/external/python/cpython3/Lib/test/test_email/ |
test_pickleable.py | 7 from email import policy 55 """), policy=policy.default),) 57 msg_params['created'] = (email.message.Message(policy=policy.default),)
|
test_parser.py | 5 from email.policy import default 12 def __init__(self, policy): 13 self.check_policy = policy 16 MyPolicy = TestEmailBase.policy.clone(linesep='boo') 21 policy=self.MyPolicy) 29 policy=self.MyPolicy) 55 policy=default, 77 msg = parser("To: foo\n\ntest", policy=MyPolicy) 84 msg = parser("To: foo\n\ntest", Message, policy=MyPolicy)
|
/frameworks/base/packages/SystemUI/src/com/android/systemui/ |
Dependency.java | 59 import com.android.systemui.statusbar.policy.AccessibilityController; 60 import com.android.systemui.statusbar.policy.AccessibilityManagerWrapper; 61 import com.android.systemui.statusbar.policy.BatteryController; 62 import com.android.systemui.statusbar.policy.BatteryControllerImpl; 63 import com.android.systemui.statusbar.policy.BluetoothController; 64 import com.android.systemui.statusbar.policy.BluetoothControllerImpl; 65 import com.android.systemui.statusbar.policy.CastController; 66 import com.android.systemui.statusbar.policy.CastControllerImpl; 67 import com.android.systemui.statusbar.policy.ConfigurationController; 68 import com.android.systemui.statusbar.policy.DarkIconDispatcher [all...] |
/external/owasp/sanitizer/src/main/org/owasp/html/ |
HtmlChangeReporter.java | 38 * Sits between the HTML parser, and then policy, and the renderer so that it 48 * The renderer receives events from the policy unchanged, but the reporter 50 * policy. 69 public void setPolicy(HtmlSanitizer.Policy policy) { 70 this.input.policy = policy; 75 public HtmlSanitizer.Policy getWrappedPolicy() { return input; } 77 private static final class InputChannel<T> implements HtmlSanitizer.Policy { 78 HtmlStreamEventReceiver policy; field in class:HtmlChangeReporter.InputChannel [all...] |
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/setools/policyrep/ |
typeattr.py | 25 """Look up the low-level qpol policy reference""" 39 assert name.policy == qpol_policy 54 assert name.policy == qpol_policy 71 assert name.policy == qpol_policy 113 return self.qpol_symbol.ispermissive(self.policy) 121 for attr in self.qpol_symbol.attr_iter(self.policy): 122 yield attribute_factory(self.policy, attr) 126 for alias in self.qpol_symbol.alias_iter(self.policy): 157 for type_ in self.qpol_symbol.type_iter(self.policy): 158 yield type_factory(self.policy, type_ [all...] |
/packages/apps/Email/provider_src/com/android/email/ |
SecurityPolicy.java | 46 import com.android.emailcommon.provider.Policy; 64 private Policy mAggregatePolicy; 76 * Get the security policy instance 103 * Compute the aggregate policy for all accounts that require it, and record it. 116 * @return a policy representing the strongest aggregate. If no policy sets are defined, 117 * a lightweight "nothing required" policy will be returned. Never null. 120 Policy computeAggregatePolicy() { 122 Policy aggregate = new Policy(); 140 Policy policy = new Policy(); local [all...] |
/packages/apps/Settings/tests/robotests/src/com/android/settings/notification/ |
ZenOnboardingActivityTest.java | 19 import static android.app.NotificationManager.Policy.PRIORITY_CATEGORY_ALARMS; 20 import static android.app.NotificationManager.Policy.PRIORITY_CATEGORY_REPEAT_CALLERS; 21 import static android.app.NotificationManager.Policy.SUPPRESSED_EFFECT_SCREEN_ON; 36 import android.app.NotificationManager.Policy; 96 Policy policy = new Policy(PRIORITY_CATEGORY_ALARMS, 0, 0, SUPPRESSED_EFFECT_SCREEN_ON); local 97 when(mNm.getNotificationPolicy()).thenReturn(policy); 104 ArgumentCaptor<Policy> captor = ArgumentCaptor.forClass(Policy.class) 118 Policy policy = new Policy(PRIORITY_CATEGORY_ALARMS, 0, 0, SUPPRESSED_EFFECT_SCREEN_ON); local 130 Policy policy = new Policy(0, 0, 0, 0); local 141 Policy policy = new Policy(0, 0, 0, 0); local 152 Policy policy = new Policy(0, 0, 0, 0); local 163 Policy policy = new Policy(0, 0, 0, 0); local 176 Policy policy = new Policy(0, 0, 0, 511); local [all...] |
/system/extras/ext4_utils/ |
