/third_party/ltp/testcases/kernel/security/tomoyo/ |
D | tomoyo_new_file_test.c | 26 static const char *policy = ""; variable 31 printf("%s : ", policy); in show_result() 126 policy = "allow_read /proc/sys/net/ipv4/ip_local_port_range"; in stage_file_test() 127 write_domain_policy(policy, 0); in stage_file_test() 129 write_domain_policy(policy, 1); in stage_file_test() 132 policy = "allow_write /proc/sys/net/ipv4/ip_local_port_range"; in stage_file_test() 133 write_domain_policy(policy, 0); in stage_file_test() 135 write_domain_policy(policy, 1); in stage_file_test() 138 policy = "allow_read/write /proc/sys/net/ipv4/ip_local_port_range"; in stage_file_test() 139 write_domain_policy(policy, 0); in stage_file_test() [all …]
|
D | tomoyo_policy_memory_test.c | 42 static const char *policy = NULL; variable 63 if (strcmp(buffer, policy)) in check_policy_common() 70 printf("BUG: Policy write error: %s %s at %d\n", policy, in check_policy_common() 191 policy = domain_testcases[j]; in domain_policy_test() 192 printf("Processing: %s\n", policy); in domain_policy_test() 194 fprintf(fp, "%s\n", policy); in domain_policy_test() 197 fprintf(fp, "delete %s\n", policy); in domain_policy_test() 201 fprintf(fp, "%s\n", policy); in domain_policy_test() 203 fprintf(fp, "delete %s\n", policy); in domain_policy_test() 300 policy = exception_testcases[j]; in exception_policy_test() [all …]
|
/third_party/python/Lib/test/test_email/ |
D | test_policy.py | 6 import email.policy 36 'header_factory': email.policy.EmailPolicy.header_factory, 38 'content_manager': email.policy.EmailPolicy.content_manager, 46 new_policy = email.policy.EmailPolicy() 48 email.policy.compat32: make_defaults(compat32_defaults, {}), 49 email.policy.default: make_defaults(policy_defaults, {}), 50 email.policy.SMTP: make_defaults(policy_defaults, 52 email.policy.SMTPUTF8: make_defaults(policy_defaults, 55 email.policy.HTTP: make_defaults(policy_defaults, 58 email.policy.strict: make_defaults(policy_defaults, [all …]
|
D | test_generator.py | 8 from email import policy 15 policy = policy.default variable in TestGeneratorBase 17 def msgmaker(self, msg, policy=None): argument 18 policy = self.policy if policy is None else policy 19 return self.msgfunc(msg, policy=policy) 90 g = self.genclass(s, maxheaderlen=n, policy=self.policy) 97 g = self.genclass(s, policy=self.policy.clone(max_line_length=n)) 105 policy=self.policy.clone(max_line_length=10)) 112 g = self.genclass(s, policy=self.policy.clone(refold_source='none', 120 g = self.genclass(s, policy=self.policy.clone(refold_source='all', [all …]
|
D | __init__.py | 29 policy = compat32 variable in TestEmailBase 42 return email.message_from_file(fp, policy=self.policy) 44 def _str_msg(self, string, message=None, policy=None): argument 45 if policy is None: 46 policy = self.policy 49 return email.message_from_string(string, message, policy=policy) 51 def _bytes_msg(self, bytestring, message=None, policy=None): argument 52 if policy is None: 53 policy = self.policy 56 return email.message_from_bytes(bytestring, message, policy=policy) [all …]
|
D | test_headerregistry.py | 5 from email import policy 142 self.assertEqual(h.fold(policy=policy.default), folded) 229 m = Message(policy=policy.default) 259 self.assertEqual(h.fold(policy=policy.default), folded) 807 self.assertEqual(h.fold(policy=policy.default), folded) 849 self.assertEqual(h.fold(policy=policy.default), folded) 932 self.assertEqual(h.fold(policy=policy.default), 1362 self.assertEqual(h.fold(policy=policy.default.clone(max_line_length=40)), 1571 m = Message(policy=policy.default) 1578 m = Message(policy=policy.default) [all …]
|
D | test_parser.py | 5 from email.policy import default 12 def __init__(self, policy): argument 13 self.check_policy = policy 16 MyPolicy = TestEmailBase.policy.clone(linesep='boo') 21 policy=self.MyPolicy) 29 policy=self.MyPolicy) 55 policy=default, 77 msg = parser("To: foo\n\ntest", policy=MyPolicy) 84 msg = parser("To: foo\n\ntest", Message, policy=MyPolicy)
|
/third_party/node/deps/openssl/openssl/crypto/x509/ |
