/system/update_engine/ |
H A D | system_state.h | 34 namespace policy { namespace 38 } // namespace policy 68 // Sets or gets the latest device policy. 69 virtual void set_device_policy(const policy::DevicePolicy* device_policy) = 0; 70 virtual const policy::DevicePolicy* device_policy() = 0;
|
H A D | update_attempter.h | 46 #include "update_engine/update_manager/policy.h" 52 namespace policy { namespace 84 // policy-mandated channel we are updating to, if not empty. If |obey_proxies| 194 // Reloads the device policy from libbrillo. Note: This method doesn't 195 // cause a real-time policy fetch from the policy server. It just reloads the 347 // only after the device policy has been loaded and set in the system_state_. 352 // scatter factor value specified from policy. 396 // Callback for the async UpdateCheckAllowed policy request. If |status| is 398 // based on the content of |params|. Otherwise, retries the policy reques [all...] |
H A D | payload_state.cc | 26 #include <policy/device_policy.h> 104 // response signature so that a change in enterprise policy for 1164 const policy::DevicePolicy* policy = system_state_->device_policy(); local 1165 if (policy && policy->GetHttpDownloadsEnabled(&http_url_ok) && !http_url_ok) 1166 LOG(INFO) << "Downloads via HTTP Url are not enabled by device policy";
|
/system/sepolicy/tools/sepolicy-analyze/ |
H A D | sepolicy-analyze.c | 34 fprintf(stderr, "%s must be called on a policy file with a component and the appropriate arguments specified\n", arg0); 35 fprintf(stderr, "%s <policy-file>:\n", arg0); 44 char *policy; local 52 policy = argv[1]; 53 if(load_policy(policy, &policydb, &pf))
|
/system/update_engine/update_manager/ |
H A D | update_manager.h | 31 #include "update_engine/update_manager/policy.h" 56 // PolicyRequest() evaluates the given policy with the provided arguments and 58 // Policy class for the policy request to call. The UpdateManager will call 59 // this method on the right policy. The pointer |result| must not be null 63 // When the policy request succeeds, the |result| is set and the method 65 // policy called with this method should not block (i.e. return 78 // Evaluates the given |policy_method| policy with the provided |args| 81 // If the policy implementation should block, returning a 83 // policy until another status is returned. If the policy implementatio 96 set_policy(const Policy* policy) argument [all...] |
/system/extras/ext4_utils/ |
H A D | ext4_crypt_init_extensions.cpp | 112 // Only set policy on first level /data directories 113 // To make this less restrictive, consider using a policy file. 114 // However this is overkill for as long as the policy is simply 115 // to apply a global policy to all /data folders created via makedir 133 KLOG_INFO(TAG, "Not setting policy on %s\n", dir); 139 std::string policy; local 140 if (!android::base::ReadFileToString(ref_filename, &policy)) { 141 KLOG_ERROR(TAG, "Unable to read system policy to set on %s\n", dir); 151 KLOG_INFO(TAG, "Setting policy on %s\n", dir); 152 int result = e4crypt_policy_ensure(dir, policy [all...] |
H A D | ext4_crypt.cpp | 34 #define XATTR_NAME_ENCRYPTION_POLICY "encryption.policy" 66 static void policy_to_hex(const char* policy, char* hex) { argument 68 hex[j++] = HEX_LOOKUP[(policy[i] & 0xF0) >> 4]; 69 hex[j++] = HEX_LOOKUP[policy[i] & 0x0F]; 104 static bool e4crypt_policy_set(const char *directory, const char *policy, argument 121 memcpy(eep.master_key_descriptor, policy, EXT4_KEY_DESCRIPTOR_SIZE); 123 PLOG(ERROR) << "Failed to set encryption policy for " << directory; 130 policy_to_hex(policy, policy_hex); 135 static bool e4crypt_policy_get(const char *directory, char *policy, argument 151 PLOG(ERROR) << "Failed to get encryption policy fo 169 e4crypt_policy_check(const char *directory, const char *policy, size_t policy_length, int contents_encryption_mode) argument 194 e4crypt_policy_ensure(const char *directory, const char *policy, size_t policy_length, const char* contents_encryption_mode) argument [all...] |
