/external/libunwind/src/mi/ |
H A D | Gset_caching_policy.c | 29 unw_set_caching_policy (unw_addr_space_t as, unw_caching_policy_t policy) argument 35 if (policy == UNW_CACHE_PER_THREAD) 36 policy = UNW_CACHE_GLOBAL; 39 if (policy == as->caching_policy) 42 as->caching_policy = policy;
|
/external/skia/src/utils/ |
H A D | SkThreadUtils_pthread_mach.cpp | 23 thread_affinity_policy_data_t policy; local 24 policy.affinity_tag = processor; 28 (thread_policy_t) &policy,
|
/external/selinux/policycoreutils/sepolicy/ |
H A D | setup.py | 7 policy = Extension("sepolicy._policy", variable 9 sources=[ "policy.c", "info.c", "search.c"] 12 setup(name = "sepolicy", version="1.1", description="Python SELinux Policy Analyses bindings", author="Daniel Walsh", author_email="dwalsh@redhat.com", ext_modules=[policy], packages=["sepolicy", "sepolicy.templates", "sepolicy.help"], package_data={'sepolicy':['*.glade'], 'sepolicy.help': ['*.txt', '*.png']})
|
H A D | policy.c | 35 #include "policy.h" 36 apol_policy_t *policy = NULL; variable 56 if (policy) 57 apol_policy_destroy(&policy); 69 policy = apol_policy_create_from_policy_path(pol_path, policy_load_options, NULL, NULL); 71 if (!policy) { 80 {"policy", (PyCFunction) wrap_policy, METH_VARARGS, 81 "Initialize SELinux policy for use with search and info"}, 83 "Return SELinux policy info about types, attributes, roles, users"},
|
/external/boringssl/src/crypto/x509v3/ |
H A D | pcy_data.c | 80 /* Create a data based on an existing policy. If 'id' is NULL use the 81 * oid in the policy, otherwise use 'id'. This behaviour covers the two 87 X509_POLICY_DATA *policy_data_new(POLICYINFO *policy, argument 92 if (!policy && !cid) 123 ret->valid_policy = policy->policyid; 124 policy->policyid = NULL; 127 if (policy) 129 ret->qualifier_set = policy->qualifiers; 130 policy->qualifiers = NULL;
|
H A D | pcy_cache.c | 81 POLICYINFO *policy; local 89 policy = sk_POLICYINFO_value(policies, i); 90 data = policy_data_new(policy, NULL, crit); 93 /* Duplicate policy OIDs are illegal: reject if matches
|
H A D | v3_pci.c | 74 if (pci->proxyPolicy->policy && pci->proxyPolicy->policy->data) 76 pci->proxyPolicy->policy->data); 82 ASN1_OCTET_STRING **policy) 116 else if (strcmp(val->name, "policy") == 0) 120 if (!*policy) 122 *policy = ASN1_OCTET_STRING_new(); 123 if (!*policy) 143 tmp_data = OPENSSL_realloc((*policy)->data, 144 (*policy) 80 process_pci_value(CONF_VALUE *val, ASN1_OBJECT **language, ASN1_INTEGER **pathlen, ASN1_OCTET_STRING **policy) argument 255 ASN1_OCTET_STRING *policy = NULL; local [all...] |
/external/owasp/sanitizer/src/main/org/owasp/html/ |
H A D | HtmlSanitizer.java | 38 * Consumes an HTML stream, and dispatches events to a policy object which 44 * Receives events based on the HTML stream, and applies a policy to decide 85 * Sanitizes the given HTML by applying the given policy to it. 97 * @param policy The Policy that will receive events based on the tokens in 98 * HTML. Typically, this policy ends up routing the events to an 102 public static void sanitize(@Nullable String html, final Policy policy) { argument 106 = new TagBalancingHtmlStreamEventReceiver(policy);
|
