/external/libsepol/tests/ |
Makefile | 11 # In order to load source policies we need to link in the checkpolicy/checkmodule parser and util code. 12 # This is less than ideal, but it makes the tests easier to maintain by allowing source policies 24 m4support := $(wildcard policies/support/*.spt) 25 testsuites := $(wildcard policies/test-*) 29 policies := $(stdpol) $(mlspol) macro 31 all: $(EXE) $(policies) 32 policies: $(policies) 45 rm -f $(policies) 46 rm -f policies/test-downgrade/policy.hi policies/test-downgrade/policy.l [all...] |
test-linker.c | 48 const char *policies[NUM_POLICIES] = { variable 63 if (test_load_policy(&linkedbase, POLICY_BASE, mls, "test-linker", policies[BASEMOD])) 66 if (test_load_policy(&basenomods, POLICY_BASE, mls, "test-linker", policies[BASEMOD])) 77 if (test_load_policy(modules[i], POLICY_MOD, mls, "test-linker", policies[i]))
|
/external/openssl/crypto/x509/ |
x509_vpm.c | 81 if (param->policies) 83 sk_ASN1_OBJECT_pop_free(param->policies, ASN1_OBJECT_free); 84 param->policies = NULL; 190 if (test_x509_verify_param_copy(policies, NULL)) 192 if (!X509_VERIFY_PARAM_set1_policies(dest, src->policies)) 262 if (!param->policies) 264 param->policies = sk_ASN1_OBJECT_new_null(); 265 if (!param->policies) 268 if (!sk_ASN1_OBJECT_push(param->policies, policy)) 274 STACK_OF(ASN1_OBJECT) *policies) [all...] |
x509_vfy.h | 175 STACK_OF(ASN1_OBJECT) *policies; /* Permissible policies */ member in struct:X509_VERIFY_PARAM_st 528 STACK_OF(ASN1_OBJECT) *policies);
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/x509/ |
CertificatePoliciesTest.java | 43 String[] policies = new String[] { local 50 for (int i=0; i<policies.length; i++) { 52 new PolicyInformation(policies[i]);
|
/external/chromium/chrome/browser/policy/ |
file_based_policy_provider_unittest.cc | 39 DictionaryValue* policies = new DictionaryValue(); local 40 policies->SetBoolean(policy::key::kSyncDisabled, true); 44 EXPECT_CALL(*provider_delegate, Load()).WillOnce(Return(policies)); 73 DictionaryValue* policies = new DictionaryValue(); local 74 policies->SetBoolean(policy::key::kSyncDisabled, true); 75 EXPECT_CALL(*provider_delegate, Load()).WillOnce(Return(policies));
|
configuration_policy_provider.cc | 26 const DictionaryValue* policies, 32 if (policies->Get(i->name, &value) && value->IsType(i->value_type)) 41 const PolicyMap* policies, 46 const Value* value = policies->Get(i->policy_type);
|
configuration_policy_provider.h | 55 // |store| to apply specific policies. Returns true if the policy could be 66 void ApplyPolicyValueTree(const DictionaryValue* policies, 69 // Writes the configuration found in the already-decoded map |policies| to 71 void ApplyPolicyMap(const PolicyMap* policies,
|
asynchronous_policy_provider_unittest.cc | 23 DictionaryValue* policies = new DictionaryValue(); local 24 policies->SetBoolean(policy::key::kSyncDisabled, true); 25 EXPECT_CALL(*delegate_, Load()).WillOnce(Return(policies));
|
/packages/apps/Email/emailcommon/src/com/android/emailcommon/service/ |
IPolicyService.aidl | 21 boolean isActive(in Policy policies);
|
PolicyServiceProxy.java | 99 public static boolean isActive(Context context, Policy policies) { 101 return new PolicyServiceProxy(context).isActive(policies);
|
/frameworks/base/core/java/android/net/ |
INetworkPolicyManager.aidl | 32 /** Control UID policies. */ 42 /** Control network policies atomically. */ 43 void setNetworkPolicies(in NetworkPolicy[] policies);
|
NetworkPolicyManager.java | 118 public void setNetworkPolicies(NetworkPolicy[] policies) { 120 mService.setNetworkPolicies(policies);
|
/external/openssl/crypto/x509v3/ |
pcy_cache.c | 74 CERTIFICATEPOLICIES *policies, int crit) 81 if (sk_POLICYINFO_num(policies) == 0) 86 for (i = 0; i < sk_POLICYINFO_num(policies); i++) 88 policy = sk_POLICYINFO_value(policies, i); 119 sk_POLICYINFO_pop_free(policies, POLICYINFO_free); 149 * even if we don't have any policies. 175 * there is no point continuing because the valid policies will be
|
/external/chromium/chrome/browser/chromeos/ |
plugin_selection_policy.cc | 68 map<string, Policy> policies; local 107 policies.insert(make_pair(last_plugin, policy)); 114 policies.insert(make_pair(last_plugin, policy)); 116 policies_.swap(policies);
|
/packages/apps/Settings/src/com/android/settings/net/ |