ext4_crypt.cpp | 37 #define XATTR_NAME_ENCRYPTION_POLICY "encryption.policy" 100 static void policy_to_hex(const char* policy, char* hex) { 102 hex[j++] = HEX_LOOKUP[(policy[i] & 0xF0) >> 4]; 103 hex[j++] = HEX_LOOKUP[policy[i] & 0x0F]; 150 static bool e4crypt_policy_set(const char *directory, const char *policy, 155 LOG(ERROR) << "Policy wrong length: " << policy_length; 159 policy_to_hex(policy, policy_hex); 172 memcpy(eep.master_key_descriptor, policy, EXT4_KEY_DESCRIPTOR_SIZE); 174 PLOG(ERROR) << "Failed to set encryption policy for " << directory << " to " << policy_hex 181 LOG(INFO) << "Policy for " << directory << " set to " << policy_he [all...] |
/system/sepolicy/tools/ |
sepolicy-check.c | 18 fprintf(stderr, "%s -s <source> -t <target> -c <class> -p <perm> -P <policy file>\n", arg0); 66 perm_datum_t *perm, policydb_t *policy, avtab_t *avtab) { 77 if (expand_avtab(policy, avtab, &exp_avtab)) { 116 int check_rule(char *s, char *t, char *c, char *p, policydb_t *policy) { 131 src = hashtab_search(policy->p_types.table, s); 138 tgt = hashtab_search(policy->p_types.table, t); 145 cls = hashtab_search(policy->p_classes.table, c); 177 perm, policy, &policy->te_avtab); 185 perm, policy, &policy->te_cond_avtab) 235 char *policy = NULL, *source = NULL, *target = NULL, *class = NULL, *perm = NULL; local [all...] |
/device/linaro/bootloader/arm-trusted-firmware/plat/hisilicon/poplar/ |
plat_storage.c | 117 const struct plat_io_policy *policy; local 122 policy = &policies[image_id]; 123 result = policy->check(policy->image_spec); 126 *image_spec = policy->image_spec; 127 *dev_handle = *(policy->dev_handle);
|
/external/ltp/testcases/kernel/syscalls/sched_setscheduler/ |
sched_setscheduler03.c | 47 int policy; member in struct:test_case_t 55 .policy = SCHED_OTHER, 60 .policy = SCHED_BATCH, 66 .policy = SCHED_IDLE, 108 "Verifying case[%d]: policy = %d, priority = %d", 109 i + 1, cases[i].policy, cases[i].sched_param->sched_priority); 111 TEST(sched_setscheduler(*cases[i].pid, cases[i].policy, 134 * of process with fair policy is 120, which will be translated 143 tst_res(TINFO, "Setting init sched policy to SCHED_OTHER");
|
/external/ltp/testcases/open_posix_testsuite/functional/threads/condvar/ |
pthread_cond_wait_1.c | 37 #define POLICY SCHED_RR 56 int policy; local 61 SAFE_PFUNC(pthread_getschedparam(pthread_self(), &policy, ¶m)); 62 if ((policy != POLICY) || (param.sched_priority != HIGH_PRIORITY)) { 63 printf("Error: the policy or priority not correct\n"); 86 int policy; local 91 SAFE_PFUNC(pthread_getschedparam(pthread_self(), &policy, ¶m)); 92 if ((policy != POLICY) || (param.sched_priority != LOW_PRIORITY)) [all...] |
pthread_cond_wait_2.c | 37 #define POLICY SCHED_RR 56 int policy; local 61 SAFE_PFUNC(pthread_getschedparam(pthread_self(), &policy, ¶m)); 62 if ((policy != POLICY) || (param.sched_priority != HIGH_PRIORITY)) { 63 printf("Error: the policy or priority not correct\n"); 86 int policy; local 91 SAFE_PFUNC(pthread_getschedparam(pthread_self(), &policy, ¶m)); 92 if ((policy != POLICY) || (param.sched_priority != LOW_PRIORITY)) [all...] |
/external/ltp/testcases/open_posix_testsuite/functional/threads/schedule/ |
1-1.c | 64 int policy; local 69 SAFE_PFUNC(pthread_getschedparam(pthread_self(), &policy, ¶m)); 70 if (policy != SCHED_RR || param.sched_priority != HIGH_PRIORITY) { 71 printf("Error: the policy or priority not correct\n"); 90 int policy; local 95 SAFE_PFUNC(pthread_getschedparam(pthread_self(), &policy, ¶m)); 96 if (policy != SCHED_RR || param.sched_priority != LOW_PRIORITY) { 97 printf("Error: the policy or priority not correct\n"); 132 /* Create the low priority thread (inherits sched policy from main) */
|
/frameworks/base/core/java/android/app/admin/ |
SystemUpdatePolicy.java | 51 * Determines when over-the-air system updates are installed on a device. Only a device policy 52 * controller (DPC) running in device owner mode can set an update policy for the device?by calling 55 * policy affects the pending system update (if there is one) and any future updates for the device. 57 * <p>If a policy is set on a device, the system doesn't notify the user about updates.</p> 67 * // Create the system update policy 68 * SystemUpdatePolicy policy = SystemUpdatePolicy.createWindowedInstallPolicy( 71 * // Get a DevicePolicyManager instance to set the policy on the device 75 * dpm.setSystemUpdatePolicy(adminComponent, policy); 99 * Unknown policy type, used only internally. 105 * this policy type immediately installs any pending updates that might be postponed or waitin 320 SystemUpdatePolicy policy = new SystemUpdatePolicy(); local 350 SystemUpdatePolicy policy = new SystemUpdatePolicy(); local 367 SystemUpdatePolicy policy = new SystemUpdatePolicy(); local 751 SystemUpdatePolicy policy = new SystemUpdatePolicy(); local [all...] |
