/external/selinux/python/sepolicy/ |
H A D | sepolicy.py | 180 sepolicy.policy(values) 189 raise ValueError("%s invalid SELinux policy type\n%s" % (values, get_poltype_desc())) 342 if not args.policy and args.root != "/": 343 sepolicy.policy(sepolicy.get_installed_policy(args.root)) 373 help=_("With this flag, alternative root path needs to include file context files and policy.xml file")) 386 help=_('Query SELinux policy network information')) 420 help=_('query SELinux policy to see if domains can communicate with each other')) 506 from sepolicy.generate import policy, AUSER, RUSER, EUSER, USERS, SANDBOX, APPLICATIONS, NEWTYPE namespace 522 raise ValueError(_("Command required for this type of policy")) 527 mypolicy = policy(arg [all...] |
/external/tcpdump/ |
H A D | print-hncp.c | 650 uint8_t policy; local 656 policy = value[0]; 658 if (policy == 0) { 664 } else if (policy >= 1 && policy <= 128) { 684 } else if (policy == 129) { 687 } else if (policy == 130) { 690 } else if (policy == 131) { 696 } else if (policy >= 132) { 697 ND_PRINT((ndo, "Unknown (%u)", policy)); /* Reserve [all...] |
/external/tpm2/ |
H A D | SessionProcess.c | 192 // Checks if a policy session is required for a command. If a command requires DUP or ADMIN role 195 // have to be special-cased in this function. A policy session is required if: 201 // d) The authorized entity is a PCR belonging to a policy group, and has its policy initialized 205 // TRUE policy session is required 206 // FALSE policy session is not required 233 TPM2B_DIGEST policy; local 236 &policy); 249 // as IsAuthPolicyAvailable() does (a null authValue is a valid auth, but a null policy is not a valid policy) [all...] |
/external/v8/src/ |
H A D | api.h | 452 inline void set_microtasks_policy(v8::MicrotasksPolicy policy); 550 v8::MicrotasksPolicy policy) { 551 microtasks_policy_ = policy; 549 set_microtasks_policy( v8::MicrotasksPolicy policy) argument
|
/external/webrtc/talk/session/media/ |
H A D | srtpfilter.cc | 678 srtp_policy_t policy; local 679 memset(&policy, 0, sizeof(policy)); 682 crypto_policy_set_aes_cm_128_hmac_sha1_80(&policy.rtp); 683 crypto_policy_set_aes_cm_128_hmac_sha1_80(&policy.rtcp); 685 crypto_policy_set_aes_cm_128_hmac_sha1_32(&policy.rtp); // rtp is 32, 686 crypto_policy_set_aes_cm_128_hmac_sha1_80(&policy.rtcp); // rtcp still 80 698 policy.ssrc.type = static_cast<ssrc_type_t>(type); 699 policy.ssrc.value = 0; 700 policy [all...] |
/external/compiler-rt/lib/asan/tests/ |
H A D | asan_test.cc | 1287 int policy; local 1290 pthread_getschedparam(pthread_self(), &policy, Ident(¶m) + 2), 1293 pthread_getschedparam(pthread_self(), Ident(&policy) - 1, ¶m), 1295 int res = pthread_getschedparam(pthread_self(), &policy, ¶m);
|
/external/e2fsprogs/misc/ |
H A D | e4crypt.c | 351 struct ext4_encryption_policy policy; local 383 policy.version = 0; 384 policy.contents_encryption_mode = 386 policy.filenames_encryption_mode = 388 policy.flags = int_log2(pad >> 2); 389 memcpy(policy.master_key_descriptor, salt->key_desc, 391 rc = ioctl(fd, EXT4_IOC_SET_ENCRYPTION_POLICY, &policy); 394 printf("Error [%s] setting policy.\nThe key descriptor " 640 "set the policy of those directories to use the key just entered by\n" \ 700 #define set_policy_desc "sets a policy fo 751 struct ext4_encryption_policy policy; local [all...] |
/external/ipsec-tools/src/libipsec/ |
H A D | pfkey.c | 860 struct sockaddr *dst, u_int prefd, u_int proto, caddr_t policy, 868 policy, policylen, seq)) < 0) 883 u_int64_t vtime, caddr_t policy, int policylen, u_int32_t seq) 890 policy, policylen, seq)) < 0) 904 struct sockaddr *dst, u_int prefd, u_int proto, caddr_t policy, 912 policy, policylen, seq)) < 0) 927 u_int64_t vtime, caddr_t policy, int policylen, u_int32_t seq) 934 policy, policylen, seq)) < 0) 948 struct sockaddr *dst, u_int prefd, u_int proto, caddr_t policy, 961 policy, policyle 859 pfkey_send_spdadd(int so, struct sockaddr *src, u_int prefs, struct sockaddr *dst, u_int prefd, u_int proto, caddr_t