/external/selinux/libsepol/tests/ |
H A D | Makefile | 11 # In order to load source policies we need to link in the checkpolicy/checkmodule parser and util code. 12 # This is less than ideal, but it makes the tests easier to maintain by allowing source policies 24 m4support := $(wildcard policies/support/*.spt) 25 testsuites := $(wildcard policies/test-*) 29 policies := $(stdpol) $(mlspol) macro 31 all: $(EXE) $(policies) 32 policies: $(policies) 45 rm -f $(policies) 46 rm -f policies/tes [all...] |
H A D | test-linker.c | 48 const char *policies[NUM_POLICIES] = { variable 63 if (test_load_policy(&linkedbase, POLICY_BASE, mls, "test-linker", policies[BASEMOD])) 66 if (test_load_policy(&basenomods, POLICY_BASE, mls, "test-linker", policies[BASEMOD])) 77 if (test_load_policy(modules[i], POLICY_MOD, mls, "test-linker", policies[i]))
|
/external/owasp/sanitizer/src/main/org/owasp/html/ |
H A D | AttributePolicy.java | 61 /** Utilities for working with attribute policies. */ 65 * An attribute policy equivalent to applying all the given policies in 69 public static final AttributePolicy join(AttributePolicy... policies) { argument 71 for (AttributePolicy p : policies) { 73 uniq.addAll(((JoinedAttributePolicy) p).policies); 112 final ImmutableList<AttributePolicy> policies; field in class:JoinedAttributePolicy 114 JoinedAttributePolicy(Collection<? extends AttributePolicy> policies) { argument 115 this.policies = ImmutableList.copyOf(policies); 120 for (AttributePolicy p : policies) { [all...] |
H A D | ElementAndAttributePolicyBasedSanitizerPolicy.java | 42 * A sanitizer policy that applies element and attribute policies to tags. 104 ElementAndAttributePolicies policies = elAndAttrPolicies.get(elementName); 105 String adjustedElementName = applyPolicies(elementName, attrs, policies); 107 && !(attrs.isEmpty() && policies.skipIfEmpty)) { 108 writeOpenTag(policies, adjustedElementName, attrs); 116 ElementAndAttributePolicies policies) { 118 if (policies != null) { 123 = policies.attrPolicies.get(name); 140 adjustedElementName = policies.elPolicy.apply(elementName, attrs); 174 ElementAndAttributePolicies policies, Strin 114 applyPolicies( String elementName, List<String> attrs, ElementAndAttributePolicies policies) argument 173 writeOpenTag( ElementAndAttributePolicies policies, String adjustedElementName, List<String> attrs) argument [all...] |
H A D | PolicyFactory.java | 46 * policies. 56 private final ImmutableMap<String, ElementAndAttributePolicies> policies; field in class:PolicyFactory 61 ImmutableMap<String, ElementAndAttributePolicies> policies, 64 this.policies = policies; 72 out, policies, textContainers); 130 * policies where they overlap on a particular granted attribute or element 136 // Merge this and f into a map of element names to attribute policies. 138 : policies.entrySet()) { 141 ElementAndAttributePolicies q = f.policies 60 PolicyFactory( ImmutableMap<String, ElementAndAttributePolicies> policies, ImmutableSet<String> textContainers, ImmutableMap<String, AttributePolicy> globalAttrPolicies) argument [all...] |
H A D | ElementPolicy.java | 40 * Element policies are applied <strong>after</strong> 41 * {@link AttributePolicy attribute policies} so 59 /** Utilities for working with element policies. */ 64 * Given zero or more element policies, returns an element policy equivalent 67 public static final ElementPolicy join(ElementPolicy... policies) { argument 94 for (ElementPolicy policy : policies) {
|
H A D | HtmlPolicyBuilder.java | 48 * Conveniences for configuring policies for the {@link HtmlSanitizer}. 74 * so you can easily white-list widely used policies that don't violate the 129 * <li>Element and attribute policies are applied in the following order: 132 * Element policies come last so they can observe all the post-processed 134 * attribute policies. 135 * Element specific policies go first, so they can normalize content to 148 * binding policies to output channels is cheap so there's no need. 298 * Returns an object that lets you associate policies with the given 345 Map<String, AttributePolicy> policies = attrPolicies.get(elementName); 346 if (policies [all...] |
/external/strace/xlat/ |
H A D | policies.h | 1 /* Generated by ./xlat/gen.sh from ./xlat/policies.in; do not edit. */ 17 # error static const struct xlat policies in mpers mode 22 const struct xlat policies[] = { variable in typeref:struct:xlat
|
/external/boringssl/src/crypto/x509/ |
