OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:audit
(Results
76 - 100
of
393
) sorted by null
1
2
3
4
5
6
7
8
9
10
11
>>
/libcore/ojluni/src/main/java/java/nio/file/attribute/
AclEntryFlag.java
33
* AclEntryType#
AUDIT
} and {@link AclEntryType#ALARM} entry types.
/system/hwservicemanager/
AccessControl.cpp
106
ALOGE("No valid hwservicemanager
audit
data");
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/org.apache.ant_1.7.1.v20090120-1145/etc/checkstyle/
checkstyle-xdoc.xsl
33
<title>Checkstyle
Audit
</title>
78
<title>Checkstyle
Audit
</title>
/external/selinux/gui/
modulesPage.py
145
button.set_label(_("Disable
Audit
"))
148
button.set_label(_("Enable
Audit
"))
/external/selinux/libselinux/man/man3/
avc_init.3
34
will be prepended to all
audit
messages produced by the userspace AVC. The default is `uavc'. The remaining arguments, if non-NULL, specify callbacks to be used by the userspace AVC.
159
to reflect the current enforcing mode and flushing the cache on receipt of a policy load notification.
Audit
messages are produced when netlink notifications are processed.
/external/selinux/policycoreutils/setfiles/
restorecon.8
171
options are set and the
audit
system is running, then an
audit
event is
setfiles.c
117
if (!mass_relabel) /* only
audit
a forced full relabel */
123
fprintf(stderr, "Error connecting to
audit
system.\n");
131
fprintf(stderr, "Error sending
audit
message: %s.\n",
setfiles.8
218
option is set and the
audit
system is running, then an
audit
event is
/external/selinux/policycoreutils/newrole/
newrole.c
532
* only with access to the
audit
system. If the user is root, we leave
534
*
audit
netlink socket.
570
* only with access to the
audit
system and the ability to raise
576
* should have access to the
audit
netlink socket and should have
641
/* Send
audit
message */
651
fprintf(stderr, _("Error connecting to
audit
system.\n"));
664
fprintf(stderr, _("Error sending
audit
message.\n"));
1087
* old_context and ttyn are required for
audit
logging,
[
all
...]
Makefile
9
# Enable capabilities to permit newrole to generate
audit
records.
/device/linaro/hikey/self-extractors/linaro/
LICENSE
156
costs for that
audit
unless it reveals unlicensed usage in which case
158
expenses, including professional fees, relating to such
audit
. Any
160
or
audit
shall be treated as your confidential information and shall
/external/kernel-headers/original/uapi/linux/
capability.h
309
/* Allow writing the
audit
log via unicast netlink socket */
313
/* Allow configuration of
audit
via unicast netlink socket */
348
/* Allow reading the
audit
log via multicast netlink socket */
/external/libcap/libcap/include/uapi/linux/
capability.h
311
/* Allow writing the
audit
log via unicast netlink socket */
315
/* Allow configuration of
audit
via unicast netlink socket */
350
/* Allow reading the
audit
log via multicast netlink socket */
/external/tpm2/
Global.h
264
// for
audit
354
TPM2B_DIGEST auditDigest; //
audit
session digest
356
} u2; //
audit
log and policyHash may
489
// Command
Audit
548
// This location holds the session handle for the current exclusive
audit
session. If there is no exclusive
549
//
audit
session, the location is set to TPM_RH_UNASSIGNED.
[
all
...]
Manufacture.c
62
// initialize command
audit
list
Startup.c
136
// Restore/Initialize command
audit
information
/bionic/libc/bionic/
bionic_systrace.cpp
48
// case an
audit
will be logged, and during boot before the property server has
/bionic/libc/seccomp/
seccomp_policy.cpp
20
#include <linux/
audit
.h>
/external/ltp/testcases/kernel/security/integrity/ima/
README
29
from https://www.redhat.com/archives/linux-
audit
/2009-March/msg00016.html.
/external/openssh/
monitor_wrap.h
75
#include "
audit
.h"
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/
link.h
123
LA_FLG_BINDTO = 0x01, /*
Audit
symbols bound to this object. */
124
LA_FLG_BINDFROM = 0x02 /*
Audit
symbols bound from this object. */
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/
link.h
123
LA_FLG_BINDTO = 0x01, /*
Audit
symbols bound to this object. */
124
LA_FLG_BINDFROM = 0x02 /*
Audit
symbols bound from this object. */
/docs/source.android.com/src/devices/tech/config/
kernel.jd
135
arm64: Add
audit
support</a> by AKASHI Takahiro</li>
138
arm64:
audit
: Add
audit
hook in syscall_trace_enter/exit()</a> by JP Abgrall</li>
/docs/source.android.com/src/security/selinux/
device-policy.jd
86
time to perform a security
audit
of the device and file bugs against behavior
286
<p><img alt="Figure 1: Comparison of device-specific policy size after security
audit
."
289
policy size after security
audit
.</p>
/external/selinux/python/sepolgen/src/sepolgen/
policygen.py
59
why a particular access was allowed based on the
audit
254
# Format the raw
audit
data to explain why the
271
# from the first
audit
message. For the vast majority of cases this info
Completed in 843 milliseconds
1
2
3
4
5
6
7
8
9
10
11
>>