Searched defs:policy (Results 1 - 25 of 115) sorted by relevance

12345

/external/libunwind/src/mi/
H A DGset_caching_policy.c29 unw_set_caching_policy (unw_addr_space_t as, unw_caching_policy_t policy) argument
35 if (policy == UNW_CACHE_PER_THREAD)
36 policy = UNW_CACHE_GLOBAL;
39 if (policy == as->caching_policy)
42 as->caching_policy = policy;
/external/skia/src/utils/
H A DSkThreadUtils_pthread_mach.cpp23 thread_affinity_policy_data_t policy; local
24 policy.affinity_tag = processor;
28 (thread_policy_t) &policy,
/external/selinux/policycoreutils/sepolicy/
H A Dsetup.py7 policy = Extension("sepolicy._policy", variable
9 sources=[ "policy.c", "info.c", "search.c"]
12 setup(name = "sepolicy", version="1.1", description="Python SELinux Policy Analyses bindings", author="Daniel Walsh", author_email="dwalsh@redhat.com", ext_modules=[policy], packages=["sepolicy", "sepolicy.templates", "sepolicy.help"], package_data={'sepolicy':['*.glade'], 'sepolicy.help': ['*.txt', '*.png']})
H A Dpolicy.c35 #include "policy.h"
36 apol_policy_t *policy = NULL; variable
56 if (policy)
57 apol_policy_destroy(&policy);
69 policy = apol_policy_create_from_policy_path(pol_path, policy_load_options, NULL, NULL);
71 if (!policy) {
80 {"policy", (PyCFunction) wrap_policy, METH_VARARGS,
81 "Initialize SELinux policy for use with search and info"},
83 "Return SELinux policy info about types, attributes, roles, users"},
/external/boringssl/src/crypto/x509v3/
H A Dpcy_data.c80 /* Create a data based on an existing policy. If 'id' is NULL use the
81 * oid in the policy, otherwise use 'id'. This behaviour covers the two
87 X509_POLICY_DATA *policy_data_new(POLICYINFO *policy, argument
92 if (!policy && !cid)
123 ret->valid_policy = policy->policyid;
124 policy->policyid = NULL;
127 if (policy)
129 ret->qualifier_set = policy->qualifiers;
130 policy->qualifiers = NULL;
H A Dpcy_cache.c81 POLICYINFO *policy; local
89 policy = sk_POLICYINFO_value(policies, i);
90 data = policy_data_new(policy, NULL, crit);
93 /* Duplicate policy OIDs are illegal: reject if matches
H A Dv3_pci.c74 if (pci->proxyPolicy->policy && pci->proxyPolicy->policy->data)
76 pci->proxyPolicy->policy->data);
82 ASN1_OCTET_STRING **policy)
116 else if (strcmp(val->name, "policy") == 0)
120 if (!*policy)
122 *policy = ASN1_OCTET_STRING_new();
123 if (!*policy)
143 tmp_data = OPENSSL_realloc((*policy)->data,
144 (*policy)
80 process_pci_value(CONF_VALUE *val, ASN1_OBJECT **language, ASN1_INTEGER **pathlen, ASN1_OCTET_STRING **policy) argument
255 ASN1_OCTET_STRING *policy = NULL; local
[all...]
/external/owasp/sanitizer/src/main/org/owasp/html/
H A DHtmlSanitizer.java38 * Consumes an HTML stream, and dispatches events to a policy object which
44 * Receives events based on the HTML stream, and applies a policy to decide
85 * Sanitizes the given HTML by applying the given policy to it.
97 * @param policy The Policy that will receive events based on the tokens in
98 * HTML. Typically, this policy ends up routing the events to an
102 public static void sanitize(@Nullable String html, final Policy policy) { argument
106 = new TagBalancingHtmlStreamEventReceiver(policy);
H A DHtmlChangeReporter.java38 * Sits between the HTML parser, and then policy, and the renderer so that it
48 * The renderer receives events from the policy unchanged, but the reporter
50 * policy.
