Searched defs:policy (Results 1 - 14 of 14) sorted by relevance

/system/update_engine/
H A Dsystem_state.h34 namespace policy { namespace
38 } // namespace policy
68 // Sets or gets the latest device policy.
69 virtual void set_device_policy(const policy::DevicePolicy* device_policy) = 0;
70 virtual const policy::DevicePolicy* device_policy() = 0;
H A Dupdate_attempter.h46 #include "update_engine/update_manager/policy.h"
52 namespace policy { namespace
84 // policy-mandated channel we are updating to, if not empty. If |obey_proxies|
194 // Reloads the device policy from libbrillo. Note: This method doesn't
195 // cause a real-time policy fetch from the policy server. It just reloads the
347 // only after the device policy has been loaded and set in the system_state_.
352 // scatter factor value specified from policy.
396 // Callback for the async UpdateCheckAllowed policy request. If |status| is
398 // based on the content of |params|. Otherwise, retries the policy reques
[all...]
H A Dpayload_state.cc26 #include <policy/device_policy.h>
104 // response signature so that a change in enterprise policy for
1164 const policy::DevicePolicy* policy = system_state_->device_policy(); local
1165 if (policy && policy->GetHttpDownloadsEnabled(&http_url_ok) && !http_url_ok)
1166 LOG(INFO) << "Downloads via HTTP Url are not enabled by device policy";
/system/sepolicy/tools/sepolicy-analyze/
H A Dsepolicy-analyze.c34 fprintf(stderr, "%s must be called on a policy file with a component and the appropriate arguments specified\n", arg0);
35 fprintf(stderr, "%s <policy-file>:\n", arg0);
44 char *policy; local
52 policy = argv[1];
53 if(load_policy(policy, &policydb, &pf))
/system/update_engine/update_manager/
H A Dupdate_manager.h31 #include "update_engine/update_manager/policy.h"
56 // PolicyRequest() evaluates the given policy with the provided arguments and
58 // Policy class for the policy request to call. The UpdateManager will call
59 // this method on the right policy. The pointer |result| must not be null
63 // When the policy request succeeds, the |result| is set and the method
65 // policy called with this method should not block (i.e. return
78 // Evaluates the given |policy_method| policy with the provided |args|
81 // If the policy implementation should block, returning a
83 // policy until another status is returned. If the policy implementatio
96 set_policy(const Policy* policy) argument
[all...]
/system/extras/ext4_utils/
H A Dext4_crypt_init_extensions.cpp112 // Only set policy on first level /data directories
113 // To make this less restrictive, consider using a policy file.
114 // However this is overkill for as long as the policy is simply
115 // to apply a global policy to all /data folders created via makedir
133 KLOG_INFO(TAG, "Not setting policy on %s\n", dir);
139 std::string policy; local
140 if (!android::base::ReadFileToString(ref_filename, &policy)) {
141 KLOG_ERROR(TAG, "Unable to read system policy to set on %s\n", dir);
151 KLOG_INFO(TAG, "Setting policy on %s\n", dir);
152 int result = e4crypt_policy_ensure(dir, policy
[all...]
H A Dext4_crypt.cpp34 #define XATTR_NAME_ENCRYPTION_POLICY "encryption.policy"
66 static void policy_to_hex(const char* policy, char* hex) { argument
68 hex[j++] = HEX_LOOKUP[(policy[i] & 0xF0) >> 4];
69 hex[j++] = HEX_LOOKUP[policy[i] & 0x0F];
104 static bool e4crypt_policy_set(const char *directory, const char *policy, argument
121 memcpy(eep.master_key_descriptor, policy, EXT4_KEY_DESCRIPTOR_SIZE);
123 PLOG(ERROR) << "Failed to set encryption policy for " << directory;
130 policy_to_hex(policy, policy_hex);
135 static bool e4crypt_policy_get(const char *directory, char *policy, argument
151 PLOG(ERROR) << "Failed to get encryption policy fo
169 e4crypt_policy_check(const char *directory, const char *policy, size_t policy_length, int contents_encryption_mode) argument
194 e4crypt_policy_ensure(const char *directory, const char *policy, size_t policy_length, const char* contents_encryption_mode) argument
[all...]
/system/bt/bta/sys/
H A Dbta_sys_conn.c52 ** Description Called by BTA DM to register link policy change callbacks
408 ** policy to peer device should be set
413 void bta_sys_set_policy (UINT8 id, UINT8 policy, BD_ADDR peer_addr) argument
417 bta_sys_cb.p_policy_cb(BTA_SYS_PLCY_SET, id, policy, peer_addr);
426 ** policy to peer device should be clear
431 void bta_sys_clear_policy (UINT8 id, UINT8 policy, BD_ADDR peer_addr) argument
435 bta_sys_cb.p_policy_cb(BTA_SYS_PLCY_CLR, id, policy, peer_addr);
444 ** link policy should be set
449 void bta_sys_set_default_policy (UINT8 id, UINT8 policy) argument
453 bta_sys_cb.p_policy_cb(BTA_SYS_PLCY_DEF_SET, id, policy, NUL
467 bta_sys_clear_default_policy(UINT8 id, UINT8 policy) argument
[all...]
