HomeSort by relevance Sort by last modified time
    Searched refs:policy (Results 176 - 200 of 1172) sorted by null

1 2 3 4 5 6 78 91011>>

  /prebuilts/ndk/current/platforms/android-9/arch-x86/usr/include/
sched.h 48 extern int sched_get_priority_max(int policy);
49 extern int sched_get_priority_min(int policy);
  /external/autotest/client/site_tests/security_DbusOwners/
security_DbusOwners.py 29 For every DBus interface XML, look for <policy user="chronos"> sections
43 policies = xmldoc.getElementsByTagName('policy')
45 for policy in policies:
46 if (policy.hasAttribute('user') and
47 policy.getAttribute('user') == 'chronos'):
48 allows = policy.getElementsByTagName('allow')
  /external/libbrillo/policy/
libpolicy.h 15 namespace policy { namespace
21 // If there is a policy on disk at creation time, we will load it at verify
37 // Returns a value from the device policy cache.
46 } // namespace policy
  /external/libchrome/base/mac/
scoped_typeref.h 44 // Retain in initialization). This behavior is based on the |policy| parameter,
45 // with |ASSUME| for the former and |RETAIN| for the latter. The default policy
58 base::scoped_policy::OwnershipPolicy policy = base::scoped_policy::ASSUME)
60 if (object_ && policy == base::scoped_policy::RETAIN)
89 base::scoped_policy::OwnershipPolicy policy =
91 if (object && policy == base::scoped_policy::RETAIN)
  /external/libchrome/sandbox/linux/syscall_broker/
broker_client.h 27 // |policy| needs to match the policy used by BrokerHost. This
33 BrokerClient(const BrokerPolicy& policy,
  /external/selinux/secilc/docs/
Makefile 44 $(TMPDIR)/policy.cil: $(TESTDIR)/policy.cil
46 @# add a title for the TOC to policy.cil. This is needed to play nicely with the PDF conversion.
47 sed -i '1i Example Policy\n=========\n```' $@
50 html: $(PANDOC_FILE_LIST) $(TMPDIR)/policy.cil
54 pdf: $(PANDOC_FILE_LIST) $(TMPDIR)/policy.cil
  /frameworks/av/services/mediaextractor/
Android.mk 14 LOCAL_REQUIRED_MODULES_arm := mediaextractor-seccomp.policy
15 LOCAL_REQUIRED_MODULES_x86 := mediaextractor-seccomp.policy
  /frameworks/base/packages/SettingsLib/src/com/android/settingslib/net/
DataUsageController.java 138 final NetworkPolicy policy = findNetworkPolicy(template); local
143 if (policy != null && policy.cycleDay > 0) {
145 if (DEBUG) Log.d(TAG, "Cycle day=" + policy.cycleDay + " tz="
146 + policy.cycleTimezone);
147 final Time nowTime = new Time(policy.cycleTimezone);
150 policyTime.set(policy.cycleDay, policyTime.month, policyTime.year);
178 if (policy != null) {
179 usage.limitLevel = policy.limitBytes > 0 ? policy.limitBytes : 0
199 final NetworkPolicy policy = policies[i]; local
    [all...]
  /frameworks/base/packages/SystemUI/src/com/android/systemui/statusbar/policy/
BatteryController.java 17 package com.android.systemui.statusbar.policy;
EthernetSignalController.java 16 package com.android.systemui.statusbar.policy;
21 import com.android.systemui.statusbar.policy.NetworkController.IconState;
22 import com.android.systemui.statusbar.policy.NetworkController.SignalCallback;
  /frameworks/base/packages/SystemUI/src/com/android/systemui/volume/
VolumeComponent.java 22 import com.android.systemui.statusbar.policy.ZenModeController;
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/setools/
polcapquery.py 27 Query SELinux policy capabilities
30 policy The policy to query.
33 name The name of the policy capability to match.
39 """Generator which yields all matching policy capabilities."""
40 self.log.info("Generating results from {0.policy}".format(self))
43 for cap in self.policy.polcaps():
infoflow.py 34 def __init__(self, policy, perm_map, min_weight=1, exclude=None):
37 policy The policy to analyze.
46 self.policy = policy
87 self._exclude = [self.policy.lookup_type(t) for t in types]
110 s = self.policy.lookup_type(source)
111 t = self.policy.lookup_type(target)
132 on the policy complexity.
150 s = self.policy.lookup_type(source
    [all...]
  /external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/sts/
connection.py 187 def get_federation_token(self, name, duration=None, policy=None):
213 intersection of the policy that is passed with the
228 resource-based policy, such as in an Amazon S3 bucket policy.
230 :type policy: string
231 :param policy: A policy that specifies the permissions that are granted
234 specify a policy, the federated user's permissions are intersection
235 of the specified policy and the IAM user's policy. If you don'
    [all...]
  /libcore/dalvik/src/main/java/dalvik/system/
BlockGuard.java 52 public interface Policy {
69 * Returns the policy bitmask, for shipping over Binder calls
70 * to remote threads/processes and reinstantiating the policy
109 return "policy=" + mPolicyState + " violation=" + mPolicyViolated +
