HomeSort by relevance Sort by last modified time
    Searched refs:policies (Results 1 - 25 of 49) sorted by null

1 2

  /external/libsepol/tests/
Makefile 11 # In order to load source policies we need to link in the checkpolicy/checkmodule parser and util code.
12 # This is less than ideal, but it makes the tests easier to maintain by allowing source policies
24 m4support := $(wildcard policies/support/*.spt)
25 testsuites := $(wildcard policies/test-*)
29 policies := $(stdpol) $(mlspol) macro
31 all: $(EXE) $(policies)
32 policies: $(policies)
45 rm -f $(policies)
46 rm -f policies/test-downgrade/policy.hi policies/test-downgrade/policy.l
    [all...]
test-linker.c 48 const char *policies[NUM_POLICIES] = { variable
63 if (test_load_policy(&linkedbase, POLICY_BASE, mls, "test-linker", policies[BASEMOD]))
66 if (test_load_policy(&basenomods, POLICY_BASE, mls, "test-linker", policies[BASEMOD]))
77 if (test_load_policy(modules[i], POLICY_MOD, mls, "test-linker", policies[i]))
  /external/openssl/crypto/x509/
x509_vpm.c 81 if (param->policies)
83 sk_ASN1_OBJECT_pop_free(param->policies, ASN1_OBJECT_free);
84 param->policies = NULL;
190 if (test_x509_verify_param_copy(policies, NULL))
192 if (!X509_VERIFY_PARAM_set1_policies(dest, src->policies))
262 if (!param->policies)
264 param->policies = sk_ASN1_OBJECT_new_null();
265 if (!param->policies)
268 if (!sk_ASN1_OBJECT_push(param->policies, policy))
274 STACK_OF(ASN1_OBJECT) *policies)
    [all...]
x509_vfy.h 175 STACK_OF(ASN1_OBJECT) *policies; /* Permissible policies */ member in struct:X509_VERIFY_PARAM_st
528 STACK_OF(ASN1_OBJECT) *policies);
  /external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/x509/
CertificatePoliciesTest.java 43 String[] policies = new String[] { local
50 for (int i=0; i<policies.length; i++) {
52 new PolicyInformation(policies[i]);
  /external/chromium/chrome/browser/policy/
file_based_policy_provider_unittest.cc 39 DictionaryValue* policies = new DictionaryValue(); local
40 policies->SetBoolean(policy::key::kSyncDisabled, true);
44 EXPECT_CALL(*provider_delegate, Load()).WillOnce(Return(policies));
73 DictionaryValue* policies = new DictionaryValue(); local
74 policies->SetBoolean(policy::key::kSyncDisabled, true);
75 EXPECT_CALL(*provider_delegate, Load()).WillOnce(Return(policies));
configuration_policy_provider.cc 26 const DictionaryValue* policies,
32 if (policies->Get(i->name, &value) && value->IsType(i->value_type))
41 const PolicyMap* policies,
46 const Value* value = policies->Get(i->policy_type);
configuration_policy_provider.h 55 // |store| to apply specific policies. Returns true if the policy could be
66 void ApplyPolicyValueTree(const DictionaryValue* policies,
69 // Writes the configuration found in the already-decoded map |policies| to
71 void ApplyPolicyMap(const PolicyMap* policies,
asynchronous_policy_provider_unittest.cc 23 DictionaryValue* policies = new DictionaryValue(); local
24 policies->SetBoolean(policy::key::kSyncDisabled, true);
25 EXPECT_CALL(*delegate_, Load()).WillOnce(Return(policies));
  /packages/apps/Email/emailcommon/src/com/android/emailcommon/service/
IPolicyService.aidl 21 boolean isActive(in Policy policies);
PolicyServiceProxy.java 99 public static boolean isActive(Context context, Policy policies) {
101 return new PolicyServiceProxy(context).isActive(policies);
  /frameworks/base/core/java/android/net/
INetworkPolicyManager.aidl 32 /** Control UID policies. */
42 /** Control network policies atomically. */
43 void setNetworkPolicies(in NetworkPolicy[] policies);
NetworkPolicyManager.java 118 public void setNetworkPolicies(NetworkPolicy[] policies) {
120 mService.setNetworkPolicies(policies);
  /external/openssl/crypto/x509v3/
pcy_cache.c 74 CERTIFICATEPOLICIES *policies, int crit)
81 if (sk_POLICYINFO_num(policies) == 0)
86 for (i = 0; i < sk_POLICYINFO_num(policies); i++)
88 policy = sk_POLICYINFO_value(policies, i);
119 sk_POLICYINFO_pop_free(policies, POLICYINFO_free);
149 * even if we don't have any policies.
175 * there is no point continuing because the valid policies will be
  /external/chromium/chrome/browser/chromeos/
plugin_selection_policy.cc 68 map<string, Policy> policies; local
107 policies.insert(make_pair(last_plugin, policy));
114 policies.insert(make_pair(last_plugin, policy));
116 policies_.swap(policies);
  /packages/apps/Settings/src/com/android/settings/net/
NetworkPolicyEditor.java 48 * about which policies can coexist. This editor offers thread safety when