H A D | HtmlChangeReporter.java | 38 * Sits between the HTML parser, and then policy, and the renderer so that it 48 * The renderer receives events from the policy unchanged, but the reporter 50 * policy. 69 public void setPolicy(HtmlSanitizer.Policy policy) { argument 70 this.input.policy = policy; 78 HtmlStreamEventReceiver policy; field in class:HtmlChangeReporter.InputChannel 92 policy.openDocument(); 96 policy.closeDocument(); 105 policy [all...] |
/external/selinux/libsepol/include/sepol/policydb/ |
H A D | module.h | 37 sepol_policydb_t *policy; member in struct:sepol_module_package
|
/external/sepolicy/tools/sepolicy-analyze/ |
H A D | sepolicy-analyze.c | 34 fprintf(stderr, "%s must be called on a policy file with a component and the appropriate arguments specified\n", arg0); 35 fprintf(stderr, "%s <policy-file>:\n", arg0); 44 char *policy; local 52 policy = argv[1]; 53 if(load_policy(policy, &policydb, &pf))
|
/external/apache-http/src/org/apache/http/client/params/ |
H A D | ClientParamBean.java | 82 public void setCookiePolicy (final String policy) { argument 83 params.setParameter(ClientPNames.COOKIE_POLICY, policy);
|
/external/libnl/lib/genl/ |
H A D | genl.c | 79 * genlmsg_parse(nlh, 0, attrs, ATTR_MAX, policy); 161 struct nla_policy *policy) 170 genlmsg_attrlen(ghdr, hdrlen), maxtype, policy); 174 int maxtype, struct nla_policy *policy) 183 genlmsg_attrlen(ghdr, hdrlen), policy); 160 genlmsg_validate(struct nlmsghdr *nlh, int hdrlen, int maxtype, struct nla_policy *policy) argument 173 genlmsg_parse(struct nlmsghdr *nlh, int hdrlen, struct nlattr *tb[], int maxtype, struct nla_policy *policy) argument
|
/external/openssh/ |
H A D | sandbox-systrace.c | 121 struct systrace_policy policy; local 154 /* Allocate and assign policy */ 155 memset(&policy, 0, sizeof(policy)); 156 policy.strp_op = SYSTR_POLICY_NEW; 157 policy.strp_maxents = SYS_MAXSYSCALL; 158 if (ioctl(box->systrace_fd, STRIOCPOLICY, &policy) == -1) 162 policy.strp_op = SYSTR_POLICY_ASSIGN; 163 policy.strp_pid = box->child_pid; 164 if (ioctl(box->systrace_fd, STRIOCPOLICY, &policy) [all...] |
/external/srtp/test/ |
H A D | dtls_srtp_driver.c | 124 srtp_policy_t policy; local 178 policy.key = key; 180 /* initialize SRTP policy from profile */ 181 err = crypto_policy_set_from_profile_for_rtp(&policy.rtp, profile); 183 err = crypto_policy_set_from_profile_for_rtcp(&policy.rtcp, profile); 185 policy.ssrc.type = ssrc_any_inbound; 186 policy.ekt = NULL; 187 policy.window_size = 128; 188 policy.allow_repeat_tx = 0; 189 policy [all...] |
H A D | rtp.c | 150 rtp_sender_init_srtp(rtp_sender_t sender, const srtp_policy_t *policy) { argument 151 return srtp_create(&sender->srtp_ctx, policy); 155 rtp_receiver_init_srtp(rtp_receiver_t sender, const srtp_policy_t *policy) { argument 156 return srtp_create(&sender->srtp_ctx, policy);
|
/external/wpa_supplicant_8/hs20/server/www/ |
H A D | users.php | 72 if ($cmd == 'subrem-add-policy' && $id > 0) { 73 $db->exec("UPDATE users SET remediation='policy' WHERE rowid=$id"); 87 if ($cmd == "policy" && $id > 0 && isset($_GET["policy"])) { 88 $policy = $_GET["policy"]; variable 89 if ($policy == "no-policy" || 90 is_readable("$osu_root/spp/policy/$policy [all...] |
/external/ipsec-tools/src/racoon/ |
