/external/boringssl/src/crypto/x509v3/ |
D | v3_pci.c | 74 if (pci->proxyPolicy->policy && pci->proxyPolicy->policy->data) in i2r_pci() 76 pci->proxyPolicy->policy->data); in i2r_pci() 82 ASN1_OCTET_STRING **policy) in process_pci_value() argument 120 if (!*policy) in process_pci_value() 122 *policy = ASN1_OCTET_STRING_new(); in process_pci_value() 123 if (!*policy) in process_pci_value() 143 tmp_data = OPENSSL_realloc((*policy)->data, in process_pci_value() 144 (*policy)->length + val_len + 1); in process_pci_value() 147 (*policy)->data = tmp_data; in process_pci_value() 148 memcpy(&(*policy)->data[(*policy)->length], in process_pci_value() [all …]
|
D | pcy_data.c | 87 X509_POLICY_DATA *policy_data_new(POLICYINFO *policy, in policy_data_new() argument 92 if (!policy && !cid) in policy_data_new() 123 ret->valid_policy = policy->policyid; in policy_data_new() 124 policy->policyid = NULL; in policy_data_new() 127 if (policy) in policy_data_new() 129 ret->qualifier_set = policy->qualifiers; in policy_data_new() 130 policy->qualifiers = NULL; in policy_data_new()
|
/external/srtp/test/ |
D | srtp_driver.c | 72 srtp_bits_per_second(int msg_len_octets, const srtp_policy_t *policy); 75 srtp_rejections_per_second(int msg_len_octets, const srtp_policy_t *policy); 78 srtp_do_timing(const srtp_policy_t *policy); 81 srtp_do_rejection_timing(const srtp_policy_t *policy); 84 srtp_test(const srtp_policy_t *policy); 87 srtcp_test(const srtp_policy_t *policy); 93 srtp_print_policy(const srtp_policy_t *policy); 221 const srtp_policy_t **policy = policy_array; in main() local 225 while (*policy != NULL) { in main() 227 if (srtp_test(*policy) == err_status_ok) in main() [all …]
|
D | rtpw.c | 145 srtp_policy_t policy; in main() local 314 crypto_policy_set_rtp_default(&policy.rtp); in main() 315 crypto_policy_set_rtcp_default(&policy.rtcp); in main() 318 crypto_policy_set_aes_cm_128_null_auth(&policy.rtp); in main() 319 crypto_policy_set_rtcp_default(&policy.rtcp); in main() 322 crypto_policy_set_null_cipher_hmac_sha1_80(&policy.rtp); in main() 323 crypto_policy_set_rtcp_default(&policy.rtcp); in main() 329 policy.ssrc.type = ssrc_specific; in main() 330 policy.ssrc.value = ssrc; in main() 331 policy.key = (uint8_t *) key; in main() [all …]
|
D | dtls_srtp_driver.c | 124 srtp_policy_t policy; in test_dtls_srtp() local 178 policy.key = key; in test_dtls_srtp() 181 err = crypto_policy_set_from_profile_for_rtp(&policy.rtp, profile); in test_dtls_srtp() 183 err = crypto_policy_set_from_profile_for_rtcp(&policy.rtcp, profile); in test_dtls_srtp() 185 policy.ssrc.type = ssrc_any_inbound; in test_dtls_srtp() 186 policy.ekt = NULL; in test_dtls_srtp() 187 policy.window_size = 128; in test_dtls_srtp() 188 policy.allow_repeat_tx = 0; in test_dtls_srtp() 189 policy.next = NULL; in test_dtls_srtp() 191 err = srtp_add_stream(s, &policy); in test_dtls_srtp()
|
/external/selinux/policycoreutils/sepolicy/ |
