/external/tpm2-tss/src/tss2-fapi/ |
D | ifapi_policy_execute.c | 27 /** Copy the policy digests from a branch list to a digest list. 29 * @param[in] branches The list of policy branches. 79 /** Add a new authorization to a policy. 81 * The the signed hash computed from the policy digest and the policyRef together with 82 * the public key of the key used for signing will be stored in the policy. 84 * @param[in,out] policy The policy to be authorized. 94 TPMS_POLICY *policy, in ifapi_extend_authorization() argument 101 if (policy->policyAuthorizations) { in ifapi_extend_authorization() 103 n = policy->policyAuthorizations->count; in ifapi_extend_authorization() 104 save = policy->policyAuthorizations; in ifapi_extend_authorization() [all …]
|
D | ifapi_policy_calculate.c | 25 /** Copy policy digest. 27 * One digest is copied from certain position in a policy list to the 49 /** Logdefault policy digest. 64 /** Calculate a policy digest for a certain PCR selection. 67 * is computed. The passed policy digest will be extended with this data 68 * and also with the policy command code. 70 * @param[in] policy The policy with the list of selected PCRs. 72 * @param[in] current_hash_alg The hash algorithm used for the policy computation. 83 TPMS_POLICYPCR *policy, in ifapi_compute_policy_pcr() argument 102 /* Compute of the index of the current policy in the passed digest list */ in ifapi_compute_policy_pcr() [all …]
|
D | ifapi_policyutil_execute.c | 29 /** Create a new policy on policy stack. 31 * The structures for policy and callback execution are allocated 38 TPMS_POLICY *policy, in new_policy() argument 41 LOG_DEBUG("ADD POLICY"); in new_policy() 75 pol_exec_ctx->policy = policy; in new_policy() 76 if (!context->policy.policyutil_stack) { in new_policy() 77 context->policy.policyutil_stack = *current_policy; in new_policy() 78 context->policy.util_current_policy = *current_policy; in new_policy() 80 context->policy.util_current_policy->next = *current_policy; in new_policy() 81 (*current_policy)->prev = context->policy.util_current_policy; in new_policy() [all …]
|
D | ifapi_policy.c | 29 /** Compute policy digest for a policy tree. 31 * A policy or a policy path can be passed. If a policy is passed the 32 * policy is computed directly from the policy otherwise the policy has to be 33 * retrieved from policy store to determine the policy. 36 * @param[in] policyPath The policy path for policy store. 37 * @param[in] policy The result of policy deserialization. 38 * @param[in] hash_alg The used hash alg for policy digest computations. 39 * @param[out] digest_idx The index of the current digest. The policy digest can be 42 * @param[out] hash_size The size of the current policy digest. 47 * @retval TSS2_FAPI_RC_BAD_VALUE If wrong values are detected during policy calculation. [all …]
|
/external/tensorflow/tensorflow/python/keras/mixed_precision/ |
D | policy_test.py | 31 from tensorflow.python.keras.mixed_precision import policy as mp_policy 46 policy = mp_policy.Policy(dtype) 47 self.assertEqual(policy.name, dtype) 48 self.assertEqual(policy.compute_dtype, dtype) 49 self.assertEqual(policy.variable_dtype, dtype) 52 policy = mp_policy.Policy('mixed_' + dtype) 53 self.assertEqual(policy.name, 'mixed_' + dtype) 54 self.assertEqual(policy.compute_dtype, dtype) 55 self.assertEqual(policy.variable_dtype, 'float32') 57 policy = mp_policy.Policy('_infer') [all …]
|
D | policy.py | 15 """Contains the Policy class for mixed precision training.""" 36 @keras_export('keras.mixed_precision.Policy', v1=[]) 37 class Policy(object): class 38 """A dtype policy for a Keras layer. 40 A dtype policy determines a layer's computation and variable dtypes. Each 41 layer has a policy. Policies can be passed to the `dtype` argument of layer 42 constructors, or a global policy can be set with 46 name: The policy name, which determines the compute and variable dtypes. Can 63 <Policy "mixed_float16"> 67 <Policy "float32"> [all …]
|
/external/crosvm/seccomp/ |
D | Android.bp | 29 cmd: "$(location policy-inliner.sh) $(location x86_64/common_device.policy) < $(in) > $(out)", 31 "policy-inliner.sh", 32 "x86_64/common_device.policy", 38 cmd: "$(location policy-inliner.sh) $(location aarch64/common_device.policy) < $(in) > $(out)", 40 "policy-inliner.sh", 41 "aarch64/common_device.policy", 48 out: ["vhost_net_device.policy"], 49 srcs: ["x86_64/vhost_net_device.policy"], 54 filename: "vhost_net_device.policy", 62 out: ["vhost_net_device.policy"], [all …]