/system/bt/bta/sys/ |
H A D | bta_sys_conn.c | 52 ** Description Called by BTA DM to register link policy change callbacks 408 ** policy to peer device should be set 413 void bta_sys_set_policy (UINT8 id, UINT8 policy, BD_ADDR peer_addr) argument 417 bta_sys_cb.p_policy_cb(BTA_SYS_PLCY_SET, id, policy, peer_addr); 426 ** policy to peer device should be clear 431 void bta_sys_clear_policy (UINT8 id, UINT8 policy, BD_ADDR peer_addr) argument 435 bta_sys_cb.p_policy_cb(BTA_SYS_PLCY_CLR, id, policy, peer_addr); 444 ** link policy should be set 449 void bta_sys_set_default_policy (UINT8 id, UINT8 policy) argument 453 bta_sys_cb.p_policy_cb(BTA_SYS_PLCY_DEF_SET, id, policy, NUL 467 bta_sys_clear_default_policy(UINT8 id, UINT8 policy) argument [all...] |
/system/core/libcutils/ |
H A D | sched_policy.c | 31 /* Re-map SP_DEFAULT to the system default policy, and leave other values unchanged. 33 * Returns the possibly re-mapped policy. 76 /* Add tid to the scheduling group defined by the policy */ 227 int get_sched_policy(int tid, SchedPolicy *policy) argument 240 *policy = SP_FOREGROUND; 242 *policy = SP_FOREGROUND; 244 *policy = SP_BACKGROUND; 246 *policy = SP_TOP_APP; 255 *policy = SP_FOREGROUND; 257 *policy 279 set_cpuset_policy(int tid, SchedPolicy policy) argument 332 set_sched_policy(int tid, SchedPolicy policy) argument 443 get_sched_policy(int tid UNUSED, SchedPolicy *policy) argument 451 get_sched_policy_name(SchedPolicy policy) argument [all...] |
/system/sepolicy/tools/ |
H A D | sepolicy-check.c | 18 fprintf(stderr, "%s -s <source> -t <target> -c <class> -p <perm> -P <policy file>\n", arg0); 66 perm_datum_t *perm, policydb_t *policy, avtab_t *avtab) { 77 if (expand_avtab(policy, avtab, &exp_avtab)) { 116 int check_rule(char *s, char *t, char *c, char *p, policydb_t *policy) { argument 131 src = hashtab_search(policy->p_types.table, s); 138 tgt = hashtab_search(policy->p_types.table, t); 145 cls = hashtab_search(policy->p_classes.table, c); 177 perm, policy, &policy->te_avtab); 185 perm, policy, 63 expand_and_check(int s_op, uint32_t source_type, int t_op, uint32_t target_type, int c_op, uint32_t target_class, perm_datum_t *perm, policydb_t *policy, avtab_t *avtab) argument 235 char *policy = NULL, *source = NULL, *target = NULL, *class = NULL, *perm = NULL; local [all...] |
/system/bt/btif/src/ |
H A D | btif_sock_thread.c | 113 int policy; local 125 pthread_getschedparam(*thread_id, &policy, ¶m); 126 min_pri = sched_get_priority_min(policy); 130 pthread_setschedparam(*thread_id, policy, ¶m);
|
/system/core/toolbox/ |
H A D | top.c | 75 char policy[POLICY_NAME_LEN]; member in struct:proc_info 411 strlcpy(proc->policy, "unk", POLICY_NAME_LEN); 413 strlcpy(proc->policy, get_sched_policy_name(p), POLICY_NAME_LEN); 414 proc->policy[2] = '\0'; 501 proc->vss / 1024, proc->rss * getpagesize() / 1024, proc->policy, 507 proc->vss / 1024, proc->rss * getpagesize() / 1024, proc->policy,
|
/system/bt/bta/av/ |
H A D | bta_av_aact.c | 2013 UINT8 policy = HCI_ENABLE_SNIFF_MODE; local 2029 policy |= HCI_ENABLE_MASTER_SLAVE_SWITCH; 2032 bta_sys_clear_policy(BTA_ID_AV, policy, p_scb->peer_addr); 2070 UINT8 policy = HCI_ENABLE_SNIFF_MODE; local 2077 policy |= HCI_ENABLE_MASTER_SLAVE_SWITCH; 2078 bta_sys_set_policy(BTA_ID_AV, policy, p_scb->peer_addr); 2336 UINT8 policy = HCI_ENABLE_SNIFF_MODE; local 2457 policy |= HCI_ENABLE_MASTER_SLAVE_SWITCH; 2460 bta_sys_clear_policy(BTA_ID_AV, policy, p_scb->peer_addr); 2532 UINT8 policy local 2617 UINT8 policy = HCI_ENABLE_SNIFF_MODE; local [all...] |
/system/bt/bta/dm/ |
H A D | bta_dm_act.c | 1049 ** Description process the link policy changes 1057 UINT16 policy = app_id; local 1063 APPL_TRACE_DEBUG(" bta_dm_policy_cback cmd:%d, policy:0x%x", 1064 status, policy); 1070 /* restore the default link policy */ 1071 p_dev->link_policy |= policy; 1078 /* clear the policy from the default link policy */ 1079 p_dev->link_policy &= (~policy); 1082 if(policy [all...] |