/cts/tools/selinux/ |
SELinuxNeverallowTestGen.py | 56 rule = NeverallowRule(line) 57 rule.treble_only = (treble_only_depth > 0) 58 rules.append(rule) 66 # returns: a string representing a generic test method based on this rule. 67 def neverallow_rule_to_test(rule, test_num): 68 squashed_neverallow = rule.statement.replace("\n", " ") 75 "true" if rule.treble_only else "false") 93 for rule in neverallow_rules: 94 src_body += neverallow_rule_to_test(rule, i)
|
/external/icu/icu4c/source/i18n/ |
funcrepl.cpp | 99 UnicodeString& FunctionReplacer::toReplacerPattern(UnicodeString& rule, 102 rule.truncate(0); 103 rule.append(AMPERSAND); 104 rule.append(translit->getID()); 105 rule.append(OPEN, 2); 106 rule.append(replacer->toReplacer()->toReplacerPattern(str, escapeUnprintable)); 107 rule.append(CLOSE, 2); 108 return rule;
|
rbt_pars.cpp | 259 * A class representing one side of a rule. This class knows how to 260 * parse half of a rule. It is tightly coupled to the method 305 int32_t parse(const UnicodeString& rule, int32_t pos, int32_t limit, UErrorCode& status); 307 int32_t parseSection(const UnicodeString& rule, int32_t pos, int32_t limit, 331 const UnicodeString& rule, 334 return parser.syntaxError(code, rule, start, status); 359 * Parse one side of a rule, stopping at either the limit, 364 int32_t RuleHalf::parse(const UnicodeString& rule, int32_t pos, int32_t limit, UErrorCode& status) { 367 pos = parseSection(rule, pos, limit, text, UnicodeString(TRUE, ILLEGAL_TOP, -1), FALSE, status); 370 return syntaxError(U_MISPLACED_CURSOR_OFFSET, rule, start, status) [all...] |
/hardware/qcom/data/ipacfg-mgr/msm8998/ipacm/src/ |
IPACM_Conntrack_NATApp.cpp | 173 IPACMERR("unable to add the rule delete from cache\n"); 180 IPACMDBG("On wan-iface reset added below rule successfully\n"); 234 bool NatApp::ChkForDup(const nat_table_entry *rule) 241 if(cache[cnt].private_ip == rule->private_ip && 242 cache[cnt].target_ip == rule->target_ip && 243 cache[cnt].private_port == rule->private_port && 244 cache[cnt].target_port == rule->target_port && 245 cache[cnt].protocol == rule->protocol) 247 log_nat(rule->protocol,rule->private_ip,rule->target_ip,rule->private_port, [all...] |
IPACM_Iface.cpp | 101 IPACMDBG("already setup software_routing rule for (%s)iface ip-family %d\n", 129 /* Configuring Software-Routing Filtering Rule */ 135 flt_rule_entry.rule.action = IPA_PASS_TO_EXCEPTION; 137 flt_rule_entry.rule.hashable = true; 139 memcpy(&flt_rule_entry.rule.attrib, 141 sizeof(flt_rule_entry.rule.attrib)); 152 IPACMERR("Error Adding Filtering rule, aborting...\n"); 158 IPACMERR("adding flt rule failed status=0x%x\n", m_pFilteringTable->rules[0].status); 164 IPACMDBG("soft-routing flt rule hdl0=0x%x\n", m_pFilteringTable->rules[0].flt_rule_hdl); 173 IPACMERR("Error Adding Filtering rule, aborting...\n") [all...] |
IPACM_Wan.cpp | 175 /* Add corresponding ipa_rm_resource_name of TX-endpoint up before IPV6 RT-rule set */ 262 rt_rule_entry->rule.hdr_hdl = hdr.hdl; 267 rt_rule_entry->rule.dst = IPA_CLIENT_APPS_WAN_CONS; 271 rt_rule_entry->rule.dst = IPA_CLIENT_APPS_LAN_CONS; 273 rt_rule_entry->rule.attrib.attrib_mask = IPA_FLT_DST_ADDR; 274 rt_rule_entry->rule.attrib.u.v6.dst_addr[0] = data->ipv6_addr[0]; 275 rt_rule_entry->rule.attrib.u.v6.dst_addr[1] = data->ipv6_addr[1]; 276 rt_rule_entry->rule.attrib.u.v6.dst_addr[2] = data->ipv6_addr[2]; 277 rt_rule_entry->rule.attrib.u.v6.dst_addr[3] = data->ipv6_addr[3]; 278 rt_rule_entry->rule.attrib.u.v6.dst_addr_mask[0] = 0xFFFFFFFF [all...] |