|
D | crosvm_seccomp_policy_product_packages.mk | 18 9p_device.policy \ 19 balloon_device.policy \ 20 battery.policy \ 21 block_device.policy \ 22 cras_audio_device.policy \ 23 fs_device.policy \ 24 gpu_device.policy \ 25 input_device.policy \ 26 net_device.policy \ 27 null_audio_device.policy \ [all …]
|
/external/autotest/metadata/tests/ |
D | policy.star | 13 'policy/AccessibilityTest', 18 'policy/AlternateErrorPages', 23 'policy/ArcAudioCaptureAllowed', 28 'policy/ArcBackupRestoreServiceEnabled', 33 'policy/ArcDisableScreenshots', 38 'policy/ArcExternalStorageDisabled', 43 'policy/ArcVideoCaptureAllowed', 48 'policy/AudioOutputAllowed', 53 'policy/AutotestSanity', 54 suites = ['bvt-perbuild', 'ent-nightly', 'policy', 'smoke'], [all …]
|
/external/ltp/testcases/kernel/security/tomoyo/ |
D | tomoyo_new_file_test.c | 26 static const char *policy = ""; variable 31 printf("%s : ", policy); in show_result() 126 policy = "allow_read /proc/sys/net/ipv4/ip_local_port_range"; in stage_file_test() 127 write_domain_policy(policy, 0); in stage_file_test() 129 write_domain_policy(policy, 1); in stage_file_test() 132 policy = "allow_write /proc/sys/net/ipv4/ip_local_port_range"; in stage_file_test() 133 write_domain_policy(policy, 0); in stage_file_test() 135 write_domain_policy(policy, 1); in stage_file_test() 138 policy = "allow_read/write /proc/sys/net/ipv4/ip_local_port_range"; in stage_file_test() 139 write_domain_policy(policy, 0); in stage_file_test() [all …]
|
/external/python/cpython3/Lib/test/test_email/ |
D | test_policy.py | 6 import email.policy 30 # These default values are the ones set on email.policy.default. 36 'header_factory': email.policy.EmailPolicy.header_factory, 38 'content_manager': email.policy.EmailPolicy.content_manager, 43 # For each policy under test, we give here what we expect the defaults to 44 # be for that policy. The second argument to make defaults is the 45 # difference between the base defaults and that for the particular policy. 46 new_policy = email.policy.EmailPolicy() 48 email.policy.compat32: make_defaults(compat32_defaults, {}), 49 email.policy.default: make_defaults(policy_defaults, {}), [all …]
|
/external/python/google-api-python-client/docs/dyn/ |
D | cloudresourcemanager_v1.folders.html | 79 <p class="firstline">Clears a `Policy` from a resource.</p> 82 <p class="firstline">Gets the effective `Policy` on a resource. This is the result of merging</p> 85 <p class="firstline">Gets a `Policy` on a resource.</p> 100 <p class="firstline">Updates the specified `Policy` on the resource. Creates a new `Policy` for</p> 104 <pre>Clears a `Policy` from a resource. 107 resource: string, Name of the resource for the `Policy` to clear. (required) 113 # will cause the `Policy` to be cleared blindly. 114 "constraint": "A String", # Name of the `Constraint` of the `Policy` to clear. 139 <pre>Gets the effective `Policy` on a resource. This is the result of merging 140 `Policies` in the resource hierarchy. The returned `Policy` will not have [all …]
|
D | cloudresourcemanager_v1.organizations.html | 79 <p class="firstline">Clears a `Policy` from a resource.</p> 85 <p class="firstline">Gets the effective `Policy` on a resource. This is the result of merging</p> 88 <p class="firstline">Gets the access control policy for an Organization resource. May be empty</p> 91 <p class="firstline">Gets a `Policy` on a resource.</p> 112 <p class="firstline">Sets the access control policy on an Organization resource. Replaces any</p> 115 <p class="firstline">Updates the specified `Policy` on the resource. Creates a new `Policy` for</p> 122 <pre>Clears a `Policy` from a resource. 125 resource: string, Name of the resource for the `Policy` to clear. (required) 131 # will cause the `Policy` to be cleared blindly. 132 "constraint": "A String", # Name of the `Constraint` of the `Policy` to clear. [all …]
|
D | dns_v1beta2.policies.html | 79 <p class="firstline">Create a new Policy</p> 81 <code><a href="#delete">delete(project, policy, clientOperationId=None)</a></code></p> 82 <p class="firstline">Delete a previously created Policy. Will fail if the policy is still being ref… 84 <code><a href="#get">get(project, policy, clientOperationId=None)</a></code></p> 85 <p class="firstline">Fetch the representation of an existing Policy.</p> 93 <code><a href="#patch">patch(project, policy, body, clientOperationId=None)</a></code></p> 94 <p class="firstline">Apply a partial update to an existing Policy.</p> 96 <code><a href="#update">update(project, policy, body, clientOperationId=None)</a></code></p> 97 <p class="firstline">Update an existing Policy.</p> 101 <pre>Create a new Policy [all …]
