HomeSort by relevance Sort by last modified time
    Searched refs:policy (Results 101 - 125 of 1172) sorted by null

1 2 3 45 6 7 8 91011>>

  /system/update_engine/
system_state.h 34 namespace policy { namespace
38 } // namespace policy
68 // Sets or gets the latest device policy.
69 virtual void set_device_policy(const policy::DevicePolicy* device_policy) = 0;
70 virtual const policy::DevicePolicy* device_policy() = 0;
  /hardware/qcom/audio/legacy/alsa_sound/
audio_policy_hal.cpp 45 struct audio_policy policy; member in struct:android_audio_legacy::qcom_audio_policy
340 qap->policy.set_device_connection_state = ap_set_device_connection_state;
341 qap->policy.get_device_connection_state = ap_get_device_connection_state;
342 qap->policy.set_phone_state = ap_set_phone_state;
343 qap->policy.set_ringer_mode = ap_set_ringer_mode;
344 qap->policy.set_force_use = ap_set_force_use;
345 qap->policy.get_force_use = ap_get_force_use;
346 qap->policy.set_can_mute_enforced_audible =
348 qap->policy.init_check = ap_init_check;
349 qap->policy.get_output = ap_get_output
    [all...]
  /cts/hostsidetests/devicepolicy/app/DeviceOwner/src/com/android/cts/deviceowner/
SystemUpdatePolicyTest.java 117 private void testPolicy(SystemUpdatePolicy policy) {
118 mDevicePolicyManager.setSystemUpdatePolicy(getWho(), policy); local
121 if (policy == null) {
125 assertEquals(policy.toString(), newPolicy.toString());
126 assertEquals(policy.getPolicyType(), newPolicy.getPolicyType());
127 if (policy.getPolicyType() == SystemUpdatePolicy.TYPE_INSTALL_WINDOWED) {
128 assertEquals(policy.getInstallWindowStart(), newPolicy.getInstallWindowStart());
129 assertEquals(policy.getInstallWindowEnd(), newPolicy.getInstallWindowEnd());
  /frameworks/base/core/java/android/net/
NetworkPolicyManager.java 38 * Manager for creating and modifying network policy rules.
45 /** No specific network policy, use system default. */
66 * See network-policy-restrictions.md for more info.
127 * Set policy flags for specific UID.
129 * @param policy {@link #POLICY_NONE} or combination of flags like
132 public void setUidPolicy(int uid, int policy) {
134 mService.setUidPolicy(uid, policy);
141 * Add policy flags for specific UID. The given policy bits will be set for
142 * the uid. Policy flags may be eithe
    [all...]
  /system/extras/ext4_utils/
ext4_crypt_init_extensions.cpp 112 // Only set policy on first level /data directories
113 // To make this less restrictive, consider using a policy file.
114 // However this is overkill for as long as the policy is simply
115 // to apply a global policy to all /data folders created via makedir
133 KLOG_INFO(TAG, "Not setting policy on %s\n", dir);
139 std::string policy; local
140 if (!android::base::ReadFileToString(ref_filename, &policy)) {
141 KLOG_ERROR(TAG, "Unable to read system policy to set on %s\n", dir);
151 KLOG_INFO(TAG, "Setting policy on %s\n", dir);
152 int result = e4crypt_policy_ensure(dir, policy.c_str(), policy.length()
    [all...]
  /frameworks/base/services/core/java/com/android/server/net/
NetworkPolicyManagerShellCommand.java 81 pw.println("Network policy manager (netpolicy) commands:");
285 for (NetworkPolicy policy : getWifiPolicies()) {
286 if (filter != null && filter.booleanValue() != policy.metered) {
289 pw.print(getNetworkId(policy));
291 pw.println(policy.metered);
311 // First try to find a policy with such id
312 for (NetworkPolicy policy : policies) {
313 if (policy.template.isMatchRuleMobile() || policy.metered == metered) {
316 final String networkId = getNetworkId(policy);
331 final NetworkPolicy policy = newPolicy(ssid); local
366 final NetworkPolicy policy = newPolicy(ssid); local
374 final NetworkPolicy policy = newWifiPolicy(template, false); local
    [all...]
  /external/selinux/policycoreutils/sepolicy/
search.c 38 #include "policy.h"
41 #include <apol/policy-query.h>
47 #include <qpol/policy.h>
107 static int perform_ra_query(const apol_policy_t * policy, const options_t * opt, apol_vector_t ** v)
112 if (!policy || !opt || !v) {
113 ERR(policy, "%s", strerror(EINVAL));
125 ERR(policy, "%s", strerror(ENOMEM));
130 apol_role_allow_query_set_regex(policy, raq, opt->useregex);
132 if (apol_role_allow_query_set_source(policy, raq, opt->src_role_name)) {
138 if (apol_role_allow_query_set_target(policy, raq, opt->tgt_role_name))
