Searched defs:policy (Results 176 - 200 of 258) sorted by relevance

1234567891011

/external/selinux/python/sepolicy/
H A Dsepolicy.py180 sepolicy.policy(values)
189 raise ValueError("%s invalid SELinux policy type\n%s" % (values, get_poltype_desc()))
342 if not args.policy and args.root != "/":
343 sepolicy.policy(sepolicy.get_installed_policy(args.root))
373 help=_("With this flag, alternative root path needs to include file context files and policy.xml file"))
386 help=_('Query SELinux policy network information'))
420 help=_('query SELinux policy to see if domains can communicate with each other'))
506 from sepolicy.generate import policy, AUSER, RUSER, EUSER, USERS, SANDBOX, APPLICATIONS, NEWTYPE namespace
522 raise ValueError(_("Command required for this type of policy"))
527 mypolicy = policy(arg
[all...]
/external/tcpdump/
H A Dprint-hncp.c650 uint8_t policy; local
656 policy = value[0];
658 if (policy == 0) {
664 } else if (policy >= 1 && policy <= 128) {
684 } else if (policy == 129) {
687 } else if (policy == 130) {
690 } else if (policy == 131) {
696 } else if (policy >= 132) {
697 ND_PRINT((ndo, "Unknown (%u)", policy)); /* Reserve
[all...]
/external/tpm2/
H A DSessionProcess.c192 // Checks if a policy session is required for a command. If a command requires DUP or ADMIN role
195 // have to be special-cased in this function. A policy session is required if:
201 // d) The authorized entity is a PCR belonging to a policy group, and has its policy initialized
205 // TRUE policy session is required
206 // FALSE policy session is not required
233 TPM2B_DIGEST policy; local
236 &policy);
249 // as IsAuthPolicyAvailable() does (a null authValue is a valid auth, but a null policy is not a valid policy)
[all...]
/external/v8/src/
H A Dapi.h452 inline void set_microtasks_policy(v8::MicrotasksPolicy policy);
550 v8::MicrotasksPolicy policy) {
551 microtasks_policy_ = policy;
549 set_microtasks_policy( v8::MicrotasksPolicy policy) argument
/external/webrtc/talk/session/media/
H A Dsrtpfilter.cc678 srtp_policy_t policy; local
679 memset(&policy, 0, sizeof(policy));
682 crypto_policy_set_aes_cm_128_hmac_sha1_80(&policy.rtp);
683 crypto_policy_set_aes_cm_128_hmac_sha1_80(&policy.rtcp);
685 crypto_policy_set_aes_cm_128_hmac_sha1_32(&policy.rtp); // rtp is 32,
686 crypto_policy_set_aes_cm_128_hmac_sha1_80(&policy.rtcp); // rtcp still 80
698 policy.ssrc.type = static_cast<ssrc_type_t>(type);
699 policy.ssrc.value = 0;
700 policy
[all...]
/external/compiler-rt/lib/asan/tests/
H A Dasan_test.cc1287 int policy; local
1290 pthread_getschedparam(pthread_self(), &policy, Ident(&param) + 2),
1293 pthread_getschedparam(pthread_self(), Ident(&policy) - 1, &param),
1295 int res = pthread_getschedparam(pthread_self(), &policy, &param);
/external/e2fsprogs/misc/
H A De4crypt.c351 struct ext4_encryption_policy policy; local
383 policy.version = 0;
384 policy.contents_encryption_mode =
386 policy.filenames_encryption_mode =
388 policy.flags = int_log2(pad >> 2);
389 memcpy(policy.master_key_descriptor, salt->key_desc,
391 rc = ioctl(fd, EXT4_IOC_SET_ENCRYPTION_POLICY, &policy);
394 printf("Error [%s] setting policy.\nThe key descriptor "
640 "set the policy of those directories to use the key just entered by\n" \
700 #define set_policy_desc "sets a policy fo
751 struct ext4_encryption_policy policy; local
[all...]
