Home
last modified time | relevance | path

Searched full:policy (Results 1 – 25 of 3717) sorted by relevance

12345678910>>...149

/external/tpm2-tss/src/tss2-fapi/
Difapi_policy_execute.c27 /** Copy the policy digests from a branch list to a digest list.
29 * @param[in] branches The list of policy branches.
79 /** Add a new authorization to a policy.
81 * The the signed hash computed from the policy digest and the policyRef together with
82 * the public key of the key used for signing will be stored in the policy.
84 * @param[in,out] policy The policy to be authorized.
94 TPMS_POLICY *policy, in ifapi_extend_authorization() argument
101 if (policy->policyAuthorizations) { in ifapi_extend_authorization()
103 n = policy->policyAuthorizations->count; in ifapi_extend_authorization()
104 save = policy->policyAuthorizations; in ifapi_extend_authorization()
[all …]
Difapi_policy_calculate.c25 /** Copy policy digest.
27 * One digest is copied from certain position in a policy list to the
49 /** Logdefault policy digest.
64 /** Calculate a policy digest for a certain PCR selection.
67 * is computed. The passed policy digest will be extended with this data
68 * and also with the policy command code.
70 * @param[in] policy The policy with the list of selected PCRs.
72 * @param[in] current_hash_alg The hash algorithm used for the policy computation.
83 TPMS_POLICYPCR *policy, in ifapi_compute_policy_pcr() argument
102 /* Compute of the index of the current policy in the passed digest list */ in ifapi_compute_policy_pcr()
[all …]
Difapi_policyutil_execute.c29 /** Create a new policy on policy stack.
31 * The structures for policy and callback execution are allocated
38 TPMS_POLICY *policy, in new_policy() argument
41 LOG_DEBUG("ADD POLICY"); in new_policy()
75 pol_exec_ctx->policy = policy; in new_policy()
76 if (!context->policy.policyutil_stack) { in new_policy()
77 context->policy.policyutil_stack = *current_policy; in new_policy()
78 context->policy.util_current_policy = *current_policy; in new_policy()
80 context->policy.util_current_policy->next = *current_policy; in new_policy()
81 (*current_policy)->prev = context->policy.util_current_policy; in new_policy()
[all …]
Difapi_policy.c29 /** Compute policy digest for a policy tree.
31 * A policy or a policy path can be passed. If a policy is passed the
32 * policy is computed directly from the policy otherwise the policy has to be
33 * retrieved from policy store to determine the policy.
36 * @param[in] policyPath The policy path for policy store.
37 * @param[in] policy The result of policy deserialization.
38 * @param[in] hash_alg The used hash alg for policy digest computations.
39 * @param[out] digest_idx The index of the current digest. The policy digest can be
42 * @param[out] hash_size The size of the current policy digest.
47 * @retval TSS2_FAPI_RC_BAD_VALUE If wrong values are detected during policy calculation.
[all …]
/external/tensorflow/tensorflow/python/keras/mixed_precision/
Dpolicy_test.py31 from tensorflow.python.keras.mixed_precision import policy as mp_policy
46 policy = mp_policy.Policy(dtype)
47 self.assertEqual(policy.name, dtype)
48 self.assertEqual(policy.compute_dtype, dtype)
49 self.assertEqual(policy.variable_dtype, dtype)
52 policy = mp_policy.Policy('mixed_' + dtype)
53 self.assertEqual(policy.name, 'mixed_' + dtype)
54 self.assertEqual(policy.compute_dtype, dtype)
55 self.assertEqual(policy.variable_dtype, 'float32')
57 policy = mp_policy.Policy('_infer')
[all …]
Dpolicy.py15 """Contains the Policy class for mixed precision training."""
36 @keras_export('keras.mixed_precision.Policy', v1=[])
37 class Policy(object): class
38 """A dtype policy for a Keras layer.
