Home
last modified time | relevance | path

Searched refs:pol (Results 1 – 25 of 51) sorted by relevance

123

/external/boringssl/src/crypto/x509v3/
Dv3_cpols.c75 static int i2r_certpol(X509V3_EXT_METHOD *method, STACK_OF(POLICYINFO) *pol, BIO *out, int indent);
141 POLICYINFO *pol; variable
178 pol = policy_section(ctx, polsect, ia5org);
180 if(!pol) goto err;
187 pol = POLICYINFO_new();
188 pol->policyid = pobj;
190 if (!sk_POLICYINFO_push(pols, pol)){
191 POLICYINFO_free(pol);
209 POLICYINFO *pol; in policy_section() local
211 if(!(pol = POLICYINFO_new())) goto merr; in policy_section()
[all …]
/external/valgrind/VEX/priv/
Dguest_generic_x87.c630 UInt pol, UInt idx, in compute_PCMPxSTRx_gen_output() argument
633 vassert((pol >> 2) == 0); in compute_PCMPxSTRx_gen_output()
637 switch (pol) { in compute_PCMPxSTRx_gen_output()
698 UInt pol, UInt idx, in compute_PCMPxSTRx_gen_output_wide() argument
701 vassert((pol >> 2) == 0); in compute_PCMPxSTRx_gen_output_wide()
705 switch (pol) { in compute_PCMPxSTRx_gen_output_wide()
809 UInt pol = (imm8 >> 4) & 3; // imm8[5:4] polarity in compute_PCMPxSTRx() local
840 intRes1, zmaskL, zmaskR, validL, pol, idx, isxSTRM in compute_PCMPxSTRx()
878 intRes1, zmaskL, zmaskR, validL, pol, idx, isxSTRM in compute_PCMPxSTRx()
918 intRes1, zmaskL, zmaskR, validL, pol, idx, isxSTRM in compute_PCMPxSTRx()
[all …]
/external/selinux/policycoreutils/gui/
Dselinux-polgengui.desktop4 Name[ca]=Eina de generació de polítiques del SELinux
23 Name[pt_BR]=Ferramenta de criação de políticas do SELinux
33 Comment[ca]=Genera els mòduls de les polítiques de SELinux
36 Comment[es]=Generar módulos de política de SELinux
51 Comment[pt]=Gerar módulos de políticas SELinux
52 Comment[pt_BR]=Gerar módulos de política do SELinux
/external/mesa3d/src/gallium/drivers/nv50/codegen/
Dnv50_ir.cpp258 LValue::clone(ClonePolicy<Function>& pol) const in clone()
260 LValue *that = new_LValue(pol.context(), reg.file); in clone()
262 pol.set<Value>(this, that); in clone()
293 Symbol::clone(ClonePolicy<Function>& pol) const in clone()
295 Program *prog = pol.context()->getProgram(); in clone()
299 pol.set<Value>(this, that); in clone()
367 ImmediateValue::clone(ClonePolicy<Function>& pol) const in clone()
369 Program *prog = pol.context()->getProgram(); in clone()
372 pol.set<Value>(this, that); in clone()
714 Instruction::clone(ClonePolicy<Function>& pol, Instruction *i) const in clone() argument
[all …]
Dnv50_ir_bb.cpp91 BasicBlock::clone(ClonePolicy<Function>& pol) const in clone()
93 BasicBlock *bb = new BasicBlock(pol.context()); in clone()
95 pol.set(this, bb); in clone()
98 bb->insertTail(i->clone(pol)); in clone()
100 pol.context()->cfg.insert(&bb->cfg); in clone()
104 bb->cfg.attach(&pol.get(obb)->cfg, it.getType()); in clone()
Dnv50_ir_inlines.h296 DeepClonePolicy<Function> pol(ctx); in cloneForward()
299 pol.set(obj->getSrc(i), obj->getSrc(i)); in cloneForward()
301 return obj->clone(pol); in cloneForward()
Dnv50_ir_util.h731 ShallowClonePolicy<C> pol(c); in cloneShallow()
732 return obj->clone(pol); in cloneShallow()
/external/selinux/policycoreutils/sepolicy/
Dsepolicy.py597 pol = parser.add_parser("generate", usage=generate_usage,
599 pol.add_argument("-d", "--domain", dest="domain", default=[],
