/prebuilts/ndk/current/platforms/android-4/arch-arm/usr/include/machine/ |
internal_types.h | 2 /* Public domain */
|
/prebuilts/ndk/current/platforms/android-5/arch-arm/usr/include/machine/ |
internal_types.h | 2 /* Public domain */
|
/prebuilts/ndk/current/platforms/android-8/arch-arm/usr/include/machine/ |
internal_types.h | 2 /* Public domain */
|
/prebuilts/ndk/current/platforms/android-9/arch-arm/usr/include/machine/ |
internal_types.h | 2 /* Public domain */
|
/prebuilts/ndk/current/platforms/android-9/arch-mips/usr/include/machine/ |
internal_types.h | 2 /* Public domain */
|
setjmp.h | 3 /* Public domain */
|
/system/connectivity/shill/udev/ |
87-set_wifi_regulatory.rules | 1 # Configure initial regulatory domain from VPD, for devices that don't
|
/system/sepolicy/ |
hci_attach.te | 1 type hci_attach, domain, domain_deprecated;
|
inputflinger.te | 2 type inputflinger, domain, domain_deprecated;
|
toolbox.te | 3 # Do NOT use this domain for toolbox when run by any other domain. 4 type toolbox, domain, domain_deprecated; 24 neverallow { domain -init } toolbox:process transition;
|
tzdatacheck.te | 2 type tzdatacheck, domain, domain_deprecated;
|
debuggerd.te | 2 type debuggerd, domain, domain_deprecated; 9 allow debuggerd domain:dir r_dir_perms; 10 allow debuggerd domain:file r_file_perms; 11 allow debuggerd domain:lnk_file read; 13 domain 27 allow debuggerd domain:process { sigstop sigkill signal };
|
/frameworks/base/tests/NetworkSecurityConfigTest/src/android/security/net/config/ |
NetworkSecurityConfigTests.java | 124 ArraySet<Pair<Domain, NetworkSecurityConfig>> domainMap 125 = new ArraySet<Pair<Domain, NetworkSecurityConfig>>(); 133 ArraySet<Pair<Domain, NetworkSecurityConfig>> domainMap 134 = new ArraySet<Pair<Domain, NetworkSecurityConfig>>(); 135 domainMap.add(new Pair<Domain, NetworkSecurityConfig>( 136 new Domain("android.com", true), getEmptyConfig())); 146 NetworkSecurityConfig domain = new NetworkSecurityConfig.Builder() local 151 ArraySet<Pair<Domain, NetworkSecurityConfig>> domainMap 152 = new ArraySet<Pair<Domain, NetworkSecurityConfig>>(); 153 domainMap.add(new Pair<Domain, NetworkSecurityConfig> 164 NetworkSecurityConfig domain = new NetworkSecurityConfig.Builder() local 183 NetworkSecurityConfig domain = new NetworkSecurityConfig.Builder() local 249 NetworkSecurityConfig domain = new NetworkSecurityConfig.Builder() local [all...] |
/device/lge/bullhead/sepolicy/ |
time_daemon.te | 2 type time_daemon, domain, domain_deprecated; 6 # Make transition to its own time_daemon domain from init
|
/external/curl/tests/data/ |
test8 | 38 Set-Cookie: foobar=name; domain=%HOSTIP; path=/; 39 Set-Cookie: mismatch=this; domain=%HOSTIP; path="/silly/"; 40 Set-Cookie: partmatch=present; domain=.0.0.1; path=/w; 41 Set-Cookie: duplicate=test; domain=.0.0.1; domain=.0.0.1; path=/donkey; 45 Set-Cookie: blexp=yesyes; domain=%HOSTIP; domain=%HOSTIP; expiry=totally bad; 46 Set-Cookie: partialip=nono; domain=.0.0.1;
|
test7 | 19 Set-Cookie: foobar=name; domain=127.0.0.1; path=/; 20 Set-Cookie: mismatch=this; domain=127.0.0.1; path="/silly/"; 21 Set-Cookie: partmatch=present; domain=.0.0.1; path=/; 56 Set-Cookie: foobar=name; domain=127.0.0.1; path=/; 57 Set-Cookie: mismatch=this; domain=127.0.0.1; path="/silly/"; 58 Set-Cookie: partmatch=present; domain=.0.0.1; path=/;
|
/external/libdrm/nouveau/nvif/ |
if0002.h | 20 __u8 domain; member in struct:nvif_perfmon_query_signal_v0 30 __u8 domain; member in struct:nvif_perfmon_query_source_v0
|
/external/mesa3d/src/gallium/drivers/nv30/ |
nv30_transfer.h | 7 unsigned domain; member in struct:nv30_rect 31 struct nouveau_bo *, unsigned offset, unsigned domain,
|
/external/selinux/policycoreutils/sepolicy/sepolicy/help/ |
files_exec.txt | 4 In SELinux these are called entrypoints. SELinux controls the executable files that can be used as an entrypoint to an confined domain. If you have an alternate executable that you would like to run in the '%(APP)s' domain, you need to change the executable file type to the entrypoint type.