115 * The default, permissive policy that doesn't prevent any operations.
117 public static final Policy LAX_POLICY = new Policy() {
126 private static ThreadLocal<Policy> threadPolicy = new ThreadLocal<Policy>() {
127 @Override protected Policy initialValue()
    [all...]
  /packages/services/Car/tests/carservice_test/src/com/android/car/test/
TestAppBlockingPolicyService.java 62 CarAppBlockingPolicy policy = new CarAppBlockingPolicy(whitelists, null); local
63 Log.i(TAG, "getAppBlockingPolicy, passing policy:" + policy);
64 return policy;
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/setools/policyrep/
role.py 29 assert name.policy == qpol_policy
62 for type_ in self.qpol_symbol.type_iter(self.policy):
63 yield typeattr.type_or_attr_factory(self.policy, type_)
rule.py 26 """This is base class for policy rules."""
45 return self.qpol_symbol.rule_type(self.policy)
66 return objclass.class_factory(self.policy, self.qpol_symbol.object_class(self.policy))
  /system/sepolicy/tools/sepolicy-analyze/
sepolicy-analyze.c 34 fprintf(stderr, "%s must be called on a policy file with a component and the appropriate arguments specified\n", arg0);
35 fprintf(stderr, "%s <policy-file>:\n", arg0);
44 char *policy; local
52 policy = argv[1];
53 if(load_policy(policy, &policydb, &pf))
  /system/update_engine/
p2p_manager.h 27 #include <policy/device_policy.h>
28 #include <policy/libpolicy.h>
65 // Use the device policy specified by |device_policy|. If this is
66 // null, then no device policy is used.
67 virtual void SetDevicePolicy(const policy::DevicePolicy* device_policy) = 0;
real_system_state.h 27 #include <policy/device_policy.h>
74 const policy::DevicePolicy* device_policy) override {
78 inline const policy::DevicePolicy* device_policy() override {
147 // The latest device policy object from the policy provider.
148 const policy::DevicePolicy* device_policy_{nullptr};
186 policy::PolicyProvider policy_provider_;
  /external/autotest/client/site_tests/login_MultipleSessions/
login_MultipleSessions.py 10 from autotest_lib.client.common_lib.cros import policy, session_manager namespace
44 self._listener.wait_for_signals(desc='Initial policy push complete.')
47 retrieved_policy = policy.get_policy(self._session_manager)
48 if retrieved_policy is None: raise error.TestFail('Policy not found')
49 policy.compare_policy_response(self.srcdir, retrieved_policy,
64 retrieved_policy = policy.get_policy(self._session_manager)
65 if retrieved_policy is None: raise error.TestFail('Policy not found')
66 policy.compare_policy_response(self.srcdir, retrieved_policy,
  /external/autotest/client/site_tests/security_DbusMap/
security_DbusMap.py 18 def policy_sort_priority(self, policy):
20 Given a DOMElement representing one <policy> block from a dbus
22 the order in which this policy would be applied by dbus-daemon.
32 if policy.getAttribute('context') == 'default':
34 if policy.getAttribute('group') != '':
36 if policy.getAttribute('user') != '':
38 if policy.getAttribute('at_console') == 'true':
40 if policy.getAttribute('at_console') == 'false':
42 if policy.getAttribute('context') == 'mandatory':
48 Given an array of DOMElements representing <policy> blocks
    [all...]
  /external/autotest/client/site_tests/login_OwnershipApi/
login_OwnershipApi.py 10 from autotest_lib.client.common_lib.cros import policy, session_manager namespace
60 poldata = policy.build_policy_data(self.srcdir,
69 policy_string = policy.generate_policy(self.srcdir,
73 policy.push_policy_and_verify(policy_string, sm)
74 retrieved_policy = policy.get_policy(sm)
75 if retrieved_policy is None: raise error.TestFail('Policy not found')
76 policy.compare_policy_response(self.srcdir,
85 # Sanity check against an incorrect policy
86 policy.compare_policy_response(self.srcdir,
96 raise error.TestFail('Did not detect bad policy')
    [all...]
  /external/owasp/sanitizer/src/main/org/owasp/html/
HtmlPolicyBuilder.java 52 * To create a policy, first construct an instance of this class; then call
58 * // Define the policy.
59 * Function&lt;HtmlStreamEventReceiver, HtmlSanitizer.Policy&gt; policy
66 * HtmlSanitizer.sanitize(myHtml, policy.apply(myHtmlStreamRenderer));
73 * There is a {@link HtmlPolicyBuilder#allowStandardUrlProtocols canned policy}
82 * Use a custom element or attribute policy to allow through
97 * own {@link ElementPolicy element policy} or
98 * {@link AttributePolicy attribute policy} when calling
100 * E.g. to convert headers into {@code <div>}s, you could use an element policy
604 AttributePolicy policy = ape.getValue(); local
612 AttributePolicy policy = AttributePolicy.Util.join( local
636 private AttributePolicy policy = AttributePolicy.IDENTITY_ATTRIBUTE_POLICY; field in class:HtmlPolicyBuilder.AttributeBuilder
    [all...]

Completed in 470 milliseconds

1 2 3 4 5 6 78 91011>>