602 pol.add_argument("-u", "--user", dest="user", default=[],
605 pol.add_argument("-r", "--role", dest="role", default=[],
608 pol.add_argument("-a", "--admin", dest="admin_domain", default=[],
611 pol.add_argument("-n", "--name", dest="name",
614 pol.add_argument("-T", "--test", dest="test", default=False, action="store_true",
616 pol.add_argument("-t", "--type", dest="types", default=[], nargs="*",
619 pol.add_argument("-p", "--path", dest="path", default=os.getcwd(),
621 pol.add_argument("-w", "--writepath", dest="writepaths", nargs="*", default=[],
[all …]
/external/iptables/extensions/
Dlibxt_policy.c97 struct xt_policy_elem *e = &info->pol[info->len]; in policy_parse()
208 e = &info->pol[i]; in policy_check()
334 print_entry("", &info->pol[i], numeric, NFPROTO_IPV4); in policy4_print()
349 print_entry("", &info->pol[i], numeric, NFPROTO_IPV6); in policy6_print()
360 print_entry("--", &info->pol[i], false, NFPROTO_IPV4); in policy4_save()
373 print_entry("--", &info->pol[i], false, NFPROTO_IPV6); in policy6_save()
Dlibxt_policy.man15 \fB\-\-pol\fP {\fBnone\fP|\fBipsec\fP}
16 Matches if the packet is subject to IPsec processing. \fB\-\-pol none\fP
/external/icu/icu4c/source/data/unit/
Dpt.txt1017 one{"{0} pol²"}
1018 other{"{0} pol²"}
1019 per{"{0} por pol²"}
1285 dnam{"pol."}
1286 one{"{0} pol."}
1287 other{"{0} pol."}
1288 per{"{0}/pol."}
1455 dnam{"pol Hg"}
1456 one{"{0} pol Hg"}
1457 other{"{0} pol Hg"}
[all …]
/external/iptables/include/linux/netfilter/
Dxt_policy.h53 struct xt_policy_elem pol[XT_POLICY_MAX_ELEM]; member
/external/valgrind/none/tests/amd64/
Dpcmpstr64w.c132 UInt pol, UInt idx ) in PCMPxSTRx_WRK_gen_output_fmt_I_wide() argument
134 assert((pol >> 2) == 0); in PCMPxSTRx_WRK_gen_output_fmt_I_wide()
138 switch (pol) { in PCMPxSTRx_WRK_gen_output_fmt_I_wide()
222 UInt pol = (imm8 >> 4) & 3; // imm8[5:4] polarity in pcmpXstrX_WRK_wide() local
253 intRes1, zmaskL, zmaskR, validL, pol, idx in pcmpXstrX_WRK_wide()
291 intRes1, zmaskL, zmaskR, validL, pol, idx in pcmpXstrX_WRK_wide()
331 intRes1, zmaskL, zmaskR, validL, pol, idx in pcmpXstrX_WRK_wide()
371 intRes1, zmaskL, zmaskR, validL, pol, idx in pcmpXstrX_WRK_wide()
Dpcmpstr64.c131 UInt pol, UInt idx ) in pcmpXstrX_WRK_gen_output_fmt_I() argument
133 assert((pol >> 2) == 0); in pcmpXstrX_WRK_gen_output_fmt_I()
137 switch (pol) { in pcmpXstrX_WRK_gen_output_fmt_I()
217 UInt pol = (imm8 >> 4) & 3; // imm8[5:4] polarity in pcmpXstrX_WRK() local
249 intRes1, zmaskL, zmaskR, validL, pol, idx in pcmpXstrX_WRK()
288 intRes1, zmaskL, zmaskR, validL, pol, idx in pcmpXstrX_WRK()
329 intRes1, zmaskL, zmaskR, validL, pol, idx in pcmpXstrX_WRK()
370 intRes1, zmaskL, zmaskR, validL, pol, idx in pcmpXstrX_WRK()
411 intRes1, zmaskL, zmaskR, validL, pol, idx in pcmpXstrX_WRK()
/external/kernel-headers/original/uapi/linux/netfilter/
Dxt_policy.h64 struct xt_policy_elem pol[XT_POLICY_MAX_ELEM]; member
/external/strace/
Dmem.c404 int pol; in SYS_FUNC() local
405 if (!umove_or_printaddr(tcp, tcp->u_arg[0], &pol)) in SYS_FUNC()
406 printxval(policies, pol, "MPOL_???"); in SYS_FUNC()
/external/selinux/libsepol/src/
Dlink.c1995 policydb_t *pol = state->base; in is_decl_requires_met() local
2012 id = pol->sym_val_to_name[i][j]; in is_decl_requires_met()
