HomeSort by relevance Sort by last modified time
    Searched full:enforcement (Results 1 - 25 of 63) sorted by null

1 2 3

  /development/samples/training/device-management-policy/
_index.html 1 <p>This is a security-aware sample application that demonstrates the enforcement of device administration policies on Android 2.2 or above platforms.</p>
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/
dqblk_xfs.h 34 #define Q_XQUOTAON XQM_CMD(1) /* enable accounting/enforcement */
35 #define Q_XQUOTAOFF XQM_CMD(2) /* disable accounting/enforcement */
116 #define XFS_QUOTA_UDQ_ENFD (1<<1) /* user quota limits enforcement */
118 #define XFS_QUOTA_GDQ_ENFD (1<<3) /* group quota limits enforcement */
120 #define XFS_QUOTA_PDQ_ENFD (1<<5) /* project quota limits enforcement */
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/linux/
dqblk_xfs.h 34 #define Q_XQUOTAON XQM_CMD(1) /* enable accounting/enforcement */
35 #define Q_XQUOTAOFF XQM_CMD(2) /* disable accounting/enforcement */
116 #define XFS_QUOTA_UDQ_ENFD (1<<1) /* user quota limits enforcement */
118 #define XFS_QUOTA_GDQ_ENFD (1<<3) /* group quota limits enforcement */
120 #define XFS_QUOTA_PDQ_ENFD (1<<5) /* project quota limits enforcement */
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/linux/
dqblk_xfs.h 34 #define Q_XQUOTAON XQM_CMD(1) /* enable accounting/enforcement */
35 #define Q_XQUOTAOFF XQM_CMD(2) /* disable accounting/enforcement */
116 #define XFS_QUOTA_UDQ_ENFD (1<<1) /* user quota limits enforcement */
118 #define XFS_QUOTA_GDQ_ENFD (1<<3) /* group quota limits enforcement */
120 #define XFS_QUOTA_PDQ_ENFD (1<<5) /* project quota limits enforcement */
  /external/srtp/crypto/include/
key.h 4 * key usage limits enforcement
  /libcore/luni/src/test/java/libcore/java/security/
AccessControllerTest.java 32 * passed through without permission enforcement.
  /libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/
PinListEntry.java 69 // entry must have a CN, an enforcement value, and at least one pin
86 throw new PinEntryException("Enforcement status is not a valid value");
  /external/libsepol/include/sepol/policydb/
avtab.h 36 * table is used to represent the type enforcement
policydb.h 517 /* type enforcement access vectors and transitions */
522 /* type enforcement conditional access vectors and transitions */
  /external/srtp/crypto/kernel/
key.c 4 * key usage limits enforcement
  /packages/apps/Contacts/tests/src/com/android/contacts/
RawContactDeltaTests.java 194 assertEquals("Expected version enforcement", TYPE_ASSERT, oper.getType());
234 assertEquals("Expected version enforcement", TYPE_ASSERT, oper.getType());
273 assertEquals("Expected version enforcement", TYPE_ASSERT, oper.getType());
306 assertEquals("Expected version enforcement", TYPE_ASSERT, oper.getType());
RawContactModifierTests.java 353 // Build diff, expecting insert for data row and update enforcement
396 // Build diff, expecting insert for data row and update enforcement
422 // Build diff, expecting insert for data row and update enforcement
    [all...]
  /frameworks/base/docs/html/guide/topics/security/
permissions.jd 17 <li><a href="#enforcement">Other Permission Enforcement</a></li>
88 <p>Because security enforcement happens at the
369 <a name="enforcement"></a>
370 <h3>Other Permission Enforcement</h3>
  /docs/source.android.com/src/devices/tech/security/
se-linux.jd 160 the OEM, before turning on enforcement.</p>
216 then have all other functions and their domains set to enforcement. Domains are
292 under policy enforcement and why. Android is taking this information, analyzing
307 <p>Finally, if possible, turn on enforcement internally (on devices of
  /external/chromium/base/
atomicops.h 24 // Although there are currently no compiler enforcement, you are encouraged
  /external/v8/src/
atomicops.h 44 // Although there are currently no compiler enforcement, you are encouraged
  /docs/source.android.com/src/devices/
drm.jd 55 secure enforcement of content protection.
144 <li>Device manufacturers must provide a secure bootloader. The chain of trust from the bootloader must extend through any software or firmware components involved in the security implementation, such as the ARM TrustZone protected application and any components involved in the enforcement of the secure video path. </li>
  /external/quake/quake/src/WinQuake/data/
RLICNSE.TXT 180 provide for enforcement of the provision's intent, to the extent
SLICNSE.TXT 153 modification of such provision to provide for enforcement of the
  /frameworks/opt/telephony/src/java/android/telephony/
SmsCbCmasInfo.java 68 /** CMAS alert category: Law enforcement, military, homeland/local/private security. */
  /external/safe-iop/include/
safe_iop.h 60 #include <assert.h> /* for type enforcement */
464 /* These are used for testing for easy type enforcement */
  /external/strace/
quota.c 145 #define XFS_QUOTA_UDQ_ENFD (1<<1) /* user quota limits enforcement */
147 #define XFS_QUOTA_GDQ_ENFD (1<<3) /* group quota limits enforcement */
  /frameworks/base/docs/html/google/play/licensing/
overview.jd 202 blocks that let you securely check licensing, but the actual enforcement and
  /packages/apps/CellBroadcastReceiver/res/values/
strings.xml 153 <!-- CMAS category for security alerts (law enforcement, military, etc.). [CHAR LIMIT=50] -->
  /sdk/eclipse/plugins/com.android.ide.eclipse.tests/unittests/com/android/ide/eclipse/adt/internal/editors/descriptors/
DescriptorsUtilsTest.java 213 // This test is disabled since I had to remove the namespace enforcement

Completed in 575 milliseconds

1 2 3