/third_party/ltp/testcases/kernel/security/tomoyo/ |
D | tomoyo_new_file_test.c | 26 static const char *policy = ""; variable 31 printf("%s : ", policy); in show_result() 126 policy = "allow_read /proc/sys/net/ipv4/ip_local_port_range"; in stage_file_test() 127 write_domain_policy(policy, 0); in stage_file_test() 129 write_domain_policy(policy, 1); in stage_file_test() 132 policy = "allow_write /proc/sys/net/ipv4/ip_local_port_range"; in stage_file_test() 133 write_domain_policy(policy, 0); in stage_file_test() 135 write_domain_policy(policy, 1); in stage_file_test() 138 policy = "allow_read/write /proc/sys/net/ipv4/ip_local_port_range"; in stage_file_test() 139 write_domain_policy(policy, 0); in stage_file_test() [all …]
|
D | tomoyo_policy_memory_test.c | 42 static const char *policy = NULL; variable 63 if (strcmp(buffer, policy)) in check_policy_common() 70 printf("BUG: Policy write error: %s %s at %d\n", policy, in check_policy_common() 191 policy = domain_testcases[j]; in domain_policy_test() 192 printf("Processing: %s\n", policy); in domain_policy_test() 194 fprintf(fp, "%s\n", policy); in domain_policy_test() 197 fprintf(fp, "delete %s\n", policy); in domain_policy_test() 201 fprintf(fp, "%s\n", policy); in domain_policy_test() 203 fprintf(fp, "delete %s\n", policy); in domain_policy_test() 300 policy = exception_testcases[j]; in exception_policy_test() [all …]
|
/third_party/openssl/crypto/x509/ |
D | v3_pci.c | 78 if (pci->proxyPolicy->policy && pci->proxyPolicy->policy->data) in i2r_pci() 80 pci->proxyPolicy->policy->length, in i2r_pci() 81 pci->proxyPolicy->policy->data); in i2r_pci() 87 ASN1_OCTET_STRING **policy) in process_pci_value() argument 118 if (*policy == NULL) { in process_pci_value() 119 *policy = ASN1_OCTET_STRING_new(); in process_pci_value() 120 if (*policy == NULL) { in process_pci_value() 136 tmp_data = OPENSSL_realloc((*policy)->data, in process_pci_value() 137 (*policy)->length + val_len + 1); in process_pci_value() 139 (*policy)->data = tmp_data; in process_pci_value() [all …]
|
D | pcy_data.c | 38 X509_POLICY_DATA *ossl_policy_data_new(POLICYINFO *policy, in ossl_policy_data_new() argument 44 if (policy == NULL && cid == NULL) in ossl_policy_data_new() 72 ret->valid_policy = policy->policyid; in ossl_policy_data_new() 73 policy->policyid = NULL; in ossl_policy_data_new() 76 if (policy) { in ossl_policy_data_new() 77 ret->qualifier_set = policy->qualifiers; in ossl_policy_data_new() 78 policy->qualifiers = NULL; in ossl_policy_data_new()
|
/third_party/node/deps/openssl/openssl/crypto/x509/ |
D | v3_pci.c | 78 if (pci->proxyPolicy->policy && pci->proxyPolicy->policy->data) in i2r_pci() 80 pci->proxyPolicy->policy->length, in i2r_pci() 81 pci->proxyPolicy->policy->data); in i2r_pci() 87 ASN1_OCTET_STRING **policy) in process_pci_value() argument 118 if (*policy == NULL) { in process_pci_value() 119 *policy = ASN1_OCTET_STRING_new(); in process_pci_value() 120 if (*policy == NULL) { in process_pci_value() 136 tmp_data = OPENSSL_realloc((*policy)->data, in process_pci_value() 137 (*policy)->length + val_len + 1); in process_pci_value() 139 (*policy)->data = tmp_data; in process_pci_value() [all …]
|
