/external/adhd/dbus-config/ |
org.chromium.cras.conf | 5 <policy context="default"> 7 </policy> 9 <policy user="cras"> 11 </policy>
|
/external/libbrillo/policy/ |
device_policy.cc | 5 #include "policy/device_policy.h" 7 namespace policy { namespace 15 } // namespace policy
|
/hardware/qcom/gps/msm8998/utils/platform_lib_abstractions/loc_stub/src/ |
loc_stub_sched_policy.cpp | 47 int set_sched_policy(int tid, SchedPolicy policy)
|
/system/tpm/trunks/ |
com.android.Trunks.conf | 5 <policy user="system"> 7 </policy> 9 <policy context="default"> 14 </policy>
|
org.chromium.Trunks.conf | 5 <policy user="trunks"> 7 </policy> 9 <policy context="default"> 14 </policy>
|
/external/python/cpython3/Lib/email/mime/ |
base.py | 9 import email.policy 19 def __init__(self, _maintype, _subtype, *, policy=None, **_params): 26 if policy is None: 27 policy = email.policy.compat32 28 message.Message.__init__(self, policy=policy)
|
/external/libunwind/src/mi/ |
Gset_caching_policy.c | 29 unw_set_caching_policy (unw_addr_space_t as, unw_caching_policy_t policy) 35 if (policy == UNW_CACHE_PER_THREAD) 36 policy = UNW_CACHE_GLOBAL; 39 if (policy == as->caching_policy) 42 as->caching_policy = policy;
|
/system/tpm/tpm_manager/server/ |
org.chromium.TpmManager.conf | 5 <policy user="tpm_manager"> 8 </policy> 9 <policy user="root"> 12 </policy> 13 <policy context="default"> 18 </policy>
|
/frameworks/base/core/java/com/android/internal/policy/ |
IKeyguardDrawnCallback.aidl | 16 package com.android.internal.policy;
|
IKeyguardDismissCallback.aidl | 17 package com.android.internal.policy;
|
IKeyguardExitCallback.aidl | 16 package com.android.internal.policy;
|
IShortcutService.aidl | 17 package com.android.internal.policy;
|
/hardware/qcom/gps/msm8909w_3100/utils/platform_lib_abstractions/loc_pla/src/ |
platform_lib_sched_policy.cpp | 37 int platform_lib_abstraction_set_sched_policy(int tid, PLASchedPolicy policy) 39 return set_sched_policy(tid, (SchedPolicy)policy);
|
/hardware/qcom/gps/msm8998/utils/platform_lib_abstractions/loc_pla/src/ |
platform_lib_sched_policy.cpp | 37 int platform_lib_abstraction_set_sched_policy(int tid, PLASchedPolicy policy) 39 return set_sched_policy(tid, (SchedPolicy)policy);
|
/system/core/debuggerd/seccomp_policy/ |
generate.sh | 6 CPP='cpp -undef -E -P crash_dump.policy.def' 7 $CPP -D__arm__ -o crash_dump.arm.policy 8 $CPP -D__aarch64__ -D__LP64__ -o crash_dump.arm64.policy 9 $CPP -D__i386__ -o crash_dump.x86.policy 10 $CPP -D__x86_64__ -D__LP64__ -o crash_dump.x86_64.policy
|
/system/tpm/attestation/server/ |
org.chromium.Attestation.conf | 5 <policy user="attestation"> 8 </policy> 9 <policy context="default"> 14 </policy>
|
/external/ipsec-tools/src/libipsec/ |
ipsec_get_policylen.c | 50 ipsec_get_policylen(policy) 51 ipsec_policy_t policy; 53 return policy ? PFKEY_EXTLEN(policy) : -1;
|
/frameworks/base/packages/SystemUI/src/com/android/systemui/statusbar/policy/ |
Listenable.java | 17 package com.android.systemui.statusbar.policy;
|
/external/ltp/testcases/kernel/security/tomoyo/ |
tomoyo_new_file_test.c | 26 static const char *policy = ""; variable 31 printf("%s : ", policy); 126 policy = "allow_read /proc/sys/net/ipv4/ip_local_port_range"; 127 write_domain_policy(policy, 0); 129 write_domain_policy(policy, 1); 132 policy = "allow_write /proc/sys/net/ipv4/ip_local_port_range"; 133 write_domain_policy(policy, 0); 135 write_domain_policy(policy, 1); 138 policy = "allow_read/write /proc/sys/net/ipv4/ip_local_port_range"; 139 write_domain_policy(policy, 0) [all...] |
/system/core/debuggerd/ |
Android.mk | 4 LOCAL_MODULE := crash_dump.policy 9 LOCAL_MODULE_STEM_32 := crash_dump.arm.policy 10 LOCAL_MODULE_STEM_64 := crash_dump.arm64.policy 14 LOCAL_MODULE_STEM_32 := crash_dump.x86.policy 15 LOCAL_MODULE_STEM_64 := crash_dump.x86_64.policy 19 LOCAL_SRC_FILES_arm := seccomp_policy/crash_dump.arm.policy 20 LOCAL_SRC_FILES_arm64 := seccomp_policy/crash_dump.arm64.policy 21 LOCAL_SRC_FILES_x86 := seccomp_policy/crash_dump.x86.policy 22 LOCAL_SRC_FILES_x86_64 := seccomp_policy/crash_dump.x86_64.policy
|
/external/caliper/caliper/src/main/java/com/google/caliper/runner/ |
ScheduledTrial.java | 28 private final TrialSchedulingPolicy policy; field in class:ScheduledTrial 31 TrialSchedulingPolicy policy) { 34 this.policy = policy; 37 TrialSchedulingPolicy policy() { method in class:ScheduledTrial 38 return policy;
|
/packages/apps/Settings/src/com/android/settings/datausage/ |
DataUsageInfoController.java | 27 public void updateDataLimit(DataUsageInfo info, NetworkPolicy policy) { 28 if (info == null || policy == null) { 31 if (policy.warningBytes >= 0) { 32 info.warningLevel = policy.warningBytes; 34 if (policy.limitBytes >= 0) { 35 info.limitLevel = policy.limitBytes;
|
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
dbus-wpa_supplicant.conf | 5 <policy user="root"> 16 </policy> 17 <policy context="default"> 24 </policy>
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/setools/policyrep/ |
initsid.py | 25 def initialsid_factory(policy, name): 29 assert name.policy == policy 32 return InitialSID(policy, name) 35 return InitialSID(policy, qpol.qpol_isid_t(policy, name)) 47 return context.context_factory(self.policy, self.qpol_symbol.context(self.policy))
|
/external/libbrillo/policy/tests/ |
libpolicy_unittest.cc | 5 #include "policy/libpolicy.h" 14 #include "policy/device_policy_impl.h" 16 namespace policy { namespace 18 static const char kPolicyFileAllSet[] = "policy/tests/whitelist/policy_all"; 19 static const char kPolicyFileNoneSet[] = "policy/tests/whitelist/policy_none"; 20 static const char kKeyFile[] = "policy/tests/whitelist/owner.key"; 38 // Test that a policy file can be verified and parsed correctly. The file 49 // Ensure we successfully loaded the device policy file. 52 const DevicePolicy& policy = provider.GetDevicePolicy(); local 56 ASSERT_TRUE(policy.GetPolicyRefreshRate(&int_value)) 179 const DevicePolicy& policy = provider.GetDevicePolicy(); local [all...] |