIC the "policy.allowSystemProperty" property}) 444 * to use additional policy location, read the system property under the 456 * of the "policy.expandProperties" security setting. [all...] |
/external/webkit/WebCore/platform/win/ |
ClipboardWin.cpp | 398 ClipboardWin::ClipboardWin(bool isForDragging, IDataObject* dataObject, ClipboardAccessPolicy policy) 399 : Clipboard(policy, isForDragging) 405 ClipboardWin::ClipboardWin(bool isForDragging, WCDataObject* dataObject, ClipboardAccessPolicy policy) 406 : Clipboard(policy, isForDragging) 464 if (policy() != ClipboardWritable || !m_writableDataObject) 484 if (policy() != ClipboardWritable) 495 if (policy() != ClipboardReadable || !m_dataObject) { 512 if (policy() != ClipboardWritable || !m_writableDataObject) 555 if (policy() != ClipboardReadable && policy() != ClipboardTypesReadable [all...] |
/external/webkit/WebKit/gtk/webkit/ |
webkitwebframe.cpp | 253 * WebKitWebFrame::scrollbars-policy-changed: 256 * Signal emitted when policy for one or both of the scrollbars of 258 * policy to the container that holds the #WebKitWebFrame if it is 269 * WebKitWebFrame:horizontal-scrollbar-policy and 270 * WebKitWebFrame:vertical-scrollbar-policy properties. 277 webkit_web_frame_signals[SCROLLBARS_POLICY_CHANGED] = g_signal_new("scrollbars-policy-changed", 333 * WebKitWebFrame:horizontal-scrollbar-policy: 335 * Determines the current policy for the horizontal scrollbar of 336 * the frame. For the main frame, make sure to set the same policy 343 g_param_spec_enum("horizontal-scrollbar-policy", [all...] |
/external/iproute2/ip/ |
xfrm_monitor.c | 63 family = xacq->policy.sel.family; 81 xfrm_policy_info_print(&xacq->policy, tb, fp, " ", " policy "); 148 fprintf(fp, "Flushed policy "); 220 fprintf(fp, " policy updated "); 331 } else if (matches(*argv, "policy") == 0) {
|
/hardware/ti/wlan/wl1271/stad/src/Application/ |
scanMngrApi.h | 81 * Scan was not attempted because the policy defines 86 * available for scan, according to the defined policy. 179 * \param pNeighborAPsOnly - Indicates whether to scan only neighbor APs (or all channels defined by the policy) 248 * which are then given priority over policy channels in the discovery phase 339 * \brief Print scan policy 341 * \param scanPolicy - scan policy to print
|
/system/wlan/ti/wilink_6_1/stad/src/Application/ |
scanMngrApi.h | 81 * Scan was not attempted because the policy defines 86 * available for scan, according to the defined policy. 179 * \param pNeighborAPsOnly - Indicates whether to scan only neighbor APs (or all channels defined by the policy) 248 * which are then given priority over policy channels in the discovery phase 337 * \brief Print scan policy 339 * \param scanPolicy - scan policy to print
|
/dalvik/libcore/security/src/main/java/org/apache/harmony/security/ |
DefaultPolicyScanner.java | 35 * This is a basic high-level tokenizer of policy files. It takes in a stream, 58 * {@link org.apache.harmony.security.fortress.DefaultPolicy default policy description}. 73 * Specific exception class to signal policy file syntax error. 109 * policy stream reader 398 * Compound token representing <i>keystore </i> clause. See policy format 418 * Compound token representing <i>grant </i> clause. See policy format 463 * clause. See policy format 491 * clause. See policy format
|
/dalvik/libcore/security/src/main/java/org/bouncycastle/asn1/cmp/ |
PKIStatusInfo.java | 136 * badTime (3), -- messageTime was not sufficiently close to the system time, as defined by local policy 141 * missingTimeStamp (8), -- when the timestamp is missing but should be there (by policy)
|
/external/apache-http/src/org/apache/http/client/params/ |
ClientParamBean.java | 76 public void setCookiePolicy (final String policy) { 77 params.setParameter(ClientPNames.COOKIE_POLICY, policy);
|
/external/dbus/bus/ |
Makefile.am | 55 policy.c \ 56 policy.h \
|
test-main.c | 112 printf ("%s: Running policy test\n", argv[0]); 114 die ("policy");
|
/external/ipsec-tools/src/racoon/samples/ |
racoon.conf.sample-natt | 40 # policy in the kernel SPD. For example for traffic between 52 # the translated address, use the following policy:
|
/external/opencore/pvmi/content_policy_manager/plugins/common/include/ |
pvmf_cpmplugin_access_interface.h | 47 * Base Content Access Interface for all Content Policy Manager Plugins 60 * Access Unit Decryption Interface for Content Policy Manager Plugins
|
/external/webkit/WebCore/editing/mac/ |
EditorMac.mm | 49 PassRefPtr<Clipboard> Editor::newGeneralClipboard(ClipboardAccessPolicy policy) 51 return ClipboardMac::create(false, [NSPasteboard generalPasteboard], policy, 0);
|
/external/webkit/WebCore/loader/ |
MainResourceLoader.cpp | 161 // Update cookie policy base URL as URL changes, except for subframes, which use the 182 // FIXME: Ideally we'd stop the I/O until we hear back from the navigation policy delegate 184 // listener tells us to. In practice that means the navigation policy needs to be decided 271 void MainResourceLoader::callContinueAfterContentPolicy(void* argument, PolicyAction policy) 273 static_cast<MainResourceLoader*>(argument)->continueAfterContentPolicy(policy); 276 void MainResourceLoader::continueAfterContentPolicy(PolicyAction policy) 281 continueAfterContentPolicy(policy, m_response); 364 // Respect the hidden FTP Directory Listing pref so it can be tested even if the policy delegate might otherwise disallow it
|
PolicyChecker.h | 70 // from the FrameLoaderClient, but this callback uses the policy types and so has to 71 // live on this object. In the long term, we should create a type for non-policy
|
/external/webkit/WebCore/platform/haiku/ |
ClipboardHaiku.cpp | 45 ClipboardHaiku::ClipboardHaiku(ClipboardAccessPolicy policy, bool forDragging) 46 : Clipboard(policy, forDragging)
|
/external/webkit/WebCore/platform/mac/ |
DragDataMac.mm | 103 PassRefPtr<Clipboard> DragData::createClipboard(ClipboardAccessPolicy policy) const 105 return ClipboardMac::create(true, [m_platformDragData draggingPasteboard], policy, 0);
|