OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:labeling
(Results
226 - 250
of
278
) sorted by null
1
2
3
4
5
6
7
8
9
10
11
>>
/external/ImageMagick/ImageMagick/script/
index.html
91
<td><a href="connected-components.php">Connected component
labeling
</a></td>
/external/ImageMagick/
index.html
101
<td><a href="www/connected-components.html">Connected component
labeling
</a></td>
/external/ImageMagick/www/
index.html
101
<td><a href="connected-components.html">Connected component
labeling
</a></td>
/external/libjpeg-turbo/
jdmainct.c
79
* the workspace.
Labeling
the physical row groups 0 to M+1, the synthesized
/external/libselinux/src/
label_file.c
2
* File contexts backend for
labeling
system
/external/opencv3/3rdparty/libjpeg/
jdmainct.c
80
* the workspace.
Labeling
the physical row groups 0 to M+1, the synthesized
/external/pdfium/third_party/libjpeg/
fpdfapi_jdmainct.c
79
* the workspace.
Labeling
the physical row groups 0 to M+1, the synthesized
/external/selinux/checkpolicy/
ChangeLog
52
* implement new default
labeling
behaviors for usr, role, range
checkpolicy.c
997
printf("no
labeling
support\n");
/external/selinux/libselinux/include/selinux/
selinux.h
206
/* Compute a
labeling
decision and set *newcon to refer to it.
/external/selinux/libselinux/src/
label_file.c
2
* File contexts backend for
labeling
system
/external/selinux/secilc/docs/
cil_type_statements.md
396
The type transition rule specifies the
labeling
and object creation allowed between the `source_type` and `target`\_type when a domain transition is requested. Kernels from 2.6.39 with policy versions from 25 and above also support a 'name transition' rule, however this is not allowed inside conditionals and currently only supports the file classes. Note that an [`allow`](cil_access_vector_rules.md#allow) rule must be used to authorise the transition.
/external/selinux/libsepol/src/
services.c
[
all
...]
/external/selinux/policycoreutils/
ChangeLog
653
* Rebase setfiles to use new
labeling
interface.
[
all
...]
/cts/tests/tests/graphics/src/android/graphics/cts/
BitmapFactoryTest.java
618
//
labeling
each pixel as if it is a translucency (alpha) value. If the
[
all
...]
/external/llvm/lib/CodeGen/AsmPrinter/
DwarfCompileUnit.cpp
707
// Don't bother
labeling
the .dwo unit, as its offset isn't used.
/external/selinux/libsepol/cil/src/
cil_binary.c
[
all
...]
/external/libvpx/libvpx/vp8/encoder/
pickinter.c
[
all
...]
/external/selinux/libsemanage/
ChangeLog
204
Ultimately we need to expand them to the list of users to support per-role homedir
labeling
when using the %groupname syntax.
/external/selinux/policycoreutils/semanage/
semanage
410
path arguments. The context
labeling
for the target subtree is
[
all
...]
/toolchain/binutils/binutils-2.25/ld/emultempl/
xtensaelf.em
[
all
...]
/external/libxml2/result/valid/
xhtml1.xhtml
[
all
...]
/external/libxml2/test/valid/
xhtml1.xhtml
[
all
...]
/external/autotest/client/deps/webgl_mpd/src/resources/
J3DIMath.js
[
all
...]
/external/selinux/policycoreutils/sepolicy/sepolicy/
generate.py
[
all
...]
Completed in 1780 milliseconds
1
2
3
4
5
6
7
8
9
10
11
>>