/external/libsepol/tests/ |
D | Makefile | 24 m4support := $(wildcard policies/support/*.spt) 25 testsuites := $(wildcard policies/test-*) 29 policies := $(stdpol) $(mlspol) macro 31 all: $(EXE) $(policies) 32 policies: $(policies) target 45 rm -f $(policies) 46 rm -f policies/test-downgrade/policy.hi policies/test-downgrade/policy.lo 49 test: $(EXE) $(policies) 50 $(MKDIR) -p policies/test-downgrade 51 …../../checkpolicy/checkpolicy -M policies/test-cond/refpolicy-base.conf -o policies/test-downgrade… [all …]
|
D | test-linker.c | 48 const char *policies[NUM_POLICIES] = { variable 63 if (test_load_policy(&linkedbase, POLICY_BASE, mls, "test-linker", policies[BASEMOD])) in linker_test_init() 66 if (test_load_policy(&basenomods, POLICY_BASE, mls, "test-linker", policies[BASEMOD])) in linker_test_init() 77 if (test_load_policy(modules[i], POLICY_MOD, mls, "test-linker", policies[i])) in linker_test_init()
|
/external/openssl/crypto/x509/ |
D | x509_vpm.c | 81 if (param->policies) in x509_verify_param_zero() 83 sk_ASN1_OBJECT_pop_free(param->policies, ASN1_OBJECT_free); in x509_verify_param_zero() 84 param->policies = NULL; in x509_verify_param_zero() 190 if (test_x509_verify_param_copy(policies, NULL)) in X509_VERIFY_PARAM_inherit() 192 if (!X509_VERIFY_PARAM_set1_policies(dest, src->policies)) in X509_VERIFY_PARAM_inherit() 262 if (!param->policies) in X509_VERIFY_PARAM_add0_policy() 264 param->policies = sk_ASN1_OBJECT_new_null(); in X509_VERIFY_PARAM_add0_policy() 265 if (!param->policies) in X509_VERIFY_PARAM_add0_policy() 268 if (!sk_ASN1_OBJECT_push(param->policies, policy)) in X509_VERIFY_PARAM_add0_policy() 274 STACK_OF(ASN1_OBJECT) *policies) in X509_VERIFY_PARAM_set1_policies() [all …]
|
D | x509_vfy.h | 175 STACK_OF(ASN1_OBJECT) *policies; /* Permissible policies */ 528 STACK_OF(ASN1_OBJECT) *policies);
|
/external/chromium/chrome/browser/policy/ |
D | file_based_policy_provider_unittest.cc | 39 DictionaryValue* policies = new DictionaryValue(); in TEST_F() local 40 policies->SetBoolean(policy::key::kSyncDisabled, true); in TEST_F() 44 EXPECT_CALL(*provider_delegate, Load()).WillOnce(Return(policies)); in TEST_F() 73 DictionaryValue* policies = new DictionaryValue(); in TEST_F() local 74 policies->SetBoolean(policy::key::kSyncDisabled, true); in TEST_F() 75 EXPECT_CALL(*provider_delegate, Load()).WillOnce(Return(policies)); in TEST_F()
|
D | configuration_policy_provider.cc | 26 const DictionaryValue* policies, in ApplyPolicyValueTree() argument 32 if (policies->Get(i->name, &value) && value->IsType(i->value_type)) in ApplyPolicyValueTree() 41 const PolicyMap* policies, in ApplyPolicyMap() argument 46 const Value* value = policies->Get(i->policy_type); in ApplyPolicyMap()
|
D | asynchronous_policy_provider_unittest.cc | 23 DictionaryValue* policies = new DictionaryValue(); in TEST_F() local 24 policies->SetBoolean(policy::key::kSyncDisabled, true); in TEST_F() 25 EXPECT_CALL(*delegate_, Load()).WillOnce(Return(policies)); in TEST_F()
|
D | configuration_policy_provider.h | 66 void ApplyPolicyValueTree(const DictionaryValue* policies, 71 void ApplyPolicyMap(const PolicyMap* policies,
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/x509/ |
D | CertificatePoliciesTest.java | 43 String[] policies = new String[] { in testCertificatePolicies() local 50 for (int i=0; i<policies.length; i++) { in testCertificatePolicies() 52 new PolicyInformation(policies[i]); in testCertificatePolicies()
|
/external/openssl/crypto/x509v3/ |
D | pcy_cache.c | 74 CERTIFICATEPOLICIES *policies, int crit) in policy_cache_create() argument 81 if (sk_POLICYINFO_num(policies) == 0) in policy_cache_create() 86 for (i = 0; i < sk_POLICYINFO_num(policies); i++) in policy_cache_create() 88 policy = sk_POLICYINFO_value(policies, i); in policy_cache_create() 119 sk_POLICYINFO_pop_free(policies, POLICYINFO_free); in policy_cache_create()
|
/external/chromium/chrome/browser/chromeos/ |
D | plugin_selection_policy.cc | 68 map<string, Policy> policies; in InitFromFile() local 107 policies.insert(make_pair(last_plugin, policy)); in InitFromFile() 114 policies.insert(make_pair(last_plugin, policy)); in InitFromFile() 116 policies_.swap(policies); in InitFromFile()
|
/external/chromium/net/tools/testserver/ |
D | device_management.py | 371 def GatherDevicePolicySettings(self, settings, policies): argument 388 if field.name in policies: 390 field_value = policies[field.name] 395 def GatherUserPolicySettings(self, settings, policies): argument 416 if field.name in policies['mandatory']: 418 field_value = policies['mandatory'][field.name] 419 elif field.name in policies['recommended']: 420 field_value = policies['recommended'][field.name]