/system/core/libcutils/
H A Dsched_policy.c31 /* Re-map SP_DEFAULT to the system default policy, and leave other values unchanged.
33 * Returns the possibly re-mapped policy.
76 /* Add tid to the scheduling group defined by the policy */
227 int get_sched_policy(int tid, SchedPolicy *policy) argument
240 *policy = SP_FOREGROUND;
242 *policy = SP_FOREGROUND;
244 *policy = SP_BACKGROUND;
246 *policy = SP_TOP_APP;
255 *policy = SP_FOREGROUND;
257 *policy
279 set_cpuset_policy(int tid, SchedPolicy policy) argument
332 set_sched_policy(int tid, SchedPolicy policy) argument
443 get_sched_policy(int tid UNUSED, SchedPolicy *policy) argument
451 get_sched_policy_name(SchedPolicy policy) argument
[all...]
/system/sepolicy/tools/
H A Dsepolicy-check.c18 fprintf(stderr, "%s -s <source> -t <target> -c <class> -p <perm> -P <policy file>\n", arg0);
66 perm_datum_t *perm, policydb_t *policy, avtab_t *avtab) {
77 if (expand_avtab(policy, avtab, &exp_avtab)) {
116 int check_rule(char *s, char *t, char *c, char *p, policydb_t *policy) { argument
131 src = hashtab_search(policy->p_types.table, s);
138 tgt = hashtab_search(policy->p_types.table, t);
145 cls = hashtab_search(policy->p_classes.table, c);
177 perm, policy, &policy->te_avtab);
185 perm, policy,
63 expand_and_check(int s_op, uint32_t source_type, int t_op, uint32_t target_type, int c_op, uint32_t target_class, perm_datum_t *perm, policydb_t *policy, avtab_t *avtab) argument
235 char *policy = NULL, *source = NULL, *target = NULL, *class = NULL, *perm = NULL; local
[all...]
/system/bt/btif/src/
H A Dbtif_sock_thread.c113 int policy; local
125 pthread_getschedparam(*thread_id, &policy, &param);
126 min_pri = sched_get_priority_min(policy);
130 pthread_setschedparam(*thread_id, policy, &param);
/system/core/toolbox/
H A Dtop.c75 char policy[POLICY_NAME_LEN]; member in struct:proc_info
411 strlcpy(proc->policy, "unk", POLICY_NAME_LEN);
413 strlcpy(proc->policy, get_sched_policy_name(p), POLICY_NAME_LEN);
414 proc->policy[2] = '\0';
501 proc->vss / 1024, proc->rss * getpagesize() / 1024, proc->policy,
507 proc->vss / 1024, proc->rss * getpagesize() / 1024, proc->policy,
/system/bt/bta/av/
H A Dbta_av_aact.c2013 UINT8 policy = HCI_ENABLE_SNIFF_MODE; local
2029 policy |= HCI_ENABLE_MASTER_SLAVE_SWITCH;
2032 bta_sys_clear_policy(BTA_ID_AV, policy, p_scb->peer_addr);
2070 UINT8 policy = HCI_ENABLE_SNIFF_MODE; local
2077 policy |= HCI_ENABLE_MASTER_SLAVE_SWITCH;
2078 bta_sys_set_policy(BTA_ID_AV, policy, p_scb->peer_addr);
2336 UINT8 policy = HCI_ENABLE_SNIFF_MODE; local
2457 policy |= HCI_ENABLE_MASTER_SLAVE_SWITCH;
2460 bta_sys_clear_policy(BTA_ID_AV, policy, p_scb->peer_addr);
2532 UINT8 policy local
2617 UINT8 policy = HCI_ENABLE_SNIFF_MODE; local
[all...]
/system/bt/bta/dm/
H A Dbta_dm_act.c1049 ** Description process the link policy changes
1057 UINT16 policy = app_id; local
1063 APPL_TRACE_DEBUG(" bta_dm_policy_cback cmd:%d, policy:0x%x",
1064 status, policy);
1070 /* restore the default link policy */
1071 p_dev->link_policy |= policy;
1078 /* clear the policy from the default link policy */
1079 p_dev->link_policy &= (~policy);
1082 if(policy
[all...]

Completed in 329 milliseconds