/external/selinux/policycoreutils/sepolicy/ |
H A D | search.c | 38 #include "policy.h" 41 #include <apol/policy-query.h> 47 #include <qpol/policy.h> 107 static int perform_ra_query(const apol_policy_t * policy, const options_t * opt, apol_vector_t ** v) argument 112 if (!policy || !opt || !v) { 113 ERR(policy, "%s", strerror(EINVAL)); 125 ERR(policy, "%s", strerror(ENOMEM)); 130 apol_role_allow_query_set_regex(policy, raq, opt->useregex); 132 if (apol_role_allow_query_set_source(policy, raq, opt->src_role_name)) { 138 if (apol_role_allow_query_set_target(policy, ra 158 get_ra_results(const apol_policy_t * policy, const apol_vector_t * v, PyObject *output) argument 221 perform_te_query(const apol_policy_t * policy, const options_t * opt, apol_vector_t ** v) argument 369 get_te_results(const apol_policy_t * policy, const apol_vector_t * v, PyObject *output) argument 479 perform_ft_query(const apol_policy_t * policy, const options_t * opt, apol_vector_t ** v) argument 548 get_ft_results(const apol_policy_t * policy, const apol_vector_t * v, PyObject *list) argument 643 perform_av_query(const apol_policy_t * policy, const options_t * opt, apol_vector_t ** v) argument 743 get_av_results(const apol_policy_t * policy, const apol_vector_t * v, PyObject *output) argument [all...] |
H A D | sepolicy.py | 155 sepolicy.policy(values) 162 raise ValueError("%s invalid SELinux policy type\n%s" % (values, get_poltype_desc())) 308 if not args.policy and args.root != "/": 309 sepolicy.policy(sepolicy.get_installed_policy(args.root)) 338 help=_("With this flag, alternative root path needs to include file context files and policy.xml file")) 350 help=_('Query SELinux policy network information')) 382 help=_('query SELinux policy to see if domains can communicate with each other')) 461 from sepolicy.generate import policy, AUSER, RUSER, EUSER, USERS, SANDBOX, APPLICATIONS, NEWTYPE namespace 477 raise ValueError(_("Command required for this type of policy")) 482 mypolicy = policy(arg [all...] |
/external/srtp/srtp/ |
H A D | srtp.c | 1211 const srtp_policy_t *policy) { 1216 if ((session == NULL) || (policy == NULL) || (policy->key == NULL)) 1220 status = srtp_stream_alloc(&tmp, policy); 1226 status = srtp_stream_init(tmp, policy); 1237 * if the template stream has already been set, then the policy is 1240 switch (policy->ssrc.type) { 1270 const srtp_policy_t *policy) { /* SRTP policy (list) */ 1285 * loop over elements in the policy lis 1210 srtp_add_stream(srtp_t session, const srtp_policy_t *policy) argument 1269 srtp_create(srtp_t *session, const srtp_policy_t *policy) argument 1882 crypto_policy_set_from_profile_for_rtp(crypto_policy_t *policy, srtp_profile_t profile) argument 1911 crypto_policy_set_from_profile_for_rtcp(crypto_policy_t *policy, srtp_profile_t profile) argument [all...] |
/external/srtp/test/ |
H A D | srtp_driver.c | 72 srtp_bits_per_second(int msg_len_octets, const srtp_policy_t *policy); 75 srtp_rejections_per_second(int msg_len_octets, const srtp_policy_t *policy); 78 srtp_do_timing(const srtp_policy_t *policy); 81 srtp_do_rejection_timing(const srtp_policy_t *policy); 84 srtp_test(const srtp_policy_t *policy); 87 srtcp_test(const srtp_policy_t *policy); 93 srtp_print_policy(const srtp_policy_t *policy); 116 * The policy_array is a null-terminated array of policy structs. it 221 const srtp_policy_t **policy = policy_array; local 224 /* loop over policy arra 293 const srtp_policy_t **policy = policy_array; local 304 const srtp_policy_t **policy = policy_array; local 315 srtp_policy_t policy; local 415 srtp_do_timing(const srtp_policy_t *policy) argument 437 srtp_do_rejection_timing(const srtp_policy_t *policy) argument 461 srtp_bits_per_second(int msg_len_octets, const srtp_policy_t *policy) argument 521 srtp_rejections_per_second(int msg_len_octets, const srtp_policy_t *policy) argument 570 srtp_test(const srtp_policy_t *policy) argument 769 srtcp_test(const srtp_policy_t *policy) argument 1041 srtp_print_policy(const srtp_policy_t *policy) argument 1175 srtp_policy_t policy; local [all...] |
/external/wpa_supplicant_8/hostapd/src/pae/ |
H A D | ieee802_1x_kay.h | 146 enum macsec_policy policy; member in struct:ieee802_1x_kay 158 ieee802_1x_kay_init(struct ieee802_1x_kay_ctx *ctx, enum macsec_policy policy,