40 A dtype policy determines a layer's computation and variable dtypes. Each
41 layer has a policy. Policies can be passed to the `dtype` argument of layer
42 constructors, or a global policy can be set with
46 name: The policy name, which determines the compute and variable dtypes. Can
63 <Policy "mixed_float16">
67 <Policy "float32">
[all …]
/external/crosvm/seccomp/
DAndroid.bp29 cmd: "$(location policy-inliner.sh) $(location x86_64/common_device.policy) < $(in) > $(out)",
31 "policy-inliner.sh",
32 "x86_64/common_device.policy",
38 cmd: "$(location policy-inliner.sh) $(location aarch64/common_device.policy) < $(in) > $(out)",
40 "policy-inliner.sh",
41 "aarch64/common_device.policy",
48 out: ["vhost_net_device.policy"],
49 srcs: ["x86_64/vhost_net_device.policy"],
54 filename: "vhost_net_device.policy",
62 out: ["vhost_net_device.policy"],
[all …]
Dcrosvm_seccomp_policy_product_packages.mk18 9p_device.policy \
19 balloon_device.policy \
20 battery.policy \
21 block_device.policy \
22 cras_audio_device.policy \
23 fs_device.policy \
24 gpu_device.policy \
25 input_device.policy \
26 net_device.policy \
27 null_audio_device.policy \
[all …]
/external/autotest/metadata/tests/
Dpolicy.star13 'policy/AccessibilityTest',
18 'policy/AlternateErrorPages',
23 'policy/ArcAudioCaptureAllowed',
28 'policy/ArcBackupRestoreServiceEnabled',
33 'policy/ArcDisableScreenshots',
38 'policy/ArcExternalStorageDisabled',
43 'policy/ArcVideoCaptureAllowed',
48 'policy/AudioOutputAllowed',
53 'policy/AutotestSanity',
54 suites = ['bvt-perbuild', 'ent-nightly', 'policy', 'smoke'],
[all …]
/external/ltp/testcases/kernel/security/tomoyo/
Dtomoyo_new_file_test.c26 static const char *policy = ""; variable
31 printf("%s : ", policy); in show_result()
126 policy = "allow_read /proc/sys/net/ipv4/ip_local_port_range"; in stage_file_test()
127 write_domain_policy(policy, 0); in stage_file_test()
129 write_domain_policy(policy, 1); in stage_file_test()
132 policy = "allow_write /proc/sys/net/ipv4/ip_local_port_range"; in stage_file_test()
133 write_domain_policy(policy, 0); in stage_file_test()
135 write_domain_policy(policy, 1); in stage_file_test()
138 policy = "allow_read/write /proc/sys/net/ipv4/ip_local_port_range"; in stage_file_test()
139 write_domain_policy(policy, 0); in stage_file_test()
[all …]
/external/python/cpython3/Lib/test/test_email/
Dtest_policy.py6 import email.policy
30 # These default values are the ones set on email.policy.default.
36 'header_factory': email.policy.EmailPolicy.header_factory,
38 'content_manager': email.policy.EmailPolicy.content_manager,
43 # For each policy under test, we give here what we expect the defaults to
44 # be for that policy. The second argument to make defaults is the
45 # difference between the base defaults and that for the particular policy.
46 new_policy = email.policy.EmailPolicy()
48 email.policy.compat32: make_defaults(compat32_defaults, {}),
49 email.policy.default: make_defaults(policy_defaults, {}),
[all …]
/external/python/google-api-python-client/docs/dyn/
Dcloudresourcemanager_v1.folders.html79 <p class="firstline">Clears a `Policy` from a resource.</p>
82 <p class="firstline">Gets the effective `Policy` on a resource. This is the result of merging</p>
85 <p class="firstline">Gets a `Policy` on a resource.</p>
100 <p class="firstline">Updates the specified `Policy` on the resource. Creates a new `Policy` for</p>
104 <pre>Clears a `Policy` from a resource.
107 resource: string, Name of the resource for the `Policy` to clear. (required)
113 # will cause the `Policy` to be cleared blindly.
114 "constraint": "A String", # Name of the `Constraint` of the `Policy` to clear.
139 <pre>Gets the effective `Policy` on a resource. This is the result of merging
140 `Policies` in the resource hierarchy. The returned `Policy` will not have
[all …]
Dcloudresourcemanager_v1.organizations.html79 <p class="firstline">Clears a `Policy` from a resource.</p>
85 <p class="firstline">Gets the effective `Policy` on a resource. This is the result of merging</p>
88 <p class="firstline">Gets the access control policy for an Organization resource. May be empty</p>
91 <p class="firstline">Gets a `Policy` on a resource.</p>
112 <p class="firstline">Sets the access control policy on an Organization resource. Replaces any</p>
115 <p class="firstline">Updates the specified `Policy` on the resource. Creates a new `Policy` for</p>
122 <pre>Clears a `Policy` from a resource.
125 resource: string, Name of the resource for the `Policy` to clear. (required)
131 # will cause the `Policy` to be cleared blindly.
132 "constraint": "A String", # Name of the `Constraint` of the `Policy` to clear.
