/external/selinux/libsepol/tests/ |
D | Makefile | 24 m4support := $(wildcard policies/support/*.spt) 25 testsuites := $(wildcard policies/test-*) 29 policies := $(stdpol) $(mlspol) macro 31 all: $(EXE) $(policies) 32 policies: $(policies) target 45 rm -f $(policies) 46 rm -f policies/test-downgrade/policy.hi policies/test-downgrade/policy.lo 49 test: $(EXE) $(policies) 50 $(MKDIR) -p policies/test-downgrade 51 …../../checkpolicy/checkpolicy -M policies/test-cond/refpolicy-base.conf -o policies/test-downgrade… [all …]
|
D | test-linker.c | 48 const char *policies[NUM_POLICIES] = { variable 63 if (test_load_policy(&linkedbase, POLICY_BASE, mls, "test-linker", policies[BASEMOD])) in linker_test_init() 66 if (test_load_policy(&basenomods, POLICY_BASE, mls, "test-linker", policies[BASEMOD])) in linker_test_init() 77 if (test_load_policy(modules[i], POLICY_MOD, mls, "test-linker", policies[i])) in linker_test_init()
|
/external/owasp/sanitizer/src/main/org/owasp/html/ |
D | AttributePolicy.java | 69 public static final AttributePolicy join(AttributePolicy... policies) { in join() argument 71 for (AttributePolicy p : policies) { in join() 73 uniq.addAll(((JoinedAttributePolicy) p).policies); in join() 112 final ImmutableList<AttributePolicy> policies; field in JoinedAttributePolicy 114 JoinedAttributePolicy(Collection<? extends AttributePolicy> policies) { in JoinedAttributePolicy() argument 115 this.policies = ImmutableList.copyOf(policies); in JoinedAttributePolicy() 120 for (AttributePolicy p : policies) { in apply() 130 && policies.equals(((JoinedAttributePolicy) o).policies); in equals() 135 return policies.hashCode(); in hashCode()
|
D | ElementAndAttributePolicyBasedSanitizerPolicy.java | 104 ElementAndAttributePolicies policies = elAndAttrPolicies.get(elementName); in openTag() local 105 String adjustedElementName = applyPolicies(elementName, attrs, policies); in openTag() 107 && !(attrs.isEmpty() && policies.skipIfEmpty)) { in openTag() 108 writeOpenTag(policies, adjustedElementName, attrs); in openTag() 116 ElementAndAttributePolicies policies) { in applyPolicies() argument 118 if (policies != null) { in applyPolicies() 123 = policies.attrPolicies.get(name); in applyPolicies() 140 adjustedElementName = policies.elPolicy.apply(elementName, attrs); in applyPolicies() 174 ElementAndAttributePolicies policies, String adjustedElementName, in writeOpenTag() argument 176 if (!policies.isVoid) { in writeOpenTag() [all …]
|
D | PolicyFactory.java | 56 private final ImmutableMap<String, ElementAndAttributePolicies> policies; field in PolicyFactory 61 ImmutableMap<String, ElementAndAttributePolicies> policies, in PolicyFactory() argument 64 this.policies = policies; in PolicyFactory() 72 out, policies, textContainers); in apply() 138 : policies.entrySet()) { in and() 141 ElementAndAttributePolicies q = f.policies.get(elName); in and() 152 : f.policies.entrySet()) { in and() 154 if (!policies.containsKey(elName)) { in and()
|
D | HtmlPolicyBuilder.java | 345 Map<String, AttributePolicy> policies = attrPolicies.get(elementName); in allowAttributesOnElements() local 346 if (policies == null) { in allowAttributesOnElements() 347 policies = Maps.newLinkedHashMap(); in allowAttributesOnElements() 348 attrPolicies.put(elementName, policies); in allowAttributesOnElements() 351 AttributePolicy oldPolicy = policies.get(attributeName); in allowAttributesOnElements() 352 policies.put( in allowAttributesOnElements() 575 Map<String, AttributePolicy> policies = e.getValue(); in compilePolicies() local 577 if (policies.containsKey(urlAttributeName)) { in compilePolicies() 578 policies.put(urlAttributeName, AttributePolicy.Util.join( in compilePolicies() 579 urlAttributePolicy, policies.get(urlAttributeName))); in compilePolicies()
|
D | ElementPolicy.java | 67 public static final ElementPolicy join(ElementPolicy... policies) { in join() argument 94 for (ElementPolicy policy : policies) { in join()
|
/external/boringssl/src/crypto/x509/ |