policy, int policylen, u_int32_t seq) argument 881 pfkey_send_spdadd2(int so, struct sockaddr *src, u_int prefs, struct sockaddr *dst, u_int prefd, u_int proto, u_int64_t ltime, u_int64_t vtime, caddr_t policy, int policylen, u_int32_t seq) argument 903 pfkey_send_spdupdate(int so, struct sockaddr *src, u_int prefs, struct sockaddr *dst, u_int prefd, u_int proto, caddr_t policy, int policylen, u_int32_t seq) argument 925 pfkey_send_spdupdate2(int so, struct sockaddr *src, u_int prefs, struct sockaddr *dst, u_int prefd, u_int proto, u_int64_t ltime, u_int64_t vtime, caddr_t policy, int policylen, u_int32_t seq) argument 947 pfkey_send_spddelete(int so, struct sockaddr *src, u_int prefs, struct sockaddr *dst, u_int prefd, u_int proto, caddr_t policy, int policylen, u_int32_t seq) argument 1008 pfkey_send_spdsetidx(int so, struct sockaddr *src, u_int prefs, struct sockaddr *dst, u_int prefd, u_int proto, caddr_t policy, int policylen, u_int32_t seq) argument 1071 pfkey_send_migrate(int so, struct sockaddr *src, u_int prefs, struct sockaddr *dst, u_int prefd, u_int proto, caddr_t policy, int policylen, u_int32_t seq) argument 1571 pfkey_send_x4(int so, u_int type, struct sockaddr *src, u_int prefs, struct sockaddr *dst, u_int prefd, u_int proto, u_int64_t ltime, u_int64_t vtime, char *policy, int policylen, u_int32_t seq) argument [all...] |
/external/ipsec-tools/src/racoon/ |
H A D | pfkey.c | 86 #include "policy.h" 1718 * than one in the policy, so kernel will drop them; 1740 * If there is a phase 2 handler against the policy identifier in 1764 plog(LLV_ERROR, LOCATION, NULL, "no policy found: id:%d.\n", 1771 /* get inbound policy */ 1800 "no in-bound policy found: %s\n", 2022 caddr_t policy, p; local 2032 /* get policy buffer size */ 2054 /* make policy structure */ 2055 policy 2180 caddr_t policy = NULL; local 2302 caddr_t policy = NULL; local 2424 caddr_t policy = NULL; local [all...] |
/external/iptables/iptables/ |
H A D | ip6tables.c | 94 {.name = "policy", .has_arg = 1, .val = 'P'}, 236 " --policy -P chain target\n" 237 " Change policy on chain to target\n" 473 printf(" (policy %s", pol); 1348 const char *policy = NULL, *newname = NULL; local 1503 policy = argv[optind++]; 1506 "-%c requires a chain and a policy", 1733 ((policy != NULL && strcmp(policy, "DROP") == 0) || 1956 ret = ip6tc_set_policy(chain, policy, c [all...] |
H A D | iptables.c | 91 {.name = "policy", .has_arg = 1, .val = 'P'}, 230 " --policy -P chain target\n" 231 " Change policy on chain to target\n" 457 printf(" (policy %s", pol); 1342 const char *policy = NULL, *newname = NULL; local 1496 policy = argv[optind++]; 1499 "-%c requires a chain and a policy", 1720 ((policy != NULL && strcmp(policy, "DROP") == 0) || 1945 ret = iptc_set_policy(chain, policy, c [all...] |
H A D | nft-shared.h | 228 char *policy; member in struct:nft_xt_cmd_parse 253 const char *chain, const char *policy,
|
H A D | xtables-eb.c | 262 { "policy" , required_argument, 0, 'P' }, 435 "--policy -P chain target : change policy on chain to target\n" 741 const char *policy = NULL; local 787 case 'P': /* Define policy */ 792 /* We allow -N chainname -P policy */ 858 "No policy specified"); 861 policy = argv[optind]; 864 "Wrong policy '%s'", 870 "Unknown policy ' [all...] |
/external/libcups/cups/ |
H A D | tls-darwin.c | 874 SecPolicyRef policy = NULL; /* Policy ref */ local 902 policy = SecPolicyCreateSSL(1, cfcommon_name); 907 if (!policy) 914 CFDictionaryAddValue(query, kSecMatchPolicy, policy); 959 if (policy) 960 CFRelease(policy); 1776 SecPolicyRef policy = NULL; /* Policy ref */ local 1789 policy = SecPolicyCreateSSL(1, cfcommon_name); 1791 if (!policy) 1793 DEBUG_puts("4http_cdsa_copy_server: Unable to create SSL policy [all...] |
/external/libnl/lib/ |
