Searched defs:policy (Results 51 - 75 of 115) sorted by relevance

12345

/external/selinux/policycoreutils/sepolicy/
H A Dsearch.c38 #include "policy.h"
41 #include <apol/policy-query.h>
47 #include <qpol/policy.h>
107 static int perform_ra_query(const apol_policy_t * policy, const options_t * opt, apol_vector_t ** v) argument
112 if (!policy || !opt || !v) {
113 ERR(policy, "%s", strerror(EINVAL));
125 ERR(policy, "%s", strerror(ENOMEM));
130 apol_role_allow_query_set_regex(policy, raq, opt->useregex);
132 if (apol_role_allow_query_set_source(policy, raq, opt->src_role_name)) {
138 if (apol_role_allow_query_set_target(policy, ra
158 get_ra_results(const apol_policy_t * policy, const apol_vector_t * v, PyObject *output) argument
221 perform_te_query(const apol_policy_t * policy, const options_t * opt, apol_vector_t ** v) argument
369 get_te_results(const apol_policy_t * policy, const apol_vector_t * v, PyObject *output) argument
479 perform_ft_query(const apol_policy_t * policy, const options_t * opt, apol_vector_t ** v) argument
548 get_ft_results(const apol_policy_t * policy, const apol_vector_t * v, PyObject *list) argument
643 perform_av_query(const apol_policy_t * policy, const options_t * opt, apol_vector_t ** v) argument
743 get_av_results(const apol_policy_t * policy, const apol_vector_t * v, PyObject *output) argument
[all...]
H A Dsepolicy.py155 sepolicy.policy(values)
162 raise ValueError("%s invalid SELinux policy type\n%s" % (values, get_poltype_desc()))
308 if not args.policy and args.root != "/":
309 sepolicy.policy(sepolicy.get_installed_policy(args.root))
338 help=_("With this flag, alternative root path needs to include file context files and policy.xml file"))
350 help=_('Query SELinux policy network information'))
382 help=_('query SELinux policy to see if domains can communicate with each other'))
461 from sepolicy.generate import policy, AUSER, RUSER, EUSER, USERS, SANDBOX, APPLICATIONS, NEWTYPE namespace
477 raise ValueError(_("Command required for this type of policy"))
482 mypolicy = policy(arg
[all...]
/external/srtp/srtp/
H A Dsrtp.c1211 const srtp_policy_t *policy) {
1216 if ((session == NULL) || (policy == NULL) || (policy->key == NULL))
1220 status = srtp_stream_alloc(&tmp, policy);
1226 status = srtp_stream_init(tmp, policy);
1237 * if the template stream has already been set, then the policy is
1240 switch (policy->ssrc.type) {
1270 const srtp_policy_t *policy) { /* SRTP policy (list) */
1285 * loop over elements in the policy lis
1210 srtp_add_stream(srtp_t session, const srtp_policy_t *policy) argument
1269 srtp_create(srtp_t *session, const srtp_policy_t *policy) argument
1882 crypto_policy_set_from_profile_for_rtp(crypto_policy_t *policy, srtp_profile_t profile) argument
1911 crypto_policy_set_from_profile_for_rtcp(crypto_policy_t *policy, srtp_profile_t profile) argument
[all...]
/external/srtp/test/
H A Dsrtp_driver.c72 srtp_bits_per_second(int msg_len_octets, const srtp_policy_t *policy);
75 srtp_rejections_per_second(int msg_len_octets, const srtp_policy_t *policy);
78 srtp_do_timing(const srtp_policy_t *policy);
81 srtp_do_rejection_timing(const srtp_policy_t *policy);
84 srtp_test(const srtp_policy_t *policy);
87 srtcp_test(const srtp_policy_t *policy);
93 srtp_print_policy(const srtp_policy_t *policy);
116 * The policy_array is a null-terminated array of policy structs. it
221 const srtp_policy_t **policy = policy_array; local
224 /* loop over policy arra
293 const srtp_policy_t **policy = policy_array; local
304 const srtp_policy_t **policy = policy_array; local
315 srtp_policy_t policy; local
415 srtp_do_timing(const srtp_policy_t *policy) argument
437 srtp_do_rejection_timing(const srtp_policy_t *policy) argument
461 srtp_bits_per_second(int msg_len_octets, const srtp_policy_t *policy) argument
521 srtp_rejections_per_second(int msg_len_octets, const srtp_policy_t *policy) argument
570 srtp_test(const srtp_policy_t *policy) argument
769 srtcp_test(const srtp_policy_t *policy) argument
1041 srtp_print_policy(const srtp_policy_t *policy) argument
1175 srtp_policy_t policy; local
[all...]
