/external/iproute2/examples/diffserv/ |
ef-prio | 11 # EF class: Maximum about one MTU sized packet allowed on the queue
|
/external/iptables/extensions/ |
libip6t_ipv6header.man | 36 /etc/protocols and numeric value also allowed. The number 255 is equivalent to
|
/external/jacoco/org.jacoco.report/src/org/jacoco/report/check/ |
Limit.java | 118 * Sets allowed minimum value as decimal string representation. The given 123 * allowed minimum or <code>null</code>, if no minimum should be 139 * Sets allowed maximum value as decimal string representation. The given 144 * allowed maximum or <code>null</code>, if no maximum should be
|
/external/jcommander/src/main/java/com/beust/jcommander/ |
DynamicParameter.java | 15 * An array of allowed command line parameters (e.g. "-D", "--define", etc...).
|
/external/kernel-headers/original/uapi/asm-generic/ |
resource.h | 44 #define RLIMIT_NICE 13 /* max nice prio allowed to raise to
|
/external/kernel-headers/original/uapi/linux/ |
hysdn_if.h | 26 #define ERR_NOT_BOOTED 1008 /* operation only allowed when booted */
|
/external/kernel-headers/original/uapi/linux/nfsd/ |
cld.h | 34 Cld_Check, /* is this cm_id allowed? */
|
/external/libchrome/base/power_monitor/ |
power_monitor_source.h | 37 // Friend function that is allowed to access the protected ProcessPowerEvent.
|
/external/libchrome/dbus/ |
string_util.cc | 40 // A trailing '/' character is not allowed unless the path is the root path.
|
/external/libgdx/tests/gdx-tests/src/com/badlogic/gdx/tests/g3d/shadows/utils/ |
AllLightFilter.java | 22 /** This Filter does not block lights. All lights are allowed.
|
/external/libselinux/src/ |
compute_av.c | 54 &avd->allowed, &avd->decided,
|
/external/libxml2/test/schemas/ |
src-element2-2_0.xsd | 5 id are allowed in addition to ref, along with <annotation>.
|
/external/libyuv/files/ |
DEPS | 20 # Define rules for which include paths are allowed in our source.
|
/external/llvm/test/CodeGen/AArch64/ |
setcc-takes-i32.ll | 10 ; with flag-manipulation operations allowed to use W-registers).
|
/external/llvm/test/CodeGen/MIR/ARM/ |
nested-instruction-bundle-error.mir | 24 ; CHECK: [[@LINE+1]]:14: nested instruction bundles are not allowed
|
/external/lzma/CPP/Common/ |
NewHandler.h | 15 It's still allowed to use redefined version of operator "new" from "NewHandler.cpp"
|
/external/mockito/src/org/mockito/internal/verification/ |
AtMost.java | 26 throw new MockitoException("Negative value is not allowed here");
|
Calls.java | 25 throw new MockitoException( "Negative and zero values are not allowed here" );
|
/external/opencv/cvaux/include/ |
cvaux.hpp | 77 int get_min_ch_val( int channel ) const // get the minimum allowed value of the specified channel 80 int get_max_ch_val( int channel ) const // get the maximum allowed value of the specified channel 94 bool set_min_ch_val( int channel, int val ) // set the minimum allowed value of the specified channel 96 bool set_max_ch_val( int channel, int val ) // set the maximum allowed value of the specified channel
|
/external/parameter-framework/upstream/parameter/ |
FixedPointParameterType.h | 80 * illegal value provided and gives the range allowed for the parameter. 95 * illegal value provided and gives the range allowed for the parameter. 110 * illegal value provided and gives the range allowed for the parameter. 125 * illegal value provided and gives the range allowed for the parameter.
|
/external/pcre/dist/doc/ |
pcre_get_stringnumber.3 | 30 found, or PCRE_ERROR_NOSUBSTRING otherwise. When duplicate names are allowed
|
pcre_jit_stack_alloc.3 | 25 the stack, and a maximum size to which it is allowed to grow. The result can be
|
/external/selinux/checkpolicy/ |
module_compiler.h | 24 * that insertion is allowed here and that the symbol does not already 26 * needs to free() the datum), -1 if declarations not allowed, -2 for 97 * - no declarations are allowed within else branches 98 * - no REQUIRES are allowed; the else branch inherits the parent's
|
/external/selinux/libsemanage/man/man3/ |
semanage_modify.3 | 24 is invoked, changes will be permanently written into the local store, and then loaded into policy. Validity of the object being added is checked at commit time. Adding new objects with respect to policy is allowed, except in the case of booleans. Attempt to add new booleans with respect to policy will fail at commit time.
|
/external/selinux/libsepol/include/sepol/policydb/ |
flask_types.h | 57 sepol_access_vector_t allowed; member in struct:sepol_av_decision
|