/external/clang/test/Driver/ |
arm-restrict-it.c | 2 // RUN: FileCheck --check-prefix=CHECK-RESTRICTED < %t %s 5 // RUN: FileCheck --check-prefix=CHECK-RESTRICTED < %t %s 7 // CHECK-RESTRICTED: "-backend-option" "-arm-restrict-it" 10 // RUN: FileCheck --check-prefix=CHECK-NO-RESTRICTED < %t %s 13 // RUN: FileCheck --check-prefix=CHECK-NO-RESTRICTED < %t %s 15 // CHECK-NO-RESTRICTED: "-backend-option" "-arm-no-restrict-it"
|
/external/robolectric/src/main/java/com/xtremelabs/robolectric/shadows/ |
ShadowKeyguardManager.java | 30 public void setinRestrictedInputMode(boolean restricted) { 31 inRestrictedInputMode = restricted;
|
/development/samples/browseable/AppRestrictions/ |
_index.jd | 14 types and custom. When launched under a restricted profile, this activity displays app
|
/external/chromium_org/content/public/common/ |
three_d_api_types.h | 10 // these APIs is restricted for some reason.
|
/external/sepolicy/ |
init_shell.te | 0 # Restricted domain for shell processes spawned by init.
|
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/ |
rexec.py | 0 """Restricted execution facilities. 124 """Basic restricted execution framework. 126 Code executed in this restricted environment will only have access to 172 import within the restricted environment.) 260 m.argv = ['RESTRICTED'] 308 """Execute code within a restricted environment. 312 executed in the restricted environment's __main__ module. 319 """Evaluate code within a restricted environment. 323 the restricted environment's __main__ module. The value of the 331 """Execute the Python code in the file in the restricted [all...] |
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/ |
rexec.py | 0 """Restricted execution facilities. 124 """Basic restricted execution framework. 126 Code executed in this restricted environment will only have access to 172 import within the restricted environment.) 260 m.argv = ['RESTRICTED'] 308 """Execute code within a restricted environment. 312 executed in the restricted environment's __main__ module. 319 """Evaluate code within a restricted environment. 323 the restricted environment's __main__ module. The value of the 331 """Execute the Python code in the file in the restricted [all...] |
/external/chromium_org/sandbox/win/src/ |
restricted_token.h | 27 // Handles the creation of a restricted token using the effective token or 62 // Creates a restricted token and returns its handle using the token_handle 69 // Creates a restricted token and uses this new token to create a new token 99 // Adds a user or group SID for Deny Only in the restricted token. 107 // Adds the user sid of the token for Deny Only in the restricted token. 129 // Adds a privilege to the list of privileges to remove in the restricted 141 // Adds a SID to the list of restricting sids in the restricted token. 154 // restricted token. 162 // restricted token. 181 // The list of restricting sids in the restricted token [all...] |
restricted_token_utils.h | 14 // Contains the utility functions to be able to create restricted tokens based 25 // Creates a restricted token based on the effective token of the current 27 // restricted. The token_type determines if the token will be used as a primary 31 // newly created restricted token. 41 // with a restricted token. Also set the main thread of this newly created
|
/external/chromium_org/chrome/browser/extensions/api/idltest/ |
idltest_apitest.cc | 11 // Set the channel to "trunk" since idltest is restricted to trunk.
|
/external/chromium_org/components/policy/resources/ |
OWNERS | 4 # compatibility issues is required and review is restricted to the list of
|
/external/chromium_org/third_party/v4l2capture/ |
README.chromium | 15 Restricted to MJPG format.
|
/external/chromium_org/webkit/browser/fileapi/ |
file_permission_policy.h | 19 // Access should be restricted to read-only.
|
/external/linux-tools-perf/perf-3.12.0/tools/perf/bench/ |
mem-memcpy-x86-64-asm.S | 10 * the ELF stack should not be restricted at all and set it RWX.
|
mem-memset-x86-64-asm.S | 11 * the ELF stack should not be restricted at all and set it RWX.
|
/developers/build/prebuilts/gradle/AppRestrictions/Application/src/main/java/com/example/android/apprestrictions/ |
CustomRestrictionsActivity.java | 24 * with the restricted profile feature. 30 * the corresponding restriction entries are saved, which are retrievable under a restricted
|
/developers/samples/android/content/multiuser/AppRestrictions/Application/src/main/java/com/example/android/apprestrictions/ |
CustomRestrictionsActivity.java | 24 * with the restricted profile feature. 30 * the corresponding restriction entries are saved, which are retrievable under a restricted
|
/development/samples/browseable/AppRestrictions/src/com.example.android.apprestrictions/ |
CustomRestrictionsActivity.java | 24 * with the restricted profile feature. 30 * the corresponding restriction entries are saved, which are retrievable under a restricted
|
/external/chromium_org/chrome/browser/chromeos/policy/ |
variations_service_policy_browsertest.cc | 32 proto.mutable_variations_parameter()->set_parameter("restricted"); 51 EXPECT_EQ("restricted", value);
|
/external/chromium_org/components/data_reduction_proxy/browser/ |
data_reduction_proxy_settings_test_utils.h | 26 virtual void Enable(bool restricted, 39 // Describes whether the proxy has been put in a restricted mode. True if 40 // |Enable| is called with |restricted| set to true. Defaults to false. 69 bool enabled, bool restricted, bool at_startup)); 78 bool restricted, 80 EXPECT_CALL(*this, LogProxyState(enabled, restricted, at_startup)).Times(1); 81 C::SetProxyConfigs(enabled, alternative_enabled, restricted, at_startup);
|
/developers/build/prebuilts/gradle/AppRestrictions/Application/src/main/res/values/ |
strings.xml | 24 <string name="sample_app_description">Note: This sample app requires the restricted profile 27 2. Create a restricted profile, if one doesn\'t exist already.\n\n 30 4. In the lock screen, switch to the user\'s restricted profile, launch this sample app,
|
/developers/samples/android/content/multiuser/AppRestrictions/Application/src/main/res/values/ |
strings.xml | 24 <string name="sample_app_description">Note: This sample app requires the restricted profile 27 2. Create a restricted profile, if one doesn\'t exist already.\n\n 30 4. In the lock screen, switch to the user\'s restricted profile, launch this sample app,
|
/development/samples/browseable/AppRestrictions/res/values/ |
strings.xml | 24 <string name="sample_app_description">Note: This sample app requires the restricted profile 27 2. Create a restricted profile, if one doesn\'t exist already.\n\n 30 4. In the lock screen, switch to the user\'s restricted profile, launch this sample app,
|
/external/chromium_org/chrome/browser/chromeos/extensions/file_system_provider/ |
file_system_provider_apitest.cc | 12 // Set the channel to "trunk" since this API is restricted to trunk.
|
/external/chromium_org/content/utility/ |
utility.sb | 12 ; file system access is entireley restricted.
|