D | v3_pci.c | 78 if (pci->proxyPolicy->policy && pci->proxyPolicy->policy->data) in i2r_pci() 80 pci->proxyPolicy->policy->length, in i2r_pci() 81 pci->proxyPolicy->policy->data); in i2r_pci() 87 ASN1_OCTET_STRING **policy) in process_pci_value() argument 118 if (*policy == NULL) { in process_pci_value() 119 *policy = ASN1_OCTET_STRING_new(); in process_pci_value() 120 if (*policy == NULL) { in process_pci_value() 136 tmp_data = OPENSSL_realloc((*policy)->data, in process_pci_value() 137 (*policy)->length + val_len + 1); in process_pci_value() 139 (*policy)->data = tmp_data; in process_pci_value() [all …]
|
/third_party/openssl/crypto/x509/ |
D | v3_pci.c | 78 if (pci->proxyPolicy->policy && pci->proxyPolicy->policy->data) in i2r_pci() 80 pci->proxyPolicy->policy->length, in i2r_pci() 81 pci->proxyPolicy->policy->data); in i2r_pci() 87 ASN1_OCTET_STRING **policy) in process_pci_value() argument 118 if (*policy == NULL) { in process_pci_value() 119 *policy = ASN1_OCTET_STRING_new(); in process_pci_value() 120 if (*policy == NULL) { in process_pci_value() 136 tmp_data = OPENSSL_realloc((*policy)->data, in process_pci_value() 137 (*policy)->length + val_len + 1); in process_pci_value() 139 (*policy)->data = tmp_data; in process_pci_value() [all …]
|
/third_party/ltp/testcases/kernel/syscalls/mbind/ |
D | mbind01.c | 29 #define POLICY_DESC(x) .policy = x, .desc = #x 30 #define POLICY_DESC_TEXT(x, y) .policy = x, .desc = #x" ("y")" 40 int policy; member 139 static void check_policy_pref_or_local(int policy) in check_policy_pref_or_local() argument 141 if (policy != MPOL_PREFERRED && policy != MPOL_LOCAL) { in check_policy_pref_or_local() 144 tst_mempolicy_mode_name(policy), policy); in check_policy_pref_or_local() 152 TEST(mbind(p, MEM_LENGTH, tc->policy, nodemask->maskp, in test_default() 160 TEST(mbind(p, MEM_LENGTH, tc->policy, NULL, 0, tc->flags)); in test_none() 168 TEST(mbind(p, MEM_LENGTH, tc->policy, sbrk(0) + 64*1024*1024, in test_invalid_nodemask() 194 int policy, fail = 0; in do_test() local [all …]
|
/third_party/python/Lib/email/ |
D | generator.py | 37 policy=None): argument 62 mangle_from_ = True if policy is None else policy.mangle_from_ 66 self.policy = policy 93 policy = msg.policy if self.policy is None else self.policy 95 policy = policy.clone(linesep=linesep) 97 policy = policy.clone(max_line_length=self.maxheaderlen) 98 self._NL = policy.linesep 106 old_gen_policy = self.policy 107 old_msg_policy = msg.policy 109 self.policy = policy [all …]
|
D | message.py | 120 def __init__(self, policy=compat32): argument 121 self.policy = policy 137 def as_string(self, unixfrom=False, maxheaderlen=0, policy=None): argument 152 policy = self.policy if policy is None else policy 157 policy=policy) 166 def as_bytes(self, unixfrom=False, policy=None): argument 175 policy = self.policy if policy is None else policy 177 g = BytesGenerator(fp, mangle_from_=False, policy=policy) 288 self.policy.handle_defect(self, defect) 399 max_count = self.policy.header_max_count(name) [all …]
|
/third_party/ltp/testcases/realtime/stress/pi-tests/ |
D | testpi-3.c | 101 int rc, i, j, policy, tid = gettid(); in func_nonrt() local 117 pthread_getschedparam(pthr->pthread, &policy, &schedp); in func_nonrt() 124 pthr->priority, policy, schedp.sched_priority); in func_nonrt() 129 policy = sched_getscheduler(tid); in func_nonrt() 132 policy, schedp.sched_priority); in func_nonrt() 150 int rc, i, j, policy, tid = gettid(); in func_rt() local 166 pthread_getschedparam(pthr->pthread, &policy, &schedp); in func_rt() 174 pthr->priority, policy, schedp.sched_priority); in func_rt() 184 policy = sched_getscheduler(tid); in func_rt() 187 tid, pthr->priority, i, policy, in func_rt() [all …]
|
/third_party/libwebsockets/lib/secure-streams/ |
D | secure-streams.c | 205 if (!h->policy || !(h->policy->flags & LWSSSPOLF_PERF) || !h->wsi || in lws_conmon_ss_json() 495 lws_ss_metadata_t *md = lws_ss_policy_metadata(h->policy, name), in lws_ss_exp_cb_metadata() 537 !!(h->policy->flags & LWSSSPOLF_WAKE_SUSPEND__VALIDITY)], in lws_ss_set_timeout_us() 557 ms = lws_retry_get_delay_ms(h->context, h->policy->retry_bo, in _lws_ss_backoff() 685 if (!h->policy) { in _lws_ss_client_connect() 702 if (h->policy == &pol_smd) { in _lws_ss_client_connect() 734 if (lws_strexp_expand(&exp, h->policy->endpoint, in _lws_ss_client_connect() 735 strlen(h->policy->endpoint), in _lws_ss_client_connect() 750 _port = port = h->policy->port; in _lws_ss_client_connect() 767 tls = !!(h->policy->flags & LWSSSPOLF_TLS); in _lws_ss_client_connect() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