2037 id = pol->p_class_val_to_name[i]; in is_decl_requires_met()
2038 cladatum = pol->class_val_to_struct[i]; in is_decl_requires_met()
2194 static int enable_avrules(link_state_t * state, policydb_t * pol) in enable_avrules() argument
2207 for (block = pol->global; block != NULL; block = block->next) { in enable_avrules()
2218 for (block = pol->global; block != NULL; block = block->next) { in enable_avrules()
2256 for (block = pol->global->next; block != NULL; block = block->next) { in enable_avrules()
2267 debug_requirements(state, pol); in enable_avrules()
2497 static int populate_roleattributes(link_state_t *state, policydb_t *pol) in populate_roleattributes() argument
[all …]
Dpolicydb.c1488 int symtab_insert(policydb_t * pol, uint32_t sym, in symtab_insert() argument
1502 rc = hashtab_insert(pol->symtab[sym].table, key, datum); in symtab_insert()
1507 *value = ++pol->symtab[sym].nprim; in symtab_insert()
1517 (scope_datum_t *) hashtab_search(pol->scope[sym].table, key); in symtab_insert()
1530 hashtab_insert(pol->scope[sym].table, key2, in symtab_insert()
1549 hashtab_search(pol->symtab[sym].table, in symtab_insert()
/external/selinux/policycoreutils/po/
Des.po99 msgstr "Para hacer este paquete de políticas activo, ejecute:"
108 "La política SELinux no es administrada o no se puede acceder al "
113 msgstr "No se puede leer el almacenamiento de políticas."
292 "La asignación de ingreso para %s se definió en la política, no se puede "
401 msgstr "El usuario SELinux %s está definido en política, no puede ser borrado"
559 msgstr "El puerto %s/%s está definido en la política, no se puede borrar"
681 msgstr "La dirección %s está definido en la política, no se puede borrar"
764 msgstr "La interfase %s está definida en la política, no se puede borrar"
909 "El contexto de archivo para %s está definido en la política, no se puede "
988 msgstr "El booleano %s está definido en la política, no se puede borrar"
[all …]
Dpt_BR.po99 msgstr "Para tornar este pacote de políticas ativo, execute:"
108 "A política SELinux não é gerenciada ou não foi possível acessar os dados."
112 msgstr "Não foi possível ler os dados da política."
288 "O mapeamento de início de sessão para %s está definido na política, e não "
398 "O usuário SELinux %s está definido na política, e não pode ser excluído"
556 msgstr "A porta %s/%s está definida na política, e não pode ser excluída"
677 msgstr "O endereço %s está definido na política, e não pode ser excluído"
761 msgstr "A interface %s está definida na política, e não pode ser excluída"
906 "O contexto de arquivo para %s está definido na política, e não pode ser "
985 msgstr "O booleano %s está definido na política, e não pode ser excluído"
[all …]
/external/icu/icu4c/source/data/brkitr/
Dpt.txt117 "pol.",
/external/kernel-headers/original/uapi/linux/
Dxfrm.h444 struct xfrm_userpolicy_info pol; member
/external/iproute2/include/linux/
Dxfrm.h444 struct xfrm_userpolicy_info pol; member
/external/icu/icu4c/source/data/region/
Dksf.txt171 PL{"polɔ́n"}
/external/iptables/tests/
Doptions-most.rules12 …ysdev --physdev-in eth0 -m pkttype --pkt-type unicast -m policy --dir in --pol ipsec --strict --re…
35 -A INPUT -p tcp -m policy --dir in --pol ipsec --strict --reqid 1 --spi 0x1 --proto esp --mode tunn…

123