/frameworks/base/packages/SystemUI/src/com/android/systemui/statusbar/policy/ |
LocationController.java | 17 package com.android.systemui.statusbar.policy; 19 import com.android.systemui.statusbar.policy.LocationController.LocationChangeCallback;
|
RemoteInputQuickSettingsDisabler.java | 17 package com.android.systemui.statusbar.policy;
|
RotationLockController.java | 17 package com.android.systemui.statusbar.policy; 19 import com.android.systemui.statusbar.policy.RotationLockController.RotationLockControllerCallback;
|
WifiIcons.java | 17 package com.android.systemui.statusbar.policy;
|
/frameworks/base/packages/SystemUI/tests/src/com/android/systemui/statusbar/policy/ |
KeyButtonViewTest.java | 15 package com.android.systemui.statusbar.policy;
|
LocationControllerImplTest.java | 15 package com.android.systemui.statusbar.policy; 29 import com.android.systemui.statusbar.policy.LocationController.LocationChangeCallback;
|
NetworkControllerEthernetTest.java | 1 package com.android.systemui.statusbar.policy; 9 import com.android.systemui.statusbar.policy.NetworkController.IconState;
|
/frameworks/base/services/core/java/com/android/server/policy/ |
GlobalActionsProvider.java | 16 package com.android.server.policy;
|
PowerAction.java | 16 package com.android.server.policy; 23 import com.android.server.policy.WindowManagerPolicy;
|
RestartAction.java | 16 package com.android.server.policy; 23 import com.android.server.policy.WindowManagerPolicy;
|
SplashScreenSurface.java | 17 package com.android.server.policy; 19 import static com.android.server.policy.PhoneWindowManager.DEBUG_SPLASH_SCREEN; 27 import com.android.internal.policy.DecorView; 28 import com.android.internal.policy.PhoneWindow; 29 import com.android.server.policy.WindowManagerPolicy.StartingSurface;
|
/system/extras/ext4_utils/ |
ext4_crypt_init_extensions.cpp | 69 // Try to set policy on this directory, but if it is non-empty this may fail. 74 // Only set policy on first level /data directories 75 // To make this less restrictive, consider using a policy file. 76 // However this is overkill for as long as the policy is simply 77 // to apply a global policy to all /data folders created via makedir 96 LOG(INFO) << "Not setting policy on " << dir; 105 std::string policy; local 106 if (!android::base::ReadFileToString(ref_filename, &policy)) { 107 LOG(ERROR) << "Unable to read system policy to set on " << dir; 124 LOG(INFO) << "Setting policy on " << dir [all...] |
/system/sepolicy/tools/sepolicy-analyze/ |
sepolicy-analyze.c | 34 fprintf(stderr, "%s must be called on a policy file with a component and the appropriate arguments specified\n", arg0); 35 fprintf(stderr, "%s <policy-file>:\n", arg0); 44 char *policy; local 52 policy = argv[1]; 53 if(load_policy(policy, &policydb, &pf))
|
/system/tpm/tpm_manager/server/ |
mock_tpm_nvram.h | 35 NvramSpacePolicy policy; member in struct:tpm_manager::NvSpace 71 NvramSpacePolicy policy); 89 NvramSpacePolicy* policy);
|
/frameworks/base/packages/SettingsLib/src/com/android/settingslib/ |
NetworkPolicyEditor.java | 65 for (NetworkPolicy policy : policies) { 67 if (policy.limitBytes < -1) { 68 policy.limitBytes = LIMIT_DISABLED; 71 if (policy.warningBytes < -1) { 72 policy.warningBytes = WARNING_DISABLED; 76 mPolicies.add(policy); 100 final NetworkPolicy policy = getPolicy(template); local 101 return policy != null && policy.limitBytes != LIMIT_DISABLED; 105 NetworkPolicy policy = getPolicy(template) local 123 NetworkPolicy policy = getPolicy(template); local 152 final NetworkPolicy policy = getPolicy(template); local 162 final NetworkPolicy policy = getOrCreatePolicy(template); local 170 final NetworkPolicy policy = getPolicy(template); local 175 final NetworkPolicy policy = getOrCreatePolicy(template); local 192 final NetworkPolicy policy = getPolicy(template); local 204 final NetworkPolicy policy = getOrCreatePolicy(template); local [all...] |
/sdk/eclipse/plugins/com.android.ide.eclipse.tests/unittests/com/android/ide/eclipse/adt/internal/refactorings/core/ |
AndroidTypeMoveParticipantTest.java | 121 IMovePolicy policy = ReorgPolicyFactory.createMovePolicy(resources, elements); local 122 JavaMoveProcessor processor = new JavaMoveProcessor(policy); 125 assertTrue(policy.canEnable());
|
/device/linaro/bootloader/arm-trusted-firmware/plat/hisilicon/poplar/ |
plat_storage.c | 117 const struct plat_io_policy *policy; local 122 policy = &policies[image_id]; 123 result = policy->check(policy->image_spec); 126 *image_spec = policy->image_spec; 127 *dev_handle = *(policy->dev_handle);
|
/external/boringssl/src/crypto/x509v3/ |
pcy_cache.c | 82 POLICYINFO *policy; local 89 policy = sk_POLICYINFO_value(policies, i); 90 data = policy_data_new(policy, NULL, crit); 94 * Duplicate policy OIDs are illegal: reject if matches found.