69 public void setPolicy(HtmlSanitizer.Policy policy) { argument
70 this.input.policy = policy;
78 HtmlStreamEventReceiver policy; field in class:HtmlChangeReporter.InputChannel
92 policy.openDocument();
96 policy.closeDocument();
105 policy
[all...]
/external/selinux/libsepol/include/sepol/policydb/
H A Dmodule.h37 sepol_policydb_t *policy; member in struct:sepol_module_package
/external/sepolicy/tools/sepolicy-analyze/
H A Dsepolicy-analyze.c34 fprintf(stderr, "%s must be called on a policy file with a component and the appropriate arguments specified\n", arg0);
35 fprintf(stderr, "%s <policy-file>:\n", arg0);
44 char *policy; local
52 policy = argv[1];
53 if(load_policy(policy, &policydb, &pf))
/external/apache-http/src/org/apache/http/client/params/
H A DClientParamBean.java82 public void setCookiePolicy (final String policy) { argument
83 params.setParameter(ClientPNames.COOKIE_POLICY, policy);
/external/libnl/lib/genl/
H A Dgenl.c79 * genlmsg_parse(nlh, 0, attrs, ATTR_MAX, policy);
161 struct nla_policy *policy)
170 genlmsg_attrlen(ghdr, hdrlen), maxtype, policy);
174 int maxtype, struct nla_policy *policy)
183 genlmsg_attrlen(ghdr, hdrlen), policy);
160 genlmsg_validate(struct nlmsghdr *nlh, int hdrlen, int maxtype, struct nla_policy *policy) argument
173 genlmsg_parse(struct nlmsghdr *nlh, int hdrlen, struct nlattr *tb[], int maxtype, struct nla_policy *policy) argument
/external/openssh/
H A Dsandbox-systrace.c121 struct systrace_policy policy; local
154 /* Allocate and assign policy */
155 memset(&policy, 0, sizeof(policy));
156 policy.strp_op = SYSTR_POLICY_NEW;
157 policy.strp_maxents = SYS_MAXSYSCALL;
158 if (ioctl(box->systrace_fd, STRIOCPOLICY, &policy) == -1)
162 policy.strp_op = SYSTR_POLICY_ASSIGN;
163 policy.strp_pid = box->child_pid;
164 if (ioctl(box->systrace_fd, STRIOCPOLICY, &policy)
[all...]
/external/srtp/test/
H A Ddtls_srtp_driver.c124 srtp_policy_t policy; local
178 policy.key = key;
180 /* initialize SRTP policy from profile */
181 err = crypto_policy_set_from_profile_for_rtp(&policy.rtp, profile);
183 err = crypto_policy_set_from_profile_for_rtcp(&policy.rtcp, profile);
185 policy.ssrc.type = ssrc_any_inbound;
186 policy.ekt = NULL;
187 policy.window_size = 128;
188 policy.allow_repeat_tx = 0;
189 policy
[all...]
H A Drtp.c150 rtp_sender_init_srtp(rtp_sender_t sender, const srtp_policy_t *policy) { argument
151 return srtp_create(&sender->srtp_ctx, policy);
155 rtp_receiver_init_srtp(rtp_receiver_t sender, const srtp_policy_t *policy) { argument
156 return srtp_create(&sender->srtp_ctx, policy);
/external/wpa_supplicant_8/hs20/server/www/
H A Dusers.php72 if ($cmd == 'subrem-add-policy' && $id > 0) {
73 $db->exec("UPDATE users SET remediation='policy' WHERE rowid=$id");
87 if ($cmd == "policy" && $id > 0 && isset($_GET["policy"])) {
88 $policy = $_GET["policy"]; variable
89 if ($policy == "no-policy" ||
90 is_readable("$osu_root/spp/policy/$policy
[all...]
