HomeSort by relevance Sort by last modified time
    Searched full:audit (Results 76 - 100 of 393) sorted by null

1 2 34 5 6 7 8 91011>>

  /libcore/ojluni/src/main/java/java/nio/file/attribute/
AclEntryFlag.java 33 * AclEntryType#AUDIT} and {@link AclEntryType#ALARM} entry types.
  /system/hwservicemanager/
AccessControl.cpp 106 ALOGE("No valid hwservicemanager audit data");
  /external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/org.apache.ant_1.7.1.v20090120-1145/etc/checkstyle/
checkstyle-xdoc.xsl 33 <title>Checkstyle Audit</title>
78 <title>Checkstyle Audit</title>
  /external/selinux/gui/
modulesPage.py 145 button.set_label(_("Disable Audit"))
148 button.set_label(_("Enable Audit"))
  /external/selinux/libselinux/man/man3/
avc_init.3 34 will be prepended to all audit messages produced by the userspace AVC. The default is `uavc'. The remaining arguments, if non-NULL, specify callbacks to be used by the userspace AVC.
159 to reflect the current enforcing mode and flushing the cache on receipt of a policy load notification. Audit messages are produced when netlink notifications are processed.
  /external/selinux/policycoreutils/setfiles/
restorecon.8 171 options are set and the audit system is running, then an audit event is
setfiles.c 117 if (!mass_relabel) /* only audit a forced full relabel */
123 fprintf(stderr, "Error connecting to audit system.\n");
131 fprintf(stderr, "Error sending audit message: %s.\n",
setfiles.8 218 option is set and the audit system is running, then an audit event is
  /external/selinux/policycoreutils/newrole/
newrole.c 532 * only with access to the audit system. If the user is root, we leave
534 * audit netlink socket.
570 * only with access to the audit system and the ability to raise
576 * should have access to the audit netlink socket and should have
641 /* Send audit message */
651 fprintf(stderr, _("Error connecting to audit system.\n"));
664 fprintf(stderr, _("Error sending audit message.\n"));
1087 * old_context and ttyn are required for audit logging,
    [all...]
Makefile 9 # Enable capabilities to permit newrole to generate audit records.
  /device/linaro/hikey/self-extractors/linaro/
LICENSE 156 costs for that audit unless it reveals unlicensed usage in which case
158 expenses, including professional fees, relating to such audit. Any
160 or audit shall be treated as your confidential information and shall
  /external/kernel-headers/original/uapi/linux/
capability.h 309 /* Allow writing the audit log via unicast netlink socket */
313 /* Allow configuration of audit via unicast netlink socket */
348 /* Allow reading the audit log via multicast netlink socket */
  /external/libcap/libcap/include/uapi/linux/
capability.h 311 /* Allow writing the audit log via unicast netlink socket */
315 /* Allow configuration of audit via unicast netlink socket */
350 /* Allow reading the audit log via multicast netlink socket */
  /external/tpm2/
Global.h 264 // for audit
354 TPM2B_DIGEST auditDigest; // audit session digest
356 } u2; // audit log and policyHash may
489 // Command Audit
548 // This location holds the session handle for the current exclusive audit session. If there is no exclusive
549 // audit session, the location is set to TPM_RH_UNASSIGNED.
    [all...]
Manufacture.c 62 // initialize command audit list
Startup.c 136 // Restore/Initialize command audit information
  /bionic/libc/bionic/
bionic_systrace.cpp 48 // case an audit will be logged, and during boot before the property server has
  /bionic/libc/seccomp/
seccomp_policy.cpp 20 #include <linux/audit.h>
  /external/ltp/testcases/kernel/security/integrity/ima/
README 29 from https://www.redhat.com/archives/linux-audit/2009-March/msg00016.html.
  /external/openssh/
monitor_wrap.h 75 #include "audit.h"
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/
link.h 123 LA_FLG_BINDTO = 0x01, /* Audit symbols bound to this object. */
124 LA_FLG_BINDFROM = 0x02 /* Audit symbols bound from this object. */
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/
link.h 123 LA_FLG_BINDTO = 0x01, /* Audit symbols bound to this object. */
124 LA_FLG_BINDFROM = 0x02 /* Audit symbols bound from this object. */
  /docs/source.android.com/src/devices/tech/config/
kernel.jd 135 arm64: Add audit support</a> by AKASHI Takahiro</li>
138 arm64: audit: Add audit hook in syscall_trace_enter/exit()</a> by JP Abgrall</li>
  /docs/source.android.com/src/security/selinux/
device-policy.jd 86 time to perform a security audit of the device and file bugs against behavior
286 <p><img alt="Figure 1: Comparison of device-specific policy size after security audit."
289 policy size after security audit.</p>
  /external/selinux/python/sepolgen/src/sepolgen/
policygen.py 59 why a particular access was allowed based on the audit
254 # Format the raw audit data to explain why the
271 # from the first audit message. For the vast majority of cases this info

Completed in 843 milliseconds

1 2 34 5 6 7 8 91011>>