|
D | binaryauthorization_v1beta1.projects.html | 83 <code><a href="binaryauthorization_v1beta1.projects.policy.html">policy()</a></code> 85 <p class="firstline">Returns the policy Resource.</p> 89 <p class="firstline">A policy specifies the attestors that must attest to</p> 92 <p class="firstline">Creates or updates a project's policy, and returns a copy of the</p> 96 <pre>A policy specifies the attestors that must attest to 98 image. There is at most one policy per project. All image admission 99 requests are permitted if a project has no policy. 101 Gets the policy for this project. Returns a default 102 policy if the project does not have one. 105 name: string, Required. The resource name of the policy to retrieve, [all …]
|
/external/libbrillo/policy/tests/ |
D | libpolicy_test.cc | 5 #include "policy/libpolicy.h" 19 #include "policy/device_policy_impl.h" 21 namespace policy { namespace 23 static const char kPolicyFileAllSet[] = "policy/tests/whitelist/policy_all"; 24 static const char kPolicyFileNoneSet[] = "policy/tests/whitelist/policy_none"; 25 static const char kKeyFile[] = "policy/tests/whitelist/owner.key"; 44 // Test that a policy file can be verified and parsed correctly. The file 56 // Ensure we successfully loaded the device policy file. in TEST() 59 const DevicePolicy& policy = provider.GetDevicePolicy(); in TEST() local 63 ASSERT_TRUE(policy.GetPolicyRefreshRate(&int_value)); in TEST() [all …]
|
/external/ImageMagick/config/ |
D | policy.xml | 3 <!ELEMENT policymap (policy)*> 5 <!ELEMENT policy EMPTY> 6 <!ATTLIST policy xmlns CDATA #FIXED '' domain NMTOKEN #REQUIRED 22 <policy domain="delegate" rights="none" pattern="mpeg:decode" /> 26 <policy domain="coder" rights="none" pattern="HTTP" /> 31 <policy domain="path" rights="read" pattern="/repository/*" /> 35 <policy domain="filter" rights="none" pattern="*" /> 39 <policy domain="resource" name="area" value="1GP"/> 43 <policy domain="system" name="font" value="/usr/share/fonts/favorite.ttf"/> 47 for each instance of ImageMagick (e.g. policy memory limit 1GB, -limit 2GB [all …]
|
/external/ImageMagick/www/source/ |
D | policy.xml | 3 <!ELEMENT policymap (policy)+> 5 <!ELEMENT policy EMPTY> 6 <!ATTLIST policy xmlns CDATA #FIXED '' domain NMTOKEN #REQUIRED 22 <policy domain="delegate" rights="none" pattern="mpeg:decode" /> 26 <policy domain="coder" rights="none" pattern="HTTP" /> 30 <policy domain="filter" rights="none" pattern="*" /> 35 <policy domain="path" rights="read" pattern="/repository/*" /> 39 <policy domain="filter" rights="none" pattern="*" /> 43 <policy domain="resource" name="area" value="1GP"/> 47 for each instance of ImageMagick (e.g. policy memory limit 1GB, -limit 2GB [all …]
|
/external/androidplot/.idea/ |
D | uiDesigner.xml | 6 <default-constraints vsize-policy="1" hsize-policy="6" anchor="0" fill="1" /> 9 <default-constraints vsize-policy="6" hsize-policy="1" anchor="0" fill="2" /> 12 <default-constraints vsize-policy="3" hsize-policy="3" anchor="0" fill="3" /> 15 <default-constraints vsize-policy="7" hsize-policy="7" anchor="0" fill="3" /> 18 <default-constraints vsize-policy="0" hsize-policy="3" anchor="0" fill="1" /> 24 <default-constraints vsize-policy="0" hsize-policy="3" anchor="8" fill="0" /> 30 <default-constraints vsize-policy="0" hsize-policy="3" anchor="8" fill="0" /> 36 <default-constraints vsize-policy="0" hsize-policy="0" anchor="8" fill="0" /> 42 <default-constraints vsize-policy="0" hsize-policy="6" anchor="8" fill="1"> 47 <default-constraints vsize-policy="0" hsize-policy="6" anchor="8" fill="1"> [all …]
|
/external/selinux/secilc/docs/ |
