/frameworks/base/tools/preload/ |
Android.mk | 10 Policy.java \
|
/external/bluetooth/bluez/src/ |
hcid.conf | 44 # none - no specific policy 50 # Default link policy 51 # none - no specific policy
|
/frameworks/base/core/java/com/android/internal/policy/ |
IPolicy.java | 17 package com.android.internal.policy; 28 /* The implementation of this interface must be called Policy and contained 29 * within the com.android.internal.policy.impl package */
|
/external/webkit/WebKit/mac/WebView/ |
WebPolicyDelegate.h | 67 policy decision. This provides the ability to make these decisions 77 @discussion If there remain more policy decisions to be made, then 78 the next policy delegate method gets to decide. This will be 79 either the next navigation policy delegate if there is a redirect, 80 or the content policy delegate. If there are no more policy 104 @discussion A policy of ignore prevents WebKit from doing anything 119 the URL represents. Typically, the policy handler methods are called in this order: 125 New window policy is always checked. Navigation policy is checke [all...] |
/external/webkit/WebKit/win/Interfaces/ |
IWebPolicyDelegate.idl | 70 policy decision. This provides the ability to make these decisions 86 @discussion If there remain more policy decisions to be made, then 87 the next policy delegate method gets to decide. This will be 88 either the next navigation policy delegate if there is a redirect, 89 or the content policy delegate. If there are no more policy 116 @discussion A policy of ignore prevents WebKit from doing anything 130 the URL represents. Typically, the policy handler methods are called in this order: 136 New window policy is always checked. Navigation policy is checke [all...] |
/external/apache-http/src/org/apache/http/client/params/ |
CookiePolicy.java | 37 * The policy that provides high degree of compatibilty 43 * The Netscape cookie draft compliant policy. 48 * The RFC 2109 compliant policy. 53 * The RFC 2965 compliant policy. 58 * The default 'best match' policy.
|
/dalvik/libcore/security/src/main/java/java/security/cert/ |
PKIXCertPathValidatorResult.java | 33 // Valid policy tree resulting from PKIX 41 * trust anchor, the valid policy tree and the subject public key. 47 * the valid policy tree from the validation. 66 * Returns the valid policy tree from the validation. 68 * @return the valid policy tree from the validation. 117 sb.append("\n Policy Tree: "); //$NON-NLS-1$ 118 sb.append(policyTree == null ? "no valid policy tree\n" //$NON-NLS-1$
|
/hardware/libhardware_legacy/include/hardware_legacy/ |
AudioPolicyInterface.h | 30 // between the platform specific audio policy manager and Android generic audio policy manager. 31 // The platform specific audio policy manager must implement methods of the AudioPolicyInterface class. 35 // The platform specific audio policy manager is in charge of the audio routing and volume control 39 // System state changes and user actions are notified to audio policy manager with methods of the AudioPolicyInterface. 41 // return a handler on an output that has been selected, configured and opened by the audio policy manager and that 43 // When the AudioTrack object is released, a putOutput() query is received and the audio policy manager can decide 50 // The platform specific audio policy manager is provided as a shared library by platform vendors (as for libaudio.so) 54 // Audio Policy Manager Interface 93 // indicates to the audio policy manager that the output starts being used by corresponding stream [all...] |
/external/openssl/crypto/x509v3/ |
pcy_data.c | 65 /* Policy Node routines */ 78 /* Create a data based on an existing policy. If 'id' is NULL use the 79 * oid in the policy, otherwise use 'id'. This behaviour covers the two 85 X509_POLICY_DATA *policy_data_new(POLICYINFO *policy, ASN1_OBJECT *id, int crit) 88 if (!policy && !id) 117 ret->valid_policy = policy->policyid; 118 policy->policyid = NULL; 121 if (policy) 123 ret->qualifier_set = policy->qualifiers; 124 policy->qualifiers = NULL [all...] |
