Searched refs:Define (Results 1 – 25 of 37) sorted by relevance
12
25 Define::Define(const std::string &name, const std::string &slurp) in Define() function in android::Define29 Define::~Define() { in ~Define()33 Expression::Type Define::getExpressionType() const { in getExpressionType()36 Expression *Define::getExpression() const { in getExpression()39 void Define::setExpression(Expression* expression) { in setExpression()43 void Define::generateSource(Formatter &out) const { in generateSource()47 void Define::processContents(AST &ast) { in processContents()
29 struct Define : Declaration { struct30 Define(const std::string &name, const std::string &slurp);31 ~Define();49 DISALLOW_COPY_AND_ASSIGN(Define); argument
33 struct Define;61 const Scope<Define *> &getDefinesScope() const;62 Scope<Define *> &getDefinesScope();78 Scope<Define *> mDefinesScope;
110 const Scope<Define *> &AST::getDefinesScope() const { in getDefinesScope()114 Scope<Define *> &AST::getDefinesScope() { in getDefinesScope()204 if ((*it)->decType() == Define::type() && in isolateConstants()205 ((Define *)*it)->getExpressionType() == ofType) { in isolateConstants()207 Define* define = (Define *)*it; in isolateConstants()
28 struct Define;
31 "Define.cpp",
2 # Define common prefixes for access vectors8 # Define a common prefix for file access vectors.42 # Define a common prefix for socket access vectors.73 # Define a common prefix for ipc access vectors.90 # Define a common for capability access vectors.147 # Define the access vectors.153 # Define the access vector interpretation for file-related objects.216 # Define the access vector interpretation for network-related objects.272 # Define the access vector interpretation for process-related objects317 # Define the access vector interpretation for ipc-related objects[all …]
32 # Define the ordering of the sensitivity levels (least to greatest)
4 # Define initial security identifiers
21 # Define type_transition rules if you want per-domain types.
41 # Define sepolicy for NN AIDL HAL service
8 # Define apps that can be marked debuggable/profileable and be profiled by simpleperf.
4 # Define the security object classes
96 # Define types for endpoint and channel sockets.830 # Define a property with given owner and scope838 # Define a /system-owned property used only in /system851 # Define a /system-owned property which can't be written outside /system864 # Define a /system-owned property with no restrictions870 # Define a /system-owned property which can only be written by vendor_init882 # Define a /product-owned property used only in /product895 # Define a /product-owned property which can't be written outside /product908 # Define a /product-owned property with no restrictions914 # Define a /vendor-owned property used only in /vendor[all …]
96 # Define types for endpoint and channel sockets.909 # Define a property with given owner and scope917 # Define a /system-owned property used only in /system930 # Define a /system-owned property which can't be written outside /system943 # Define a /system-owned property with no restrictions949 # Define a /system-owned property which can only be written by vendor_init961 # Define a /product-owned property used only in /product974 # Define a /product-owned property which can't be written outside /product987 # Define a /product-owned property with no restrictions993 # Define a /vendor-owned property used only in /vendor[all …]
56 Define values for PROT_READ, PROT_WRITE and PROT_MTE ourselves to maintain backwards compatibility.