/frameworks/base/tools/split-select/ |
Rule_test.cpp | 17 #include "Rule.h" 33 Rule rule(AndRule() 34 .add(EqRule(Rule::SDK_VERSION, 7)) 36 .add(GtRule(Rule::SCREEN_DENSITY, 10)) 37 .add(LtRule(Rule::SCREEN_DENSITY, 5)) 71 std::string result(rule.toJson().string()); 78 sp<Rule> rule = new Rule(AndRule( local 86 sp<Rule> rule = new Rule(AndRule() local [all...] |
/external/icu/icu4c/source/common/ |
util_props.cpp | 28 int32_t ICU_Utility::parseInteger(const UnicodeString& rule, int32_t& pos, int32_t limit) { 34 if (p < limit && rule.charAt(p) == 48 /*0*/) { 35 if (p+1 < limit && (rule.charAt(p+1) == 0x78 /*x*/ || rule.charAt(p+1) == 0x58 /*X*/)) { 47 int32_t d = u_digit(rule.charAt(p++), radix); 88 int32_t ICU_Utility::parsePattern(const UnicodeString& rule, int32_t pos, int32_t limit, 101 c = rule.charAt(pos++); 108 pos = skipWhitespace(rule, pos); 112 parsedInts[intCount++] = parseInteger(rule, p, limit); 123 c = (UChar) u_tolower(rule.charAt(pos++)) [all...] |
util.h | 147 static int32_t parsePattern(const UnicodeString& rule, int32_t pos, int32_t limit, 179 static int32_t parseInteger(const UnicodeString& rule, int32_t& pos, int32_t limit); 216 static void appendToRule(UnicodeString& rule, 222 static void appendToRule(UnicodeString& rule, 228 static void appendToRule(UnicodeString& rule,
|
/build/kati/ |
rule.cc | 17 #include "rule.h" 28 static void ParseInputs(Rule* r, StringPiece s) { 50 Rule::Rule() 58 Rule** out_rule, RuleVarAssignment* rule_var) { 92 // "test: =foo" is questionable but a valid rule definition (not a 114 Rule* rule = new Rule(); local 115 *out_rule = rule; [all...] |
/external/r8/src/main/java/com/android/tools/r8/ir/optimize/ |
MemberValuePropagation.java | 43 final ProguardMemberRule rule; field in class:MemberValuePropagation.ProguardMemberRuleLookup 45 ProguardMemberRuleLookup(RuleType type, ProguardMemberRule rule) { 47 this.rule = rule; 60 ProguardMemberRule rule = liveSet.noSideEffects.get(item); local 61 if (rule != null) { 62 return new ProguardMemberRuleLookup(RuleType.ASSUME_NO_SIDE_EFFECTS, rule); 64 rule = liveSet.assumedValues.get(item); 65 if (rule != null) { 66 return new ProguardMemberRuleLookup(RuleType.ASSUME_VALUES, rule); [all...] |
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/setools/diff/ |
genfscon.py | 26 modified_genfs_record = namedtuple("modified_genfs", ["rule", 65 self.log.debug("Resetting genfscon rule differences") 75 def __init__(self, rule): 76 self.origin = rule 77 self.fs = rule.fs 78 self.path = rule.path 79 self.filetype = rule.filetype 80 self.context = ContextWrapper(rule.context) 81 self.key = hash(rule)
|
terules.py | 29 modified_avrule_record = namedtuple("modified_avrule", ["rule", 34 modified_terule_record = namedtuple("modified_terule", ["rule", "added_default", "removed_default"]) 43 ruletype The rule type, e.g. "allow". 89 ruletype The rule type, e.g. "allowxperm". 135 ruletype The rule type, e.g. "type_transition". 238 """Create rule lists for both policies.""" 241 self.log.debug("Building TE rule lists from {0.left_policy}".format(self)) 242 for rule in self.left_policy.terules(): 243 self._left_te_rules[rule.ruletype].append(rule) [all...] |