H A D | policy.h | 1 /* $NetBSD: policy.h,v 1.5.4.2 2007/06/07 20:34:19 manu Exp $ */ 3 /* Id: policy.h,v 1.5 2004/06/11 16:00:17 ludvigm Exp */ 67 u_int32_t priority; /* priority for the policy */ 81 u_int policy; /* DISCARD, NONE or IPSEC, see keyv2.h */ member in struct:secpolicy 84 /* if policy == IPSEC else this value == NULL.*/
|
/external/selinux/libsepol/tests/ |
H A D | test-deps.c | 130 * req_met boolean indicating whether the base policy meets the 132 * b index of the base policy in the global bases_met array. 134 * policy name of the policy module to load for this test. 138 static void do_deps_modreq_global(int req_met, int b, char *policy, char *decl_type) argument 162 CU_ASSERT_FATAL(test_load_policy(&mod, POLICY_MOD, mls, "test-deps", policy) == 0); 212 * req_met boolean indicating whether the base policy meets the 214 * b index of the base policy in the global bases_met array. 216 * policy name of the policy modul 220 do_deps_modreq_opt(int req_met, int ret_val, int b, char *policy, char *decl_type) argument [all...] |
/external/v8/src/ |
H A D | splay-tree.h | 23 // The tree is also parameterized by an allocation policy 24 // (Allocator). The policy is used for allocating lists in the C free 50 INLINE(void operator delete(void* p, AllocationPolicy policy)) { argument
|
/external/webrtc/src/system_wrappers/source/ |
H A D | thread_posix.cc | 177 const int policy = SCHED_RR; local 179 const int policy = SCHED_FIFO; local 202 const int minPrio = sched_get_priority_min(policy); 203 const int maxPrio = sched_get_priority_max(policy); 227 result = pthread_setschedparam(_thread, policy, ¶m);
|
/external/wpa_supplicant_8/hostapd/src/utils/ |
H A D | browser.c | 100 gchar *mime, WebKitWebPolicyDecision *policy, 106 webkit_web_policy_decision_download(policy); 187 g_signal_connect(G_OBJECT(view), "mime-type-policy-decision-requested", 98 view_cb_mime_type_policy_decision( WebKitWebView *view, WebKitWebFrame *frame, WebKitNetworkRequest *req, gchar *mime, WebKitWebPolicyDecision *policy, struct browser_context *ctx) argument
|
/external/wpa_supplicant_8/src/utils/ |
H A D | browser.c | 100 gchar *mime, WebKitWebPolicyDecision *policy, 106 webkit_web_policy_decision_download(policy); 187 g_signal_connect(G_OBJECT(view), "mime-type-policy-decision-requested", 98 view_cb_mime_type_policy_decision( WebKitWebView *view, WebKitWebFrame *frame, WebKitNetworkRequest *req, gchar *mime, WebKitWebPolicyDecision *policy, struct browser_context *ctx) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/utils/ |
H A D | browser.c | 100 gchar *mime, WebKitWebPolicyDecision *policy, 106 webkit_web_policy_decision_download(policy); 187 g_signal_connect(G_OBJECT(view), "mime-type-policy-decision-requested", 98 view_cb_mime_type_policy_decision( WebKitWebView *view, WebKitWebFrame *frame, WebKitNetworkRequest *req, gchar *mime, WebKitWebPolicyDecision *policy, struct browser_context *ctx) argument
|
/external/iptables/iptables/ |
H A D | ip6tables-restore.c | 311 char *policy, *chain; local 346 policy = strtok(NULL, " \t\n"); 347 DEBUGP("line %u, policy '%s'\n", line, policy); 348 if (!policy) { 350 "%s: line %u policy invalid\n", 355 if (strcmp(policy, "-") != 0) { 364 "invalid policy counters " 371 DEBUGP("Setting policy of chain %s to %s\n", 372 chain, policy); [all...] |