Searched
full:capability (Results
451 -
475 of
2334) sorted by null
<<11121314151617181920>>
/prebuilts/ndk/current/platforms/android-23/arch-x86_64/usr/include/sys/ |
capability.h | 33 #include <linux/capability.h>
|
/prebuilts/ndk/current/platforms/android-24/arch-arm/usr/include/sys/ |
capability.h | 33 #include <linux/capability.h>
|
/prebuilts/ndk/current/platforms/android-24/arch-arm64/usr/include/sys/ |
capability.h | 33 #include <linux/capability.h>
|
/prebuilts/ndk/current/platforms/android-24/arch-mips/usr/include/sys/ |
capability.h | 33 #include <linux/capability.h>
|
/prebuilts/ndk/current/platforms/android-24/arch-mips64/usr/include/sys/ |
capability.h | 33 #include <linux/capability.h>
|
/prebuilts/ndk/current/platforms/android-24/arch-x86/usr/include/sys/ |
capability.h | 33 #include <linux/capability.h>
|
/prebuilts/ndk/current/platforms/android-24/arch-x86_64/usr/include/sys/ |
capability.h | 33 #include <linux/capability.h>
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/setools/diff/ |
polcap.py | 45 self.log.debug("Resetting policy capability differences")
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/setools/ |
polcapquery.py | 33 name The name of the policy capability to match.
|
/system/sepolicy/ |
debuggerd.te | 7 allow debuggerd self:capability { dac_override sys_ptrace chown kill fowner setuid setgid };
|
dumpstate.te | 11 allow dumpstate self:capability { setuid setgid sys_resource }; 16 allow dumpstate self:capability { 32 allow dumpstate self:capability { dac_override chown fowner fsetid }; 107 allow dumpstate self:capability sys_ptrace;
|
global_macros | 4 define(`capability_class_set', `{ capability capability2 }')
|
rild.te | 9 allow rild self:capability { setuid net_admin net_raw };
|
sdcardd.te | 12 allow sdcardd self:capability { setuid setgid dac_override sys_admin sys_resource };
|
security_classes | 13 class capability
|
vold.te | 76 allow vold self:capability { net_admin dac_override mknod sys_admin chown fowner fsetid }; 88 allow vold self:capability { sys_ptrace kill }; 172 allow vold self:capability sys_nice; 175 allow vold self:capability sys_chroot;
|
wpa.te | 10 allow wpa self:capability { setuid net_admin setgid net_raw };
|
/external/tpm2/ |
TpmFail.c | 45 TPM_CAP capability; // Always TPM_CAP_TPM_PROPERTIES member in struct:__anon23943 191 UINT32 capability; local 225 // returned for the capability, property, and count 228 || (UINT32_Unmarshal(&capability, &inRequest, 231 || (capability != TPM_CAP_TPM_PROPERTIES) 266 // indicate the capability type 267 marshalSize += MarshalUint32(capability, &buffer, &bufferSize);
|
/external/mesa3d/src/gallium/drivers/svga/ |
svga_format.c | 113 * Format capability description entry. 119 * Capability index corresponding to the format. 125 * capability is not explicitly present. 132 * Format capability description table. 554 * be supported when the host does not provide an explicit capability entry.
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/lib32/ |
libtic.so | |
libtic.so.5 | |
libtic.so.5.7 | |
/packages/apps/Email/provider_src/com/android/email/mail/store/ |
ImapConnection.java | 53 /** ID capability per RFC 2971*/ 55 /** NAMESPACE capability per RFC 2342 */ 57 /** STARTTLS capability per RFC 3501 */ 59 /** UIDPLUS capability per RFC 4315 */ 150 // CAPABILITY 164 // such, we save away capability information here for future use. 214 * Returns whether or not the specified capability is supported by the server. 216 private boolean isCapable(int capability) { 217 return (mCapabilities & capability) != 0; 221 * Sets the capability flags according to the response provided by the server [all...] |
/external/clang/test/SemaCXX/ |
warn-thread-safety-parsing.cpp | 356 // expected-warning {{'guarded_by' attribute requires arguments whose type is annotated with 'capability' attribute; type here is 'int'}} 360 // expected-warning {{'guarded_by' attribute requires arguments whose type is annotated with 'capability' attribute; type here is 'Mutex **'}} 362 // expected-warning {{'guarded_by' attribute requires arguments whose type is annotated with 'capability' attribute; type here is 'UnlockableMu'}} 427 // expected-warning {{'pt_guarded_by' attribute requires arguments whose type is annotated with 'capability' attribute; type here is 'int'}} 431 // expected-warning {{'pt_guarded_by' attribute requires arguments whose type is annotated with 'capability' attribute; type here is 'Mutex **'}} 433 // expected-warning {{'pt_guarded_by' attribute requires arguments whose type is annotated with 'capability' attribute}} 488 // expected-warning {{'acquired_after' attribute requires arguments whose type is annotated with 'capability' attribute; type here is 'int'}} 492 // expected-warning {{'acquired_after' attribute requires arguments whose type is annotated with 'capability' attribute; type here is 'Mutex **'}} 494 // expected-warning {{'acquired_after' attribute requires arguments whose type is annotated with 'capability' attribute}} 496 // expected-warning {{'acquired_after' attribute can only be applied in a context annotated with 'capability("mutex")' attribute} [all...] |
/external/apache-harmony/jdwp/src/test/java/org/apache/harmony/jpda/tests/jdwp/StackFrame/ |
PopFrames002Test.java | 69 //check capability, relevant for this test 70 logWriter.println("=> Check capability: canPopFrames"); 72 logWriter.println("##WARNING: this VM doesn't possess capability: canPopFrames"); 193 //check capability, relevant for this test 194 logWriter.println("=> Check capability: canPopFrames"); 196 logWriter.println("##WARNING: this VM doesn't possess capability: canPopFrames"); 288 //check capability, relevant for this test 289 logWriter.println("=> Check capability: canPopFrames"); 291 logWriter.println("##WARNING: this VM doesn't possess capability: canPopFrames");
|
Completed in 2767 milliseconds
<<11121314151617181920>>