H A D | x509_vpm.c | 143 if (param->policies) { 144 sk_ASN1_OBJECT_pop_free(param->policies, ASN1_OBJECT_free); 145 param->policies = NULL; 290 if (test_x509_verify_param_copy(policies, NULL)) { 291 if (!X509_VERIFY_PARAM_set1_policies(dest, src->policies)) 412 if (!param->policies) { 413 param->policies = sk_ASN1_OBJECT_new_null(); 414 if (!param->policies) 417 if (!sk_ASN1_OBJECT_push(param->policies, policy)) 423 STACK_OF(ASN1_OBJECT) *policies) 422 X509_VERIFY_PARAM_set1_policies(X509_VERIFY_PARAM *param, STACK_OF(ASN1_OBJECT) *policies) argument [all...] |
/external/linux-kselftest/tools/testing/selftests/cpufreq/ |
H A D | cpufreq.sh | 30 policies=$(ls $CPUFREQROOT| grep "policy[0-9].*") 31 for policy in $policies; do 38 policies=$(ls $CPUFREQROOT| grep "policy[0-9].*") 39 for policy in $policies; do
|
/external/autotest/client/site_tests/security_DbusOwners/ |
H A D | security_DbusOwners.py | 45 policies = xmldoc.getElementsByTagName('policy') 47 for policy in policies:
|
/external/boringssl/src/crypto/x509v3/ |
H A D | pcy_cache.c | 76 CERTIFICATEPOLICIES *policies, int crit) 83 if (sk_POLICYINFO_num(policies) == 0) 88 for (i = 0; i < sk_POLICYINFO_num(policies); i++) { 89 policy = sk_POLICYINFO_value(policies, i); 115 sk_POLICYINFO_pop_free(policies, POLICYINFO_free); 144 * don't have any policies. 168 * no point continuing because the valid policies will be NULL. 75 policy_cache_create(X509 *x, CERTIFICATEPOLICIES *policies, int crit) argument
|
/external/strace/tests/ |
H A D | get_mempolicy.c | 39 # include "xlat/policies.h" 98 printxval(policies, (unsigned) *mode, "MPOL_???"); 104 printxval(policies, (unsigned) *mode, "MPOL_???");
|
/external/strace/tests-m32/ |
H A D | get_mempolicy.c | 39 # include "xlat/policies.h" 98 printxval(policies, (unsigned) *mode, "MPOL_???"); 104 printxval(policies, (unsigned) *mode, "MPOL_???");
|
/external/strace/tests-mx32/ |
H A D | get_mempolicy.c | 39 # include "xlat/policies.h" 98 printxval(policies, (unsigned) *mode, "MPOL_???"); 104 printxval(policies, (unsigned) *mode, "MPOL_???");
|
/external/ImageMagick/MagickCore/ |
H A D | policy.c | 332 % GetPolicyInfoList() returns any policies that match the specified pattern. 343 % o number_policies: returns the number of policies in the list. 352 **policies; 370 policies=(const PolicyInfo **) AcquireQuantumMemory((size_t) 371 GetNumberOfElementsInLinkedList(policy_cache)+1UL,sizeof(*policies)); 372 if (policies == (const PolicyInfo **) NULL) 384 policies[i++]=p; 388 policies[i]=(PolicyInfo *) NULL; 390 return(policies); 405 % GetPolicyList() returns any policies tha 344 **policies; local 416 **policies; local [all...] |
/external/strace/ |
H A D | numa.c | 75 #include "xlat/policies.h" 82 printxval64(policies, tcp->u_arg[2], "MPOL_???"); 93 printxval(policies, tcp->u_arg[0], "MPOL_???"); 109 printxval(policies, pol, "MPOL_???");
|
/external/owasp/sanitizer/distrib/lib/ |
H A D | owasp-java-html-sanitizer.jar | ... int i$
org.owasp.html.AttributePolicy[] policies
java.util.Set uniq
}
org/owasp/html/AttributePolicy ... |
/external/libnl/python/netlink/ |
H A D | capi.i | 950 struct nla_policy *policies; 955 policies = calloc(n_items, sizeof(*policies)); 958 polobj = SWIG_NewPointerObj(SWIG_as_voidptr(&policies[i]),
|
/external/ltp/testcases/kernel/hotplug/memory_hotplug/ |
H A D | commands.c | 241 static struct policies { struct 244 } policies[] = { variable in typeref:struct:policies 257 * <mpol> is one of the policies[] above. 263 struct policies *polp; 269 for (polp = policies; polp->pol_name != NULL; ++polp) {
|
/external/boringssl/include/openssl/ |
H A D | x509_vfy.h | 157 STACK_OF(ASN1_OBJECT) *policies; /* Permissible policies */ member in struct:X509_VERIFY_PARAM_st 553 STACK_OF(ASN1_OBJECT) *policies);
|
/external/boringssl/src/include/openssl/ |
H A D | x509_vfy.h | 157 STACK_OF(ASN1_OBJECT) *policies; /* Permissible policies */ member in struct:X509_VERIFY_PARAM_st 553 STACK_OF(ASN1_OBJECT) *policies);
|
/external/ltp/testcases/realtime/ |
H A D | 00_Descriptions.txt | 122 - The scheduling policies of threads are different from previous testcase
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
H A D | CertPathValidatorUtilities.java | 538 ASN1Sequence policies = null; 541 policies = DERSequence.getInstance(getExtensionValue(cert, CERTIFICATE_POLICIES)); 545 throw new AnnotatedException("Certificate policies cannot be decoded.", e); 547 Enumeration e = policies.getObjects();
|
/external/selinux/python/sepolicy/sepolicy/ |
H A D | __init__.py | 121 policies = glob.glob("%s.*" % path) 122 policies.sort() 123 return policies[-1]
|