H A D | msg.c | 209 * @arg policy validation policy 214 int maxtype, struct nla_policy *policy) 220 nlmsg_attrlen(nlh, hdrlen), policy); 242 * @arg policy validation policy 245 struct nla_policy *policy) 251 nlmsg_attrlen(nlh, hdrlen), maxtype, policy); 213 nlmsg_parse(struct nlmsghdr *nlh, int hdrlen, struct nlattr *tb[], int maxtype, struct nla_policy *policy) argument 244 nlmsg_validate(struct nlmsghdr *nlh, int hdrlen, int maxtype, struct nla_policy *policy) argument
|
/external/ltp/testcases/kernel/fs/fsx-linux/ |
H A D | fsx-linux.c | 404 prt("unknown policy"); 411 void assign_fd_policy(char *policy) argument 413 if (!strcmp(policy, "random")) 415 else if (!strcmp(policy, "rotate")) 418 prt("unknown -I policy: '%s'\n", policy);
|
/external/oj-libjdwp/src/share/back/ |
H A D | eventHelper.c | 486 suspendWithInvokeEnabled(jbyte policy, jthread thread) argument 490 if (policy == JDWP_SUSPEND_POLICY(ALL)) { 628 * policy could be processed by commandLoop() at one time. It was 636 * processing more than one event with a suspend-all policy. This is 639 * when an event with a suspend-all policy has been completed. 658 * policy, then prepare for either ThreadReferenceImpl.c: resume() 884 /* Return the combined suspend policy for the event set 891 jbyte *policy = arg; local 903 /* Expand running policy value if this policy demand [all...] |
/external/python/cpython3/Lib/test/test_email/ |
H A D | test_headerregistry.py | 5 from email import policy namespace 141 self.assertEqual(h.fold(policy=policy.default), folded) 212 m = Message(policy=policy.default) 242 self.assertEqual(h.fold(policy=policy.default), folded) 769 self.assertEqual(h.fold(policy=policy.default), folded) 811 self.assertEqual(h.fold(policy [all...] |
/external/selinux/python/sepolicy/sepolicy/ |
H A D | __init__.py | 93 # the setools policy handle 133 def policy(policy_file): function 157 raise ValueError(_("Failed to read %s policy file") % policy_file) 162 policy(policy_file) 276 enabled = bool(rule.qpol_symbol.is_enabled(rule.policy)) 1102 def policy_xml(path="/usr/share/selinux/devel/policy.xml"): 1114 def gen_bool_dict(path="/usr/share/selinux/devel/policy.xml"): 1164 pkg_name = "selinux-policy"
|
/external/tensorflow/tensorflow/c/eager/ |
H A D | c_api.cc | 80 TFE_ContextOptions* options, TFE_ContextDevicePlacementPolicy policy) { 81 options->policy = policy; 128 TFE_Context* ctx, TFE_ContextDevicePlacementPolicy policy) { 130 ctx->thread_local_policies[std::this_thread::get_id()] = policy; 141 return ctx->policy; 523 // We are only here if the policy is warn or silent copies, so we should 79 TFE_ContextOptionsSetDevicePlacementPolicy( TFE_ContextOptions* options, TFE_ContextDevicePlacementPolicy policy) argument 127 TFE_ContextSetThreadLocalDevicePlacementPolicy( TFE_Context* ctx, TFE_ContextDevicePlacementPolicy policy) argument
|
/external/wpa_supplicant_8/hostapd/src/pae/ |
H A D | ieee802_1x_kay.h | 224 enum macsec_policy policy; member in struct:ieee802_1x_kay 238 ieee802_1x_kay_init(struct ieee802_1x_kay_ctx *ctx, enum macsec_policy policy,
|
/external/wpa_supplicant_8/src/pae/ |
H A D | ieee802_1x_kay.h | 224 enum macsec_policy policy; member in struct:ieee802_1x_kay 238 ieee802_1x_kay_init(struct ieee802_1x_kay_ctx *ctx, enum macsec_policy policy,
|
/external/wpa_supplicant_8/wpa_supplicant/src/pae/ |
H A D | ieee802_1x_kay.h | 224 enum macsec_policy policy; member in struct:ieee802_1x_kay 238 ieee802_1x_kay_init(struct ieee802_1x_kay_ctx *ctx, enum macsec_policy policy,
|
/external/owasp/sanitizer/distrib/lib/ |
H A D | owasp-java-html-sanitizer.jar | META-INF/ META-INF/MANIFEST.MF org/ org/owasp/ org/owasp/html/ org/owasp/html/AbstractTokenStream ... |
/external/clang/lib/AST/ |
H A D | TypePrinter.cpp | 1657 raw_ostream &OS, const PrintingPolicy &policy, 1662 TypePrinter(policy, Indentation).print(ty, qs, OS, PH); 1667 const PrintingPolicy &policy) { 1670 TypePrinter(policy).print(ty, qs, StrOS, buffer); 1656 print(const Type *ty, Qualifiers qs, raw_ostream &OS, const PrintingPolicy &policy, const Twine &PlaceHolder, unsigned Indentation) argument 1665 getAsStringInternal(const Type *ty, Qualifiers qs, std::string &buffer, const PrintingPolicy &policy) argument
|