/libcore/luni/src/main/java/java/security/ |
PolicySpi.java | 21 * Represents the Service Provider Interface (SPI) for java.security.Policy 24 * <p>If there is any class that wants to provide a Policy implementation, all 28 * Policy.Paramters implementation acts as an input parameter.If the 29 * Policy.Paramters input cannot by understood by the constructor, an 39 * Answers if the policy has granted a Permission to a 54 * Refreshes/reloads the policy configuration. The behavior of this method 56 * file-based policy will cause the file to be re-read. 59 * should be overridden if a refresh operation is supported by the policy 72 * Policy.UNSUPPORTED_EMPTY_COLLECTION object. This method can be overridden 73 * if the policy implementation can return a set of permissions granted to [all...] |
Policy.java | 27 * {@code Policy} is the common super type of classes which represent a system 28 * security policy. The {@code Policy} specifies which permissions apply to 31 * The system policy can be changed by setting the {@code 'policy.provider'} 33 * the fully qualified class name of the desired {@code Policy}. 35 * Only one instance of a {@code Policy} is active at any time. 37 public abstract class Policy { 39 // Key to security properties, defining default policy provider. 40 private static final String POLICY_PROVIDER = "policy.provider" [all...] |
ProtectionDomain.java | 56 * The policy will not be consulted by access checks against this {@code 86 * against this protection domain, the permissions defined by the policy are 90 * performed, the policy and the provided permission collection are checked. 184 * , the specified permission is checked against the policy and the 193 // First, test with the Policy, as the default Policy.implies() 197 && Policy.getAccessiblePolicy().implies(this, permission)) { 203 // or Policy.implies() did not check for static permissions 246 if (Policy.isSet()) { 248 perms = Policy.getAccessiblePolicy().getPermissions(this) [all...] |
/frameworks/base/tools/preload/ |
Policy.java | 22 * Policy that governs which classes are preloaded. 24 public class Policy { 29 private Policy() {}
|
Android.mk | 10 Policy.java \
|
WritePreloadedClassFile.java | 58 new FileOutputStream(Policy.PRELOADED_CLASS_FILE), 82 if (!Policy.isPreloadable(loadedClass)) { 99 if (proc.fromZygote() && !Policy.isService(proc.name)) { 139 = Policy.isPreloadable(operation.loadedClass); 152 return Policy.isPreloadable(clazz)
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
PolicyTest.java | 43 import java.security.Policy; 51 @TestTargetClass(Policy.class) 53 * Tests for <code>Policy</code> 57 public static final String JAVA_SECURITY_POLICY = "java.security.policy"; 64 * @tests constructor Policy() 71 method = "Policy", 92 assertTrue(tp instanceof Policy); 107 public static class TestProvider extends Policy { 135 TestProvider policy = new TestProvider(); local 136 policy.pc = sp.newPermissionCollection() 221 Policy policy = Policy.getPolicy(); local [all...] |
ProtectionDomainTest.java | 38 import java.security.Policy; 237 * policy. 246 TestPolicy policy = new TestPolicy(); local 247 // null set of permissions [must] force the PD to use Policy - for 250 policy.setTrackPD(pd); 252 Policy.setPolicy(policy); 255 Policy.setPolicy(null); 257 assertFalse(policy.getPdTracked()); 262 * policy 271 TestPolicy policy = new TestPolicy(); local [all...] |
/external/chromium/net/base/ |
x509_certificate.cc | 94 X509Certificate::Policy::Judgment X509Certificate::Policy::Check( 111 // We don't have a policy for this cert. 115 void X509Certificate::Policy::Allow(X509Certificate* cert) { 121 void X509Certificate::Policy::Deny(X509Certificate* cert) { 127 bool X509Certificate::Policy::HasAllowedCert() const { 131 bool X509Certificate::Policy::HasDeniedCert() const {
|
x509_certificate_unittest.cc | 363 TEST(X509CertificateTest, Policy) { 370 X509Certificate::Policy policy; local 372 EXPECT_EQ(policy.Check(google_cert.get()), X509Certificate::Policy::UNKNOWN); 373 EXPECT_EQ(policy.Check(webkit_cert.get()), X509Certificate::Policy::UNKNOWN); 374 EXPECT_FALSE(policy.HasAllowedCert()); 375 EXPECT_FALSE(policy.HasDeniedCert()); 377 policy.Allow(google_cert.get()) [all...] |
x509_certificate.h | 96 class Policy { 98 // The judgments this policy can reach. 100 // We don't have policy information for this certificate. 110 // Returns the judgment this policy makes about this certificate. 113 // Causes the policy to allow this certificate. 116 // Causes the policy to deny this certificate. 119 // Returns true if this policy has allowed at least one certificate. 122 // Returns true if this policy has denied at least one certificate.