NetworkPolicyEditor.java | 48 * about which policies can coexist. This editor offers thread safety when 52 // TODO: be more robust when missing policies from service 64 final NetworkPolicy[] policies = mPolicyManager.getNetworkPolicies(); local 68 for (NetworkPolicy policy : policies) { 82 // force combine any split policies when disabled 87 // when we cleaned policies above, write back changes 93 final NetworkPolicy[] policies = mPolicies.toArray(new NetworkPolicy[mPolicies.size()]); local 97 write(policies); 103 public void write(NetworkPolicy[] policies) { 104 mPolicyManager.setNetworkPolicies(policies); [all...] |
/libcore/luni/src/main/java/java/security/cert/ |
X509CertSelector.java | 69 private Set<String> policies; field in class:X509CertSelector 855 * some policies in its policy extension. 857 * @param policies 863 public void setPolicy(Set<String> policies) throws IOException { 864 if (policies == null) { 865 this.policies = null; 868 HashSet<String> pols = new HashSet<String>(policies.size()); 869 for (String certPolicyId : policies) { 873 this.policies = Collections.unmodifiableSet(pols); 881 * policies in its policy extension [all...] |
/packages/apps/Settings/src/com/android/settings/ |
DeviceAdminAdd.java | 182 // Nothing changed (or policies were removed) - return immediately 324 ArrayList<DeviceAdminInfo.PolicyInfo> policies = mDeviceAdmin.getUsedPolicies(); local 325 for (int i=0; i<policies.size(); i++) { 326 DeviceAdminInfo.PolicyInfo pi = policies.get(i); 342 ArrayList<DeviceAdminInfo.PolicyInfo> policies = mDeviceAdmin.getUsedPolicies(); local 343 for (int i=0; i<policies.size(); i++) { 344 DeviceAdminInfo.PolicyInfo pi = policies.get(i);
|
/external/chromium/net/tools/testserver/ |
device_management.py | 11 enforced and recommended policies for the device and user scope, and a list 371 def GatherDevicePolicySettings(self, settings, policies): 372 '''Copies all the policies from a dictionary into a protobuf of type 377 policies: The source dictionary containing policies in JSON format. 388 if field.name in policies: 390 field_value = policies[field.name] 395 def GatherUserPolicySettings(self, settings, policies): 396 '''Copies all the policies from a dictionary into a protobuf of type 401 policies: The source: a dictionary containing policies under key [all...] |
/external/chromium/net/base/ |
x509_certificate_nss.cc | 36 explicit ScopedCERTCertificatePolicies(CERTCertificatePolicies* policies) 37 : policies_(policies) {} 332 // If policy_oids is not NULL and num_policy_oids is positive, policies 541 CERTCertificatePolicies* policies = 544 return policies; 551 CERTCertificatePolicies* policies = DecodeCertPolicies(cert_handle); local 552 if (!policies) 554 ScopedCERTCertificatePolicies scoped_policies(policies); 555 CERTPolicyInfo* policy_info = policies->policyInfos[0]; 578 CERTCertificatePolicies* policies = DecodeCertPolicies(cert_handle) local [all...] |
/external/apache-harmony/security/src/test/impl/java.injected/java/security/cert/ |
X509CertSelectorTest.java | 106 protected String[] policies = null; field in class:X509CertSelectorTest.TestCert 124 public TestCert(String[] policies) { 125 setPolicies(policies); 165 public void setPolicies(String[] policies) { 166 this.policies = policies; 418 if ("2.5.29.32".equals(oid) && (policies != null) 419 && (policies.length > 0)) { 420 // Certificate Policies Extension (as specified in rfc 3280) 423 for (int i=0; i<policies.length; i++) 2282 String[] policies = new String[] { local 2719 String[] policies = new String[] { local 2784 String[] policies = new String[] { local 2879 String[] policies = new String[] { local [all...] |
/external/webkit/LayoutTests/fast/dom/Geolocation/script-tests/ |
disconnected-frame-permission-denied.js | 4 // same code path for both preemptive and non-preemtive permissions policies.
|
/external/strace/ |
mem.c | 763 static const struct xlat policies[] = { variable in typeref:struct:xlat 844 printxval(policies, tcp->u_arg[2], "MPOL_???"); 857 printxval(policies, tcp->u_arg[0], "MPOL_???"); 874 printxval(policies, pol, "MPOL_???");
|
/libcore/luni/src/test/java/tests/security/cert/ |
X509CertSelectorTest.java | 1585 protected String[] policies = null; field in class:X509CertSelectorTest.TestCert [all...] |
/external/openssl/include/openssl/ |
x509_vfy.h | 175 STACK_OF(ASN1_OBJECT) *policies; /* Permissible policies */ member in struct:X509_VERIFY_PARAM_st 528 STACK_OF(ASN1_OBJECT) *policies);
|