D | pcy_data.c | 38 X509_POLICY_DATA *ossl_policy_data_new(POLICYINFO *policy, in ossl_policy_data_new() argument 44 if (policy == NULL && cid == NULL) in ossl_policy_data_new() 72 ret->valid_policy = policy->policyid; in ossl_policy_data_new() 73 policy->policyid = NULL; in ossl_policy_data_new() 76 if (policy) { in ossl_policy_data_new() 77 ret->qualifier_set = policy->qualifiers; in ossl_policy_data_new() 78 policy->qualifiers = NULL; in ossl_policy_data_new()
|
/third_party/python/Lib/test/test_email/ |
D | test_policy.py | 6 import email.policy 36 'header_factory': email.policy.EmailPolicy.header_factory, 38 'content_manager': email.policy.EmailPolicy.content_manager, 46 new_policy = email.policy.EmailPolicy() 48 email.policy.compat32: make_defaults(compat32_defaults, {}), 49 email.policy.default: make_defaults(policy_defaults, {}), 50 email.policy.SMTP: make_defaults(policy_defaults, 52 email.policy.SMTPUTF8: make_defaults(policy_defaults, 55 email.policy.HTTP: make_defaults(policy_defaults, 58 email.policy.strict: make_defaults(policy_defaults, [all …]
|
D | test_generator.py | 8 from email import policy 15 policy = policy.default variable in TestGeneratorBase 17 def msgmaker(self, msg, policy=None): argument 18 policy = self.policy if policy is None else policy 19 return self.msgfunc(msg, policy=policy) 90 g = self.genclass(s, maxheaderlen=n, policy=self.policy) 97 g = self.genclass(s, policy=self.policy.clone(max_line_length=n)) 105 policy=self.policy.clone(max_line_length=10)) 112 g = self.genclass(s, policy=self.policy.clone(refold_source='none', 120 g = self.genclass(s, policy=self.policy.clone(refold_source='all', [all …]
|
D | __init__.py | 29 policy = compat32 variable in TestEmailBase 42 return email.message_from_file(fp, policy=self.policy) 44 def _str_msg(self, string, message=None, policy=None): argument 45 if policy is None: 46 policy = self.policy 49 return email.message_from_string(string, message, policy=policy) 51 def _bytes_msg(self, bytestring, message=None, policy=None): argument 52 if policy is None: 53 policy = self.policy 56 return email.message_from_bytes(bytestring, message, policy=policy) [all …]
|
D | test_headerregistry.py | 5 from email import policy 142 self.assertEqual(h.fold(policy=policy.default), folded) 229 m = Message(policy=policy.default) 259 self.assertEqual(h.fold(policy=policy.default), folded) 807 self.assertEqual(h.fold(policy=policy.default), folded) 849 self.assertEqual(h.fold(policy=policy.default), folded) 932 self.assertEqual(h.fold(policy=policy.default), 1362 self.assertEqual(h.fold(policy=policy.default.clone(max_line_length=40)), 1571 m = Message(policy=policy.default) 1578 m = Message(policy=policy.default) [all …]
|
/third_party/gstreamer/gstplugins_bad/ext/srtp/ |
D | gstsrtp.c | 217 GstSrtpAuthType auth, srtp_crypto_policy_t * policy) in set_crypto_policy_cipher_auth() argument 221 policy->cipher_type = SRTP_AES_ICM_128; in set_crypto_policy_cipher_auth() 224 policy->cipher_type = SRTP_AES_ICM_256; in set_crypto_policy_cipher_auth() 227 policy->cipher_type = SRTP_AES_GCM_128; in set_crypto_policy_cipher_auth() 230 policy->cipher_type = SRTP_AES_GCM_256; in set_crypto_policy_cipher_auth() 233 policy->cipher_type = SRTP_NULL_CIPHER; in set_crypto_policy_cipher_auth() 239 policy->cipher_key_len = cipher_key_size (cipher); in set_crypto_policy_cipher_auth() 243 policy->auth_type = SRTP_HMAC_SHA1; in set_crypto_policy_cipher_auth() 244 policy->auth_key_len = 20; in set_crypto_policy_cipher_auth() 245 policy->auth_tag_len = 10; in set_crypto_policy_cipher_auth() [all …]
