/third_party/selinux/libsepol/tests/ |
D | Makefile | 40 m4support := $(wildcard policies/support/*.spt) 41 testsuites := $(wildcard policies/test-*) 45 policies := $(stdpol) $(mlspol) macro 47 all: $(EXE) $(policies) 48 policies: $(policies) target 61 rm -f $(policies) 62 rm -f policies/test-downgrade/policy.hi policies/test-downgrade/policy.lo 70 test: $(EXE) $(policies) 71 $(ENV) -i $(MKDIR) -p policies/test-downgrade 72 …../../checkpolicy/checkpolicy -M policies/test-cond/refpolicy-base.conf -o policies/test-downgrade… [all …]
|
D | test-linker.c | 48 const char *policies[NUM_POLICIES] = { variable 63 if (test_load_policy(&linkedbase, POLICY_BASE, mls, "test-linker", policies[BASEMOD])) in linker_test_init() 66 if (test_load_policy(&basenomods, POLICY_BASE, mls, "test-linker", policies[BASEMOD])) in linker_test_init() 77 if (test_load_policy(modules[i], POLICY_MOD, mls, "test-linker", policies[i])) in linker_test_init()
|
/third_party/node/deps/openssl/openssl/crypto/x509/ |
D | x509_vpm.c | 102 sk_ASN1_OBJECT_pop_free(param->policies, ASN1_OBJECT_free); in X509_VERIFY_PARAM_free() 190 if (test_x509_verify_param_copy(policies, NULL)) { in X509_VERIFY_PARAM_inherit() 191 if (!X509_VERIFY_PARAM_set1_policies(dest, src->policies)) in X509_VERIFY_PARAM_inherit() 335 if (param->policies == NULL) { in X509_VERIFY_PARAM_add0_policy() 336 param->policies = sk_ASN1_OBJECT_new_null(); in X509_VERIFY_PARAM_add0_policy() 337 if (param->policies == NULL) in X509_VERIFY_PARAM_add0_policy() 341 if (sk_ASN1_OBJECT_push(param->policies, policy) <= 0) in X509_VERIFY_PARAM_add0_policy() 347 STACK_OF(ASN1_OBJECT) *policies) in X509_VERIFY_PARAM_set1_policies() 356 sk_ASN1_OBJECT_pop_free(param->policies, ASN1_OBJECT_free); in X509_VERIFY_PARAM_set1_policies() 358 if (policies == NULL) { in X509_VERIFY_PARAM_set1_policies() [all …]
|
D | pcy_cache.c | 27 CERTIFICATEPOLICIES *policies, int crit) in policy_cache_create() argument 34 if ((num = sk_POLICYINFO_num(policies)) <= 0) in policy_cache_create() 42 policy = sk_POLICYINFO_value(policies, i); in policy_cache_create() 73 sk_POLICYINFO_pop_free(policies, POLICYINFO_free); in policy_cache_create()
|
/third_party/openssl/crypto/x509/ |
D | x509_vpm.c | 102 sk_ASN1_OBJECT_pop_free(param->policies, ASN1_OBJECT_free); in X509_VERIFY_PARAM_free() 190 if (test_x509_verify_param_copy(policies, NULL)) { in X509_VERIFY_PARAM_inherit() 191 if (!X509_VERIFY_PARAM_set1_policies(dest, src->policies)) in X509_VERIFY_PARAM_inherit() 335 if (param->policies == NULL) { in X509_VERIFY_PARAM_add0_policy() 336 param->policies = sk_ASN1_OBJECT_new_null(); in X509_VERIFY_PARAM_add0_policy() 337 if (param->policies == NULL) in X509_VERIFY_PARAM_add0_policy() 340 return sk_ASN1_OBJECT_push(param->policies, policy); in X509_VERIFY_PARAM_add0_policy() 344 STACK_OF(ASN1_OBJECT) *policies) in X509_VERIFY_PARAM_set1_policies() 353 sk_ASN1_OBJECT_pop_free(param->policies, ASN1_OBJECT_free); in X509_VERIFY_PARAM_set1_policies() 355 if (policies == NULL) { in X509_VERIFY_PARAM_set1_policies() [all …]
|