|
v3_pci.c | 76 if (pci->proxyPolicy->policy && pci->proxyPolicy->policy->data) 78 pci->proxyPolicy->policy->data); 84 ASN1_OCTET_STRING **policy) 112 } else if (strcmp(val->name, "policy") == 0) { 115 if (!*policy) { 116 *policy = ASN1_OCTET_STRING_new(); 117 if (!*policy) { 134 tmp_data = OPENSSL_realloc((*policy)->data, 135 (*policy)->length + val_len + 1) 203 ASN1_OCTET_STRING *policy = NULL; local [all...] |
/external/ltp/testcases/kernel/security/tomoyo/ |
tomoyo_new_file_test.c | 26 static const char *policy = ""; variable 31 printf("%s : ", policy); 126 policy = "allow_read /proc/sys/net/ipv4/ip_local_port_range"; 127 write_domain_policy(policy, 0); 129 write_domain_policy(policy, 1); 132 policy = "allow_write /proc/sys/net/ipv4/ip_local_port_range"; 133 write_domain_policy(policy, 0); 135 write_domain_policy(policy, 1); 138 policy = "allow_read/write /proc/sys/net/ipv4/ip_local_port_range"; 139 write_domain_policy(policy, 0) [all...] |
tomoyo_policy_memory_test.c | 42 static const char *policy = NULL; variable 47 if (!fp || fscanf(fp, "Policy: %u", policy_memory) != 1 || fclose(fp)) 48 BUG("BUG: Policy read error\n"); 58 BUG("BUG: Policy read error\n"); 63 if (strcmp(buffer, policy)) 70 printf("BUG: Policy write error: %s %s at %d\n", policy, 189 BUG("BUG: Policy write error\n"); 191 policy = domain_testcases[j]; 192 printf("Processing: %s\n", policy); [all...] |
/external/ltp/testcases/kernel/syscalls/sched_setparam/ |
sched_setparam02.c | 39 * Change scheduling policy to SCHED_FIFO 84 int policy; member in struct:test_cases_t 88 "Test with policy SCHED_FIFO", SCHED_FIFO, FIFO_OR_RR_PRIO}, { 89 "Test with policy SCHED_RR", SCHED_RR, FIFO_OR_RR_PRIO}, { 115 if ((sched_setscheduler(0, testcases[i].policy,
|
/external/ltp/testcases/kernel/syscalls/sched_setscheduler/ |
sched_setscheduler01.c | 31 * 2. Call sched_setscheduler with an invalid scheduling policy, 76 int policy; member in struct:test_case_t 83 /* The policy is invalid - EINVAL */ 116 TEST(sched_setscheduler(*(TC[i].pid), TC[i].policy,
|
/external/ltp/testcases/open_posix_testsuite/conformance/interfaces/pthread_attr_setschedpolicy/ |
common.h | 35 printf("Failed: policy: %s, func: %s, rc: %s (%u)\n", \ 39 int policy; member in struct:params 50 int policy; local 54 rc = pthread_getschedparam(self, &policy, &sp); 62 if (policy != p->policy) { 63 printf("Failed: policy: %s thread policy: %u != %u\n", 64 p->policy_label, policy, p->policy); [all...] |
/external/lzma/CPP/Windows/ |
SecurityUtils.cpp | 44 static void MyLookupSids(CPolicy &policy, PSID ps)
48 NTSTATUS nts = policy.LookupSids(1, &ps, &referencedDomains, &names);
111 CPolicy policy;
local 119 if (policy.Open(NULL, &attr,
141 NTSTATUS status = policy.EnumerateAccountRights(psid, &userRightsArray, &countOfRights);
162 NTSTATUS status = policy.EnumerateAccountsWithUserRight(&userRights, &enums, &countReturned);
166 MyLookupSids(policy, enums[i].Sid);
172 NTSTATUS status = policy.AddAccountRights(psid, &userRights);
|