/bionic/libc/include/ |
pthread.h | 116 int pthread_attr_setschedpolicy(pthread_attr_t * attr, int policy); 117 int pthread_attr_getschedpolicy(pthread_attr_t const * attr, int * policy); 148 int pthread_getschedparam(pthread_t thid, int * policy,
|
/external/apache-http/src/org/apache/http/cookie/ |
CookieSpecRegistry.java | 103 * @throws IllegalStateException if a policy with the given name cannot be found 126 * @throws IllegalStateException if a policy with the given name cannot be found 137 * Note that the DEFAULT policy (if present) is likely to be the same
|
/external/iproute2/include/libiptc/ |
libiptc.h | 59 /* Get the policy of a given built-in chain */ 125 /* Sets the policy on a built-in chain. */ 127 const ipt_chainlabel policy,
|
/external/iptables/include/libiptc/ |
libiptc.h | 59 /* Get the policy of a given built-in chain */ 125 /* Sets the policy on a built-in chain. */ 127 const ipt_chainlabel policy,
|
/external/webkit/WebKit/mac/Plugins/ |
WebPluginContainerCheck.mm | 87 - (void)_continueWithPolicy:(PolicyAction)policy 90 ((void (*)(id, SEL, BOOL, id))objc_msgSend)(_resultObject, _resultSelector, (policy == PolicyUse), _contextInfo); 92 ((void (*)(id, SEL, BOOL))objc_msgSend)(_resultObject, _resultSelector, (policy == PolicyUse));
|
/external/webkit/WebKitTools/DumpRenderTree/win/ |
PolicyDelegate.cpp | 135 wstring message = TEXT("Policy delegate: attempt to load ") + wurl + TEXT(" with navigation type '") + typeDescription + TEXT("'"); 181 printf("Policy delegate: unable to implement policy with error domain '%S', error code %d, in frame '%S'", domainMessage.c_str(), code, frameNameMessage.c_str());
|
/ndk/build/platforms/android-3/arch-arm/usr/include/ |
pthread.h | 116 int pthread_attr_setschedpolicy(pthread_attr_t * attr, int policy); 117 int pthread_attr_getschedpolicy(pthread_attr_t const * attr, int * policy); 148 int pthread_getschedparam(pthread_t thid, int * policy,
|
/ndk/build/platforms/android-4/arch-arm/usr/include/ |
pthread.h | 116 int pthread_attr_setschedpolicy(pthread_attr_t * attr, int policy); 117 int pthread_attr_getschedpolicy(pthread_attr_t const * attr, int * policy); 148 int pthread_getschedparam(pthread_t thid, int * policy,
|
/ndk/build/platforms/android-5/arch-arm/usr/include/ |
pthread.h | 116 int pthread_attr_setschedpolicy(pthread_attr_t * attr, int policy); 117 int pthread_attr_getschedpolicy(pthread_attr_t const * attr, int * policy); 148 int pthread_getschedparam(pthread_t thid, int * policy,
|
/ndk/build/platforms/android-5/arch-x86/usr/include/ |
pthread.h | 116 int pthread_attr_setschedpolicy(pthread_attr_t * attr, int policy); 117 int pthread_attr_getschedpolicy(pthread_attr_t const * attr, int * policy); 148 int pthread_getschedparam(pthread_t thid, int * policy,
|
/ndk/build/platforms/android-8/arch-arm/usr/include/ |
pthread.h | 116 int pthread_attr_setschedpolicy(pthread_attr_t * attr, int policy); 117 int pthread_attr_getschedpolicy(pthread_attr_t const * attr, int * policy); 148 int pthread_getschedparam(pthread_t thid, int * policy,
|
/ndk/build/platforms/android-8/arch-x86/usr/include/ |
pthread.h | 116 int pthread_attr_setschedpolicy(pthread_attr_t * attr, int policy); 117 int pthread_attr_getschedpolicy(pthread_attr_t const * attr, int * policy); 148 int pthread_getschedparam(pthread_t thid, int * policy,
|
/external/ipsec-tools/src/racoon/ |
pfkey.c | 86 #include "policy.h" 2022 caddr_t policy, p; local 2180 caddr_t policy = NULL; local 2302 caddr_t policy = NULL; local 2424 caddr_t policy = NULL; local [all...] |
isakmp_quick.c | 72 #include "policy.h" 82 #include "policy.h" 1079 /* generate a policy template from peer's proposal */ [all...] |
/dalvik/libcore/security/src/test/java/tests/security/cert/ |
PKIXCertPathValidatorResultTest.java | 232 * policy tree or <code>null</code> if there are 239 notes = "Verifies that getPolicyTree method returns the root node of the valid policy tree.", 249 // valid policy tree case; 265 * policy tree or <code>null</code> if there are 282 // no valid policy tree case (null)
|
PolicyQualifierInfoTest.java | 46 * parameter does not represent a valid and parsable policy 84 * parameter does not represent a valid and parsable policy 109 // corrupt policy qualifier ID: 240 // get policy qualifier encoding 266 // get policy qualifier encoding
|
/external/bluetooth/glib/gthread/ |