D | pcy_cache.c | 27 CERTIFICATEPOLICIES *policies, int crit) in policy_cache_create() argument 34 if ((num = sk_POLICYINFO_num(policies)) <= 0) in policy_cache_create() 42 policy = sk_POLICYINFO_value(policies, i); in policy_cache_create() 73 sk_POLICYINFO_pop_free(policies, POLICYINFO_free); in policy_cache_create()
|
/third_party/vk-gl-cts/external/jsoncpp/ |
D | CMakeLists.txt | 3 # ==== Define cmake build policies that affect compilation and linkage default behaviors 6 # policies that provide successful builds. By setting JSONCPP_NEWEST_VALIDATED_POLICIES_VERSION 7 # to a value greater than the oldest policies, all policies between 9 # are set to their NEW behaivor, thereby suppressing policy warnings related to policies 12 # CMake versions greater than the JSONCPP_NEWEST_VALIDATED_POLICIES_VERSION policies will 19 #Set and use the newest available cmake policies that are validated to work 26 # Now enumerate specific policies newer than JSONCPP_NEWEST_VALIDATED_POLICIES_VERSION
|
/third_party/node/doc/contributing/ |
D | security-model-strategy.md | 12 * Support experimentation on features like permissions and policies 53 ### Support experimentation on features like permissions and policies 57 related features like policies and permission enforcement. 67 [policies](https://nodejs.org/docs/latest/api/policy.html#policies).
|
/third_party/node/tools/inspector_protocol/jinja2/ |
D | filters.py | 522 policies = eval_ctx.environment.policies 526 rel.update((policies['urlize.rel'] or '').split()) 528 target = policies['urlize.target'] 603 leeway = env.policies['truncate.leeway'] 1072 policies = eval_ctx.environment.policies 1073 dumper = policies['json.dumps_function'] 1074 options = policies['json.dumps_kwargs']
|
/third_party/node/deps/v8/third_party/jinja2/ |
D | filters.py | 606 policies = eval_ctx.environment.policies 610 rel.update((policies["urlize.rel"] or "").split()) 612 target = policies["urlize.target"] 694 leeway = env.policies["truncate.leeway"] 1254 policies = eval_ctx.environment.policies 1255 dumper = policies["json.dumps_function"] 1256 options = policies["json.dumps_kwargs"]
|
/third_party/skia/third_party/externals/jinja2/ |
D | filters.py | 606 policies = eval_ctx.environment.policies 610 rel.update((policies["urlize.rel"] or "").split()) 612 target = policies["urlize.target"] 694 leeway = env.policies["truncate.leeway"] 1254 policies = eval_ctx.environment.policies 1255 dumper = policies["json.dumps_function"] 1256 options = policies["json.dumps_kwargs"]
|
/third_party/python/Lib/test/test_email/ |
D | test_policy.py | 47 policies = { variable in PolicyAPITests 64 policies[new_policy]['header_factory'] = new_policy.header_factory 67 for policy, expected in self.policies.items(): 75 for policy, expected in self.policies.items(): 99 for policy, defaults in self.policies.items(): 109 for policyclass, defaults in self.policies.items(): 116 for policyclass in self.policies:
|
/third_party/benchmark/docs/ |
D | dependencies.md | 3 We follow the [Foundational C++ support policy](https://opensource.google/documentation/policies/cp… 4 particular the ["Build Systems" section](https://opensource.google/documentation/policies/cplusplus…
|
/third_party/jinja2/ |
