/third_party/node/deps/v8/include/ |
H A D | v8-microtask-queue.h | 46 Isolate* isolate, MicrotasksPolicy policy = MicrotasksPolicy::kAuto);
|
/third_party/node/deps/openssl/openssl/crypto/ts/ |
H A D | ts_local.h | 66 * policy TSAPolicyId, 138 ASN1_OBJECT *policy; member
|
/third_party/node/deps/openssl/openssl/crypto/x509/ |
H A D | pcy_local.h | 19 * X509_POLICY_NODE contains that. This means that the main policy data can 34 * This flag indicates the structure has been mapped using a policy mapping 35 * extension. If policy mapping is not active its references get deleted. 41 * This flag indicates the data doesn't correspond to a policy in Certificate 42 * Policies: it has been mapped to any policy. 68 /* other policy data */ 123 * Extra policy data when additional nodes (not from the certificate) are 127 /* This is the authority constrained policy set */ 143 X509_POLICY_DATA *ossl_policy_data_new(POLICYINFO *policy, const ASN1_OBJECT *id,
|
/third_party/openssl/crypto/ts/ |
H A D | ts_local.h | 66 * policy TSAPolicyId, 138 ASN1_OBJECT *policy; member
|
/third_party/openssl/crypto/x509/ |
H A D | pcy_local.h | 19 * X509_POLICY_NODE contains that. This means that the main policy data can 34 * This flag indicates the structure has been mapped using a policy mapping 35 * extension. If policy mapping is not active its references get deleted. 41 * This flag indicates the data doesn't correspond to a policy in Certificate 42 * Policies: it has been mapped to any policy. 68 /* other policy data */ 123 * Extra policy data when additional nodes (not from the certificate) are 127 /* This is the authority constrained policy set */ 143 X509_POLICY_DATA *ossl_policy_data_new(POLICYINFO *policy, const ASN1_OBJECT *id,
|
/base/powermgr/thermal_manager/test/unittest/src/ |
H A D | thermal_level_event_test.cpp | 227 std::vector<PolicyAction> policy; in HWTEST_F() local 228 if (!g_parser.GetActionPolicy("base_safe", item.level, policy)) { in HWTEST_F()
|
/third_party/python/Lib/test/libregrtest/ |
H A D | save_env.py | 96 def restore_asyncio_events__event_loop_policy(self, policy): 98 asyncio.set_event_loop_policy(policy)
|
/third_party/f2fs-tools/tools/f2fs_io/ |
H A D | f2fs_io.c | 1220 arg.policy_size = sizeof(arg.policy); in do_get_filename_encrypt_mode() 1223 ret = ioctl(fd, FS_IOC_GET_ENCRYPTION_POLICY, arg.policy.v1); in do_get_filename_encrypt_mode() 1231 switch (arg.policy.version) { in do_get_filename_encrypt_mode() 1233 mode = arg.policy.v1.filenames_encryption_mode; in do_get_filename_encrypt_mode() 1236 mode = arg.policy.v2.filenames_encryption_mode; in do_get_filename_encrypt_mode() 1239 printf("Do not support policy version: %d\n", in do_get_filename_encrypt_mode() 1240 arg.policy.version); in do_get_filename_encrypt_mode()
|
/third_party/googletest/googletest/src/ |
H A D | gtest-death-test.cc | 78 #include <zircon/syscalls/policy.h> 1030 zx_policy_basic_t policy; in AssumeRole() local 1031 policy.condition = ZX_POL_NEW_ANY; in AssumeRole() 1032 policy.policy = ZX_POL_ACTION_ALLOW; in AssumeRole() 1034 &policy, 1); in AssumeRole()
|
/third_party/node/lib/internal/modules/cjs/ |
H A D | loader.js | 117 const policy = getLazy( 118 () => (getOptionValue('--experimental-policy') ? require('internal/process/policy') : null), 261 const manifest = policy()?.manifest; 1219 * Note: when using the experimental policy mechanism this function is overridden. 1321 const manifest = policy()?.manifest; 1433 const manifest = policy()?.manifest; 1453 const manifest = policy()?.manifest; 1589 return policy() ? undefined : Module;
|
/third_party/node/deps/googletest/src/ |
H A D | gtest-death-test.cc | 82 #include <zircon/syscalls/policy.h> 1018 zx_policy_basic_t policy; in AssumeRole() local 1019 policy.condition = ZX_POL_NEW_ANY; in AssumeRole() 1020 policy.policy = ZX_POL_ACTION_ALLOW; in AssumeRole() 1022 &policy, 1); in AssumeRole()
|
/third_party/mesa3d/src/gtest/src/ |
H A D | gtest-death-test.cc | 77 # include <zircon/syscalls/policy.h> 1040 zx_policy_basic_t policy; in AssumeRole() local 1041 policy.condition = ZX_POL_NEW_ANY; in AssumeRole() 1042 policy.policy = ZX_POL_ACTION_ALLOW; in AssumeRole() 1044 child_job, ZX_JOB_POL_RELATIVE, ZX_JOB_POL_BASIC, &policy, 1); in AssumeRole()
|
/base/customization/enterprise_device_management/services/edm/src/ |
