/external/apache-harmony/security/src/test/resources/PermissionCollection/ |
H A D | signedBKS.jar | ... 4.1.1/s?defs= " () public static void access () java.io.File f
public static void main ... |
/external/apache-harmony/support/src/test/resources/tests/resources/ |
H A D | hyts_signed.jar | ... 4.1.1/s?defs= " () public static void access () java.io.File f
public static void main ... |
/external/chromium/net/disk_cache/ |
H A D | cache_util_win.cc | 64 // There is an error, but we share delete access so let's see if there is a 69 DWORD access = SYNCHRONIZE; local 71 name.value().c_str(), access, sharing, NULL, OPEN_EXISTING, 0, NULL));
|
H A D | file_win.cc | 80 DWORD access = GENERIC_READ | GENERIC_WRITE | DELETE; local 81 platform_file_ = CreateFile(name.value().c_str(), access, sharing, NULL, 91 sync_platform_file_ = CreateFile(name.value().c_str(), access, sharing, NULL,
|
/external/javassist/src/main/javassist/bytecode/analysis/ |
H A D | Subroutine.java | 31 private Set access = new HashSet(); field in class:Subroutine 47 public void access(int index) { method in class:Subroutine 48 access.add(new Integer(index)); 52 return access.contains(new Integer(index)); 56 return access;
|
H A D | Executor.java | 56 * If a subroutine is passed, the access flags will be modified if this instruction accesses 424 access(index, Type.INTEGER, subroutine); 786 access(index, type, subroutine); 875 access(index, type, subroutine); 980 private void access(int index, Type type, Subroutine subroutine) { method in class:Executor 983 subroutine.access(index); 985 subroutine.access(index + 1);
|
/external/openfst/src/include/fst/ |
H A D | rmfinalepsilon.h | 42 vector<bool> access; local 45 SccVisitor<A> scc_visitor(0, &access, &coaccess, &props);
|
H A D | connect.h | 129 // access[i]: accessibility of state i. 134 SccVisitor(vector<StateId> *scc, vector<bool> *access, argument 136 : scc_(scc), access_(access), coaccess_(coaccess), props_(props) {} 199 vector<StateId> *scc_stack_; // SCC stack (w/ random access) 304 vector<bool> access; local 307 SccVisitor<Arc> scc_visitor(0, &access, &coaccess, &props); 310 for (StateId s = 0; s < access.size(); ++s) 311 if (!access[s] || !coaccess[s])
|
/external/srec/tools/thirdparty/OpenFst/fst/lib/ |
H A D | rmfinalepsilon.h | 36 vector<bool> access; local 39 SccVisitor<A> scc_visitor(0, &access, &coaccess, &props);
|
H A D | connect.h | 39 // access[i]: accessibility of state i. 44 SccVisitor(vector<StateId> *scc, vector<bool> *access, argument 46 : scc_(scc), access_(access), coaccess_(coaccess), props_(props) {} 190 vector<StateId> *scc_stack_; // SCC stack (w/ random access) 205 vector<bool> access; local 208 SccVisitor<Arc> scc_visitor(0, &access, &coaccess, &props); 211 for (StateId s = 0; s < (StateId)access.size(); ++s) 212 if (!access[s] || !coaccess[s])
|
/external/webkit/Source/WebCore/rendering/style/ |
H A D | DataRef.h | 38 T* access() function in class:WebCore::DataRef
|
/external/proguard/src/proguard/ant/ |
H A D | MemberSpecificationElement.java | 39 private String access; field in class:MemberSpecificationElement 67 String access = memberSpecificationElement.access; 116 new MemberSpecification(requiredAccessFlags(true, access), 117 requiredAccessFlags(false, access), 129 public void setAccess(String access) argument 131 this.access = access; 171 String access) 176 if (access ! 170 requiredAccessFlags(boolean set, String access) argument [all...] |
H A D | ClassSpecificationElement.java | 40 private String access; field in class:ClassSpecificationElement 76 String access = classSpecificationElement.access; 93 requiredAccessFlags(true, access, type), 94 requiredAccessFlags(false, access, type), 116 public void setAccess(String access) argument 118 this.access = access; 202 String access, 208 if (access ! 201 requiredAccessFlags(boolean set, String access, String type) argument [all...] |
/external/chromium/chrome/browser/password_manager/ |
H A D | password_manager_unittest.cc | 44 virtual PasswordStore* GetPasswordStore(ServiceAccessType access) { argument
|
/external/chromium/chrome/browser/renderer_host/ |
H A D | web_cache_manager.h | 80 // The access time for this renderer. 81 base::Time access; member in struct:WebCacheManager::RendererInfo
|
/external/chromium/base/ |
H A D | platform_file_win.cc | 50 DWORD access = (flags & PLATFORM_FILE_READ) ? GENERIC_READ : 0; local 52 access |= GENERIC_WRITE; 54 access |= FILE_WRITE_ATTRIBUTES; 70 HANDLE file = CreateFile(name.value().c_str(), access, sharing, NULL,
|
H A D | shared_memory_win.cc | 161 DWORD access = STANDARD_RIGHTS_REQUIRED | FILE_MAP_READ; local 166 access |= FILE_MAP_WRITE; 180 &result, access, FALSE, options))
|