|
/toolchain/binutils/binutils-2.25/gas/testsuite/gas/ppc/ |
range64.l | 2 .*:3: Error: operand out of domain \(-1 is not a multiple of 4\) 3 .*:4: Error: operand out of domain \(2 is not a multiple of 4\)
|
/external/avahi/avahi-python/avahi-discover/ |
avahi-discover.py | 60 def __init__(self, path="avahi-discover.ui", root="main_window", domain=None, **kwargs): 74 (name,interface,protocol,stype,domain) = self.treemodel.get(iter,1,2,3,4,5) 79 self.server.ResolveService( int(interface), int(protocol), name, stype, domain, avahi.PROTO_UNSPEC, dbus.UInt32(0), reply_handler=self.service_resolved, error_handler=self.print_error) 100 def service_resolved(self, interface, protocol, name, stype, domain, host, aprotocol, address, port, txt, flags): 101 print "Service data for service '%s' of type '%s' in domain '%s' on %i.%i:" % (name, stype, domain, interface, protocol) 105 self.update_label(interface, protocol, name, stype, domain, host, aprotocol, address, port, avahi.txt_array_to_string_array(txt)) 120 def new_service(self, interface, protocol, name, stype, domain, flags): 121 print "Found service '%s' of type '%s' in domain '%s' on %i.%i." % (name, stype, domain, interface, protocol [all...] |
/external/skia/src/gpu/effects/ |
GrTextureDomain.cpp | 19 GrTextureDomain::GrTextureDomain(const SkRect& domain, Mode mode, int index) 23 if (domain.contains(kFullRect) && kClamp_Mode == mode) { 31 // It is OK if the domain rect is a line or point, but it should not be inverted. We do not 33 SkASSERT(domain.fLeft <= domain.fRight); 34 SkASSERT(domain.fTop <= domain.fBottom); 35 fDomain.fLeft = SkScalarPin(domain.fLeft, kFullRect.fLeft, kFullRect.fRight); 36 fDomain.fRight = SkScalarPin(domain.fRight, kFullRect.fLeft, kFullRect.fRight); 37 fDomain.fTop = SkScalarPin(domain.fTop, kFullRect.fTop, kFullRect.fBottom) 92 const char* domain = fDomainName.c_str(); local 193 const GrTextureDomain& domain = textureDomainEffect.textureDomain(); local 210 const GrTextureDomain& domain = textureDomainEffect.textureDomain(); local 216 const GrTextureDomain& domain = processor.cast<GrTextureDomainEffect>().textureDomain(); local 286 SkRect domain; local [all...] |
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/sdb/ |
queryresultset.py | 23 def query_lister(domain, query='', max_items=None, attr_names=None): 28 rs = domain.connection.query_with_attributes(domain, query, attr_names, 41 def __init__(self, domain=None, query='', max_items=None, attr_names=None): 43 self.domain = domain 48 return query_lister(self.domain, self.query, self.max_items, self.attr_names) 50 def select_lister(domain, query='', max_items=None): 55 rs = domain.connection.select(domain, query, next_token=next_token [all...] |
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/unit/cloudsearchdomain/ |
test_cloudsearchdomain.py | 5 from boto.cloudsearch2.domain import Domain 28 "ARN": "arn:aws:cs:us-east-1:1234567890:domain/demo", 42 domain = Domain(layer1=layer1, data=json.loads(self.domain_status)) 43 search_service = domain.get_search_service() 51 domain = Domain(layer1=layer1, data=json.loads(self.domain_status)) 52 document_service = domain.get_document_service() 60 domain = Domain(layer1=layer1, data=json.loads(self.domain_status) [all...] |
/external/chromium-trace/catapult/third_party/gsutil/gslib/addlhelp/ |
naming.py | 26 company's domain name (see "DOMAIN NAMED BUCKETS"). 79 <B>DOMAIN NAMED BUCKETS</B> 81 by creating buckets with domain names (like "example.com"). 87 currently-recognized top-level domain (such as .com), you will be required 88 to verify domain ownership. 91 If your project needs to use a domain-named bucket, you need to have 92 a team member both verify the domain and create the bucket. This is 93 because Google Cloud Storage checks for domain ownership against the 95 also be verified as an owner or manager of the domain [all...] |