|
/third_party/ltp/testcases/kernel/syscalls/mbind/ |
D | mbind01.c | 29 #define POLICY_DESC(x) .policy = x, .desc = #x 30 #define POLICY_DESC_TEXT(x, y) .policy = x, .desc = #x" ("y")" 40 int policy; member 139 static void check_policy_pref_or_local(int policy) in check_policy_pref_or_local() argument 141 if (policy != MPOL_PREFERRED && policy != MPOL_LOCAL) { in check_policy_pref_or_local() 144 tst_mempolicy_mode_name(policy), policy); in check_policy_pref_or_local() 152 TEST(mbind(p, MEM_LENGTH, tc->policy, nodemask->maskp, in test_default() 160 TEST(mbind(p, MEM_LENGTH, tc->policy, NULL, 0, tc->flags)); in test_none() 168 TEST(mbind(p, MEM_LENGTH, tc->policy, sbrk(0) + 64*1024*1024, in test_invalid_nodemask() 194 int policy, fail = 0; in do_test() local [all …]
|
/third_party/python/Lib/email/ |
D | generator.py | 37 policy=None): argument 62 mangle_from_ = True if policy is None else policy.mangle_from_ 66 self.policy = policy 93 policy = msg.policy if self.policy is None else self.policy 95 policy = policy.clone(linesep=linesep) 97 policy = policy.clone(max_line_length=self.maxheaderlen) 98 self._NL = policy.linesep 106 old_gen_policy = self.policy 107 old_msg_policy = msg.policy 109 self.policy = policy [all …]
|
D | message.py | 120 def __init__(self, policy=compat32): argument 121 self.policy = policy 137 def as_string(self, unixfrom=False, maxheaderlen=0, policy=None): argument 152 policy = self.policy if policy is None else policy 157 policy=policy) 166 def as_bytes(self, unixfrom=False, policy=None): argument 175 policy = self.policy if policy is None else policy 177 g = BytesGenerator(fp, mangle_from_=False, policy=policy) 288 self.policy.handle_defect(self, defect) 399 max_count = self.policy.header_max_count(name) [all …]
|
/third_party/ltp/testcases/realtime/stress/pi-tests/ |
D | testpi-3.c | 101 int rc, i, j, policy, tid = gettid(); in func_nonrt() local 117 pthread_getschedparam(pthr->pthread, &policy, &schedp); in func_nonrt() 124 pthr->priority, policy, schedp.sched_priority); in func_nonrt() 129 policy = sched_getscheduler(tid); in func_nonrt() 132 policy, schedp.sched_priority); in func_nonrt() 150 int rc, i, j, policy, tid = gettid(); in func_rt() local 166 pthread_getschedparam(pthr->pthread, &policy, &schedp); in func_rt() 174 pthr->priority, policy, schedp.sched_priority); in func_rt() 184 policy = sched_getscheduler(tid); in func_rt() 187 tid, pthr->priority, i, policy, in func_rt() [all …]
|
/third_party/libwebsockets/lib/secure-streams/protocols/ |
D | ss-mqtt.c | 57 if (!h || !h->policy) in secstream_mqtt_subscribe() 60 if (h->policy->u.mqtt.aws_iot) in secstream_mqtt_subscribe() 65 if (!h->policy->u.mqtt.subscribe || wsi->mqtt->done_subscribe) in secstream_mqtt_subscribe() 75 if (lws_strexp_expand(&exp, h->policy->u.mqtt.subscribe, in secstream_mqtt_subscribe() 76 strlen(h->policy->u.mqtt.subscribe), &used_in, in secstream_mqtt_subscribe() 97 if (lws_strexp_expand(&exp, h->policy->u.mqtt.subscribe, in secstream_mqtt_subscribe() 98 strlen(h->policy->u.mqtt.subscribe), &used_in, in secstream_mqtt_subscribe() 117 h->u.mqtt.sub_top.qos = h->policy->u.mqtt.qos; in secstream_mqtt_subscribe() 124 h->u.mqtt.sub_info.topic[0].qos = h->policy->u.mqtt.qos; in secstream_mqtt_subscribe() 154 if (h->policy->u.mqtt.aws_iot) in secstream_mqtt_publish() [all …]