/external/wpa_supplicant_8/hostapd/src/pae/
H A Dieee802_1x_kay.h146 enum macsec_policy policy; member in struct:ieee802_1x_kay
158 ieee802_1x_kay_init(struct ieee802_1x_kay_ctx *ctx, enum macsec_policy policy,
H A Dieee802_1x_kay.c747 /* TODO: What policy should be applied to detect duplicated SCI
3127 ieee802_1x_kay_init(struct ieee802_1x_kay_ctx *ctx, enum macsec_policy policy, argument
3146 kay->policy = policy;
3168 if (policy == DO_NOT_SECURE) {
3201 if (policy == DO_NOT_SECURE) {
/external/wpa_supplicant_8/src/pae/
H A Dieee802_1x_kay.h146 enum macsec_policy policy; member in struct:ieee802_1x_kay
158 ieee802_1x_kay_init(struct ieee802_1x_kay_ctx *ctx, enum macsec_policy policy,
H A Dieee802_1x_kay.c747 /* TODO: What policy should be applied to detect duplicated SCI
3127 ieee802_1x_kay_init(struct ieee802_1x_kay_ctx *ctx, enum macsec_policy policy, argument
3146 kay->policy = policy;
3168 if (policy == DO_NOT_SECURE) {
3201 if (policy == DO_NOT_SECURE) {
/external/wpa_supplicant_8/wpa_supplicant/src/pae/
H A Dieee802_1x_kay.h146 enum macsec_policy policy; member in struct:ieee802_1x_kay
158 ieee802_1x_kay_init(struct ieee802_1x_kay_ctx *ctx, enum macsec_policy policy,
/external/clang/lib/AST/
H A DTypePrinter.cpp1553 raw_ostream &OS, const PrintingPolicy &policy,
1558 TypePrinter(policy).print(ty, qs, OS, PH);
1563 const PrintingPolicy &policy) {
1566 TypePrinter(policy).print(ty, qs, StrOS, buffer);
1552 print(const Type *ty, Qualifiers qs, raw_ostream &OS, const PrintingPolicy &policy, const Twine &PlaceHolder) argument
1561 getAsStringInternal(const Type *ty, Qualifiers qs, std::string &buffer, const PrintingPolicy &policy) argument
/external/compiler-rt/lib/asan/tests/
H A Dasan_test.cc1278 int policy; local
1281 pthread_getschedparam(pthread_self(), &policy, Ident(&param) + 2),
1284 pthread_getschedparam(pthread_self(), Ident(&policy) - 1, &param),
1286 int res = pthread_getschedparam(pthread_self(), &policy, &param);
/external/ipsec-tools/src/racoon/
H A Dpfkey.c86 #include "policy.h"
1718 * than one in the policy, so kernel will drop them;
1740 * If there is a phase 2 handler against the policy identifier in
1764 plog(LLV_ERROR, LOCATION, NULL, "no policy found: id:%d.\n",
1771 /* get inbound policy */
1800 "no in-bound policy found: %s\n",
2022 caddr_t policy, p; local
2032 /* get policy buffer size */
2054 /* make policy structure */
2055 policy
2180 caddr_t policy = NULL; local
2302 caddr_t policy = NULL; local
2424 caddr_t policy = NULL; local
[all...]
/external/iptables/iptables/
H A Dip6tables.c92 {.name = "policy", .has_arg = 1, .val = 'P'},
232 " --policy -P chain target\n"
233 " Change policy on chain to target\n"
440 printf(" (policy %s", pol);
1302 const char *policy = NULL, *newname = NULL; local
1477 policy = argv[optind++];
1480 "-%c requires a chain and a policy",
1918 ret = ip6tc_set_policy(chain, policy, cs.options&OPT_COUNTERS ? &cs.fw6.counters : NULL, *handle);
H A Diptables.c89 {.name = "policy", .has_arg = 1, .val = 'P'},
226 " --policy -P chain target\n"
227 " Change policy on chain to target\n"
425 printf(" (policy %s", pol);
1298 const char *policy = NULL, *newname = NULL; local
1473 policy = argv[optind++];
1476 "-%c requires a chain and a policy",
1684 ((policy != NULL && strcmp(policy, "DROP") == 0) ||
1917 ret = iptc_set_policy(chain, policy, c
[all...]
/external/pdfium/fpdfsdk/src/
H A Dfpdfview.cpp39 void FSDK_SetSandBoxPolicy(FPDF_DWORD policy, FPDF_BOOL enable) argument
41 switch(policy)
56 FPDF_BOOL FSDK_IsSandBoxPolicyEnabled(FPDF_DWORD policy) argument
58 switch(policy)
181 DLLEXPORT void STDCALL FPDF_SetSandBoxPolicy(FPDF_DWORD policy, FPDF_BOOL enable) argument
183 return FSDK_SetSandBoxPolicy(policy, enable);
/external/selinux/policycoreutils/sepolicy/sepolicy/
H A D__init__.py706 def policy(policy_file): function
726 _policy.policy(policy_file)
728 raise ValueError(_("Failed to read %s policy file") % policy_file)
732 policy(policy_file)
786 def policy_xml(path="/usr/share/selinux/devel/policy.xml"):
797 def gen_bool_dict(path="/usr/share/selinux/devel/policy.xml"):
845 pkg_name = "selinux-policy"
H A Dgenerate.py6 # policygentool is a tool for the initial generation of SELinux policy
182 class policy: class in inherits:
191 raise ValueError(_("You must enter a valid policy type"))
194 raise ValueError(_("You must enter a name for your policy module for your '%s'.") % poltype[type])
837 raise ValueError(_("'%s' policy modules require existing domains") % poltype[self.type])
1032 # %s local policy
1181 selinux_policyver = get_rpm_nvr_list("selinux-policy")[1]
1319 # we don't want to have subdir in the .fc policy file
/external/owasp/sanitizer/distrib/lib/
H A Dowasp-java-html-sanitizer.jarMETA-INF/ META-INF/MANIFEST.MF org/ org/owasp/ org/owasp/html/ org/owasp/html/AbstractTokenStream ...
