/external/webkit/WebCore/editing/haiku/ |
EditorHaiku.cpp | 38 PassRefPtr<Clipboard> Editor::newGeneralClipboard(ClipboardAccessPolicy policy) 40 return ClipboardHaiku::create(policy, false);
|
/external/webkit/WebCore/editing/wx/ |
EditorWx.cpp | 34 PassRefPtr<Clipboard> Editor::newGeneralClipboard(ClipboardAccessPolicy policy) 36 return ClipboardWx::create(policy, true);
|
/external/webkit/WebCore/loader/ |
PolicyChecker.cpp | 133 void PolicyChecker::continueAfterNavigationPolicy(PolicyAction policy) 138 bool shouldContinue = policy == PolicyUse; 140 switch (policy) { 163 void PolicyChecker::continueAfterNewWindowPolicy(PolicyAction policy) 168 switch (policy) { 180 callback.call(policy == PolicyUse); 183 void PolicyChecker::continueAfterContentPolicy(PolicyAction policy) 187 callback.call(policy);
|
/external/webkit/WebCore/platform/wince/ |
EditorWince.cpp | 38 PassRefPtr<Clipboard> Editor::newGeneralClipboard(ClipboardAccessPolicy policy) 40 return adoptRef(new ClipboardWince(policy, false));
|
/hardware/ti/wlan/wl1271/stad/src/Application/ |
scanMngrTypes.h | 57 * \brief Maximal number of channels per band policy 116 * This structure defines the policy parameters for an AC triggered scan. 131 * This structure defines the policy parameters for an SPS. 149 * This structure defines the policy parameters for a scan method, which can be any type of scan 156 /* Scan policy parameters */ 166 * \brief Scan Band Policy 169 * This structure defines the parameters comprising a scan policy for a single band 187 * \brief Scan Policy
|
/system/wlan/ti/wilink_6_1/stad/src/Application/ |
scanMngrTypes.h | 57 * \brief Maximal number of channels per band policy 116 * This structure defines the policy parameters for an AC triggered scan. 131 * This structure defines the policy parameters for an SPS. 149 * This structure defines the policy parameters for a scan method, which can be any type of scan 156 /* Scan policy parameters */ 166 * \brief Scan Band Policy 169 * This structure defines the parameters comprising a scan policy for a single band 187 * \brief Scan Policy
|
/external/webkit/WebKit/gtk/webkit/ |
webkitwebpolicydecision.cpp | 32 * @short_description: Liason between WebKit and the application regarding asynchronous policy decisions 35 * signal emissions that deal with policy decisions, such as if a new 78 * Will send the USE decision to the policy implementer. 96 * Will send the IGNORE decision to the policy implementer. 114 * Will send the DOWNLOAD decision to the policy implementer.
|
/external/webkit/WebKit/win/ |
WebMutableURLRequest.h | 39 inline WebCore::ResourceRequestCachePolicy core(WebURLRequestCachePolicy policy) 41 return static_cast<WebCore::ResourceRequestCachePolicy>(policy); 44 inline WebURLRequestCachePolicy kit(WebCore::ResourceRequestCachePolicy policy) 46 return static_cast<WebURLRequestCachePolicy>(policy); 129 /* [in] */ WebURLRequestCachePolicy policy);
|
/dalvik/libcore/security/src/main/java/org/apache/harmony/security/x509/tsp/ |
TSTInfo.java | 45 * policy TSAPolicyId, 70 private final String policy; field in class:TSTInfo 88 public TSTInfo(int version, String policy, MessageImprint messageImprint, 93 this.policy = policy; 110 res.append(policy); 177 * @return Returns the policy. 180 return policy; 254 ASN1Oid.getInstance(), // policy 294 values[1] = ObjectIdentifier.toIntArray(info.policy); [all...] |
/external/iptables/ |
ip6tables-restore.c | 224 char *policy, *chain; local 253 policy = strtok(NULL, " \t\n"); 254 DEBUGP("line %u, policy '%s'\n", line, policy); 255 if (!policy) { 257 "%s: line %u policy invalid\n", 262 if (strcmp(policy, "-") != 0) { 271 "invalid policy counters " 279 DEBUGP("Setting policy of chain %s to %s\n", 280 chain, policy); [all...] |
iptables-restore.c | 227 char *policy, *chain; local 256 policy = strtok(NULL, " \t\n"); 257 DEBUGP("line %u, policy '%s'\n", line, policy); 258 if (!policy) { 260 "%s: line %u policy invalid\n", 265 if (strcmp(policy, "-") != 0) { 274 "invalid policy counters " 282 DEBUGP("Setting policy of chain %s to %s\n", 283 chain, policy); [all...] |