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/setools/ |
mlsrulequery.py | 36 ruletype The list of rule type(s) to match. 45 matching the rule's object class. 69 self.log.info("Generating MLS rule results from {0.policy}".format(self)) 80 for rule in self.policy.mlsrules(): 82 # Matching on rule type 85 if rule.ruletype not in self.ruletype: 92 rule.source, 102 rule.target, 111 if not self._match_object_class(rule): 118 rule.default [all...] |
terulequery.py | 38 ruletype The list of rule type(s) to match. 57 matching the rule's object class. 60 perms_equal If true, the permission set of the rule 68 perms_subset If true, the rule matches if the permissions criteria 69 is a subset of the rule's permission set. 80 expression of the rule must exactly match the 131 self.log.info("Generating TE rule results from {0.policy}".format(self)) 144 for rule in self.policy.terules(): 146 # Matching on rule type 149 if rule.ruletype not in self.ruletype [all...] |
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/setools/policyrep/ |
mlsrule.py | 23 from . import rule 29 """Factory function for creating MLS rule objects.""" 40 original The MLS rule the expanded rule originates from. 41 source The source type of the expanded rule. 42 target The target type of the expanded rule. 48 rule = ExpandedMLSRule(original.policy, original.qpol_symbol) 50 raise TypeError("The original rule must be a MLS rule class.") 52 rule.source = sourc [all...] |
/external/v8/tools/testrunner/local/ |
statusfile.py | 149 def _ParseOutcomeList(rule, outcomes, target_dict, variables): 173 if rule in target_dict: 174 # A FAIL without PASS in one rule has always precedence over a single 176 # in a rule with a modifier (e.g. PASS, SLOW) would be joined to a FAIL 177 # from another rule (which intended to mark a test as FAIL and not as 179 if _JoinsPassAndFail(target_dict[rule], result): 180 target_dict[rule] -= set([PASS]) 181 if _JoinsPassAndFail(result, target_dict[rule]): 183 target_dict[rule] |= result 185 target_dict[rule] = resul [all...] |
/external/jacoco/org.jacoco.report/src/org/jacoco/report/check/ |
BundleChecker.java | 34 private final Collection<Rule> bundleRules; 35 private final Collection<Rule> packageRules; 36 private final Collection<Rule> classRules; 37 private final Collection<Rule> sourceFileRules; 38 private final Collection<Rule> methodRules; 45 public BundleChecker(final Collection<Rule> rules, 49 this.bundleRules = new ArrayList<Rule>(); 50 this.packageRules = new ArrayList<Rule>(); 51 this.classRules = new ArrayList<Rule>(); 52 this.sourceFileRules = new ArrayList<Rule>(); [all...] |
/external/icu/android_icu4j/src/main/java/android/icu/text/ |
TransliteratorParser.java | 33 * of rules in the rule set 39 * A Vector of Strings containing all of the ID blocks in the rule set 76 * rule. segmentStandins.charAt(0) is the standin for "$1" and corresponds 83 * parsing of a single rule. 131 // markers for beginning and end of rule groups 284 * A private abstract class representing the interface to rule 368 * A class representing one side of a rule. This class knows how to 369 * parse half of a rule. It is tightly coupled to the method 405 * Parse one side of a rule, stopping at either the limit, 410 public int parse(String rule, int pos, int limit 538 parser.checkVariableRange(buf.charAt(iq), rule, start); local 932 String rule = ruleArray.nextLine(); local [all...] |