gthread-posix.c | 139 int policy; local 140 posix_check_cmd (pthread_getschedparam (pthread_self(), &policy, &sched)); 403 int policy; local 404 posix_check_cmd (pthread_getschedparam (*(pthread_t*)thread, &policy, 407 posix_check_cmd_prio (pthread_setschedparam (*(pthread_t*)thread, policy,
|
/sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/editors/layout/parts/ |
UiElementEditPart.java | 74 * This is no longer needed, as a selection edit policy is set by the parent layout. 233 * @param layoutEditPart The layout edit part where this policy is installed. It can 237 // This policy indicates how elements can be constrained by the layout. 238 // TODO Right now we use the XY layout policy since our constraints are 275 // The host is the EditPart where this policy is installed,
|
/external/dbus/bus/ |
dbus-daemon.1 | 56 only take effect if you restart the daemon. Policy changes should take effect 328 .I "<policy>" 331 The <policy> element defines a security policy to be applied to a particular 332 set of connections to the bus. A policy is made up of 338 The <policy> element has one of three attributes: 368 A <deny> element appears below a <policy> element and prohibits some 474 It does not make sense to deny a user or group inside a <policy> 545 that are relevant to the security policy. 549 greater efficiency, the policy enforcement code of SELinux typicall [all...] |
dbus-daemon.1.in | 56 only take effect if you restart the daemon. Policy changes should take effect 328 .I "<policy>" 331 The <policy> element defines a security policy to be applied to a particular 332 set of connections to the bus. A policy is made up of 338 The <policy> element has one of three attributes: 368 A <deny> element appears below a <policy> element and prohibits some 474 It does not make sense to deny a user or group inside a <policy> 545 that are relevant to the security policy. 549 greater efficiency, the policy enforcement code of SELinux typicall [all...] |
/external/iproute2/ip/ |
xfrm_policy.c | 56 fprintf(stderr, "Usage: ip xfrm policy { add | update } dir DIR SELECTOR [ index INDEX ] [ ptype PTYPE ]\n"); 58 fprintf(stderr, "Usage: ip xfrm policy { delete | get } dir DIR [ SELECTOR | index INDEX ] [ ptype PTYPE ]\n"); 59 fprintf(stderr, "Usage: ip xfrm policy { deleteall | list } [ dir DIR ] [ SELECTOR ]\n"); 61 fprintf(stderr, "Usage: ip xfrm policy flush [ ptype PTYPE ]\n"); 423 fprintf(stderr, "Not a policy: %08x %08x %08x\n", 618 * With an existing policy of nlmsg, make new nlmsg for deleting the policy 635 fprintf(stderr, "Not a policy: %08x %08x %08x\n", 663 fprintf(stderr, "Policy buffer overflow\n"); 942 fprintf(stderr, "Flush policy\n") [all...] |
/external/openssl/crypto/x509v3/ |
pcy_tree.c | 65 /* Initialize policy tree. Return values: 69 * 2 Policy tree is empty. 90 /* Disable policy mapping for now... */ 111 /* First setup policy cache in all certificates apart from the 301 * Note: need something better for policy mapping 405 /* Calculate the authority set based on policy tree. 406 * The 'pnodes' parameter is used as a store for the set of policy nodes 471 /* Check if anyPolicy present in authority constrained policy set: 498 /* Create a new node with policy ID from user set 586 /* Application policy checking function [all...] |
/external/webkit/WebKit/chromium/src/ |
ChromeClientImpl.cpp | 241 WebNavigationPolicy policy; local 261 if (!WebViewImpl::navigationPolicyFromMouseEvent(buttonNumber, ctrl, shift, alt, meta, &policy)) 264 return policy == WebNavigationPolicyNewBackgroundTab; 281 WebNavigationPolicy policy = WebNavigationPolicyNewForegroundTab; local 283 policy = WebNavigationPolicyNewPopup; 285 policy = WebNavigationPolicyNewBackgroundTab; 287 m_webView->client()->show(policy);
|
/system/wlan/ti/sta_dk_4_0_4_32/common/src/Application/inc/ |
scanMngrApi.h | 70 * Scan was not attempted because the policy defines 75 * available for scan, according to the defined policy. 156 * \retval SCAN_MRS_SCAN_NOT_ATTEMPTED_EMPTY_POLICY - scan was not attempted because NULL policy defined.\n 295 * \brief Sets the scan policy.\n 299 * \param scanPolicy - a pointer to the policy data.\n 310 * \brief Print scan policy.\n 313 * \param scanPolicy - scan policy to print.\n
|
/external/bluetooth/bluez/plugins/ |
hciops.c | 90 uint16_t policy; local 148 /* Set default link policy */ 149 policy = htobs(main_opts.link_policy); 151 OCF_WRITE_DEFAULT_LINK_POLICY, 2, &policy); 194 /* Set link policy */ 198 error("Can't set link policy on hci%d: %s (%d)",
|