D | search.c | 107 static int perform_ra_query(const apol_policy_t * policy, const options_t * opt, apol_vector_t ** v) in perform_ra_query() argument 112 if (!policy || !opt || !v) { in perform_ra_query() 113 ERR(policy, "%s", strerror(EINVAL)); in perform_ra_query() 125 ERR(policy, "%s", strerror(ENOMEM)); in perform_ra_query() 130 apol_role_allow_query_set_regex(policy, raq, opt->useregex); in perform_ra_query() 132 if (apol_role_allow_query_set_source(policy, raq, opt->src_role_name)) { in perform_ra_query() 138 if (apol_role_allow_query_set_target(policy, raq, opt->tgt_role_name)) { in perform_ra_query() 143 if (apol_role_allow_get_by_query(policy, raq, v)) { in perform_ra_query() 153 ERR(policy, "%s", strerror(error)); in perform_ra_query() 158 static PyObject* get_ra_results(const apol_policy_t * policy, const apol_vector_t * v, PyObject *ou… in get_ra_results() argument [all …]
|
D | org.selinux.conf | 9 <policy user="root"> 11 </policy> 15 <policy at_console="true"> 17 </policy> 18 <policy context="default"> 21 </policy>
|
D | policy.c | 36 apol_policy_t *policy = NULL; variable 56 if (policy) in wrap_policy() 57 apol_policy_destroy(&policy); in wrap_policy() 69 policy = apol_policy_create_from_policy_path(pol_path, policy_load_options, NULL, NULL); in wrap_policy() 71 if (!policy) { in wrap_policy()
|
/external/srtp/googlepatches/ |
D | vidyo-4-srtp-rtx.patch | 14 struct srtp_policy_t *next; /**< Pointer to next stream policy. */ 69 policy.ssrc.type = ssrc_any_inbound; 70 policy.ekt = NULL; 71 policy.window_size = 128; 72 + policy.allow_repeat_tx = 0; 73 policy.next = NULL; 75 err = srtp_add_stream(s, &policy); 80 policy.key = (uint8_t *) key; 81 policy.next = NULL; 82 policy.window_size = 128; [all …]
|
D | vidyo-3-srtp-ws.patch | 600 ekt_policy_t ekt; /**< Pointer to the EKT policy structure 604 struct srtp_policy_t *next; /**< Pointer to next stream policy. */ 660 policy.ssrc.type = ssrc_any_inbound; 661 policy.ekt = NULL; 662 + policy.window_size = 128; 663 policy.next = NULL; 665 err = srtp_add_stream(s, &policy); 800 policy.ssrc.value = ssrc; 801 policy.key = (uint8_t *) key; 802 policy.next = NULL; [all …]
|
/external/openssh/ |
D | sandbox-systrace.c | 121 struct systrace_policy policy; in ssh_sandbox_parent() local 155 memset(&policy, 0, sizeof(policy)); in ssh_sandbox_parent() 156 policy.strp_op = SYSTR_POLICY_NEW; in ssh_sandbox_parent() 157 policy.strp_maxents = SYS_MAXSYSCALL; in ssh_sandbox_parent() 158 if (ioctl(box->systrace_fd, STRIOCPOLICY, &policy) == -1) in ssh_sandbox_parent() 162 policy.strp_op = SYSTR_POLICY_ASSIGN; in ssh_sandbox_parent() 163 policy.strp_pid = box->child_pid; in ssh_sandbox_parent() 164 if (ioctl(box->systrace_fd, STRIOCPOLICY, &policy) == -1) in ssh_sandbox_parent() 177 policy.strp_op = SYSTR_POLICY_MODIFY; in ssh_sandbox_parent() 178 policy.strp_code = i; in ssh_sandbox_parent() [all …]
|
/external/sepolicy/tools/ |
D | sepolicy-check.c | 66 perm_datum_t *perm, policydb_t *policy, avtab_t *avtab) { in expand_and_check() argument 77 if (expand_avtab(policy, avtab, &exp_avtab)) { in expand_and_check() 116 int check_rule(char *s, char *t, char *c, char *p, policydb_t *policy) { in check_rule() argument 131 src = hashtab_search(policy->p_types.table, s); in check_rule() 138 tgt = hashtab_search(policy->p_types.table, t); in check_rule() 145 cls = hashtab_search(policy->p_classes.table, c); in check_rule() 177 perm, policy, &policy->te_avtab); in check_rule() 185 perm, policy, &policy->te_cond_avtab); in check_rule() 235 char *policy = NULL, *source = NULL, *target = NULL, *class = NULL, *perm = NULL; in main() local 266 policy = optarg; in main() [all …]
|
