HomeSort by relevance Sort by last modified time
    Searched refs:policy (Results 26 - 50 of 1172) sorted by null

12 3 4 5 6 7 8 91011>>

  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/setools/policyrep/
polcap.py 23 def polcap_factory(policy, name):
24 """Factory function for creating policy capability objects."""
27 assert name.policy == policy
30 return PolicyCapability(policy, name)
32 raise TypeError("Policy capabilities cannot be looked up.")
37 """A policy capability."""
context.py 28 def context_factory(policy, name):
34 return Context(policy, name)
50 return user.user_factory(self.policy, self.qpol_symbol.user(self.policy))
55 return role.role_factory(self.policy, self.qpol_symbol.role(self.policy))
60 return typeattr.type_factory(self.policy, self.qpol_symbol.type_(self.policy))
65 return mls.range_factory(self.policy, self.qpol_symbol.range(self.policy))
    [all...]
__init__.py 21 # Create a Python representation of the policy.
23 # abstractions and methods for accessing the policy
37 # Python the policy is repeatedly referenced in the
40 # a reference to the policy for internal use.
42 # be valid for the policy it comes from.
65 # In-policy Labeling
73 """The complete SELinux policy."""
78 policyfile Path to a policy to open.
82 self.policy = None
91 raise RuntimeError("Loading the running policy requires libselinux Python bindings"
    [all...]
objclass.py 24 def common_factory(policy, name):
28 assert name.policy == policy
31 return Common(policy, name)
34 return Common(policy, qpol.qpol_common_t(policy, str(name)))
39 def class_factory(policy, name):
43 assert name.policy == policy
46 return ObjClass(policy, name
    [all...]
mls.py 44 def enabled(policy):
46 return bool(policy.capability(qpol.QPOL_CAP_MLS))
49 def category_factory(policy, sym):
52 if not enabled(policy):
56 assert sym.policy == policy
59 if sym.isalias(policy):
60 raise TypeError("{0} is an alias".format(sym.name(policy)))
62 return Category(policy, sym)
65 return Category(policy, qpol.qpol_cat_t(policy, str(sym))
    [all...]
  /external/dhcpcd-6.8.2/dbus/
dhcpcd-dbus.conf 5 <policy user="root">
9 </policy>
10 <policy user="dhcp">
14 </policy>
16 <policy context="default">
20 </policy>
  /external/selinux/policycoreutils/sepolicy/
org.selinux.conf 9 <policy user="root">
11 </policy>
15 <policy at_console="true">
17 </policy>
18 <policy context="default">
21 </policy>
setup.py 7 policy = Extension("sepolicy._policy", variable
9 sources=["policy.c", "info.c", "search.c"]
12 setup(name="sepolicy", version="1.1", description="Python SELinux Policy Analyses bindings", author="Daniel Walsh", author_email="dwalsh@redhat.com", ext_modules=[policy], packages=["sepolicy", "sepolicy.templates", "sepolicy.help"], package_data={'sepolicy': ['*.glade'], 'sepolicy.help': ['*.txt', '*.png']})
  /external/tlsdate/dbus/
org.torproject.tlsdate.conf 7 <policy user="nobody">
9 </policy>
12 <policy group="root">
22 </policy>
25 <policy context="default">
30 </policy>
  /libcore/luni/src/main/java/libcore/net/
NetworkSecurityPolicy.java 20 * Network security policy for this process/application.
22 * <p>Network stacks/components are expected to honor this policy. Components which can use the
23 * Android framework API should be accessing this policy via the framework's
26 * <p>The policy currently consists of a single flag: whether cleartext network traffic is
37 public static void setInstance(NetworkSecurityPolicy policy) {
38 if (policy == null) {
39 throw new NullPointerException("policy == null");
41 instance = policy;
  /packages/apps/Email/emailcommon/src/com/android/emailcommon/service/
LegacyPolicySet.java 18 import com.android.emailcommon.provider.Policy;
21 * Legacy class for policy storage as a bit field of flags
64 * Convert legacy policy flags to a Policy
65 * @param flags legacy policy flags
66 * @return a Policy representing the legacy policy flag
68 public static Policy flagsToPolicy(long flags) {
69 Policy policy = new Policy() local
    [all...]
  /external/boringssl/src/crypto/x509v3/
v3_pci.c 74 if (pci->proxyPolicy->policy && pci->proxyPolicy->policy->data)
76 pci->proxyPolicy->policy->data);
82 ASN1_OCTET_STRING **policy)
116 else if (strcmp(val->name, "policy") == 0)
120 if (!*policy)
122 *policy = ASN1_OCTET_STRING_new();
123 if (!*policy)
143 tmp_data = OPENSSL_realloc((*policy)->data,
144 (*policy)->length + val_len + 1)
255 ASN1_OCTET_STRING *policy = NULL; local
    [all...]
  /external/libbrillo/policy/tests/
libpolicy_unittest.cc 5 #include "policy/libpolicy.h"
14 #include "policy/device_policy_impl.h"
16 namespace policy { namespace
19 "policy/tests/whitelist/policy_all";
