/external/libsepol/tests/ |
H A D | Makefile | 11 # In order to load source policies we need to link in the checkpolicy/checkmodule parser and util code. 12 # This is less than ideal, but it makes the tests easier to maintain by allowing source policies 24 m4support := $(wildcard policies/support/*.spt) 25 testsuites := $(wildcard policies/test-*) 29 policies := $(stdpol) $(mlspol) macro 31 all: $(EXE) $(policies) 32 policies: $(policies) 45 rm -f $(policies) 46 rm -f policies/tes [all...] |
H A D | test-linker.c | 48 const char *policies[NUM_POLICIES] = { variable 63 if (test_load_policy(&linkedbase, POLICY_BASE, mls, "test-linker", policies[BASEMOD])) 66 if (test_load_policy(&basenomods, POLICY_BASE, mls, "test-linker", policies[BASEMOD])) 77 if (test_load_policy(modules[i], POLICY_MOD, mls, "test-linker", policies[i]))
|
/external/openssl/crypto/x509/ |
H A D | x509_vpm.c | 81 if (param->policies) 83 sk_ASN1_OBJECT_pop_free(param->policies, ASN1_OBJECT_free); 84 param->policies = NULL; 190 if (test_x509_verify_param_copy(policies, NULL)) 192 if (!X509_VERIFY_PARAM_set1_policies(dest, src->policies)) 262 if (!param->policies) 264 param->policies = sk_ASN1_OBJECT_new_null(); 265 if (!param->policies) 268 if (!sk_ASN1_OBJECT_push(param->policies, policy)) 274 STACK_OF(ASN1_OBJECT) *policies) 273 X509_VERIFY_PARAM_set1_policies(X509_VERIFY_PARAM *param, STACK_OF(ASN1_OBJECT) *policies) argument [all...] |
H A D | x509_vfy.h | 175 STACK_OF(ASN1_OBJECT) *policies; /* Permissible policies */ member in struct:X509_VERIFY_PARAM_st 528 STACK_OF(ASN1_OBJECT) *policies);
|
H A D | x509_vfy.c | 380 /* If we get this far evaluate policies */ 1485 ctx->param->policies, ctx->param->flags);
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/x509/ |
H A D | CertificatePoliciesTest.java | 43 String[] policies = new String[] { 50 for (int i=0; i<policies.length; i++) { 52 new PolicyInformation(policies[i]);
|
/external/chromium/chrome/browser/policy/ |
H A D | file_based_policy_provider_unittest.cc | 39 DictionaryValue* policies = new DictionaryValue(); local 40 policies->SetBoolean(policy::key::kSyncDisabled, true); 44 EXPECT_CALL(*provider_delegate, Load()).WillOnce(Return(policies)); 73 DictionaryValue* policies = new DictionaryValue(); local 74 policies->SetBoolean(policy::key::kSyncDisabled, true); 75 EXPECT_CALL(*provider_delegate, Load()).WillOnce(Return(policies));
|
H A D | configuration_policy_provider.cc | 26 const DictionaryValue* policies, 32 if (policies->Get(i->name, &value) && value->IsType(i->value_type)) 41 const PolicyMap* policies, 46 const Value* value = policies->Get(i->policy_type); 25 ApplyPolicyValueTree( const DictionaryValue* policies, ConfigurationPolicyStoreInterface* store) argument 40 ApplyPolicyMap( const PolicyMap* policies, ConfigurationPolicyStoreInterface* store) argument
|
H A D | asynchronous_policy_provider_unittest.cc | 23 DictionaryValue* policies = new DictionaryValue(); local 24 policies->SetBoolean(policy::key::kSyncDisabled, true); 25 EXPECT_CALL(*delegate_, Load()).WillOnce(Return(policies));
|
H A D | configuration_policy_provider.h | 55 // |store| to apply specific policies. Returns true if the policy could be 66 void ApplyPolicyValueTree(const DictionaryValue* policies, 69 // Writes the configuration found in the already-decoded map |policies| to 71 void ApplyPolicyMap(const PolicyMap* policies,
|
/external/openssl/crypto/x509v3/ |
H A D | pcy_cache.c | 74 CERTIFICATEPOLICIES *policies, int crit) 81 if (sk_POLICYINFO_num(policies) == 0) 86 for (i = 0; i < sk_POLICYINFO_num(policies); i++) 88 policy = sk_POLICYINFO_value(policies, i); 119 sk_POLICYINFO_pop_free(policies, POLICYINFO_free); 149 * even if we don't have any policies. 175 * there is no point continuing because the valid policies will be 73 policy_cache_create(X509 *x, CERTIFICATEPOLICIES *policies, int crit) argument
|
/external/chromium/chrome/browser/chromeos/ |