/external/webkit/WebCore/platform/chromium/ |
ClipboardChromium.cpp | 75 ClipboardAccessPolicy policy) 76 : Clipboard(policy, isForDragging) 82 PassRefPtr<ChromiumDataObject> dataObject, ClipboardAccessPolicy policy) 84 return adoptRef(new ClipboardChromium(isForDragging, dataObject, policy)); 89 if (policy() != ClipboardWritable || !m_dataObject) 105 if (policy() != ClipboardWritable) 114 if (policy() != ClipboardReadable || !m_dataObject) 147 if (policy() != ClipboardWritable) 177 if (policy() != ClipboardReadable && policy() != ClipboardTypesReadable [all...] |
/dalvik/libcore/security/src/main/java/java/security/cert/ |
PKIXParameters.java | 46 // Set of acceptable initial policy identifiers (OID strings) 61 // Indicates whether explicit policy required or not 63 // Indicates whether policy mapping inhibited or not 65 // Indicates whether any policy inhibited or not 67 // Indicates whether certificates that include policy 161 * Returns whether the <i>any policy OID</i> will be inhibited if it's 164 * @return {@code true} if the <i>any policy OID</i> will be inhibited, 172 * Sets whether the <i>any policy OID</i> should be inhibited if it's 176 * {@code true} if the <i>any policy OID</i> should be inhibited, 351 * Returns whether an acceptable policy needs to be explicit identified i [all...] |
/external/ipsec-tools/src/racoon/ |
policy.h | 1 /* $NetBSD: policy.h,v 1.5.4.2 2007/06/07 20:34:19 manu Exp $ */ 3 /* Id: policy.h,v 1.5 2004/06/11 16:00:17 ludvigm Exp */ 54 * Security Policy Index 67 u_int32_t priority; /* priority for the policy */ 74 /* Security Policy Data Base */ 81 u_int policy; /* DISCARD, NONE or IPSEC, see keyv2.h */ member in struct:secpolicy 84 /* if policy == IPSEC else this value == NULL.*/
|
/dalvik/libcore/security/src/main/java/org/bouncycastle/asn1/x509/ |
CertificatePolicies.java | 65 * create a certificate policy with the given OID. 75 * create a certificate policy with the policy given by the OID represented
|
/external/dbus/bus/ |
system.conf.in | 35 <policy context="default"> 50 </policy> 53 holes in the above policy for specific services. -->
|
Android.mk | 29 policy.c \
|
/external/dbus/test/data/valid-config-files/ |
system.conf | 35 <policy context="default"> 50 </policy> 53 holes in the above policy for specific services. -->
|
/frameworks/base/tools/preload/ |
Policy.java | 22 * Policy that governs which classes are preloaded. 24 public class Policy { 29 private Policy() {}
|
/dalvik/libcore/luni/src/main/java/org/apache/harmony/luni/util/ |
PriviAction.java | 22 import java.security.Policy; 66 * Creates a PrivilegedAction to get the current security policy object. 68 * @see Policy#getPolicy 133 return (T)Policy.getPolicy();
|
/external/e2fsprogs/ |
e2fsprogs.lsm | 16 Copying-policy: GPL/LGPL
|
/external/ipsec-tools/src/racoon/contrib/ |
sp.pl | 17 print STDERR "delete policy: $src -> $dst\n";
|
/external/webkit/WebCore/bindings/generic/ |
BindingSecurityBase.cpp | 50 // Same origin policy implementation: 52 // Same origin policy prevents JS code from domain A from accessing JS & DOM 59 // The callback function enforces the same origin policy. 73 // First it checks same domain policy using the lexical context.
|
/external/webkit/WebCore/platform/gtk/ |
ClipboardGtk.cpp | 35 PassRefPtr<Clipboard> Editor::newGeneralClipboard(ClipboardAccessPolicy policy) 37 return ClipboardGtk::create(policy, false); 40 ClipboardGtk::ClipboardGtk(ClipboardAccessPolicy policy, bool forDragging) 41 : Clipboard(policy, forDragging)
|
/external/webkit/WebKit/gtk/tests/ |
testwindow.c | 59 /* Test we correctly apply policy for not having scrollbars; This 60 * case is special, because we turn the policy from NEVER to 78 /* Test we correctly apply policy for always having scrollbars */ 94 /* Test we correctly apply policy for having scrollbars when needed */
|