NFRuleSet.java | 23 * appropriate rule for formatting a particular number and dispatch 34 * The rule set's name 39 * The rule set's regular rules 44 * The rule set's non-numerical rules like negative, fractions, infinity and NaN 68 * The RuleBasedNumberFormat that owns this rule 73 * True if the rule set is a fraction rule set. A fraction rule set 74 * is a rule set that is used to format the fractional part of a 75 * number. It is called from a >> substitution in another rule set' 470 NFRule rule = nonNumericalRules[NAN_RULE_INDEX]; local 489 NFRule rule = nonNumericalRules[INFINITY_RULE_INDEX]; local [all...] |
/external/icu/icu4j/main/classes/translit/src/com/ibm/icu/text/ |
TransliteratorParser.java | 32 * of rules in the rule set 38 * A Vector of Strings containing all of the ID blocks in the rule set 75 * rule. segmentStandins.charAt(0) is the standin for "$1" and corresponds 82 * parsing of a single rule. 130 // markers for beginning and end of rule groups 283 * A private abstract class representing the interface to rule 367 * A class representing one side of a rule. This class knows how to 368 * parse half of a rule. It is tightly coupled to the method 404 * Parse one side of a rule, stopping at either the limit, 409 public int parse(String rule, int pos, int limit 537 parser.checkVariableRange(buf.charAt(iq), rule, start); local 931 String rule = ruleArray.nextLine(); local [all...] |
/external/icu/icu4j/main/classes/core/src/com/ibm/icu/text/ |
NFRuleSet.java | 22 * appropriate rule for formatting a particular number and dispatch 33 * The rule set's name 38 * The rule set's regular rules 43 * The rule set's non-numerical rules like negative, fractions, infinity and NaN 67 * The RuleBasedNumberFormat that owns this rule 72 * True if the rule set is a fraction rule set. A fraction rule set 73 * is a rule set that is used to format the fractional part of a 74 * number. It is called from a >> substitution in another rule set' 469 NFRule rule = nonNumericalRules[NAN_RULE_INDEX]; local 488 NFRule rule = nonNumericalRules[INFINITY_RULE_INDEX]; local [all...] |
/external/antlr/antlr-3.4/gunit/src/main/java/org/antlr/gunit/swingui/model/ |
TestSuite.java | 36 protected List<Rule> rules ; 44 rules = new ArrayList<Rule>(); 52 public void addRule(Rule currentRule) { 53 if(currentRule == null) throw new IllegalArgumentException("Null rule"); 57 // test rule name 58 public boolean hasRule(Rule rule) { 59 for(Rule r: rules) { 60 if(r.getName().equals(rule.getName())) { 71 public void setRules(List<Rule> newRules) [all...] |
/external/mockito/src/test/java/org/mockito/internal/junit/ |
JUnitRuleTest.java | 3 import org.junit.Rule; 18 @Rule public SafeJUnitRule rule = new SafeJUnitRule(MockitoJUnit.rule()); field in class:JUnitRuleTest 27 rule.expectFailure(RuntimeException.class, "foo"); 33 rule.expectFailure(UnfinishedStubbingException.class); 40 //However, it was like that since the beginning of JUnit rule support 42 rule.expectFailure(RuntimeException.class, "foo");
|
/tools/loganalysis/src/com/android/loganalysis/rule/ |
RuleEngine.java | 16 package com.android.loganalysis.rule; 53 for (IRule rule : mRulesList) { 54 rule.applyRule(); 60 for (IRule rule : mRulesList) { 61 result.put(rule.getAnalysis());
|