D | README | 1 This directory contains a number of tools related to policy, some of 2 which are used in building and validating the policy and others are 3 available for help in auditing and analyzing policy. The tools are 8 property_contexts configuration file. Used as part of the policy 21 policy build process to merge and validate the configuration. 33 certs not already found in that policy. This becomes useful when a directory 35 policy not already explicitly listed. 42 -f POLICY, --file POLICY mac_permissions.xml policy file
|
/external/owasp/sanitizer/src/main/org/owasp/html/ |
D | HtmlChangeReporter.java | 69 public void setPolicy(HtmlSanitizer.Policy policy) { in setPolicy() argument 70 this.input.policy = policy; in setPolicy() 78 HtmlStreamEventReceiver policy; field in HtmlChangeReporter.InputChannel 92 policy.openDocument(); in openDocument() 96 policy.closeDocument(); in closeDocument() 105 policy.openTag(elementName, attrs); in openTag() 130 policy.closeTag(elementName); in closeTag() 134 policy.text(textChunk); in text()
|
D | HtmlPolicyBuilder.java | 200 ElementPolicy policy, String... elementNames) { in allowElements() argument 205 elPolicies.get(elementName), policy); in allowElements() 325 AttributePolicy policy, List<String> attributeNames) { in allowAttributesGlobally() argument 335 attributeName, AttributePolicy.Util.join(oldPolicy, policy)); in allowAttributesGlobally() 341 AttributePolicy policy, List<String> attributeNames, in allowAttributesOnElements() argument 354 AttributePolicy.Util.join(oldPolicy, policy)); in allowAttributesOnElements() 604 AttributePolicy policy = ape.getValue(); in compilePolicies() local 605 if (!AttributePolicy.REJECT_ALL_ATTRIBUTE_POLICY.equals(policy)) { in compilePolicies() 606 attrs.put(attributeName, policy); in compilePolicies() 612 AttributePolicy policy = AttributePolicy.Util.join( in compilePolicies() local [all …]
|
/external/libunwind/src/mi/ |
D | Gset_caching_policy.c | 29 unw_set_caching_policy (unw_addr_space_t as, unw_caching_policy_t policy) in unw_set_caching_policy() argument 35 if (policy == UNW_CACHE_PER_THREAD) in unw_set_caching_policy() 36 policy = UNW_CACHE_GLOBAL; in unw_set_caching_policy() 39 if (policy == as->caching_policy) in unw_set_caching_policy() 42 as->caching_policy = policy; in unw_set_caching_policy()
|
/external/iptables/extensions/ |
D | libxt_policy.man | 1 This modules matches the policy used by IPsec for handling a packet. 4 Used to select whether to match the policy used for decapsulation or the 5 policy that will be used for encapsulation. 20 Selects whether to match the exact policy or match if any rule of 21 the policy matches the given policy. 23 For each policy element that is to be described, one can use one or more of 28 Matches the reqid of the policy rule. The reqid can be specified with 52 Start the next element in the policy specification. Can only be used with
|
/external/ipsec-tools/ |
D | setup.c | 220 } policy; in spdadd() local 235 memset(&policy, 0, sizeof(policy)); in spdadd() 236 policy.p.sadb_x_policy_exttype = SADB_X_EXT_POLICY; in spdadd() 237 policy.p.sadb_x_policy_type = IPSEC_POLICY_IPSEC; in spdadd() 238 policy.p.sadb_x_policy_dir = IPSEC_DIR_OUTBOUND; in spdadd() 240 policy.p.sadb_x_policy_priority = PRIORITY_DEFAULT; in spdadd() 242 policy.q.sadb_x_ipsecrequest_proto = IPPROTO_ESP; in spdadd() 243 policy.q.sadb_x_ipsecrequest_mode = IPSEC_MODE_TRANSPORT; in spdadd() 244 policy.q.sadb_x_ipsecrequest_level = IPSEC_LEVEL_REQUIRE; in spdadd() 249 memcpy(policy.addresses, local, size); in spdadd() [all …]