pcy_int.h | 68 /* This structure and the field names correspond to the Policy 'node' of 70 * data: X509_POLICY_NODE contains that. This means that the main policy data 77 /* Policy OID and qualifiers for this data */ 85 /* This flag indicates the structure has been mapped using a policy mapping 86 * extension. If policy mapping is not active its references get deleted. 91 /* This flag indicates the data doesn't correspond to a policy in Certificate 92 * Policies: it has been mapped to any policy. 114 * cross reference the policy it refers to. 128 /* other policy data */ 176 /* Extra policy data when additional nodes (not from the certificate [all...] |
v3err.c | 156 {ERR_REASON(X509V3_R_INCORRECT_POLICY_SYNTAX_TAG),"incorrect policy syntax tag"}, 171 {ERR_REASON(X509V3_R_INVALID_POLICY_IDENTIFIER),"invalid policy identifier"}, 172 {ERR_REASON(X509V3_R_INVALID_PROXY_POLICY_SETTING),"invalid proxy policy setting"}, 183 {ERR_REASON(X509V3_R_NO_POLICY_IDENTIFIER),"no policy identifier"}, 184 {ERR_REASON(X509V3_R_NO_PROXY_CERT_POLICY_LANGUAGE_DEFINED),"no proxy cert policy language defined"}, 190 {ERR_REASON(X509V3_R_POLICY_LANGUAGE_ALREADTY_DEFINED),"policy language alreadty defined"}, 191 {ERR_REASON(X509V3_R_POLICY_PATH_LENGTH) ,"policy path length"}, 192 {ERR_REASON(X509V3_R_POLICY_PATH_LENGTH_ALREADTY_DEFINED),"policy path length alreadty defined"}, 193 {ERR_REASON(X509V3_R_POLICY_SYNTAX_NOT_CURRENTLY_SUPPORTED),"policy syntax not currently supported"}, 194 {ERR_REASON(X509V3_R_POLICY_WHEN_PROXY_LANGUAGE_REQUIRES_NO_POLICY),"policy when proxy language requires no policy"} [all...] |
/dalvik/libcore/security/src/main/java/org/apache/harmony/security/fortress/ |
DefaultPolicy.java | 31 import java.security.Policy; 45 * Default Policy implementation based on policy configuration files. This 66 * <i>grant </i> entries of the file. The policy file can contain any number of 89 * </i> fields does not matter. The policy file can contain any number of grant 101 * The policy content may be parameterized via property expansion. Namely, 106 * policy file. However, this feature is controlled by security properties and 107 * should be turned on by setting "policy.expandProperties" property 114 * The policy also supports generalized expansion in permissions names, of 131 * This implementation is thread-safe. The policy caches sets of calculate [all...] |
/dalvik/libcore/security/src/main/java/org/bouncycastle/x509/ |
CertPathReviewerMessages.properties | 253 ## check policy errors 255 # error processing certificate policy extension 256 CertPathReviewer.policyExtError.title = Policy checking failed 257 CertPathReviewer.policyExtError.text = Policy checking failed: there was an error processing the certificate policy extension. 258 CertPathReviewer.policyExtError.summary = Error processing the certificate policy extension. 259 CertPathReviewer.policyExtError.details = Policy checking failed: there was an error processing the certificate policy extension. 261 # error processing policy constraints extension 262 CertPathReviewer.policyConstExtError.title = Policy checking faile [all...] |
CertPathReviewerMessages_de.properties | 253 ## check policy errors 255 # error processing certificate policy extension 256 CertPathReviewer.policyExtError.title = Policy checking failed 257 CertPathReviewer.policyExtError.text = Policy checking failed: there was an error processing the certificate policy extension. 258 CertPathReviewer.policyExtError.summary = Error processing the certificate policy extension. 259 CertPathReviewer.policyExtError.details = Policy checking failed: there was an error processing the certificate policy extension. 261 # error processing policy constraints extension 262 CertPathReviewer.policyConstExtError.title = Policy checking faile [all...] |
/dalvik/libcore/concurrent/src/test/java/tests/api/java/util/concurrent/ |