/hardware/interfaces/configstore/1.1/default/ |
Android.mk | 8 LOCAL_REQUIRED_MODULES_arm64 := configstore@1.1.policy 33 LOCAL_MODULE := configstore@1.1.policy 36 LOCAL_SRC_FILES := seccomp_policy/configstore@1.1-$(TARGET_ARCH).policy
|
/packages/apps/Email/provider_src/com/android/email/service/ |
PolicyService.java | 28 import com.android.emailcommon.provider.Policy; 41 public boolean isActive(Policy policy) { 43 return mSecurityPolicy.isActive(policy); 70 public void setAccountPolicy(long accountId, Policy policy, String securityKey) { 71 setAccountPolicy2(accountId, policy, securityKey, true /* notify */); 75 public void setAccountPolicy2(long accountId, Policy policy, String securityKey, 78 mSecurityPolicy.setAccountPolicy(accountId, policy, securityKey, notify) [all...] |
/packages/apps/Email/tests/src/com/android/email/ |
SecurityPolicyTests.java | 34 import com.android.emailcommon.provider.Policy; 55 private static final Policy EMPTY_POLICY = new Policy(); 104 * Create a Policy using the arguments formerly used to create a PolicySet; this minimizes the 107 private Policy setupPolicy(int minPasswordLength, int passwordMode, int maxPasswordFails, 112 Policy policy = new Policy(); local 113 policy.mPasswordMinLength = minPasswordLength; 114 policy.mPasswordMode = passwordMode 217 Policy policy = Policy.restorePolicyWithId(mMockContext, policyKey); local 500 Policy policy = LegacyPolicySet.flagsToPolicy(flags); local [all...] |
/cts/tests/vr/src/android/vr/cts/ |
VrSetFIFOThreadTest.java | 82 int vr_thread = 0, policy = 0; local 88 policy = (int) Process.getThreadScheduler(vr_thread); 89 Log.e(TAG, "scheduling policy: " + policy); 90 assertEquals((SCHED_FIFO | SCHED_RESET_ON_FORK), policy); 104 int vr_thread = 0, policy = 0; local 110 policy = (int) Process.getThreadScheduler(vr_thread); 111 Log.e(TAG, "scheduling policy: " + policy); 112 assertEquals(SCHED_OTHER, policy); [all...] |
/external/boringssl/src/crypto/x509v3/ |
v3_pcia.c | 46 ASN1_OPT(PROXY_POLICY,policy,ASN1_OCTET_STRING)
|
/external/desugar/java/com/google/devtools/common/options/ |
InvocationPolicyEnforcer.java | 53 private static final String INVOCATION_POLICY_SOURCE = "Invocation policy"; 58 * Creates an InvocationPolicyEnforcer that enforces the given policy. 60 * @param invocationPolicy the policy to enforce. A null policy means this enforcer will do 68 * Creates an InvocationPolicyEnforcer that enforces the given policy. 70 * @param invocationPolicy the policy to enforce. A null policy means this enforcer will do 81 private final FlagPolicy policy; field in class:InvocationPolicyEnforcer.FlagPolicyWithContext 86 FlagPolicy policy, OptionDescription description, OptionInstanceOrigin origin) { 87 this.policy = policy [all...] |
/external/ltp/testcases/kernel/syscalls/sched_get_priority_max/ |
sched_get_priority_max01.c | 77 int policy; member in struct:test_case_t 105 TEST(sched_get_priority_max(test_cases[ind].policy));
|
/external/ltp/testcases/kernel/syscalls/sched_get_priority_min/ |
sched_get_priority_min01.c | 77 int policy; member in struct:test_case_t 105 TEST(sched_get_priority_min(test_cases[ind].policy));
|
/external/ltp/testcases/open_posix_testsuite/conformance/interfaces/pthread_attr_setschedpolicy/ |
5-1.c | 30 int set_policy(char *label, int policy) 43 rc = pthread_attr_setschedpolicy(&attr, policy);
|
/frameworks/base/cmds/incidentd/src/ |
PrivacyBuffer.cpp | 70 * Strip next field based on its private policy and request spec, then stores data in buf. 81 const Privacy* policy = lookup(parentPolicy, fieldId); local 84 if (policy == NULL || policy->children == NULL) { 85 bool skip = !spec.CheckPremission(policy, parentPolicy->dest); 96 uint64_t token = mProto.start(encode_field_id(policy)); 98 status_t err = stripField(policy, spec, depth + 1); 106 PrivacyBuffer::PrivacyBuffer(const Privacy* policy, EncodedBuffer::iterator data) 107 : mPolicy(policy), mData(data), mProto(), mSize(0) {}
|