H A D | enterprise_device_mgr_ability.cpp | 232 EDMLOGW("EnterpriseDeviceMgrAbility::OnCommonEventUserRemoved: remove sub and super admin policy failed."); in OnCommonEventUserRemoved() 266 // remove sub super admin and sub super admin policy in OnCommonEventPackageRemoved() 270 // remove super admin and super admin policy in OnCommonEventPackageRemoved() 590 PasswordPolicy policy; in SetPasswordPolicy() local 591 serializer_->Deserialize(policyData, policy); in SetPasswordPolicy() 595 param.value.pinExpiredPeriod = policy.validityPeriod; in SetPasswordPolicy() 607 FingerprintPolicy policy; in SetFingerprintPolicy() local 608 serializer_->Deserialize(policyData, policy); in SetFingerprintPolicy() 609 std::vector<int32_t> userIds(policy.accountIds.size()); in SetFingerprintPolicy() 610 std::copy(policy in SetFingerprintPolicy() [all...] |
/third_party/libuv/src/unix/ |
H A D | core.c | 1588 * for Linux, when schedule policy is SCHED_OTHER (default), priority is 0. 1593 int policy; in uv_thread_getpriority() local 1602 r = pthread_getschedparam(tid, &policy, ¶m); in uv_thread_getpriority() 1607 if (SCHED_OTHER == policy && pthread_equal(tid, pthread_self())) { in uv_thread_getpriority() 1648 int policy; in uv_thread_setpriority() local 1654 r = pthread_getschedparam(tid, &policy, ¶m); in uv_thread_setpriority() 1660 * for Linux, when schedule policy is SCHED_OTHER (default), priority must be 0, in uv_thread_setpriority() 1663 if (SCHED_OTHER == policy && pthread_equal(tid, pthread_self())) in uv_thread_setpriority() 1671 min = sched_get_priority_min(policy); in uv_thread_setpriority() 1672 max = sched_get_priority_max(policy); in uv_thread_setpriority() [all...] |
/base/security/dlp_permission_service/interfaces/kits/dlp_permission/napi/src/ |
H A D | napi_dlp_permission.cpp | 244 PermissionPolicy policy; in GetDlpProperty() local 245 dlpFileNative->GetPolicy(policy); in GetDlpProperty() 249 .ownerAccount = policy.ownerAccount_, in GetDlpProperty() 250 .ownerAccountId = policy.ownerAccountId_, in GetDlpProperty() 251 .authUsers = policy.authUsers_, in GetDlpProperty() 253 .ownerAccountType = policy.ownerAccountType_, in GetDlpProperty() 255 .supportEveryone = policy.supportEveryone_, in GetDlpProperty() 256 .everyonePerm = policy.everyonePerm_, in GetDlpProperty() 257 .expireTime = policy.expireTime_, in GetDlpProperty() 1395 GatheringPolicyType policy in GetDlpGatheringPolicyComplete() local [all...] |
/third_party/libwebsockets/lib/secure-streams/ |
H A D | secure-streams-serialize.c | 975 policy->timeout_ms; in lws_ss_deserialize_parse() 1044 * client side does not have access to policy in lws_ss_deserialize_parse() 1106 if (!proxy_pss_to_ss_h(pss)->policy) { in lws_ss_deserialize_parse() 1107 lwsl_err("%s: null policy\n", __func__); in lws_ss_deserialize_parse() 1112 * This is the policy's metadata list for the given in lws_ss_deserialize_parse() 1116 proxy_pss_to_ss_h(pss)->policy, in lws_ss_deserialize_parse() 1119 lwsl_err("%s: metadata %s not in proxy policy\n", in lws_ss_deserialize_parse() 1263 if ((*pss)->policy != &pol_smd) in lws_ss_deserialize_parse()
|
/third_party/lwip/src/netif/ppp/ |
H A D | chap_ms.c | 912 void set_mppe_enc_types(int policy, int types) { 914 if (policy != MPPE_ENC_POL_ENC_ALLOWED || 915 policy != MPPE_ENC_POL_ENC_REQUIRED) 919 if (policy == MPPE_ENC_POL_ENC_ALLOWED && !ccp_wantoptions[0].mppe)
|
/base/account/os_account/interfaces/innerkits/domain_account/native/include/ |
H A D | domain_account_client.h | 120 ErrCode SetAccountPolicy(const DomainAccountPolicy &policy);
|
/base/account/os_account/frameworks/domain_account/include/ |
H A D | domain_account_proxy.h | 44 ErrCode SetAccountPolicy(const DomainAccountPolicy &policy) override;
|
/base/customization/enterprise_device_management/interfaces/kits/usb_manager/include/ |
H A D | usb_manager_addon.h | 35 int32_t policy; member
|
/base/powermgr/thermal_manager/test/unittest/include/ |
H A D | thermal_config_file_parser.h | 42 bool GetActionPolicy(const std::string& name, uint32_t level, std::vector<PolicyAction>& policy);
|
/base/security/dlp_permission_service/interfaces/inner_api/dlp_permission/include/ |
H A D | dlp_permission_client.h | 42 const PermissionPolicy& policy, std::shared_ptr<GenerateDlpCertificateCallback> callback);
|
/device/soc/rockchip/common/sdk_linux/drivers/thermal/ |
H A D | thermal_core.h | 115 int thermal_zone_device_set_policy(struct thermal_zone_device *tz, char *policy);
|
/third_party/libunwind/libunwind/doc/ |
H A D | unw_set_cache_size.tex | 23 \Func{unw\_set\_caching\_policy}) with a policy of
|
/third_party/mesa3d/.gitlab-ci/common/ |
H A D | init-stage2.sh | 91 echo performance | tee -a /sys/devices/system/cpu/cpufreq/policy*/scaling_governor || true
|