|
/external/chromium/net/base/ |
D | x509_certificate_nss.cc | 36 explicit ScopedCERTCertificatePolicies(CERTCertificatePolicies* policies) in ScopedCERTCertificatePolicies() argument 37 : policies_(policies) {} in ScopedCERTCertificatePolicies() 541 CERTCertificatePolicies* policies = in DecodeCertPolicies() local 544 return policies; in DecodeCertPolicies() 551 CERTCertificatePolicies* policies = DecodeCertPolicies(cert_handle); in GetFirstCertPolicy() local 552 if (!policies) in GetFirstCertPolicy() 554 ScopedCERTCertificatePolicies scoped_policies(policies); in GetFirstCertPolicy() 555 CERTPolicyInfo* policy_info = policies->policyInfos[0]; in GetFirstCertPolicy() 578 CERTCertificatePolicies* policies = DecodeCertPolicies(cert_handle); in CheckCertPolicies() local 579 if (!policies) { in CheckCertPolicies() [all …]
|
/external/chromium/chrome/browser/policy/proto/ |
D | device_management_backend.proto | 17 // The users's device is not automatically enrolled for policies, but the 20 // The user must enroll its device for policies. 35 // When a client requests for policies, server should verify the 37 // register with type DEVICE in order to retrieve device policies. 41 DEVICE = 2; // Register for device policies. 167 // Since a single policy request may ask for multiple policies, we 186 // first time when the client requests policies (so it doesn't have 192 // Request from device to server for reading policies. 203 // request multiple policies for better performance. 207 // Response from server to device for reading policies.
|
D | old_generic_format.proto | 11 // This file keeps the deprecated GenericNamedValue based format for policies
|
/external/apache-harmony/security/src/test/impl/java.injected/java/security/cert/ |
D | X509CertSelectorTest.java | 106 protected String[] policies = null; field in X509CertSelectorTest.TestCert 124 public TestCert(String[] policies) { in TestCert() argument 125 setPolicies(policies); in TestCert() 165 public void setPolicies(String[] policies) { in setPolicies() argument 166 this.policies = policies; in setPolicies() 418 if ("2.5.29.32".equals(oid) && (policies != null) in getExtensionValue() 419 && (policies.length > 0)) { in getExtensionValue() 423 for (int i=0; i<policies.length; i++) { in getExtensionValue() 425 new PolicyInformation(policies[i]); in getExtensionValue() 2282 String[] policies = new String[] { in testGetPolicy() local [all …]
|
/external/strace/ |
D | mem.c | 763 static const struct xlat policies[] = { variable 844 printxval(policies, tcp->u_arg[2], "MPOL_???"); 857 printxval(policies, tcp->u_arg[0], "MPOL_???"); 874 printxval(policies, pol, "MPOL_???");
|
/external/ipsec-tools/ |
D | README | 8 - setkey, a tool to directly manipulate policies and SAs
|
D | NEWS | 43 o Support for UNIQUE generated policies 57 o Generated policies are now correctly flushed
|
/external/checkpolicy/ |
D | ChangeLog | 75 * Add support for building Xen policies from Paul Nuzzi. 231 (requirement that policies with newer versions include the 233 classes in newer source policies to single netlink class when 234 generating older policies) from George Coker.
|
/external/openssl/include/openssl/ |
D | x509_vfy.h | 175 STACK_OF(ASN1_OBJECT) *policies; /* Permissible policies */ 528 STACK_OF(ASN1_OBJECT) *policies);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
D | CertPathValidatorUtilities.java | 556 ASN1Sequence policies = null; in prepareNextCertB1() local 559 … policies = DERSequence.getInstance(getExtensionValue(cert, CERTIFICATE_POLICIES)); in prepareNextCertB1() 565 Enumeration e = policies.getObjects(); in prepareNextCertB1()
|
/external/srtp/doc/ |
D | intro.txt | 267 applied to it. A session policy is a collection of stream policies. 320 that describe the cryptograhic policies for RTP and RTCP, as well as 325 is desirable to use the same cryptographic policies across all of the 329 functions, which set a crypto policy structure to the default policies
|
/external/llvm/docs/ |
D | DeveloperPolicy.rst | 28 policies <copyright-license-patents>` with contributors to the project. 39 This section contains policies that pertain to frequent LLVM developers. We 116 software. We generally follow these policies: 278 If you have recently been granted commit access, these policies apply: 297 #. Multiple violations of these policies or a single egregious violation may
|
/external/iproute2/doc/actions/ |
D | ifb-README | 12 1) qdiscs/policies that are per device as opposed to system wide.
|