[all …]
Ddns_v1beta2.policies.html79 <p class="firstline">Create a new Policy</p>
81 <code><a href="#delete">delete(project, policy, clientOperationId=None)</a></code></p>
82 <p class="firstline">Delete a previously created Policy. Will fail if the policy is still being ref…
84 <code><a href="#get">get(project, policy, clientOperationId=None)</a></code></p>
85 <p class="firstline">Fetch the representation of an existing Policy.</p>
93 <code><a href="#patch">patch(project, policy, body, clientOperationId=None)</a></code></p>
94 <p class="firstline">Apply a partial update to an existing Policy.</p>
96 <code><a href="#update">update(project, policy, body, clientOperationId=None)</a></code></p>
97 <p class="firstline">Update an existing Policy.</p>
101 <pre>Create a new Policy
[all …]
Dbinaryauthorization_v1beta1.projects.html83 <code><a href="binaryauthorization_v1beta1.projects.policy.html">policy()</a></code>
85 <p class="firstline">Returns the policy Resource.</p>
89 <p class="firstline">A policy specifies the attestors that must attest to</p>
92 <p class="firstline">Creates or updates a project's policy, and returns a copy of the</p>
96 <pre>A policy specifies the attestors that must attest to
98 image. There is at most one policy per project. All image admission
99 requests are permitted if a project has no policy.
101 Gets the policy for this project. Returns a default
102 policy if the project does not have one.
105 name: string, Required. The resource name of the policy to retrieve,
[all …]
/external/libbrillo/policy/tests/
Dlibpolicy_test.cc5 #include "policy/libpolicy.h"
19 #include "policy/device_policy_impl.h"
21 namespace policy { namespace
23 static const char kPolicyFileAllSet[] = "policy/tests/whitelist/policy_all";
24 static const char kPolicyFileNoneSet[] = "policy/tests/whitelist/policy_none";
25 static const char kKeyFile[] = "policy/tests/whitelist/owner.key";
44 // Test that a policy file can be verified and parsed correctly. The file
56 // Ensure we successfully loaded the device policy file. in TEST()
59 const DevicePolicy& policy = provider.GetDevicePolicy(); in TEST() local
63 ASSERT_TRUE(policy.GetPolicyRefreshRate(&int_value)); in TEST()
[all …]
/external/ImageMagick/config/
Dpolicy.xml3 <!ELEMENT policymap (policy)*>
5 <!ELEMENT policy EMPTY>
6 <!ATTLIST policy xmlns CDATA #FIXED '' domain NMTOKEN #REQUIRED
22 <policy domain="delegate" rights="none" pattern="mpeg:decode" />
26 <policy domain="coder" rights="none" pattern="HTTP" />
31 <policy domain="path" rights="read" pattern="/repository/*" />
35 <policy domain="filter" rights="none" pattern="*" />
39 <policy domain="resource" name="area" value="1GP"/>
43 <policy domain="system" name="font" value="/usr/share/fonts/favorite.ttf"/>
47 for each instance of ImageMagick (e.g. policy memory limit 1GB, -limit 2GB
[all …]
/external/ImageMagick/www/source/
Dpolicy.xml3 <!ELEMENT policymap (policy)+>
5 <!ELEMENT policy EMPTY>
6 <!ATTLIST policy xmlns CDATA #FIXED '' domain NMTOKEN #REQUIRED
22 <policy domain="delegate" rights="none" pattern="mpeg:decode" />
26 <policy domain="coder" rights="none" pattern="HTTP" />
30 <policy domain="filter" rights="none" pattern="*" />
35 <policy domain="path" rights="read" pattern="/repository/*" />
39 <policy domain="filter" rights="none" pattern="*" />
43 <policy domain="resource" name="area" value="1GP"/>
47 for each instance of ImageMagick (e.g. policy memory limit 1GB, -limit 2GB
[all …]
/external/androidplot/.idea/
DuiDesigner.xml6 <default-constraints vsize-policy="1" hsize-policy="6" anchor="0" fill="1" />
9 <default-constraints vsize-policy="6" hsize-policy="1" anchor="0" fill="2" />
12 <default-constraints vsize-policy="3" hsize-policy="3" anchor="0" fill="3" />
15 <default-constraints vsize-policy="7" hsize-policy="7" anchor="0" fill="3" />
18 <default-constraints vsize-policy="0" hsize-policy="3" anchor="0" fill="1" />
24 <default-constraints vsize-policy="0" hsize-policy="3" anchor="8" fill="0" />
30 <default-constraints vsize-policy="0" hsize-policy="3" anchor="8" fill="0" />
36 <default-constraints vsize-policy="0" hsize-policy="0" anchor="8" fill="0" />
42 <default-constraints vsize-policy="0" hsize-policy="6" anchor="8" fill="1">
47 <default-constraints vsize-policy="0" hsize-policy="6" anchor="8" fill="1">
[all …]
/external/selinux/secilc/docs/
Dcil_introduction.md4 …s between one or more high level policy languages (such as the current module language) and the lo…
6 …e and produce language constructs with more features than the raw kernel policy (e.g., interfaces)…
8 …f high-level languages, encouraging the creation of more domain specific policy languages (e.g., C…
10 * Provides a semantically rich representation suitable for policy analysis, allowing the analysis o…
19 …sy to parse and to generate by high-level compilers, analysis tools, and policy generation tools. …
21policy that will be enforced by the kernel. That policy must be full represented so that all of th…
23 …istent one - CIL is meant for a source policy oriented world, so assume and leverage that. The onl…
25 …lute requirement. Where necessary it is assumed that manual or automated policy conversion will be…
27policy, but there is no reason to re-think core concepts that are working well. All changes to exi…
29 * No more M4 - the pervasive use of M4 and pre-processing in general has eased policy creation, but…
[all …]