/external/ipsec-tools/src/libipsec/
H A Dpfkey.c860 struct sockaddr *dst, u_int prefd, u_int proto, caddr_t policy,
868 policy, policylen, seq)) < 0)
883 u_int64_t vtime, caddr_t policy, int policylen, u_int32_t seq)
890 policy, policylen, seq)) < 0)
904 struct sockaddr *dst, u_int prefd, u_int proto, caddr_t policy,
912 policy, policylen, seq)) < 0)
927 u_int64_t vtime, caddr_t policy, int policylen, u_int32_t seq)
934 policy, policylen, seq)) < 0)
948 struct sockaddr *dst, u_int prefd, u_int proto, caddr_t policy,
961 policy, policyle
859 pfkey_send_spdadd(int so, struct sockaddr *src, u_int prefs, struct sockaddr *dst, u_int prefd, u_int proto, caddr_t policy, int policylen, u_int32_t seq) argument
881 pfkey_send_spdadd2(int so, struct sockaddr *src, u_int prefs, struct sockaddr *dst, u_int prefd, u_int proto, u_int64_t ltime, u_int64_t vtime, caddr_t policy, int policylen, u_int32_t seq) argument
903 pfkey_send_spdupdate(int so, struct sockaddr *src, u_int prefs, struct sockaddr *dst, u_int prefd, u_int proto, caddr_t policy, int policylen, u_int32_t seq) argument
925 pfkey_send_spdupdate2(int so, struct sockaddr *src, u_int prefs, struct sockaddr *dst, u_int prefd, u_int proto, u_int64_t ltime, u_int64_t vtime, caddr_t policy, int policylen, u_int32_t seq) argument
947 pfkey_send_spddelete(int so, struct sockaddr *src, u_int prefs, struct sockaddr *dst, u_int prefd, u_int proto, caddr_t policy, int policylen, u_int32_t seq) argument
1008 pfkey_send_spdsetidx(int so, struct sockaddr *src, u_int prefs, struct sockaddr *dst, u_int prefd, u_int proto, caddr_t policy, int policylen, u_int32_t seq) argument
1071 pfkey_send_migrate(int so, struct sockaddr *src, u_int prefs, struct sockaddr *dst, u_int prefd, u_int proto, caddr_t policy, int policylen, u_int32_t seq) argument
1571 pfkey_send_x4(int so, u_int type, struct sockaddr *src, u_int prefs, struct sockaddr *dst, u_int prefd, u_int proto, u_int64_t ltime, u_int64_t vtime, char *policy, int policylen, u_int32_t seq) argument
[all...]
/external/ipsec-tools/src/racoon/
H A Dpfkey.c86 #include "policy.h"
1718 * than one in the policy, so kernel will drop them;
1740 * If there is a phase 2 handler against the policy identifier in
1764 plog(LLV_ERROR, LOCATION, NULL, "no policy found: id:%d.\n",
1771 /* get inbound policy */
1800 "no in-bound policy found: %s\n",
2022 caddr_t policy, p; local
2032 /* get policy buffer size */
2054 /* make policy structure */
2055 policy
2180 caddr_t policy = NULL; local
2302 caddr_t policy = NULL; local
2424 caddr_t policy = NULL; local
[all...]
/external/iptables/iptables/
H A Dip6tables.c94 {.name = "policy", .has_arg = 1, .val = 'P'},
236 " --policy -P chain target\n"
237 " Change policy on chain to target\n"
473 printf(" (policy %s", pol);
1348 const char *policy = NULL, *newname = NULL; local
1503 policy = argv[optind++];
1506 "-%c requires a chain and a policy",
1733 ((policy != NULL && strcmp(policy, "DROP") == 0) ||
1956 ret = ip6tc_set_policy(chain, policy, c
[all...]
H A Diptables.c91 {.name = "policy", .has_arg = 1, .val = 'P'},
230 " --policy -P chain target\n"
231 " Change policy on chain to target\n"
457 printf(" (policy %s", pol);
1342 const char *policy = NULL, *newname = NULL; local
1496 policy = argv[optind++];
1499 "-%c requires a chain and a policy",
1720 ((policy != NULL && strcmp(policy, "DROP") == 0) ||
1945 ret = iptc_set_policy(chain, policy, c
[all...]
H A Dnft-shared.h228 char *policy; member in struct:nft_xt_cmd_parse
253 const char *chain, const char *policy,
H A Dxtables-eb.c262 { "policy" , required_argument, 0, 'P' },
435 "--policy -P chain target : change policy on chain to target\n"
741 const char *policy = NULL; local
787 case 'P': /* Define policy */
792 /* We allow -N chainname -P policy */
858 "No policy specified");
861 policy = argv[optind];
864 "Wrong policy '%s'",
870 "Unknown policy '
[all...]
/external/libcups/cups/
H A Dtls-darwin.c874 SecPolicyRef policy = NULL; /* Policy ref */ local
902 policy = SecPolicyCreateSSL(1, cfcommon_name);
907 if (!policy)
914 CFDictionaryAddValue(query, kSecMatchPolicy, policy);
959 if (policy)
960 CFRelease(policy);
1776 SecPolicyRef policy = NULL; /* Policy ref */ local
1789 policy = SecPolicyCreateSSL(1, cfcommon_name);
1791 if (!policy)
1793 DEBUG_puts("4http_cdsa_copy_server: Unable to create SSL policy
[all...]