D | x509_vpm.c | 135 if (param->policies) in x509_verify_param_zero() 137 sk_ASN1_OBJECT_pop_free(param->policies, ASN1_OBJECT_free); in x509_verify_param_zero() 138 param->policies = NULL; in x509_verify_param_zero() 289 if (test_x509_verify_param_copy(policies, NULL)) in X509_VERIFY_PARAM_inherit() 291 if (!X509_VERIFY_PARAM_set1_policies(dest, src->policies)) in X509_VERIFY_PARAM_inherit() 421 if (!param->policies) in X509_VERIFY_PARAM_add0_policy() 423 param->policies = sk_ASN1_OBJECT_new_null(); in X509_VERIFY_PARAM_add0_policy() 424 if (!param->policies) in X509_VERIFY_PARAM_add0_policy() 427 if (!sk_ASN1_OBJECT_push(param->policies, policy)) in X509_VERIFY_PARAM_add0_policy() 433 STACK_OF(ASN1_OBJECT) *policies) in X509_VERIFY_PARAM_set1_policies() [all …]
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/x509/ |
D | CertificatePoliciesTest.java | 43 String[] policies = new String[] { in testCertificatePolicies() local 50 for (int i = 0; i < policies.length; i++) { in testCertificatePolicies() 52 new PolicyInformation(policies[i]); in testCertificatePolicies()
|
/external/boringssl/src/crypto/x509v3/ |
D | pcy_cache.c | 75 CERTIFICATEPOLICIES *policies, int crit) in policy_cache_create() argument 82 if (sk_POLICYINFO_num(policies) == 0) in policy_cache_create() 87 for (i = 0; i < sk_POLICYINFO_num(policies); i++) in policy_cache_create() 89 policy = sk_POLICYINFO_value(policies, i); in policy_cache_create() 120 sk_POLICYINFO_pop_free(policies, POLICYINFO_free); in policy_cache_create()
|
/external/apache-harmony/security/src/test/impl/java.injected/java/security/cert/ |
D | X509CertSelectorTest.java | 105 protected String[] policies = null; field in X509CertSelectorTest.TestCert 124 public TestCert(String[] policies) { in TestCert() argument 125 setPolicies(policies); in TestCert() 165 public void setPolicies(String[] policies) { in setPolicies() argument 166 this.policies = policies; in setPolicies() 415 if ("2.5.29.32".equals(oid) && (policies != null) in getExtensionValue() 416 && (policies.length > 0)) { in getExtensionValue() 420 for (int i = 0; i < policies.length; i++) { in getExtensionValue() 422 new PolicyInformation(policies[i]); in getExtensionValue() 2279 String[] policies = new String[] { in testGetPolicy() local [all …]
|
/external/strace/xlat/ |
D | policies.h | 3 static const struct xlat policies[] = { variable
|
/external/owasp/sanitizer/distrib/lib/ |
D | owasp-java-html-sanitizer.jar | ... $
org.owasp.html.AttributePolicy[] policies
java.util.Set uniq
}
org/owasp ... |
/external/strace/ |
D | mem.c | 369 printxval(policies, tcp->u_arg[2], "MPOL_???"); in SYS_FUNC() 380 printxval(policies, tcp->u_arg[0], "MPOL_???"); in SYS_FUNC() 395 printxval(policies, pol, "MPOL_???"); in SYS_FUNC()
|
/external/selinux/policycoreutils/sepolicy/sepolicy/help/ |
D | lockdown_permissive.txt | 8 Permissive domain policies are experimental and will be turned to enforcing in future Operation Sys…
|
/external/ipsec-tools/ |
D | README | 8 - setkey, a tool to directly manipulate policies and SAs
|
D | NEWS | 43 o Support for UNIQUE generated policies 57 o Generated policies are now correctly flushed
|
/external/selinux/checkpolicy/ |
D | ChangeLog | 110 * Add support for building Xen policies from Paul Nuzzi. 266 (requirement that policies with newer versions include the 268 classes in newer source policies to single netlink class when 269 generating older policies) from George Coker.
|
/external/selinux/secilc/ |
D | COPYING | 31 of the authors and should not be interpreted as representing official policies,
|
/external/icu/icu4j/main/shared/data/ |
D | security.policy | 8 // policies needed to run tests
|
/external/androidplot/Examples/DemoApp/ |
D | project.properties | 25 # authors and should not be interpreted as representing official policies, either expressed
|
D | ant.properties | 25 # authors and should not be interpreted as representing official policies, either expressed
|
/external/selinux/policycoreutils/sepolicy/sepolicy/ |
D | __init__.py | 397 policies = glob.glob ("%s.*" % path ) 398 policies.sort() 399 return policies[-1]
|
/external/srtp/doc/ |
D | intro.txt | 267 applied to it. A session policy is a collection of stream policies. 320 that describe the cryptograhic policies for RTP and RTCP, as well as 325 is desirable to use the same cryptographic policies across all of the 329 functions, which set a crypto policy structure to the default policies
|
/external/boringssl/src/include/openssl/ |
D | x509_vfy.h | 173 STACK_OF(ASN1_OBJECT) *policies; /* Permissible policies */ 555 STACK_OF(ASN1_OBJECT) *policies);
|