    [all...]
  /external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/unit/cloudfront/
test_signed_urls.py 62 Test base64 encoding custom policy 1 from Amazon's documentation.
76 Test base64 encoding custom policy 2 from Amazon's documentation.
90 Test signing the canned policy from amazon's cloudfront documentation.
102 Test signing the canned policy from amazon's cloudfront documentation
118 Test signing the canned policy from amazon's cloudfront documentation
134 Test signing the canned policy from amazon's cloudfront documentation
150 Test signing the canned policy from amazon's cloudfront documentation.
163 Test signing custom policy 1 from amazon's cloudfront documentation.
175 Test signing custom policy 2 from amazon's cloudfront documentation.
187 Test that a canned policy is generated correctly
    [all...]
  /cts/tools/selinux/
SELinuxNeverallowTestFrame.py 72 mDevice.pullFile("/sys/fs/selinux/policy", devicePolicyFile);
83 /* run sepolicy-analyze neverallow check on policy file using given neverallow rules */
  /external/dbus/test/data/equiv-config-files/basic/
basic-1.conf 10 <policy context="default">
12 </policy>
  /external/dbus/test/data/equiv-config-files/entities/
entities-1.conf 11 <policy context="&#100;efault">
13 </policy>
  /external/dbus/test/data/valid-config-files/
basic.conf 10 <policy context="default">
12 </policy>
entities.conf 11 <policy context="&#100;efault">
13 </policy>
  /external/libbrillo/policy/
mock_libpolicy.h 11 #include "policy/libpolicy.h"
15 namespace policy { namespace
31 } // namespace policy
  /external/libchrome/base/
base64url.cc 26 Base64UrlEncodePolicy policy,
33 switch (policy) {
49 Base64UrlDecodePolicy policy,
60 switch (policy) {
  /frameworks/base/core/java/android/os/storage/
MountServiceInternal.java 27 * Policy that influences how external storage is mounted and reported.
57 * Adds a policy for determining how external storage is mounted and reported.
62 * @param policy The policy to add.
64 public abstract void addExternalStoragePolicy(ExternalStorageMountPolicy policy);
67 * Notify the mount service that the mount policy for a UID changed.
68 * @param uid The UID for which policy changed.
  /frameworks/base/core/tests/coretests/src/com/android/internal/policy/
PhoneWindowActionModeTestActivity.java 17 package com.android.internal.policy;
  /frameworks/base/packages/SystemUI/src/com/android/systemui/statusbar/phone/
BaseStatusBarHeader.java 24 import com.android.systemui.statusbar.policy.BatteryController;
25 import com.android.systemui.statusbar.policy.NetworkControllerImpl;
26 import com.android.systemui.statusbar.policy.NextAlarmController;
27 import com.android.systemui.statusbar.policy.UserInfoController;
  /frameworks/base/packages/SystemUI/src/com/android/systemui/statusbar/policy/
RotationLockController.java 17 package com.android.systemui.statusbar.policy;
SecurityController.java 16 package com.android.systemui.statusbar.policy;
  /libcore/ojluni/src/main/java/javax/crypto/
CryptoPolicyParser.java 40 void read(Reader policy)
  /packages/experimental/StrictModeTest/src/com/android/strictmodetest/
ServiceBase.java 59 int policy = BlockGuard.getThreadPolicy().getPolicyMask();
60 Log.d(TAG, "Doing a one-way disk write; policy is: " + policy);
69 int policy = BlockGuard.getThreadPolicy().getPolicyMask();
70 Log.d(TAG, "Doing a diskWrite; policy is: " + policy, new IAmHereException());
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/setools/policyrep/
terule.py 28 def te_rule_factory(policy, symbol):
32 return AVRule(policy, symbol)
34 return TERule(policy, symbol)
49 rule = ExpandedAVRule(original.policy, original.qpol_symbol)
51 rule = ExpandedTERule(original.policy, original.qpol_symbol)
79 return typeattr.type_or_attr_factory(self.policy, self.qpol_symbol.source_type(self.policy))
84 return typeattr.type_or_attr_factory(self.policy, self.qpol_symbol.target_type(self.policy))
94 return boolcond.condexpr_factory(self.policy, self.qpol_symbol.cond(self.policy)
    [all...]
  /system/tpm/tpm_manager/server/
tpm_managerd.conf 36 -S /usr/share/policy/tpm_managerd-seccomp.policy /usr/sbin/tpm_managerd
  /system/update_engine/update_manager/
state_factory.h 34 policy::PolicyProvider* policy_provider,

Completed in 1736 milliseconds

1 2 3 45 6 7 8 91011>>