|
/third_party/libwebsockets/lib/secure-streams/ |
D | secure-streams.c | 199 if (!h->policy || !(h->policy->flags & LWSSSPOLF_PERF) || !h->wsi || in lws_conmon_ss_json() 489 lws_ss_metadata_t *md = lws_ss_policy_metadata(h->policy, name), in lws_ss_exp_cb_metadata() 531 !!(h->policy->flags & LWSSSPOLF_WAKE_SUSPEND__VALIDITY)], in lws_ss_set_timeout_us() 551 ms = lws_retry_get_delay_ms(h->context, h->policy->retry_bo, in _lws_ss_backoff() 679 if (!h->policy) { in _lws_ss_client_connect() 696 if (h->policy == &pol_smd) { in _lws_ss_client_connect() 728 if (lws_strexp_expand(&exp, h->policy->endpoint, in _lws_ss_client_connect() 729 strlen(h->policy->endpoint), in _lws_ss_client_connect() 744 _port = port = h->policy->port; in _lws_ss_client_connect() 761 tls = !!(h->policy->flags & LWSSSPOLF_TLS); in _lws_ss_client_connect() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
D | robust_av.c | 862 static int set_frame_classifier_type4_ipv4(struct dscp_policy_data *policy) in set_frame_classifier_type4_ipv4() argument 865 const u8 *frame_classifier = policy->frame_classifier; in set_frame_classifier_type4_ipv4() 866 struct type4_params *type4_param = &policy->type4_param; in set_frame_classifier_type4_ipv4() 868 if (policy->frame_classifier_len < 18) { in set_frame_classifier_type4_ipv4() 871 policy->frame_classifier_len); in set_frame_classifier_type4_ipv4() 886 if (policy->domain_name) { in set_frame_classifier_type4_ipv4() 906 if (policy->port_range_info) { in set_frame_classifier_type4_ipv4() 929 static int set_frame_classifier_type4_ipv6(struct dscp_policy_data *policy) in set_frame_classifier_type4_ipv6() argument 932 const u8 *frame_classifier = policy->frame_classifier; in set_frame_classifier_type4_ipv6() 933 struct type4_params *type4_param = &policy->type4_param; in set_frame_classifier_type4_ipv6() [all …]
|
/third_party/selinux/secilc/docs/ |
D | cil_introduction.md | 4 …s between one or more high level policy languages (such as the current module language) and the lo… 6 …e and produce language constructs with more features than the raw kernel policy (e.g., interfaces)… 8 …f high-level languages, encouraging the creation of more domain specific policy languages (e.g., C… 10 * Provides a semantically rich representation suitable for policy analysis, allowing the analysis o… 19 …sy to parse and to generate by high-level compilers, analysis tools, and policy generation tools. … 21 …policy that will be enforced by the kernel. That policy must be full represented so that all of th… 23 …istent one - CIL is meant for a source policy oriented world, so assume and leverage that. The onl… 25 …lute requirement. Where necessary it is assumed that manual or automated policy conversion will be… 27 …policy, but there is no reason to re-think core concepts that are working well. All changes to exi… 29 * No more M4 - the pervasive use of M4 and pre-processing in general has eased policy creation, but… [all …]
|
/third_party/iptables/ |