/external/libnl/lib/
H A Dmsg.c209 * @arg policy validation policy
214 int maxtype, struct nla_policy *policy)
220 nlmsg_attrlen(nlh, hdrlen), policy);
242 * @arg policy validation policy
245 struct nla_policy *policy)
251 nlmsg_attrlen(nlh, hdrlen), maxtype, policy);
213 nlmsg_parse(struct nlmsghdr *nlh, int hdrlen, struct nlattr *tb[], int maxtype, struct nla_policy *policy) argument
244 nlmsg_validate(struct nlmsghdr *nlh, int hdrlen, int maxtype, struct nla_policy *policy) argument
/external/ltp/testcases/kernel/fs/fsx-linux/
H A Dfsx-linux.c404 prt("unknown policy");
411 void assign_fd_policy(char *policy) argument
413 if (!strcmp(policy, "random"))
415 else if (!strcmp(policy, "rotate"))
418 prt("unknown -I policy: '%s'\n", policy);
/external/oj-libjdwp/src/share/back/
H A DeventHelper.c486 suspendWithInvokeEnabled(jbyte policy, jthread thread) argument
490 if (policy == JDWP_SUSPEND_POLICY(ALL)) {
628 * policy could be processed by commandLoop() at one time. It was
636 * processing more than one event with a suspend-all policy. This is
639 * when an event with a suspend-all policy has been completed.
658 * policy, then prepare for either ThreadReferenceImpl.c: resume()
884 /* Return the combined suspend policy for the event set
891 jbyte *policy = arg; local
903 /* Expand running policy value if this policy demand
[all...]
/external/python/cpython3/Lib/test/test_email/
H A Dtest_headerregistry.py5 from email import policy namespace
141 self.assertEqual(h.fold(policy=policy.default), folded)
212 m = Message(policy=policy.default)
242 self.assertEqual(h.fold(policy=policy.default), folded)
769 self.assertEqual(h.fold(policy=policy.default), folded)
811 self.assertEqual(h.fold(policy
[all...]
/external/selinux/python/sepolicy/sepolicy/
H A D__init__.py93 # the setools policy handle
133 def policy(policy_file): function
157 raise ValueError(_("Failed to read %s policy file") % policy_file)
162 policy(policy_file)
276 enabled = bool(rule.qpol_symbol.is_enabled(rule.policy))
1102 def policy_xml(path="/usr/share/selinux/devel/policy.xml"):
1114 def gen_bool_dict(path="/usr/share/selinux/devel/policy.xml"):
1164 pkg_name = "selinux-policy"
/external/tensorflow/tensorflow/c/eager/
H A Dc_api.cc80 TFE_ContextOptions* options, TFE_ContextDevicePlacementPolicy policy) {
81 options->policy = policy;
128 TFE_Context* ctx, TFE_ContextDevicePlacementPolicy policy) {
130 ctx->thread_local_policies[std::this_thread::get_id()] = policy;
141 return ctx->policy;
523 // We are only here if the policy is warn or silent copies, so we should
79 TFE_ContextOptionsSetDevicePlacementPolicy( TFE_ContextOptions* options, TFE_ContextDevicePlacementPolicy policy) argument
127 TFE_ContextSetThreadLocalDevicePlacementPolicy( TFE_Context* ctx, TFE_ContextDevicePlacementPolicy policy) argument
/external/wpa_supplicant_8/hostapd/src/pae/
H A Dieee802_1x_kay.h224 enum macsec_policy policy; member in struct:ieee802_1x_kay
238 ieee802_1x_kay_init(struct ieee802_1x_kay_ctx *ctx, enum macsec_policy policy,
/external/wpa_supplicant_8/src/pae/
H A Dieee802_1x_kay.h224 enum macsec_policy policy; member in struct:ieee802_1x_kay
238 ieee802_1x_kay_init(struct ieee802_1x_kay_ctx *ctx, enum macsec_policy policy,
/external/wpa_supplicant_8/wpa_supplicant/src/pae/
H A Dieee802_1x_kay.h224 enum macsec_policy policy; member in struct:ieee802_1x_kay
238 ieee802_1x_kay_init(struct ieee802_1x_kay_ctx *ctx, enum macsec_policy policy,
/external/owasp/sanitizer/distrib/lib/
H A Dowasp-java-html-sanitizer.jarMETA-INF/ META-INF/MANIFEST.MF org/ org/owasp/ org/owasp/html/ org/owasp/html/AbstractTokenStream ...
/external/clang/lib/AST/
H A DTypePrinter.cpp1657 raw_ostream &OS, const PrintingPolicy &policy,
1662 TypePrinter(policy, Indentation).print(ty, qs, OS, PH);
1667 const PrintingPolicy &policy) {
1670 TypePrinter(policy).print(ty, qs, StrOS, buffer);
1656 print(const Type *ty, Qualifiers qs, raw_ostream &OS, const PrintingPolicy &policy, const Twine &PlaceHolder, unsigned Indentation) argument
1665 getAsStringInternal(const Type *ty, Qualifiers qs, std::string &buffer, const PrintingPolicy &policy) argument

Completed in 813 milliseconds

1234567891011