/system/tools/xsdc/tests/resources/simple_type/ |
D | simple_type.xsd | 6 <xs:restriction base="ints"> 8 </xs:restriction> 11 <xs:restriction base="xs:integer"> 14 </xs:restriction> 20 <xs:restriction base="xs:string"> 25 </xs:restriction>
|
/system/core/libkeyutils/ |
D | keyutils.cpp | 73 long keyctl_restrict_keyring(key_serial_t keyring, const char* type, const char* restriction) { in keyctl_restrict_keyring() argument 74 return keyctl(KEYCTL_RESTRICT_KEYRING, keyring, type, restriction); in keyctl_restrict_keyring()
|
/system/core/libkeyutils/include/ |
D | keyutils.h | 54 long keyctl_restrict_keyring(key_serial_t keyring, const char* type, const char* restriction);
|
/system/tools/xsdc/tests/resources/simple_complex_content/ |
D | simple_complex_content.xsd | 22 <xs:restriction base="address"> 28 </xs:restriction>
|
/system/libhidl/base/ |
D | Status.cpp | 147 void setProcessHidlReturnRestriction(HidlReturnRestriction restriction) { in setProcessHidlReturnRestriction() argument 148 gReturnRestriction = restriction; in setProcessHidlReturnRestriction()
|
/system/tools/xsdc/src/com/android/xsdc/ |
D | XsdHandler.java | 354 XsdGeneralRestriction restriction = (XsdGeneralRestriction) tag; in makeComplexContent() local 355 XsdType base = restriction.getBase(); in makeComplexContent() 359 content = new XsdComplexContent(null, null, restriction.getAttributes(), in makeComplexContent() 360 restriction.getElements()); in makeComplexContent() 381 XsdGeneralRestriction restriction = (XsdGeneralRestriction) tag; in makeSimpleContent() local 382 content = new XsdSimpleContent(null, restriction.getBase(), null); in makeSimpleContent()
|
/system/libhwbinder/include/hwbinder/ |
D | ProcessState.h | 91 void setCallRestriction(CallRestriction restriction);
|
/system/tools/xsdc/src/com/android/xsdc/java/ |
D | JavaCodeGenerator.java | 524 XsdRestriction restriction = (XsdRestriction) simpleType; in parseSimpleTypeValue() local 525 if (restriction.getEnums() != null) { in parseSimpleTypeValue() 526 String name = Utils.toClassName(restriction.getName()); in parseSimpleTypeValue() 530 return parseSimpleType(restriction.getBase(), traverse); in parseSimpleTypeValue()
|
/system/libhwbinder/ |
D | ProcessState.cpp | 246 void ProcessState::setCallRestriction(CallRestriction restriction) { in setCallRestriction() argument 249 mCallRestriction = restriction; in setCallRestriction()
|
/system/tools/xsdc/src/com/android/xsdc/cpp/ |
D | CppCodeGenerator.java | 593 XsdRestriction restriction = (XsdRestriction) simpleType; in parseSimpleTypeValue() local 594 if (restriction.getEnums() != null) { in parseSimpleTypeValue() 595 String name = Utils.toClassName(restriction.getName()); in parseSimpleTypeValue() 598 return parseSimpleType(restriction.getBase(), traverse); in parseSimpleTypeValue()
|
/system/libhidl/base/include/hidl/ |
D | Status.h | 209 void setProcessHidlReturnRestriction(HidlReturnRestriction restriction);
|
/system/tools/xsdc/ |
D | README.md | 137 "xsd:restriction": [
|
/system/core/logd/ |
D | README.property | 72 client, with the restriction that the PID must be in the UID group 1000
|
/system/core/rootdir/etc/ |
D | ld.config.vndk_lite.txt | 218 # This namespace has slightly looser restriction than the vndk namespace because 312 # Namespace config for vendor processes. In O, no restriction is enforced for
|
D | ld.config.txt | 278 # This namespace has slightly looser restriction than the vndk namespace because 379 # Namespace config for vendor processes. In O, no restriction is enforced for
|
/system/timezone/testing/data/test1/output_data/icu_overlay/ |
D | LICENSE | 10 without restriction, including without limitation the rights to use, 52 "Software"), to deal in the Software without restriction, including
|
/system/timezone/output_data/icu_overlay/ |
D | LICENSE | 10 without restriction, including without limitation the rights to use, 52 "Software"), to deal in the Software without restriction, including
|
/system/timezone/testing/data/test2/output_data/icu_overlay/ |
D | LICENSE | 10 without restriction, including without limitation the rights to use, 52 "Software"), to deal in the Software without restriction, including
|
/system/core/ |
D | NOTICE | 300 "Software") to deal in the Data Files or Software without restriction,
|
/system/sepolicy/prebuilts/api/26.0/public/ |
D | domain.te | 419 # the write to /system restriction above is not bypassed via context=
|
/system/sepolicy/prebuilts/api/27.0/public/ |
D | domain.te | 422 # the write to /system restriction above is not bypassed via context=
|
/system/sepolicy/prebuilts/api/28.0/public/ |
D | domain.te | 507 # the write to /system restriction above is not bypassed via context=
|
/system/sepolicy/public/ |
D | domain.te | 498 # the write to /system restriction above is not bypassed via context=
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | domain.te | 498 # the write to /system restriction above is not bypassed via context=
|
/system/media/audio_utils/ |
D | Doxyfile | 2263 # DOT_GRAPH_MAX_NODES. Using a depth of 0 means no depth restriction.
|