H A D | plugin_selection_policy.cc | 68 map<string, Policy> policies; local 107 policies.insert(make_pair(last_plugin, policy)); 114 policies.insert(make_pair(last_plugin, policy)); 116 policies_.swap(policies);
|
/external/chromium/net/tools/testserver/ |
H A D | device_management.py | 11 enforced and recommended policies for the device and user scope, and a list 371 def GatherDevicePolicySettings(self, settings, policies): 372 '''Copies all the policies from a dictionary into a protobuf of type 377 policies: The source dictionary containing policies in JSON format. 388 if field.name in policies: 390 field_value = policies[field.name] 395 def GatherUserPolicySettings(self, settings, policies): 396 '''Copies all the policies from a dictionary into a protobuf of type 401 policies [all...] |
/external/chromium/net/base/ |
H A D | x509_certificate_nss.cc | 36 explicit ScopedCERTCertificatePolicies(CERTCertificatePolicies* policies) argument 37 : policies_(policies) {} 332 // If policy_oids is not NULL and num_policy_oids is positive, policies 541 CERTCertificatePolicies* policies = 544 return policies; 551 CERTCertificatePolicies* policies = DecodeCertPolicies(cert_handle); local 552 if (!policies) 554 ScopedCERTCertificatePolicies scoped_policies(policies); 555 CERTPolicyInfo* policy_info = policies->policyInfos[0]; 578 CERTCertificatePolicies* policies local [all...] |
H A D | x509_certificate_mac.cc | 296 // noErr, and stores the resultant array of SecPolicyRefs in |policies|. 298 ScopedCFTypeRef<CFArrayRef>* policies) { 315 // Manually add OCSP and CRL policies. If neither an OCSP or CRL policy is 365 policies->reset(policy_array); 297 CreateTrustPolicies(const std::string& hostname, int flags, ScopedCFTypeRef<CFArrayRef>* policies) argument
|
/external/apache-harmony/security/src/test/impl/java.injected/java/security/cert/ |
H A D | X509CertSelectorTest.java | 106 protected String[] policies = null; field in class:X509CertSelectorTest.TestCert 124 public TestCert(String[] policies) { argument 125 setPolicies(policies); 165 public void setPolicies(String[] policies) { argument 166 this.policies = policies; 418 if ("2.5.29.32".equals(oid) && (policies != null) 419 && (policies.length > 0)) { 423 for (int i=0; i<policies.length; i++) { 425 new PolicyInformation(policies[ [all...] |
/external/strace/ |
H A D | mem.c | 763 static const struct xlat policies[] = { variable in typeref:struct:xlat 844 printxval(policies, tcp->u_arg[2], "MPOL_???"); 857 printxval(policies, tcp->u_arg[0], "MPOL_???"); 874 printxval(policies, pol, "MPOL_???");
|
/external/openssl/include/openssl/ |
H A D | x509_vfy.h | 175 STACK_OF(ASN1_OBJECT) *policies; /* Permissible policies */ member in struct:X509_VERIFY_PARAM_st 528 STACK_OF(ASN1_OBJECT) *policies);
|
H A D | ts.h | 273 policies SEQUENCE OF PolicyInformation OPTIONAL 505 STACK_OF(ASN1_OBJECT) *policies; /* Acceptable policies. */ member in struct:TS_resp_ctx 506 ASN1_OBJECT *default_policy; /* It may appear in policies, too. */
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
H A D | CertPathValidatorUtilities.java | 557 ASN1Sequence policies = null; 560 policies = DERSequence.getInstance(getExtensionValue(cert, CERTIFICATE_POLICIES)); 564 throw new AnnotatedException("Certificate policies cannot be decoded.", e); 566 Enumeration e = policies.getObjects();
|
H A D | RFC3280CertPathUtilities.java | 944 ASN1Sequence policies = null; 947 policies = (ASN1Sequence)CertPathValidatorUtilities.getExtensionValue(cert, 953 "Certificate policies extension could not be decoded.", e, certPath, index); 955 Enumeration e = policies.getObjects(); 1139 throw new ExtCertPathValidatorException("Could not read certificate policies extension from certificate.", 1273 throw new ExtCertPathValidatorException("Could not read certificate policies extension from certificate.",
|
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
H A D | org.eclipse.osgi_3.6.1.R36x_v20100806.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
H A D | org.eclipse.osgi_3.6.2.R36x_v20101103.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |