/external/autotest/client/site_tests/login_GuestAndActualSession/ |
login_GuestAndActualSession.py | 11 from autotest_lib.client.common_lib.cros import policy, session_manager 48 retrieved_policy = policy.get_policy(self._session_manager) 49 if retrieved_policy is None: raise error.TestFail('Policy not found') 50 policy.compare_policy_response(self.srcdir, retrieved_policy,
|
/external/ltp/testcases/kernel/security/integrity/ima/tests/ |
ima_policy.sh | 25 # policy. 34 # verify using default policy 35 IMA_POLICY=$IMA_DIR/policy 37 tst_resm TINFO "default policy already replaced" 40 VALID_POLICY=$LTPROOT/testcases/data/ima_policy/measure.policy 45 INVALID_POLICY=$LTPROOT/testcases/data/ima_policy/measure.policy-invalid 74 # Description - Verify invalid policy doesn't replace default policy. 80 tst_resm TPASS "didn't load invalid policy" 82 tst_resm TFAIL "loaded invalid policy" [all...] |
/external/ltp/testcases/open_posix_testsuite/conformance/interfaces/pthread_attr_setinheritsched/ |
2-1.c | 12 * 2. Set schedule policy (policy) in attr to SCHED_FIFO 16 * policy value(new_policy) 18 * default policy value in the creating thread. if new_policy is 32 const long int policy = SCHED_FIFO; variable 47 if (new_policy == policy) { 69 rc = pthread_attr_setschedpolicy(&attr, policy);
|
2-3.c | 9 * policy and priority. 14 * 3. Change main's priority and policy 16 * 5. Check that it has correct priority and policy 29 #define POLICY SCHED_FIFO 38 int policy; local 41 rc = pthread_getschedparam(pthread_self(), &policy, ¶m); 46 if (policy == POLICY) { 77 rc = pthread_setschedparam(pthread_self(), POLICY, ¶m);
|
2-4.c | 9 * policy and priority. 13 * 2. Change main's priority and policy 16 * 5. Check that it has correct priority and policy 29 #define POLICY SCHED_RR 38 int policy; local 41 rc = pthread_getschedparam(pthread_self(), &policy, ¶m); 46 if (policy == POLICY) { 65 rc = pthread_setschedparam(pthread_self(), POLICY, ¶m);
|
/external/ltp/testcases/open_posix_testsuite/conformance/interfaces/pthread_attr_setschedparam/ |
1-3.c | 12 * 1. Create a pthread_attr structure and set policy and priority in it 29 #define POLICY SCHED_FIFO 40 int policy; local 41 if (pthread_getschedparam(pthread_self(), &policy, ¶m) != 0) { 45 if (policy == POLICY) { 61 /* initialze the attribute and set policy and priority in it */ 67 rc = pthread_attr_setschedpolicy(&attr, POLICY); 104 printf("Test FAILED. Policy set incorrectly\n");
|
1-4.c | 12 * 1. Create a pthread_attr structure and set policy and priority in it 29 #define POLICY SCHED_RR 40 int policy; local 43 rc = pthread_getschedparam(pthread_self(), &policy, ¶m); 48 if (policy == POLICY) { 64 /* Initialze the attribute struct and set policy and priority in it */ 70 rc = pthread_attr_setschedpolicy(&attr, POLICY); 108 printf("Test FAILED. Policy set incorrectly\n");
|
/external/ltp/testcases/open_posix_testsuite/conformance/interfaces/sched_setparam/ |
21-1.c | 12 * their scheduling policy from the process. 32 int new_priority, max_priority, old_policy, policy, result; local 69 if (pthread_getschedparam(tid, &policy, ¶m) != 0) { 76 if (policy == old_policy) { 80 printf("The threads does not inherit the right policy.\n");
|
/external/ltp/testcases/open_posix_testsuite/conformance/interfaces/sched_setscheduler/ |
22-1.c | 12 * their scheduling policy from the process. 33 int new_policy, policy, result; local 43 /* Make sure new policy != old policy */ 51 ("This process does not have the permission to set its own scheduling policy.\nTry to launch this test as root.\n"); 75 if (pthread_getschedparam(tid, &policy, ¶m) != 0) { 82 if (policy == new_policy) { 86 printf("The thread does not inherit the right policy.\n");
|
/external/ltp/testcases/open_posix_testsuite/functional/threads/include/ |
pitest.h | 25 int test_set_priority(pthread_t pid, unsigned policy, unsigned prio) 30 if (pthread_setschedparam(pid, policy, &sched_param) == -1) 32 EPRINTF("UNRESOLVED: Can't set policy to %d and prio to %d", 33 policy, prio);
|
/frameworks/base/packages/SystemUI/src/com/android/systemui/statusbar/policy/ |