/external/autotest/client/cros/enterprise/
Dtest_policy.py9 from autotest_lib.client.cros.enterprise import policy
12 This is the unittest file for policy.py.
33 test_policy = policy.Policy()
46 test_policy = policy.Policy()
55 test_policy = policy.Policy()
64 test_policy = policy.Policy()
73 test_policy = policy.Policy()
86 test_policy = policy.Policy()
102 test_policy = policy.Policy()
106 test_policy2 = policy.Policy()
[all …]
Dpolicy_group.py8 from autotest_lib.client.cros.enterprise.policy import Policy as Policy unknown
22 # policy group is "configured" to represent what the "displayed" policy
66 @param visual: bool, If the extension policy provided is what should be
71 # If the policy is configured (ie this policy group object represents)
93 Create and the policy object, and set it in the corresponding group.
95 @param policy_type: str of the policy type. Must be:
97 @param policies: dict of policy values.
98 @param group: str, group key for the Policy object setter.
156 for policy, value in policies.items():
159 cleaned[policy] = self._jsonify(policy, value)
[all …]
/external/ImageMagick/www/
Dsecurity-policy.html10 <title>ImageMagick - Security Policy</title>
15 <meta name="keywords" content="security, policy, image processing software" />
32 <link href="../www/security-policy.html" rel="canonical" />
94 <h1 class="text-center">Security Policy</h1>
95policy.html#policy">Security Policy </a> • <a href="security-policy.html#synchronize">Pixel Cache …
98 …y <a href="https://imagemagick.org/source/policy.xml">policy</a> that suits your local environment…
100 …by adjusting the security policy per the requirements of your local environment or organizational …
102policy.xml">policy.xml</a> configuration file. You might wonder why ImageMagick does not already i…
106 &lt;policy domain="resource" name="temporary-path" value="/data/magick"/>
107 &lt;policy domain="resource" name="memory" value="256MiB"/>
[all …]
/external/desugar/java/com/google/devtools/common/options/
DInvocationPolicyEnforcer.java53 private static final String INVOCATION_POLICY_SOURCE = "Invocation policy";
58 * Creates an InvocationPolicyEnforcer that enforces the given policy.
60 * @param invocationPolicy the policy to enforce. A null policy means this enforcer will do
68 * Creates an InvocationPolicyEnforcer that enforces the given policy.
70 * @param invocationPolicy the policy to enforce. A null policy means this enforcer will do
81 private final FlagPolicy policy; field in InvocationPolicyEnforcer.FlagPolicyWithContext
86 FlagPolicy policy, OptionDescription description, OptionInstanceOrigin origin) { in FlagPolicyWithContext() argument
87 this.policy = policy; in FlagPolicyWithContext()
98 * Applies this OptionsPolicyEnforcer's policy to the given OptionsParser for all blaze commands.
100 * @param parser The OptionsParser to enforce policy on.
[all …]
/external/selinux/python/sepolicy/
Dsepolicy-generate.83 sepolicy-generate \- Generate an initial SELinux policy module template.
40 Miscellaneous Policy
50 Use \fBsepolicy generate\fP to generate an SELinux policy Module.
58 types and policy rules for your policy files.
65 Policy generated by \fBsepolicy generate\fP will automatically add a permissive DOMAIN to your te f…
69 …s the interfaces for the types generated in the te file, which can be used by other policy domains.
78 …the SELinux policy on to machines and setup the labeling. The spec file also installs the interfac…
82 … labeling on your test system. It will also generate a man page based on the installed policy, and
96 Specify alternate name of policy. The policy will default to the executable or name specified
99 Specify the directory to store the created policy files. (Default to current working directory )
[all …]

12345678910>>...149