/external/ipsec-tools/src/racoon/
H A Dpolicy.h1 /* $NetBSD: policy.h,v 1.5.4.2 2007/06/07 20:34:19 manu Exp $ */
3 /* Id: policy.h,v 1.5 2004/06/11 16:00:17 ludvigm Exp */
67 u_int32_t priority; /* priority for the policy */
81 u_int policy; /* DISCARD, NONE or IPSEC, see keyv2.h */ member in struct:secpolicy
84 /* if policy == IPSEC else this value == NULL.*/
/external/selinux/libsepol/tests/
H A Dtest-deps.c130 * req_met boolean indicating whether the base policy meets the
132 * b index of the base policy in the global bases_met array.
134 * policy name of the policy module to load for this test.
138 static void do_deps_modreq_global(int req_met, int b, char *policy, char *decl_type) argument
162 CU_ASSERT_FATAL(test_load_policy(&mod, POLICY_MOD, mls, "test-deps", policy) == 0);
212 * req_met boolean indicating whether the base policy meets the
214 * b index of the base policy in the global bases_met array.
216 * policy name of the policy modul
220 do_deps_modreq_opt(int req_met, int ret_val, int b, char *policy, char *decl_type) argument
[all...]
/external/v8/src/
H A Dsplay-tree.h23 // The tree is also parameterized by an allocation policy
24 // (Allocator). The policy is used for allocating lists in the C free
50 INLINE(void operator delete(void* p, AllocationPolicy policy)) { argument
/external/webrtc/src/system_wrappers/source/
H A Dthread_posix.cc177 const int policy = SCHED_RR; local
179 const int policy = SCHED_FIFO; local
202 const int minPrio = sched_get_priority_min(policy);
203 const int maxPrio = sched_get_priority_max(policy);
227 result = pthread_setschedparam(_thread, policy, &param);
/external/wpa_supplicant_8/hostapd/src/utils/
H A Dbrowser.c100 gchar *mime, WebKitWebPolicyDecision *policy,
106 webkit_web_policy_decision_download(policy);
187 g_signal_connect(G_OBJECT(view), "mime-type-policy-decision-requested",
98 view_cb_mime_type_policy_decision( WebKitWebView *view, WebKitWebFrame *frame, WebKitNetworkRequest *req, gchar *mime, WebKitWebPolicyDecision *policy, struct browser_context *ctx) argument
/external/wpa_supplicant_8/src/utils/
H A Dbrowser.c100 gchar *mime, WebKitWebPolicyDecision *policy,
106 webkit_web_policy_decision_download(policy);
187 g_signal_connect(G_OBJECT(view), "mime-type-policy-decision-requested",
98 view_cb_mime_type_policy_decision( WebKitWebView *view, WebKitWebFrame *frame, WebKitNetworkRequest *req, gchar *mime, WebKitWebPolicyDecision *policy, struct browser_context *ctx) argument
/external/wpa_supplicant_8/wpa_supplicant/src/utils/
H A Dbrowser.c100 gchar *mime, WebKitWebPolicyDecision *policy,
106 webkit_web_policy_decision_download(policy);
187 g_signal_connect(G_OBJECT(view), "mime-type-policy-decision-requested",
98 view_cb_mime_type_policy_decision( WebKitWebView *view, WebKitWebFrame *frame, WebKitNetworkRequest *req, gchar *mime, WebKitWebPolicyDecision *policy, struct browser_context *ctx) argument
/external/iptables/iptables/
H A Dip6tables-restore.c311 char *policy, *chain; local
346 policy = strtok(NULL, " \t\n");
347 DEBUGP("line %u, policy '%s'\n", line, policy);
348 if (!policy) {
350 "%s: line %u policy invalid\n",
355 if (strcmp(policy, "-") != 0) {
364 "invalid policy counters "
371 DEBUGP("Setting policy of chain %s to %s\n",
372 chain, policy);
[all...]

Completed in 1764 milliseconds

12345