AbstractExecutorServiceTest.java | 119 Policy savedPolicy = null; 121 savedPolicy = Policy.getPolicy(); 122 AdjustablePolicy policy = new AdjustablePolicy(); local 123 policy.addPermission(new RuntimePermission("getContextClassLoader")); 124 policy.addPermission(new RuntimePermission("setContextClassLoader")); 125 Policy.setPolicy(policy); 147 Policy.setPolicy(savedPolicy); 158 Policy savedPolicy = null; 160 savedPolicy = Policy.getPolicy() 161 AdjustablePolicy policy = new AdjustablePolicy(); local 197 AdjustablePolicy policy = new AdjustablePolicy(); local [all...] |
/frameworks/base/core/java/android/app/admin/ |
DevicePolicyManager.java | 67 * The desired policy is the ComponentName of the policy in the 81 * Activity action: send when any policy admin changes a policy. 82 * This is generally used to find out when a new policy is in effect. 128 Log.w(TAG, "Failed talking with device policy service", e); 144 Log.w(TAG, "Failed talking with device policy service", e); 158 Log.w(TAG, "Failed talking with device policy service", e); 175 Log.w(TAG, "Failed talking with device policy service", e); 181 * Constant for {@link #setPasswordQuality}: the policy has no requirement [all...] |
/packages/apps/Email/src/com/android/email/ |
VendorPolicyLoader.java | 32 * A bridge class to the email vendor policy apk. 34 * <p>Email vendor policy is a system apk named "com.android.email.helper". When exists, it must 35 * contain a class called "com.android.email.policy.EmailPolicy" with a static public method 38 * <p>A vendor policy apk is optional. The email application will operate properly when none is 42 private static final String POLICY_PACKAGE = "com.android.email.policy"; 98 // Package not found -- it's okay - there's no policy .apk found, which is OK 120 * Calls the getPolicy method in the policy apk, if one exists. This method never returns null; 121 * It returns an empty {@link Bundle} when there is no policy apk (or even if the inner 125 /* package */ Bundle getPolicy(String policy, Bundle args) { 129 ret = (Bundle) mPolicyMethod.invoke(null, policy, args) [all...] |
/external/dbus/test/data/valid-config-files/ |
many-rules.conf | 11 <policy context="default"> 27 </policy> 29 <policy context="mandatory"> 45 </policy>
|
session.conf | 15 <policy context="default"> 22 </policy>
|
/external/webkit/WebCore/platform/qt/ |
ClipboardQt.h | 43 static PassRefPtr<ClipboardQt> create(ClipboardAccessPolicy policy, const QMimeData* readableClipboard) 45 return adoptRef(new ClipboardQt(policy, readableClipboard)); 47 static PassRefPtr<ClipboardQt> create(ClipboardAccessPolicy policy, bool forDragging = false) 49 return adoptRef(new ClipboardQt(policy, forDragging));
|
/external/webkit/WebCore/platform/win/ |
ClipboardWin.h | 44 static PassRefPtr<ClipboardWin> create(bool isForDragging, IDataObject* dataObject, ClipboardAccessPolicy policy) 46 return adoptRef(new ClipboardWin(isForDragging, dataObject, policy)); 48 static PassRefPtr<ClipboardWin> create(bool isForDragging, WCDataObject* dataObject, ClipboardAccessPolicy policy) 50 return adoptRef(new ClipboardWin(isForDragging, dataObject, policy));
|
/external/ipsec-tools/ |
setup.c | 199 } policy; local 208 memset(&policy, 0, sizeof(policy)); 209 policy.p.sadb_x_policy_len = PFKEY_UNIT64(sizeof(policy)); 210 policy.p.sadb_x_policy_exttype = SADB_X_EXT_POLICY; 211 policy.p.sadb_x_policy_type = IPSEC_POLICY_IPSEC; 212 policy.p.sadb_x_policy_dir = IPSEC_DIR_OUTBOUND; 214 policy.p.sadb_x_policy_priority = PRIORITY_DEFAULT; 216 policy.q.sadb_x_ipsecrequest_len = sizeof(struct sadb_x_ipsecrequest) [all...] |
/external/dbus/bus/ |
session.conf.in | 15 <policy context="default"> 22 </policy>
|
/external/dbus/test/name-test/ |
run-with-tmp-session-bus.conf | 15 <policy context="default"> 22 </policy>
|
/external/webkit/WebCore/editing/android/ |
EditorAndroid.cpp | 34 PassRefPtr<Clipboard> Editor::newGeneralClipboard(ClipboardAccessPolicy policy) 36 return new ClipboardAndroid(policy, false);
|