/external/iptables/libiptc/
H A Dlibiptc.c812 /* Delete policy rule of previous chain, since cache doesn't contain
813 * chain policy rules.
821 /* policy rule is last rule */
945 /* Last entry ("policy rule"). End it.*/
1184 /* set policy-counters */
1523 /* Empty chain: single return/policy rule */
1645 /* Get the policy of a given built-in chain */
2413 /* Sets the policy on a built-in chain. */
2416 const IPT_CHAINLABEL policy,
2431 DEBUGP("cannot set policy o
2415 TC_SET_POLICY(const IPT_CHAINLABEL chain, const IPT_CHAINLABEL policy, STRUCT_COUNTERS *counters, struct xtc_handle *handle) argument
[all...]
/external/llvm/include/llvm/CodeGen/
H A DMachineScheduler.h63 // like to configure the GenericScheduler's policy for a given scheduler region,
64 // including scheduling direction and register pressure tracking policy, can do
147 /// Define a generic scheduling policy for targets that don't provide their own
173 /// Optionally override the per-region scheduling policy.
803 SchedCandidate(const CandPolicy &policy) argument
804 : Policy(policy), SU(nullptr), Reason(NoCand), RepeatReasonSet(0) {}
808 // Copy the status of another candidate without changing policy.
917 /* no configurable policy */
/external/selinux/checkpolicy/
H A Dpolicy_parse.y13 * Added conditional policy language extensions
19 * Added support for binary policy modules
158 policy : base_policy label
/external/selinux/libsepol/src/
H A Dlink.c42 policydb_t *policy; member in struct:policy_module
97 for (i = 0; mod->perm_map != NULL && i < mod->policy->p_classes.nprim;
263 hashtab_search(state->cur->policy->p_classes_scope.table,
649 scope = hashtab_search(state->cur->policy->p_bools_scope.table, id);
680 hashtab_search(state->cur->policy->p_sens_scope.table, id);
721 scope = hashtab_search(state->cur->policy->p_cat_scope.table, id);
737 /* unknown scope? malformed policy? */
879 target_id = mod->policy->p_type_val_to_name[primval - 1];
1048 if (!mod->policy->mls)
1789 if (module->policy
[all...]
/external/v8/src/compiler/
H A Dinstruction.h123 explicit UnallocatedOperand(ExtendedPolicy policy) argument
126 value_ |= ExtendedPolicyField::encode(policy);
130 UnallocatedOperand(BasicPolicy policy, int index) argument
132 DCHECK(policy == FIXED_SLOT);
133 value_ |= BasicPolicyField::encode(policy);
138 UnallocatedOperand(ExtendedPolicy policy, int index) argument
140 DCHECK(policy == FIXED_REGISTER || policy == FIXED_DOUBLE_REGISTER);
142 value_ |= ExtendedPolicyField::encode(policy);
147 UnallocatedOperand(ExtendedPolicy policy, Lifetim argument
[all...]
/external/v8/src/
H A Dlithium.h104 explicit LUnallocated(ExtendedPolicy policy) : LOperand(UNALLOCATED, 0) { argument
106 value_ |= ExtendedPolicyField::encode(policy);
110 LUnallocated(BasicPolicy policy, int index) : LOperand(UNALLOCATED, 0) { argument
111 DCHECK(policy == FIXED_SLOT);
112 value_ |= BasicPolicyField::encode(policy);
117 LUnallocated(ExtendedPolicy policy, int index) : LOperand(UNALLOCATED, 0) { argument
118 DCHECK(policy == FIXED_REGISTER || policy == FIXED_DOUBLE_REGISTER);
120 value_ |= ExtendedPolicyField::encode(policy);
125 LUnallocated(ExtendedPolicy policy, Lifetim argument
[all...]
/external/wpa_supplicant_8/hs20/server/
H A Dspp_server.c766 xml_node_t *spp_node, *policy; local
771 "requires policy remediation", NULL);
776 policy = build_policy(ctx, user, realm, dmacc);
777 if (!policy) {
793 if (add_update_node(ctx, spp_node, ns, buf, policy) < 0) {
795 xml_node_free(ctx->xml, policy);
800 "policy update (sub rem)", policy);
801 xml_node_free(ctx->xml, policy);
941 else if (type && strcmp(type, "policy")
956 xml_node_t *policy, *node; local
1012 xml_node_t *policy; local
[all...]

Completed in 7036 milliseconds

12345