D | cil_introduction.md | 4 …s between one or more high level policy languages (such as the current module language) and the lo… 6 …e and produce language constructs with more features than the raw kernel policy (e.g., interfaces)… 8 …f high-level languages, encouraging the creation of more domain specific policy languages (e.g., C… 10 * Provides a semantically rich representation suitable for policy analysis, allowing the analysis o… 19 …sy to parse and to generate by high-level compilers, analysis tools, and policy generation tools. … 21 …policy that will be enforced by the kernel. That policy must be full represented so that all of th… 23 …istent one - CIL is meant for a source policy oriented world, so assume and leverage that. The onl… 25 …lute requirement. Where necessary it is assumed that manual or automated policy conversion will be… 27 …policy, but there is no reason to re-think core concepts that are working well. All changes to exi… 29 * No more M4 - the pervasive use of M4 and pre-processing in general has eased policy creation, but… [all …]
|
/external/autotest/client/cros/enterprise/ |
D | test_policy.py | 9 from autotest_lib.client.cros.enterprise import policy 12 This is the unittest file for policy.py. 33 test_policy = policy.Policy() 46 test_policy = policy.Policy() 55 test_policy = policy.Policy() 64 test_policy = policy.Policy() 73 test_policy = policy.Policy() 86 test_policy = policy.Policy() 102 test_policy = policy.Policy() 106 test_policy2 = policy.Policy() [all …]
|
D | policy_group.py | 8 from autotest_lib.client.cros.enterprise.policy import Policy as Policy unknown 22 # policy group is "configured" to represent what the "displayed" policy 66 @param visual: bool, If the extension policy provided is what should be 71 # If the policy is configured (ie this policy group object represents) 93 Create and the policy object, and set it in the corresponding group. 95 @param policy_type: str of the policy type. Must be: 97 @param policies: dict of policy values. 98 @param group: str, group key for the Policy object setter. 156 for policy, value in policies.items(): 159 cleaned[policy] = self._jsonify(policy, value) [all …]
|
/external/ImageMagick/www/ |
D | security-policy.html | 10 <title>ImageMagick - Security Policy</title> 15 <meta name="keywords" content="security, policy, image processing software" /> 32 <link href="../www/security-policy.html" rel="canonical" /> 94 <h1 class="text-center">Security Policy</h1> 95 …policy.html#policy">Security Policy </a> • <a href="security-policy.html#synchronize">Pixel Cache … 98 …y <a href="https://imagemagick.org/source/policy.xml">policy</a> that suits your local environment… 100 …by adjusting the security policy per the requirements of your local environment or organizational … 102 …policy.xml">policy.xml</a> configuration file. You might wonder why ImageMagick does not already i… 106 <policy domain="resource" name="temporary-path" value="/data/magick"/> 107 <policy domain="resource" name="memory" value="256MiB"/> [all …]
|
/external/desugar/java/com/google/devtools/common/options/ |
D | InvocationPolicyEnforcer.java | 53 private static final String INVOCATION_POLICY_SOURCE = "Invocation policy"; 58 * Creates an InvocationPolicyEnforcer that enforces the given policy. 60 * @param invocationPolicy the policy to enforce. A null policy means this enforcer will do 68 * Creates an InvocationPolicyEnforcer that enforces the given policy. 70 * @param invocationPolicy the policy to enforce. A null policy means this enforcer will do 81 private final FlagPolicy policy; field in InvocationPolicyEnforcer.FlagPolicyWithContext 86 FlagPolicy policy, OptionDescription description, OptionInstanceOrigin origin) { in FlagPolicyWithContext() argument 87 this.policy = policy; in FlagPolicyWithContext() 98 * Applies this OptionsPolicyEnforcer's policy to the given OptionsParser for all blaze commands. 100 * @param parser The OptionsParser to enforce policy on. [all …]
|
/external/selinux/python/sepolicy/ |
D | sepolicy-generate.8 | 3 sepolicy-generate \- Generate an initial SELinux policy module template. 40 Miscellaneous Policy 50 Use \fBsepolicy generate\fP to generate an SELinux policy Module. 58 types and policy rules for your policy files. 65 Policy generated by \fBsepolicy generate\fP will automatically add a permissive DOMAIN to your te f… 69 …s the interfaces for the types generated in the te file, which can be used by other policy domains. 78 …the SELinux policy on to machines and setup the labeling. The spec file also installs the interfac… 82 … labeling on your test system. It will also generate a man page based on the installed policy, and 96 Specify alternate name of policy. The policy will default to the executable or name specified 99 Specify the directory to store the created policy files. (Default to current working directory ) [all …]
|