D | robust_av.c | 862 static int set_frame_classifier_type4_ipv4(struct dscp_policy_data *policy) in set_frame_classifier_type4_ipv4() argument 865 const u8 *frame_classifier = policy->frame_classifier; in set_frame_classifier_type4_ipv4() 866 struct type4_params *type4_param = &policy->type4_param; in set_frame_classifier_type4_ipv4() 868 if (policy->frame_classifier_len < 18) { in set_frame_classifier_type4_ipv4() 871 policy->frame_classifier_len); in set_frame_classifier_type4_ipv4() 886 if (policy->domain_name) { in set_frame_classifier_type4_ipv4() 906 if (policy->port_range_info) { in set_frame_classifier_type4_ipv4() 929 static int set_frame_classifier_type4_ipv6(struct dscp_policy_data *policy) in set_frame_classifier_type4_ipv6() argument 932 const u8 *frame_classifier = policy->frame_classifier; in set_frame_classifier_type4_ipv6() 933 struct type4_params *type4_param = &policy->type4_param; in set_frame_classifier_type4_ipv6() [all …]
|
/third_party/selinux/secilc/docs/ |
D | cil_introduction.md | 4 …s between one or more high level policy languages (such as the current module language) and the lo… 6 …e and produce language constructs with more features than the raw kernel policy (e.g., interfaces)… 8 …f high-level languages, encouraging the creation of more domain specific policy languages (e.g., C… 10 * Provides a semantically rich representation suitable for policy analysis, allowing the analysis o… 19 …sy to parse and to generate by high-level compilers, analysis tools, and policy generation tools. … 21 …policy that will be enforced by the kernel. That policy must be full represented so that all of th… 23 …istent one - CIL is meant for a source policy oriented world, so assume and leverage that. The onl… 25 …lute requirement. Where necessary it is assumed that manual or automated policy conversion will be… 27 …policy, but there is no reason to re-think core concepts that are working well. All changes to exi… 29 * No more M4 - the pervasive use of M4 and pre-processing in general has eased policy creation, but… [all …]
|
/third_party/iptables/ |
D | iptables.init | 112 policy=$1 121 echo -n $"${IPTABLES}: Setting chains to policy $policy: " 127 $IPTABLES -t filter -P INPUT $policy \ 128 && $IPTABLES -t filter -P OUTPUT $policy \ 129 && $IPTABLES -t filter -P FORWARD $policy \ 133 $IPTABLES -t raw -P PREROUTING $policy \ 134 && $IPTABLES -t raw -P OUTPUT $policy \ 138 $IPTABLES -t filter -P INPUT $policy \ 139 && $IPTABLES -t filter -P OUTPUT $policy \ 140 && $IPTABLES -t filter -P FORWARD $policy \ [all …]
|
/third_party/libwebsockets/lib/secure-streams/protocols/ |
D | ss-mqtt.c | 58 if (!h || !h->policy) in secstream_mqtt_subscribe() 61 if (h->policy->u.mqtt.aws_iot) in secstream_mqtt_subscribe() 66 if (!h->policy->u.mqtt.subscribe || wsi->mqtt->done_subscribe) in secstream_mqtt_subscribe() 76 if (lws_strexp_expand(&exp, h->policy->u.mqtt.subscribe, in secstream_mqtt_subscribe() 77 strlen(h->policy->u.mqtt.subscribe), &used_in, in secstream_mqtt_subscribe() 98 if (lws_strexp_expand(&exp, h->policy->u.mqtt.subscribe, in secstream_mqtt_subscribe() 99 strlen(h->policy->u.mqtt.subscribe), &used_in, in secstream_mqtt_subscribe() 118 h->u.mqtt.sub_top.qos = h->policy->u.mqtt.qos; in secstream_mqtt_subscribe() 125 h->u.mqtt.sub_info.topic[0].qos = h->policy->u.mqtt.qos; in secstream_mqtt_subscribe() 156 if (h->policy->u.mqtt.aws_iot) in secstream_mqtt_publish() [all …]
|
D | ss-h1.c | 197 const lws_ss_http_respmap_t *r = h->policy->u.http.respmap; in lws_ss_http_resp_to_state() 198 int n = h->policy->u.http.count_respmap; in lws_ss_http_resp_to_state() 217 lws_ss_metadata_t *polmd = h->policy->metadata; in lws_apply_metadata() 254 if (h->policy->u.http.method && ( in lws_apply_metadata() 255 (!strcmp(h->policy->u.http.method, "POST") || in lws_apply_metadata() 256 !strcmp(h->policy->u.http.method, "PATCH") || in lws_apply_metadata() 257 !strcmp(h->policy->u.http.method, "PUT"))) && in lws_apply_metadata() 259 if (!(h->policy->flags & in lws_apply_metadata() 316 lws_ss_metadata_t *polmd = h->policy->metadata, *omd; in lws_extract_metadata() 456 assert(h->policy); in secstream_h1() [all …]