|
/libcore/luni/src/test/java/org/apache/harmony/luni/tests/java/lang/ |
ClassLoaderTest.java | 24 import java.security.Policy; 41 Policy back = Policy.getPolicy(); 43 Policy.setPolicy(plc); 54 Policy.setPolicy(back); 236 class DynamicPolicy extends Policy {
|
/libcore/luni/src/main/java/org/apache/harmony/luni/util/ |
PriviAction.java | 22 import java.security.Policy; 66 * Creates a PrivilegedAction to get the current security policy object. 68 * @see Policy#getPolicy 133 return (T)Policy.getPolicy();
|
/frameworks/base/policy/src/com/android/internal/policy/impl/ |
Policy.java | 17 package com.android.internal.policy.impl; 22 import com.android.internal.policy.IPolicy; 23 import com.android.internal.policy.impl.PhoneLayoutInflater; 24 import com.android.internal.policy.impl.PhoneWindow; 25 import com.android.internal.policy.impl.PhoneWindowManager; 31 // Simple implementation of the policy interface that spawns the right 33 public class Policy implements IPolicy { 37 "com.android.internal.policy.impl.PhoneLayoutInflater", 38 "com.android.internal.policy.impl.PhoneWindow", 39 "com.android.internal.policy.impl.PhoneWindow$1" [all...] |
/libcore/luni/src/test/java/tests/api/java/util/concurrent/ |
JSR166TestCase.java | 102 // Policy.setPolicy(permissivePolicy()); 397 * Runs Runnable r with a security policy that permits precisely 407 Policy savedPolicy = Policy.getPolicy(); 409 Policy.setPolicy(permissivePolicy()); 414 Policy.setPolicy(savedPolicy); 417 Policy savedPolicy = Policy.getPolicy(); 418 AdjustablePolicy policy = new AdjustablePolicy(permissions); local 419 Policy.setPolicy(policy) [all...] |
/libcore/dalvik/src/main/java/dalvik/system/ |
BlockGuard.java | 53 public interface Policy { 70 * Returns the policy bitmask, for shipping over Binder calls 71 * to remote threads/processes and reinstantiating the policy 104 return "policy=" + mPolicyState + " violation=" + mPolicyViolated; 109 * The default, permissive policy that doesn't prevent any operations. 111 public static Policy LAX_POLICY = new Policy() { 120 private static ThreadLocal<Policy> threadPolicy = new ThreadLocal<Policy>() { 121 @Override protected Policy initialValue() [all...] |
/libcore/luni/src/main/java/org/apache/harmony/security/fortress/ |
DefaultPolicy.java | 31 import java.security.Policy; 44 * Default Policy implementation based on policy configuration files. This 65 * <i>grant </i> entries of the file. The policy file can contain any number of 88 * </i> fields does not matter. The policy file can contain any number of grant 100 * The policy content may be parameterized via property expansion. Namely, 105 * policy file. However, this feature is controlled by security properties and 106 * should be turned on by setting "policy.expandProperties" property 113 * The policy also supports generalized expansion in permissions names, of 130 * This implementation is thread-safe. The policy caches sets of calculate [all...] |
/device/sample/apps/SampleEmailPolicy/ |
Android.mk | 15 # This is the makefile for the Email Policy package contained elsewhere in this sample.
|
/external/ppp/pppd/plugins/radius/etc/ |
dictionary.microsoft | 15 ATTRIBUTE MS-MPPE-Encryption-Policy 7 string Microsoft
|
/frameworks/base/core/java/android/os/ |
StrictMode.java | 114 // Thread-policy: 131 // Process-policy: 144 // Used for both process and thread policy: 182 * {@link StrictMode} policy applied to a certain thread. 184 * <p>The policy is enabled by {@link #setThreadPolicy}. The current policy 194 * The default, lax policy which doesn't catch anything. 221 * StrictMode.VmPolicy policy = new StrictMode.VmPolicy.Builder() 225 * StrictMode.setVmPolicy(policy); 244 public Builder(ThreadPolicy policy) { 539 BlockGuard.Policy policy = BlockGuard.getThreadPolicy(); local 1070 BlockGuard.Policy policy = BlockGuard.getThreadPolicy(); local 1104 public final int policy; field in class:StrictMode.ViolationInfo [all...] |
/external/webkit/WebKit/qt/tests/qwebframe/ |
tst_qwebframe.cpp | 69 Q_ENUMS(Policy Strategy) 73 enum Policy { 247 Q_INVOKABLE void myInvokableWithEnumArg(Policy policy) { 249 m_actuals << policy; local 251 Q_INVOKABLE void myInvokableWithQualifiedEnumArg(MyQObject::Policy policy) { 253 m_actuals << policy; local 255 Q_INVOKABLE Policy myInvokableReturningEnum() { 259 Q_INVOKABLE MyQObject::Policy myInvokableReturningQualifiedEnum() [all...] |
/build/tools/droiddoc/templates-pdk/ |
customization.cs | 174 <a href="http://www.android.com/privacy.html">Privacy Policy</a> -
|
/packages/experimental/StrictModeTest/src/com/android/strictmodetest/ |
StrictModeActivity.java | 130 BlockGuard.Policy policy = BlockGuard.getThreadPolicy(); 132 policy.onWriteToDisk(); 246 int policy; 248 policy = mLocalServiceConn.stub.getThreadPolicy(); 249 Log.d(TAG, "local service policy: " + policy); 250 policy = mRemoteServiceConn.stub.getThreadPolicy(); 251 Log.d(TAG, "remote service policy: " + policy); [all...] |
/build/tools/droiddoc/templates-sdk/ |
customization.cs | 244 <a href="http://www.android.com/privacy.html">Privacy Policy</a> -
|
/prebuilt/common/eclipse/ |
org.eclipse.jface_3.4.2.M20090107-0800.jar | |