|
H A D | ieee802_1x_kay.c | 747 /* TODO: What policy should be applied to detect duplicated SCI 3127 ieee802_1x_kay_init(struct ieee802_1x_kay_ctx *ctx, enum macsec_policy policy, argument 3146 kay->policy = policy; 3168 if (policy == DO_NOT_SECURE) { 3201 if (policy == DO_NOT_SECURE) {
|
/external/wpa_supplicant_8/src/pae/ |
H A D | ieee802_1x_kay.h | 146 enum macsec_policy policy; member in struct:ieee802_1x_kay 158 ieee802_1x_kay_init(struct ieee802_1x_kay_ctx *ctx, enum macsec_policy policy,
|
H A D | ieee802_1x_kay.c | 747 /* TODO: What policy should be applied to detect duplicated SCI 3127 ieee802_1x_kay_init(struct ieee802_1x_kay_ctx *ctx, enum macsec_policy policy, argument 3146 kay->policy = policy; 3168 if (policy == DO_NOT_SECURE) { 3201 if (policy == DO_NOT_SECURE) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/pae/ |
H A D | ieee802_1x_kay.h | 146 enum macsec_policy policy; member in struct:ieee802_1x_kay 158 ieee802_1x_kay_init(struct ieee802_1x_kay_ctx *ctx, enum macsec_policy policy,
|
/external/clang/lib/AST/ |
H A D | TypePrinter.cpp | 1553 raw_ostream &OS, const PrintingPolicy &policy, 1558 TypePrinter(policy).print(ty, qs, OS, PH); 1563 const PrintingPolicy &policy) { 1566 TypePrinter(policy).print(ty, qs, StrOS, buffer); 1552 print(const Type *ty, Qualifiers qs, raw_ostream &OS, const PrintingPolicy &policy, const Twine &PlaceHolder) argument 1561 getAsStringInternal(const Type *ty, Qualifiers qs, std::string &buffer, const PrintingPolicy &policy) argument
|
/external/compiler-rt/lib/asan/tests/ |
H A D | asan_test.cc | 1278 int policy; local 1281 pthread_getschedparam(pthread_self(), &policy, Ident(¶m) + 2), 1284 pthread_getschedparam(pthread_self(), Ident(&policy) - 1, ¶m), 1286 int res = pthread_getschedparam(pthread_self(), &policy, ¶m);
|
/external/ipsec-tools/src/racoon/ |
H A D | pfkey.c | 86 #include "policy.h" 1718 * than one in the policy, so kernel will drop them; 1740 * If there is a phase 2 handler against the policy identifier in 1764 plog(LLV_ERROR, LOCATION, NULL, "no policy found: id:%d.\n", 1771 /* get inbound policy */ 1800 "no in-bound policy found: %s\n", 2022 caddr_t policy, p; local 2032 /* get policy buffer size */ 2054 /* make policy structure */ 2055 policy 2180 caddr_t policy = NULL; local 2302 caddr_t policy = NULL; local 2424 caddr_t policy = NULL; local [all...] |
/external/iptables/iptables/ |
H A D | ip6tables.c | 92 {.name = "policy", .has_arg = 1, .val = 'P'}, 232 " --policy -P chain target\n" 233 " Change policy on chain to target\n" 440 printf(" (policy %s", pol); 1302 const char *policy = NULL, *newname = NULL; local 1477 policy = argv[optind++]; 1480 "-%c requires a chain and a policy", 1918 ret = ip6tc_set_policy(chain, policy, cs.options&OPT_COUNTERS ? &cs.fw6.counters : NULL, *handle);
|
H A D | iptables.c | 89 {.name = "policy", .has_arg = 1, .val = 'P'}, 226 " --policy -P chain target\n" 227 " Change policy on chain to target\n" 425 printf(" (policy %s", pol); 1298 const char *policy = NULL, *newname = NULL; local 1473 policy = argv[optind++]; 1476 "-%c requires a chain and a policy", 1684 ((policy != NULL && strcmp(policy, "DROP") == 0) || 1917 ret = iptc_set_policy(chain, policy, c [all...] |
/external/pdfium/fpdfsdk/src/ |
H A D | fpdfview.cpp | 39 void FSDK_SetSandBoxPolicy(FPDF_DWORD policy, FPDF_BOOL enable) argument 41 switch(policy) 56 FPDF_BOOL FSDK_IsSandBoxPolicyEnabled(FPDF_DWORD policy) argument 58 switch(policy) 181 DLLEXPORT void STDCALL FPDF_SetSandBoxPolicy(FPDF_DWORD policy, FPDF_BOOL enable) argument 183 return FSDK_SetSandBoxPolicy(policy, enable);
|
/external/selinux/policycoreutils/sepolicy/sepolicy/ |
H A D | __init__.py | 706 def policy(policy_file): function 726 _policy.policy(policy_file) 728 raise ValueError(_("Failed to read %s policy file") % policy_file) 732 policy(policy_file) 786 def policy_xml(path="/usr/share/selinux/devel/policy.xml"): 797 def gen_bool_dict(path="/usr/share/selinux/devel/policy.xml"): 845 pkg_name = "selinux-policy"
|