|
/external/ipsec-tools/src/libipsec/ |
D | ipsec_get_policylen.c | 50 ipsec_get_policylen(policy) in ipsec_get_policylen() argument 51 ipsec_policy_t policy; in ipsec_get_policylen() 53 return policy ? PFKEY_EXTLEN(policy) : -1;
|
D | ipsec_dump_policy.c | 76 ipsec_dump_policy(policy, delimiter) in ipsec_dump_policy() argument 77 ipsec_policy_t policy; in ipsec_dump_policy() 80 return ipsec_dump_policy1(policy, delimiter, 0); 84 ipsec_dump_policy_withports(policy, delimiter) in ipsec_dump_policy_withports() argument 85 void *policy; in ipsec_dump_policy_withports() 88 return ipsec_dump_policy1(policy, delimiter, 1); 92 ipsec_dump_policy1(policy, delimiter, withports) in ipsec_dump_policy1() argument 93 void *policy; in ipsec_dump_policy1() 97 struct sadb_x_policy *xpl = policy; 111 if (policy == NULL)
|
/external/dnsmasq/dbus/ |
D | dnsmasq.conf | 5 <policy user="root"> 8 </policy> 9 <policy context="default"> 12 </policy>
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
D | ProtectionDomainTest.java | 167 TestPolicy policy = new TestPolicy(); in testImplies_02() local 171 policy.setTrackPD(pd); in testImplies_02() 173 Policy.setPolicy(policy); in testImplies_02() 178 assertFalse(policy.getPdTracked()); in testImplies_02() 186 TestPolicy policy = new TestPolicy(); in testImplies_03() local 189 policy.setTrackPD(pd); in testImplies_03() 191 Policy.setPolicy(policy); in testImplies_03() 196 assertTrue(policy.getPdTracked()); in testImplies_03()
|
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
D | dbus-wpa_supplicant.conf | 5 <policy user="root"> 16 </policy> 17 <policy context="default"> 26 </policy>
|
/external/sepolicy/tools/sepolicy-analyze/ |
D | README | 20 current policy may be overly permissive with respect to one or the 24 types may not yet be defined or may be unconfined in the policy 42 individual types may be directly represented in the source policy 44 -foo -bar is expanded to individual allow rules by the policy 51 Displays domains in the policy that are permissive, i.e. avc 59 Displays the boolean names in the policy (if any). 60 Policy booleans are forbidden in Android policy, so if there is any 61 output, the policy will fail CTS. 74 statements in the same format as the SELinux policy.conf file, i.e. after 76 policy.conf file as the neverallows.conf file and sepolicy-analyze will [all …]
|
/external/selinux/checkpolicy/test/ |
D | dismod.c | 115 int display_type_set(type_set_t * set, uint32_t flags, policydb_t * policy, in display_type_set() argument 159 display_id(policy, fp, SYM_TYPES, i, ""); in display_type_set() 166 display_id(policy, fp, SYM_TYPES, i, "-"); in display_type_set() 214 int display_avrule(avrule_t * avrule, policydb_t * policy, in display_avrule() argument 251 if (display_type_set(&avrule->stypes, 0, policy, fp)) in display_avrule() 254 if (display_type_set(&avrule->ttypes, avrule->flags, policy, fp)) in display_avrule() 272 display_id(policy, fp, SYM_CLASSES, cur->tclass - 1, ""); in display_avrule() 282 policy, fp); in display_avrule() 284 display_id(policy, fp, SYM_TYPES, avrule->perms->data - 1, ""); in display_avrule() 591 policydb_t * policy, FILE * out_fp) in display_avdecl() argument [all …]
|