21 "policy/tests/whitelist/policy_none";
22 static const char kKeyFile[] = "policy/tests/whitelist/owner.key";
47 // Test that a policy file can be verified and parsed correctly. The file
57 // Ensure we successfully loaded the device policy file.
60 const DevicePolicy& policy = provider.GetDevicePolicy(); local
64 ASSERT_TRUE(policy.GetPolicyRefreshRate(&int_value))
170 const DevicePolicy& policy = provider.GetDevicePolicy(); local
    [all...]
  /external/dbus/bus/
policy.h 2 /* policy.h Bus security policy
114 BusPolicy* bus_policy_ref (BusPolicy *policy);
115 void bus_policy_unref (BusPolicy *policy);
116 BusClientPolicy* bus_policy_create_client_policy (BusPolicy *policy,
119 dbus_bool_t bus_policy_allow_unix_user (BusPolicy *policy,
121 dbus_bool_t bus_policy_allow_windows_user (BusPolicy *policy,
123 dbus_bool_t bus_policy_append_default_rule (BusPolicy *policy,
125 dbus_bool_t bus_policy_append_mandatory_rule (BusPolicy *policy,
127 dbus_bool_t bus_policy_append_user_rule (BusPolicy *policy,
    [all...]
  /development/samples/training/device-management-policy/src/com/example/training/deviceadmin/
SecureActivity.java 27 // Check to see if the device is properly secured as per the policy. Send user
28 // back to policy set up screen if necessary.
29 Policy policy = new Policy(this); local
30 policy.readFromLocal();
31 if (!policy.isDeviceSecured()) {
  /frameworks/base/packages/SystemUI/src/com/android/systemui/statusbar/policy/
ScrollAdapter.java 17 package com.android.systemui.statusbar.policy;
  /hardware/qcom/gps/msmcobalt/utils/platform_lib_abstractions/loc_pla/include/
platform_lib_sched_policy.h 40 int platform_lib_abstraction_set_sched_policy(int tid, PLASchedPolicy policy);
  /hardware/qcom/gps/msmcobalt/utils/platform_lib_abstractions/loc_stub/include/
loc_stub_sched_policy.h 57 int set_sched_policy(int tid, SchedPolicy policy);
  /frameworks/base/core/java/android/app/admin/
SystemUpdatePolicy.java 33 * A class that represents a local system update policy set by the device owner.
49 * Unknown policy type, used only internally.
59 * days. After the expiration the policy will no longer be effective and the system should
60 * revert back to its normal behavior as if no policy were set. The only exception is
68 * should revert back to its normal behavior as if no policy were set. The only exception is
94 * Create a policy object and set it to install update automatically as soon as one is
100 SystemUpdatePolicy policy = new SystemUpdatePolicy(); local
101 policy.mPolicyType = TYPE_INSTALL_AUTOMATIC;
102 return policy;
106 * Create a policy object and set it to: new system update will only be installed automaticall
125 SystemUpdatePolicy policy = new SystemUpdatePolicy(); local
140 SystemUpdatePolicy policy = new SystemUpdatePolicy(); local
241 SystemUpdatePolicy policy = new SystemUpdatePolicy(); local
    [all...]
  /bionic/libc/bionic/
pthread_getschedparam.cpp 34 int pthread_getschedparam(pthread_t t, int* policy, sched_param* param) {
46 *policy = sched_getscheduler(thread->tid);
pthread_setschedparam.cpp 34 int pthread_setschedparam(pthread_t t, int policy, const sched_param* param) {
42 int rc = sched_setscheduler(thread->tid, policy, param);
  /external/libchrome/base/
base64url.h 28 // The |policy| defines whether padding should be included or omitted from the
31 Base64UrlEncodePolicy policy,
48 // The |policy| defines whether padding will be required, ignored or disallowed
51 Base64UrlDecodePolicy policy,
  /frameworks/base/core/java/com/android/internal/policy/
IKeyguardStateCallback.aidl 16 package com.android.internal.policy;
  /hardware/libhardware/modules/audio/
audio_policy.c 39 struct audio_policy policy; member in struct:default_audio_policy
257 dap->policy.set_device_connection_state = ap_set_device_connection_state;
258 dap->policy.get_device_connection_state = ap_get_device_connection_state;
259 dap->policy.set_phone_state = ap_set_phone_state;
260 dap->policy.set_ringer_mode = ap_set_ringer_mode;
261 dap->policy.set_force_use = ap_set_force_use;
262 dap->policy.get_force_use = ap_get_force_use;
263 dap->policy.set_can_mute_enforced_audible =
265 dap->policy.init_check = ap_init_check;
266 dap->policy.get_output = ap_get_output
    [all...]
  /packages/services/Car/car-lib/src/android/car/content/pm/
ICarAppBlockingPolicySetter.aidl 22 * Passed to CarAppBlockingPolicyService to allow setting policy. This also works as a unique
23 token per each Service. Caller still needs permission to set policy.
27 void setAppBlockingPolicy(in CarAppBlockingPolicy policy) = 0;

Completed in 2100 milliseconds

12 3 4 5 6 7 8 91011>>