D | iptables.init | 112 policy=$1 121 echo -n $"${IPTABLES}: Setting chains to policy $policy: " 127 $IPTABLES -t filter -P INPUT $policy \ 128 && $IPTABLES -t filter -P OUTPUT $policy \ 129 && $IPTABLES -t filter -P FORWARD $policy \ 133 $IPTABLES -t raw -P PREROUTING $policy \ 134 && $IPTABLES -t raw -P OUTPUT $policy \ 138 $IPTABLES -t filter -P INPUT $policy \ 139 && $IPTABLES -t filter -P OUTPUT $policy \ 140 && $IPTABLES -t filter -P FORWARD $policy \ [all …]
|
/third_party/node/deps/npm/node_modules/make-fetch-happen/lib/cache/ |
D | policy.js | 51 this.policy = new CacheSemantics(this.request, this.response, policyOptions) property 58 this.policy._responseTime = this.entry.metadata.time 81 const policy = new CacheSemantics(requestObject(request), emptyResponse, policyOptions) constant 82 return policy.storable() 120 return this.policy.storable() 127 return !!this.policy._rescc['must-revalidate'] 137 return !this.policy.satisfiesWithoutRevalidation(_req) 141 return this.policy.responseHeaders() 148 return this.policy.revalidationHeaders(_req) 156 const policy = this.policy.revalidatedPolicy(_req, _res) [all …]
|
/third_party/python/Doc/library/ |
D | email.parser.rst | 42 :class:`~email.message.EmailMessage` class is embodied in the :mod:`policy` 44 necessary by implementing custom versions of the appropriate :mod:`policy` 73 .. class:: BytesFeedParser(_factory=None, *, policy=policy.compat32) 77 :attr:`~email.policy.Policy.message_factory` from the *policy*. Call 80 If *policy* is specified use the rules it specifies to update the 81 representation of the message. If *policy* is not set, use the 82 :class:`compat32 <email.policy.Compat32>` policy, which maintains backward 86 more information on what else *policy* controls, see the 87 :mod:`~email.policy` documentation. 89 Note: **The policy keyword should always be specified**; The default will [all …]
|
/third_party/python/Lib/email/mime/ |
D | base.py | 9 import email.policy 18 def __init__(self, _maintype, _subtype, *, policy=None, **_params): argument 25 if policy is None: 26 policy = email.policy.compat32 27 message.Message.__init__(self, policy=policy)
|
/third_party/ltp/testcases/kernel/security/integrity/ima/ |
D | README.md | 12 `ima_measurements.sh` require builtin IMA tcb policy to be loaded 14 Although a custom policy, loaded via dracut, systemd or manually from user 20 policy, as well as a loaded measure policy with `func=KEY_CHECK keyrings=...`. 22 The certificate import test (second test) requires measure policy with 25 For example of valid policy for both tests on all supported kernels see `keycheck.policy`. 28 `ima-buf` template should be specified in the IMA policy rule for 35 policy rule for key measurement, e.g.: 41 policy allowed in the kernel configuration: 48 `ima_kexec.sh` requires loaded policy which contains `measure func=KEXEC_CMDLINE`, 49 see example in `kexec.policy`. [all …]
|
/third_party/ltp/testcases/open_posix_testsuite/functional/threads/schedule/ |
D | 1-2.c | 54 int policy; in hi_prio_thread() local 59 SAFE_PFUNC(pthread_getschedparam(pthread_self(), &policy, ¶m)); in hi_prio_thread() 60 if (policy != SCHED_RR) { in hi_prio_thread() 85 int policy; in low_prio_thread() local 90 SAFE_PFUNC(pthread_getschedparam(pthread_self(), &policy, ¶m)); in low_prio_thread() 91 if (policy != SCHED_RR) { in low_prio_thread() 115 int policy; in main() local 119 SAFE_PFUNC(pthread_getschedparam(pthread_self(), &policy, ¶m)); in main() 120 if (policy != SCHED_RR) { in main()
|