|
/third_party/python/Doc/library/ |
D | email.parser.rst | 42 :class:`~email.message.EmailMessage` class is embodied in the :mod:`policy` 44 necessary by implementing custom versions of the appropriate :mod:`policy` 73 .. class:: BytesFeedParser(_factory=None, *, policy=policy.compat32) 77 :attr:`~email.policy.Policy.message_factory` from the *policy*. Call 80 If *policy* is specified use the rules it specifies to update the 81 representation of the message. If *policy* is not set, use the 82 :class:`compat32 <email.policy.Compat32>` policy, which maintains backward 86 more information on what else *policy* controls, see the 87 :mod:`~email.policy` documentation. 89 Note: **The policy keyword should always be specified**; The default will [all …]
|
D | email.generator.rst | 23 assuming the same non-transforming :mod:`~email.policy` is used for both. That 45 policy=None) 55 defaults to the value of the :attr:`~email.policy.Policy.mangle_from_` 56 setting of the *policy* (which is ``True`` for the 57 :data:`~email.policy.compat32` policy and ``False`` for all others). 65 lines according to the *policy* settings. 67 If *policy* is specified, use that policy to control message generation. If 68 *policy* is ``None`` (the default), use the policy associated with the 71 :mod:`email.policy` for details on what *policy* controls. 75 .. versionchanged:: 3.3 Added the *policy* keyword. [all …]
|
/third_party/node/deps/npm/node_modules/make-fetch-happen/lib/cache/ |
D | policy.js | 51 this.policy = new CacheSemantics(this.request, this.response, policyOptions) property 58 this.policy._responseTime = this.entry.metadata.time 81 const policy = new CacheSemantics(requestObject(request), emptyResponse, policyOptions) constant 82 return policy.storable() 120 return this.policy.storable() 127 return !!this.policy._rescc['must-revalidate'] 137 return !this.policy.satisfiesWithoutRevalidation(_req) 141 return this.policy.responseHeaders() 148 return this.policy.revalidationHeaders(_req) 156 const policy = this.policy.revalidatedPolicy(_req, _res) [all …]
|
/third_party/ltp/testcases/kernel/security/integrity/ima/ |
D | README.md | 12 `ima_measurements.sh` require builtin IMA tcb policy to be loaded 14 Although a custom policy, loaded via dracut, systemd or manually from user 20 policy, as well as a loaded measure policy with `func=KEY_CHECK keyrings=...`. 22 The certificate import test (second test) requires measure policy with 25 For example of valid policy for both tests on all supported kernels see `keycheck.policy`. 28 `ima-buf` template should be specified in the IMA policy rule for 35 policy rule for key measurement, e.g.: 41 policy allowed in the kernel configuration: 48 `ima_kexec.sh` requires loaded policy which contains `measure func=KEXEC_CMDLINE`, 49 see example in `kexec.policy`. [all …]
|
/third_party/python/Lib/email/mime/ |
D | base.py | 9 import email.policy 18 def __init__(self, _maintype, _subtype, *, policy=None, **_params): argument 25 if policy is None: 26 policy = email.policy.compat32 27 message.Message.__init__(self, policy=policy)
|
/third_party/node/doc/api/ |
D | permissions.md | 26 <!-- name=policy --> 32 safe practices for the policy files such as ensuring that policy 36 A best practice would be to ensure that the policy manifest is read-only for 39 create the policy file as a different user id than the one running Node.js 46 The `--experimental-policy` flag can be used to enable features for policies 49 Once this has been set, all modules must conform to a policy manifest file 53 node --experimental-policy=policy.json app.js 56 The policy manifest will be used to enforce constraints on code loaded by 59 To mitigate tampering with policy files on disk, an integrity for 60 the policy file itself may be provided via `--policy-integrity`. [all …]
|