/external/dbus/bus/ |
selinux.c | 27 #include "policy.h" 113 * On a policy reload we need to reparse the SELinux configuration file, since 138 * Create thread to notify the AVC of enforcing and policy reload 280 _dbus_warn ("Failed to add policy reload callback: %s\n", 344 * Determine if the SELinux security policy allows the given sender 357 * @returns #TRUE if security policy allows the send. 377 _dbus_verbose ("SELinux denying due to security policy.\n"); 841 * Get the SELinux policy root. This is used to find the D-Bus 842 * specific config file within the policy.
|
/external/icu4c/data/unidata/ |
NormalizationCorrections.txt | 10 # The normalization stabilization policy of the Unicode
|
/external/iptables/ |
Android.mk | 53 PF_EXT_SLIB+=owner physdev pkttype policy realm sctp standard state tcp
|
/external/opencore/pvmi/content_policy_manager/plugins/common/include/ |
pvmf_cpmplugin_access_interface_factory.h | 50 * Base Content Access Interface for all Content Policy Manager Plugins
|
pvmf_cpmplugin_authentication_interface.h | 38 * Authentication interface for all Content Policy Manager Plugins
|
pvmf_cpmplugin_authorization_interface.h | 41 * Authorization interface for all Content Policy Manager Plugins
|
pvmf_cpmplugin_decryption_context.h | 37 * Metering interface for all Content Policy Manager Plugins
|
/external/openssl/apps/ |
openssl-vms.cnf | 76 policy = policy_match 78 # For the CA policy 87 # For the 'anything' policy 313 proxyCertInfo=critical,language:id-ppl-anyLanguage,pathlen:3,policy:foo
|
openssl.cnf | 76 policy = policy_match 78 # For the CA policy 87 # For the 'anything' policy 313 proxyCertInfo=critical,language:id-ppl-anyLanguage,pathlen:3,policy:foo
|
/external/webkit/WebCore/platform/android/ |
ClipboardAndroid.h | 40 ClipboardAndroid(ClipboardAccessPolicy policy, bool isForDragging);
|
/external/webkit/WebKit/chromium/public/ |
WebSecurityPolicy.h | 53 // Support for whitelisting access to origins beyond the same-origin policy.
|
/external/webkit/WebKit/mac/Misc/ |
WebKitErrorsPrivate.h | 37 @abstract Policy errors - Pending Public API Review
|
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
pmksa_cache.h | 36 * network configuration (e.g., a specific SSID and security policy).
|
/frameworks/base/cmds/system_server/library/ |
system_init.cpp | 85 // Start the audio policy service
|
/hardware/ti/wlan/wl1271/stad/src/Data_link/ |
Ctrl.c | 173 /* Set short/long retry for all ACs plus one policy for management packets */ 356 * the AP support and the Policy rates (Enabled/Disabled rates) 372 /* 2. Incase there are no mutual rates: ignor Policy Rate Settings (use only AP Rates) */ 389 * If TSRS is defined to specific AC, the policy is derived from it, 400 TI_UINT32 uPolicyRateMask; /* policy rates */ 410 /* 1. If a special rate set is defined for this AC, use its related policy */ 427 TRACE2(pCtrlData->hReport, REPORT_SEVERITY_INFORMATION, "ctrlData_setTxRatePolicies: AC %d, rate-policy 0x%x", ac, uEnabledHwRatesMask); 436 /* Add a specific policy for management packets, which uses only the lowest supported rate */ 762 /* For each AC, get current Tx-rate policy for Data and for Mgmt packets and update the TxCtrl module. */ [all...] |
/system/wlan/ti/wilink_6_1/stad/src/Data_link/ |
Ctrl.c | 173 /* Set short/long retry for all ACs plus one policy for management packets */ 356 * the AP support and the Policy rates (Enabled/Disabled rates) 372 /* 2. Incase there are no mutual rates: ignor Policy Rate Settings (use only AP Rates) */ 389 * If TSRS is defined to specific AC, the policy is derived from it, 400 TI_UINT32 uPolicyRateMask; /* policy rates */ 410 /* 1. If a special rate set is defined for this AC, use its related policy */ 427 TRACE2(pCtrlData->hReport, REPORT_SEVERITY_INFORMATION, "ctrlData_setTxRatePolicies: AC %d, rate-policy 0x%x", ac, uEnabledHwRatesMask); 436 /* Add a specific policy for management packets, which uses only the lowest supported rate */ 762 /* For each AC, get current Tx-rate policy for Data and for Mgmt packets and update the TxCtrl module. */ [all...] |
/dalvik/libcore/security/src/main/files/cacerts/ |
7d3cd826.0 | 6 Issuer: L=ValiCert Validation Network, O=ValiCert, Inc., OU=ValiCert Class 3 Policy Validation Authority, CN=http://www.valicert.com//emailAddress=info@valicert.com 10 Subject: L=ValiCert Validation Network, O=ValiCert, Inc., OU=ValiCert Class 3 Policy Validation Authority, CN=http://www.valicert.com//emailAddress=info@valicert.com
|
bcdd5959.0 | 6 Issuer: L=ValiCert Validation Network, O=ValiCert, Inc., OU=ValiCert Class 2 Policy Validation Authority, CN=http://www.valicert.com//emailAddress=info@valicert.com 10 Subject: L=ValiCert Validation Network, O=ValiCert, Inc., OU=ValiCert Class 2 Policy Validation Authority, CN=http://www.valicert.com//emailAddress=info@valicert.com
|
f4996e82.0 | 6 Issuer: L=ValiCert Validation Network, O=ValiCert, Inc., OU=ValiCert Class 1 Policy Validation Authority, CN=http://www.valicert.com//emailAddress=info@valicert.com 10 Subject: L=ValiCert Validation Network, O=ValiCert, Inc., OU=ValiCert Class 1 Policy Validation Authority, CN=http://www.valicert.com//emailAddress=info@valicert.com
|
/dalvik/libcore/security/src/main/java/org/apache/harmony/security/ |
UnresolvedPrincipal.java | 35 * policy may grant permissions depending on what Principals own the current 36 * execution thread. So the policy refers to this model definition of
|
/dalvik/vm/jdwp/ |
JdwpConstants.c | 204 const char* dvmJdwpSuspendPolicyStr(enum JdwpSuspendPolicy policy) 206 switch (policy) {
|
/development/pdk/docs/compatibility/ |
overview.jd | 47 <li>The Compatilbility Definition Document, representing the "policy" 58 Definition Document (CDD) will be provided. The CDD represents the "policy"
|
/external/bluetooth/bluez/tools/ |
hciconfig.8 | 40 Other than the basic info, print features, packet type, link policy, link mode, 261 sets link policy to the default behaviour of remaining slave and not accepting
|
hcitool.1 | 158 displays link policy settings for the connection to the device with Bluetooth address 162 is given, sets the link policy settings for that connection to
|
/external/ipsec-tools/src/libipsec/ |
key_debug.c | 487 printf("kdebug_sadb_x_policy: wrong policy struct.\n"); 492 printf("invalid ipsec policy length\n"); 503 panic("kdebug_sadb_x_policy: wrong policy struct.\n"); 570 printf("secpolicy{ refcnt=%u state=%u policy=%u\n", 571 sp->refcnt, sp->state, sp->policy); 575 switch (sp->policy) { 603 printf("kdebug_secpolicy: Invalid policy found. %d\n", 604 sp->policy);
|