52 // TODO: be more robust when missing policies from service
64 final NetworkPolicy[] policies = mPolicyManager.getNetworkPolicies(); local
68 for (NetworkPolicy policy : policies) {
82 // force combine any split policies when disabled
87 // when we cleaned policies above, write back changes
93 final NetworkPolicy[] policies = mPolicies.toArray(new NetworkPolicy[mPolicies.size()]); local
97 write(policies);
103 public void write(NetworkPolicy[] policies) {
104 mPolicyManager.setNetworkPolicies(policies);
    [all...]
  /libcore/luni/src/main/java/java/security/cert/
X509CertSelector.java 69 private Set<String> policies; field in class:X509CertSelector
855 * some policies in its policy extension.
857 * @param policies
863 public void setPolicy(Set<String> policies) throws IOException {
864 if (policies == null) {
865 this.policies = null;
868 HashSet<String> pols = new HashSet<String>(policies.size());
869 for (String certPolicyId : policies) {
873 this.policies = Collections.unmodifiableSet(pols);
881 * policies in its policy extension
    [all...]
  /packages/apps/Settings/src/com/android/settings/
DeviceAdminAdd.java 182 // Nothing changed (or policies were removed) - return immediately
324 ArrayList<DeviceAdminInfo.PolicyInfo> policies = mDeviceAdmin.getUsedPolicies(); local
325 for (int i=0; i<policies.size(); i++) {
326 DeviceAdminInfo.PolicyInfo pi = policies.get(i);
342 ArrayList<DeviceAdminInfo.PolicyInfo> policies = mDeviceAdmin.getUsedPolicies(); local
343 for (int i=0; i<policies.size(); i++) {
344 DeviceAdminInfo.PolicyInfo pi = policies.get(i);
  /external/chromium/net/tools/testserver/
device_management.py 11 enforced and recommended policies for the device and user scope, and a list
371 def GatherDevicePolicySettings(self, settings, policies):
372 '''Copies all the policies from a dictionary into a protobuf of type
377 policies: The source dictionary containing policies in JSON format.
388 if field.name in policies:
390 field_value = policies[field.name]
395 def GatherUserPolicySettings(self, settings, policies):
396 '''Copies all the policies from a dictionary into a protobuf of type
401 policies: The source: a dictionary containing policies under key
    [all...]
  /external/chromium/net/base/
x509_certificate_nss.cc 36 explicit ScopedCERTCertificatePolicies(CERTCertificatePolicies* policies)
37 : policies_(policies) {}
332 // If policy_oids is not NULL and num_policy_oids is positive, policies
541 CERTCertificatePolicies* policies =
544 return policies;
551 CERTCertificatePolicies* policies = DecodeCertPolicies(cert_handle); local
552 if (!policies)
554 ScopedCERTCertificatePolicies scoped_policies(policies);
555 CERTPolicyInfo* policy_info = policies->policyInfos[0];
578 CERTCertificatePolicies* policies = DecodeCertPolicies(cert_handle) local
    [all...]
  /external/apache-harmony/security/src/test/impl/java.injected/java/security/cert/
X509CertSelectorTest.java 106 protected String[] policies = null; field in class:X509CertSelectorTest.TestCert
124 public TestCert(String[] policies) {
125 setPolicies(policies);
165 public void setPolicies(String[] policies) {
166 this.policies = policies;
418 if ("2.5.29.32".equals(oid) && (policies != null)
419 && (policies.length > 0)) {
420 // Certificate Policies Extension (as specified in rfc 3280)
423 for (int i=0; i<policies.length; i++)
2282 String[] policies = new String[] { local
2719 String[] policies = new String[] { local
2784 String[] policies = new String[] { local
2879 String[] policies = new String[] { local
    [all...]
  /external/webkit/LayoutTests/fast/dom/Geolocation/script-tests/
disconnected-frame-permission-denied.js 4 // same code path for both preemptive and non-preemtive permissions policies.
  /external/strace/
mem.c 763 static const struct xlat policies[] = { variable in typeref:struct:xlat
844 printxval(policies, tcp->u_arg[2], "MPOL_???");
857 printxval(policies, tcp->u_arg[0], "MPOL_???");
874 printxval(policies, pol, "MPOL_???");
  /libcore/luni/src/test/java/tests/security/cert/
X509CertSelectorTest.java 1585 protected String[] policies = null; field in class:X509CertSelectorTest.TestCert
    [all...]
  /external/openssl/include/openssl/
x509_vfy.h 175 STACK_OF(ASN1_OBJECT) *policies; /* Permissible policies */ member in struct:X509_VERIFY_PARAM_st
528 STACK_OF(ASN1_OBJECT) *policies);

Completed in 1678 milliseconds

1 2