D | filters.py | 765 policies = eval_ctx.environment.policies 771 rel_parts.update((policies["urlize.rel"] or "").split()) 775 target = policies["urlize.target"] 778 extra_schemes = policies["urlize.extra_schemes"] or () 879 leeway = env.policies["truncate.leeway"] 1694 policies = eval_ctx.environment.policies 1695 dumps = policies["json.dumps_function"] 1696 kwargs = policies["json.dumps_kwargs"]
|
/third_party/openssl/crypto/ts/ |
D | ts_rsp_sign.c | 151 sk_ASN1_OBJECT_pop_free(ctx->policies, ASN1_OBJECT_free); in TS_RESP_CTX_free() 210 if (ctx->policies == NULL in TS_RESP_CTX_add_policy() 211 && (ctx->policies = sk_ASN1_OBJECT_new_null()) == NULL) in TS_RESP_CTX_add_policy() 215 if (!sk_ASN1_OBJECT_push(ctx->policies, copy)) in TS_RESP_CTX_add_policy() 512 for (i = 0; !policy && i < sk_ASN1_OBJECT_num(ctx->policies); ++i) { in ts_RESP_get_policy() 513 ASN1_OBJECT *current = sk_ASN1_OBJECT_value(ctx->policies, i); in ts_RESP_get_policy()
|
D | ts_conf.c | 317 char *policies = NCONF_get_string(conf, section, ENV_OTHER_POLICIES); in TS_CONF_set_policies() local 320 if (policies && (list = X509V3_parse_list(policies)) == NULL) { in TS_CONF_set_policies()
|
/third_party/node/deps/openssl/openssl/crypto/ts/ |
D | ts_rsp_sign.c | 151 sk_ASN1_OBJECT_pop_free(ctx->policies, ASN1_OBJECT_free); in TS_RESP_CTX_free() 210 if (ctx->policies == NULL in TS_RESP_CTX_add_policy() 211 && (ctx->policies = sk_ASN1_OBJECT_new_null()) == NULL) in TS_RESP_CTX_add_policy() 215 if (!sk_ASN1_OBJECT_push(ctx->policies, copy)) in TS_RESP_CTX_add_policy() 512 for (i = 0; !policy && i < sk_ASN1_OBJECT_num(ctx->policies); ++i) { in ts_RESP_get_policy() 513 ASN1_OBJECT *current = sk_ASN1_OBJECT_value(ctx->policies, i); in ts_RESP_get_policy()
|
D | ts_conf.c | 317 char *policies = NCONF_get_string(conf, section, ENV_OTHER_POLICIES); in TS_CONF_set_policies() local 320 if (policies && (list = X509V3_parse_list(policies)) == NULL) { in TS_CONF_set_policies()
|
/third_party/ltp/testcases/kernel/numa/ |
D | README | 8 also, we can apply memory policies such that an application running on a node can get memory alloct… 9 from any specified nodes memory. So, we can use the policies offered by numa libraries or numactl c…
|
/third_party/node/doc/api/ |
D | policy.md | 11 [Permissions documentation]: permissions.md#policies
|
/third_party/skia/site/docs/user/ |
D | privacy.md | 10 skia.org we follow this [privacy policy](https://policies.google.com/privacy).
|
/third_party/ltp/testcases/open_posix_testsuite/conformance/interfaces/sched_getscheduler/ |
D | coverage.txt | 9 3 YES Can not test the implementation defined policies
|
/third_party/ltp/testcases/open_posix_testsuite/conformance/definitions/sched_h/ |
D | coverage.txt | 16 9 NO implementation defined on how to get the other policies
|
/third_party/node/deps/npm/ |
D | README.md | 52 …ct to **Terms of Use** available at [https://npmjs.com/policies/terms](https://npmjs.com/policies/…
|
/third_party/openssl/test/ |
D | CAtsa.cnf | 137 other_policies = tsa_policy2, tsa_policy3 # acceptable policies (optional) 163 other_policies = tsa_policy2, tsa_policy3 # acceptable policies (optional)
|