EthernetSignalController.java | 16 package com.android.systemui.statusbar.policy; 21 import com.android.systemui.statusbar.policy.NetworkController.IconState; 22 import com.android.systemui.statusbar.policy.NetworkController.SignalCallback;
|
/frameworks/base/packages/SystemUI/tests/src/com/android/systemui/utils/leaks/ |
FakeNetworkController.java | 21 import com.android.systemui.statusbar.policy.DataSaverController; 22 import com.android.systemui.statusbar.policy.NetworkController; 23 import com.android.systemui.statusbar.policy.NetworkController.SignalCallback;
|
/libcore/dalvik/src/main/java/dalvik/system/ |
BlockGuard.java | 52 public interface Policy { 74 * Returns the policy bitmask, for shipping over Binder calls 75 * to remote threads/processes and reinstantiating the policy 114 return "policy=" + mPolicyState + " violation=" + mPolicyViolated + 120 * The default, permissive policy that doesn't prevent any operations. 122 public static final Policy LAX_POLICY = new Policy() { 132 private static ThreadLocal<Policy> threadPolicy = new ThreadLocal<Policy>() { 133 @Override protected Policy initialValue() [all...] |
/libcore/ojluni/src/main/java/sun/security/timestamp/ |
TimestampToken.java | 45 * policy TSAPolicyId, 76 private ObjectIdentifier policy; field in class:TimestampToken 119 return policy.toString(); 143 // Parse policy 144 policy = tstInfo.data.getOID();
|
/packages/services/Car/tests/carservice_test/src/com/android/car/ |
TestAppBlockingPolicyService.java | 63 CarAppBlockingPolicy policy = new CarAppBlockingPolicy(whitelists, null); local 64 Log.i(TAG, "getAppBlockingPolicy, passing policy:" + policy); 65 return policy;
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/setools/ |
boolquery.py | 28 """Query SELinux policy Booleans. 31 policy The policy to query. 54 def __init__(self, policy, **kwargs): 55 super(BoolQuery, self).__init__(policy, **kwargs) 60 self.log.info("Generating Boolean results from {0.policy}".format(self)) 64 for boolean in self.policy.bools():
|
boundsquery.py | 33 policy The policy to query. 45 def __init__(self, policy, **kwargs): 46 super(BoundsQuery, self).__init__(policy, **kwargs) 51 self.log.info("Generating bounds results from {0.policy}".format(self)) 56 for b in self.policy.bounds():
|
defaultquery.py | 33 policy The policy to query. 49 def __init__(self, policy, **kwargs): 50 super(DefaultQuery, self).__init__(policy, **kwargs) 55 self.log.info("Generating default_* results from {0.policy}".format(self)) 61 for d in self.policy.defaults():
|
fsusequery.py | 34 policy The policy to query. 65 def __init__(self, policy, **kwargs): 66 super(FSUseQuery, self).__init__(policy, **kwargs) 71 self.log.info("Generating fs_use_* results from {0.policy}".format(self)) 76 for fsu in self.policy.fs_uses():
|
genfsconquery.py | 34 policy The policy to query. 69 def __init__(self, policy, **kwargs): 70 super(GenfsconQuery, self).__init__(policy, **kwargs) 75 self.log.info("Generating genfscon results from {0.policy}".format(self)) 81 for genfs in self.policy.genfscons():
|
pcideviceconquery.py | 31 policy The policy to query. 75 def __init__(self, policy, **kwargs): 76 super(PcideviceconQuery, self).__init__(policy, **kwargs) 81 self.log.info("Generating results from {0.policy}".format(self)) 85 for pcidevicecon in self.policy.pcidevicecons():
|
pirqconquery.py | 31 policy The policy to query. 75 def __init__(self, policy, **kwargs): 76 super(PirqconQuery, self).__init__(policy, **kwargs) 81 self.log.info("Generating results from {0.policy}".format(self)) 85 for pirqcon in self.policy.pirqcons():
|
rolequery.py | 31 Query SELinux policy roles. 34 policy The policy to query. 54 def __init__(self, policy, **kwargs): 55 super(RoleQuery, self).__init__(policy, **kwargs) 60 self.log.info("Generating role results from {0.policy}".format(self)) 65 for r in self.policy.roles():
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/setools/policyrep/ |
role.py | 29 assert name.policy == qpol_policy 62 for type_ in self.qpol_symbol.type_iter(self.policy): 63 yield typeattr.type_or_attr_factory(self.policy, type_)
|
rule.py | 26 """This is base class for policy rules.""" 47 return self.qpol_symbol.rule_type(self.policy) 68 return objclass.class_factory(self.policy, self.qpol_symbol.object_class(self.policy))
|