H A D | generate.py | 6 # policygentool is a tool for the initial generation of SELinux policy 182 class policy: class in inherits: 191 raise ValueError(_("You must enter a valid policy type")) 194 raise ValueError(_("You must enter a name for your policy module for your '%s'.") % poltype[type]) 837 raise ValueError(_("'%s' policy modules require existing domains") % poltype[self.type]) 1032 # %s local policy 1181 selinux_policyver = get_rpm_nvr_list("selinux-policy")[1] 1319 # we don't want to have subdir in the .fc policy file
|
/external/owasp/sanitizer/distrib/lib/ |
H A D | owasp-java-html-sanitizer.jar | META-INF/ META-INF/MANIFEST.MF org/ org/owasp/ org/owasp/html/ org/owasp/html/AbstractTokenStream ... |
/external/iptables/libiptc/ |
H A D | libiptc.c | 812 /* Delete policy rule of previous chain, since cache doesn't contain 813 * chain policy rules. 821 /* policy rule is last rule */ 945 /* Last entry ("policy rule"). End it.*/ 1184 /* set policy-counters */ 1523 /* Empty chain: single return/policy rule */ 1645 /* Get the policy of a given built-in chain */ 2413 /* Sets the policy on a built-in chain. */ 2416 const IPT_CHAINLABEL policy, 2431 DEBUGP("cannot set policy o 2415 TC_SET_POLICY(const IPT_CHAINLABEL chain, const IPT_CHAINLABEL policy, STRUCT_COUNTERS *counters, struct xtc_handle *handle) argument [all...] |
/external/llvm/include/llvm/CodeGen/ |
H A D | MachineScheduler.h | 63 // like to configure the GenericScheduler's policy for a given scheduler region, 64 // including scheduling direction and register pressure tracking policy, can do 147 /// Define a generic scheduling policy for targets that don't provide their own 173 /// Optionally override the per-region scheduling policy. 803 SchedCandidate(const CandPolicy &policy) argument 804 : Policy(policy), SU(nullptr), Reason(NoCand), RepeatReasonSet(0) {} 808 // Copy the status of another candidate without changing policy. 917 /* no configurable policy */
|
/external/selinux/checkpolicy/ |
H A D | policy_parse.y | 13 * Added conditional policy language extensions 19 * Added support for binary policy modules 158 policy : base_policy label
|
/external/selinux/libsepol/src/ |
H A D | link.c | 42 policydb_t *policy; member in struct:policy_module 97 for (i = 0; mod->perm_map != NULL && i < mod->policy->p_classes.nprim; 263 hashtab_search(state->cur->policy->p_classes_scope.table, 649 scope = hashtab_search(state->cur->policy->p_bools_scope.table, id); 680 hashtab_search(state->cur->policy->p_sens_scope.table, id); 721 scope = hashtab_search(state->cur->policy->p_cat_scope.table, id); 737 /* unknown scope? malformed policy? */ 879 target_id = mod->policy->p_type_val_to_name[primval - 1]; 1048 if (!mod->policy->mls) 1789 if (module->policy [all...] |
/external/v8/src/compiler/ |
H A D | instruction.h | 123 explicit UnallocatedOperand(ExtendedPolicy policy) argument 126 value_ |= ExtendedPolicyField::encode(policy); 130 UnallocatedOperand(BasicPolicy policy, int index) argument 132 DCHECK(policy == FIXED_SLOT); 133 value_ |= BasicPolicyField::encode(policy); 138 UnallocatedOperand(ExtendedPolicy policy, int index) argument 140 DCHECK(policy == FIXED_REGISTER || policy == FIXED_DOUBLE_REGISTER); 142 value_ |= ExtendedPolicyField::encode(policy); 147 UnallocatedOperand(ExtendedPolicy policy, Lifetim argument [all...] |
/external/v8/src/ |
H A D | lithium.h | 104 explicit LUnallocated(ExtendedPolicy policy) : LOperand(UNALLOCATED, 0) { argument 106 value_ |= ExtendedPolicyField::encode(policy); 110 LUnallocated(BasicPolicy policy, int index) : LOperand(UNALLOCATED, 0) { argument 111 DCHECK(policy == FIXED_SLOT); 112 value_ |= BasicPolicyField::encode(policy); 117 LUnallocated(ExtendedPolicy policy, int index) : LOperand(UNALLOCATED, 0) { argument 118 DCHECK(policy == FIXED_REGISTER || policy == FIXED_DOUBLE_REGISTER); 120 value_ |= ExtendedPolicyField::encode(policy); 125 LUnallocated(ExtendedPolicy policy, Lifetim argument [all...] |
/external/wpa_supplicant_8/hs20/server/ |
H A D | spp_server.c | 766 xml_node_t *spp_node, *policy; local 771 "requires policy remediation", NULL); 776 policy = build_policy(ctx, user, realm, dmacc); 777 if (!policy) { 793 if (add_update_node(ctx, spp_node, ns, buf, policy) < 0) { 795 xml_node_free(ctx->xml, policy); 800 "policy update (sub rem)", policy); 801 xml_node_free(ctx->xml, policy); 941 else if (type && strcmp(type, "policy") 956 xml_node_t *policy, *node; local 1012 xml_node_t *policy; local [all...] |