/external/zlib/examples/ |
H A D | zran.c | 1 /* zran.c -- example of zlib/gzip stream indexing and random access 7 for random access of a compressed file. A file containing a zlib or gzip 9 its entirety, and an index built with access points about every SPAN bytes 14 An access point can be created at the start of any deflate block, by saving 21 a new access point. If so, that point is saved in a data structure that 34 requests for random access reads from the compressed data would try to use 39 access, mainly copying the 32K byte dictionary. So if small pieces of the 44 not be constrained to have access points at block boundaries, but requires 45 more memory per access point, and also cannot be saved to file due to the 57 #define SPAN 1048576L /* desired distance between access point 70 struct access { struct [all...] |
/external/bluetooth/bluez/src/ |
H A D | sdpd-database.c | 226 SDPDBG("Could not find access data for : 0x%x", handle); 332 sdp_access_t *access = p->data; local 335 if (bacmp(BDADDR_ANY, &access->device)) 338 rec = sdp_record_find(access->handle); 342 SDPDBG("adding record with handle %x", access->handle);
|
/external/chromium/base/win/ |
H A D | registry.cc | 24 RegKey::RegKey(HKEY rootkey, const wchar_t* subkey, REGSAM access) argument 29 if (access & (KEY_SET_VALUE | KEY_CREATE_SUB_KEY | KEY_CREATE_LINK)) 30 Create(rootkey, subkey, access); 32 Open(rootkey, subkey, access); 42 LONG RegKey::Create(HKEY rootkey, const wchar_t* subkey, REGSAM access) { argument 44 return CreateWithDisposition(rootkey, subkey, &disposition_value, access); 48 DWORD* disposition, REGSAM access) { 50 DCHECK(rootkey && subkey && access && disposition); 54 REG_OPTION_NON_VOLATILE, access, NULL, &key_, 59 LONG RegKey::Open(HKEY rootkey, const wchar_t* subkey, REGSAM access) { argument 47 CreateWithDisposition(HKEY rootkey, const wchar_t* subkey, DWORD* disposition, REGSAM access) argument 68 CreateKey(const wchar_t* name, REGSAM access) argument 81 OpenKey(const wchar_t* name, REGSAM access) argument [all...] |
/external/chromium/chrome/browser/search_engines/ |
H A D | template_url_model_test_util.cc | 69 virtual WebDataService* GetWebDataService(ServiceAccessType access) { argument
|
/external/icu4c/common/unicode/ |
H A D | utext.h | 41 * access to the actual text. 79 * or UTF-32, for example. When coding to the UText access API, no assumptions 107 * Most UText access functions have as their first parameter a (UText *) pointer, 349 * This is true for read access only with shallow clones, and for both read and 350 * write access with deep clones. 360 * @param readOnly TRUE to request that the cloned UText have read only access to the 822 * #define inline versions of selected performance-critical text access functions 1046 * are always an error while UText access is occuring because the underlying 1072 * deleted, not just until the next time the access() function is called 1153 * Function type declaration for UText.access() 1396 UTextAccess *access; member in struct:UTextFuncs [all...] |
/external/qemu/hw/ |
H A D | i8254.c | 248 int channel, access; local 275 access = (val >> 4) & 3; 276 if (access == 0) { 279 s->rw_mode = access; 280 s->read_state = access; 281 s->write_state = access;
|
/external/webkit/Source/WebKit/chromium/src/ |
H A D | Extensions3DChromium.cpp | 80 void* Extensions3DChromium::mapBufferSubDataCHROMIUM(unsigned target, int offset, int size, unsigned access) argument 82 return m_internal->mapBufferSubDataCHROMIUM(target, offset, size, access); 90 void* Extensions3DChromium::mapTexSubImage2DCHROMIUM(unsigned target, int level, int xoffset, int yoffset, int width, int height, unsigned format, unsigned type, unsigned access) argument 92 return m_internal->mapTexSubImage2DCHROMIUM(target, level, xoffset, yoffset, width, height, format, type, access);
|
/external/chromium/chrome/common/ |
H A D | sandbox_policy.cc | 121 // Adds the policy rules for the path and path\ with the semantic |access|. 125 sandbox::TargetPolicy::Semantics access, 137 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_FILES, access, 147 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_FILES, access, 155 // Adds the policy rules for the path and path\* with the semantic |access|. 158 sandbox::TargetPolicy::Semantics access, 161 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_REGISTRY, access, 167 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_REGISTRY, access, 124 AddDirectory(int path, const wchar_t* sub_dir, bool children, sandbox::TargetPolicy::Semantics access, sandbox::TargetPolicy* policy) argument 157 AddKeyAndSubkeys(std::wstring key, sandbox::TargetPolicy::Semantics access, sandbox::TargetPolicy* policy) argument
|