/third_party/selinux/libsepol/tests/ |
H A D | Makefile | 27 # In order to load source policies we need to link in the checkpolicy/checkmodule parser and util code. 28 # This is less than ideal, but it makes the tests easier to maintain by allowing source policies 40 m4support := $(wildcard policies/support/*.spt) 41 testsuites := $(wildcard policies/test-*) 45 policies := $(stdpol) $(mlspol) macro 47 all: $(EXE) $(policies) 48 policies: $(policies) 61 rm -f $(policies) 62 rm -f policies/tes [all...] |
H A D | test-linker.c | 48 const char *policies[NUM_POLICIES] = { variable 63 if (test_load_policy(&linkedbase, POLICY_BASE, mls, "test-linker", policies[BASEMOD])) in linker_test_init() 66 if (test_load_policy(&basenomods, POLICY_BASE, mls, "test-linker", policies[BASEMOD])) in linker_test_init() 77 if (test_load_policy(modules[i], POLICY_MOD, mls, "test-linker", policies[i])) in linker_test_init()
|
/third_party/node/deps/openssl/openssl/crypto/x509/ |
H A D | x509_vpm.c | 102 sk_ASN1_OBJECT_pop_free(param->policies, ASN1_OBJECT_free); in X509_VERIFY_PARAM_free() 190 if (test_x509_verify_param_copy(policies, NULL)) { in X509_VERIFY_PARAM_inherit() 191 if (!X509_VERIFY_PARAM_set1_policies(dest, src->policies)) in X509_VERIFY_PARAM_inherit() 335 if (param->policies == NULL) { in X509_VERIFY_PARAM_add0_policy() 336 param->policies = sk_ASN1_OBJECT_new_null(); in X509_VERIFY_PARAM_add0_policy() 337 if (param->policies == NULL) in X509_VERIFY_PARAM_add0_policy() 341 if (sk_ASN1_OBJECT_push(param->policies, policy) <= 0) in X509_VERIFY_PARAM_add0_policy() 347 STACK_OF(ASN1_OBJECT) *policies) in X509_VERIFY_PARAM_set1_policies() 356 sk_ASN1_OBJECT_pop_free(param->policies, ASN1_OBJECT_free); in X509_VERIFY_PARAM_set1_policies() 358 if (policies in X509_VERIFY_PARAM_set1_policies() 346 X509_VERIFY_PARAM_set1_policies(X509_VERIFY_PARAM *param, STACK_OF(ASN1_OBJECT) *policies) X509_VERIFY_PARAM_set1_policies() argument [all...] |
H A D | pcy_cache.c | 27 CERTIFICATEPOLICIES *policies, int crit) in policy_cache_create() 34 if ((num = sk_POLICYINFO_num(policies)) <= 0) in policy_cache_create() 42 policy = sk_POLICYINFO_value(policies, i); in policy_cache_create() 73 sk_POLICYINFO_pop_free(policies, POLICYINFO_free); in policy_cache_create() 107 * don't have any policies. in policy_cache_new() 131 * no point continuing because the valid policies will be NULL. in policy_cache_new() 26 policy_cache_create(X509 *x, CERTIFICATEPOLICIES *policies, int crit) policy_cache_create() argument
|
H A D | x509_local.h | 30 STACK_OF(ASN1_OBJECT) *policies; /* Permissible policies */ member
|
/third_party/openssl/crypto/x509/ |
H A D | x509_vpm.c | 102 sk_ASN1_OBJECT_pop_free(param->policies, ASN1_OBJECT_free); in X509_VERIFY_PARAM_free() 190 if (test_x509_verify_param_copy(policies, NULL)) { in X509_VERIFY_PARAM_inherit() 191 if (!X509_VERIFY_PARAM_set1_policies(dest, src->policies)) in X509_VERIFY_PARAM_inherit() 335 if (param->policies == NULL) { in X509_VERIFY_PARAM_add0_policy() 336 param->policies = sk_ASN1_OBJECT_new_null(); in X509_VERIFY_PARAM_add0_policy() 337 if (param->policies == NULL) in X509_VERIFY_PARAM_add0_policy() 340 return sk_ASN1_OBJECT_push(param->policies, policy); in X509_VERIFY_PARAM_add0_policy() 344 STACK_OF(ASN1_OBJECT) *policies) in X509_VERIFY_PARAM_set1_policies() 353 sk_ASN1_OBJECT_pop_free(param->policies, ASN1_OBJECT_free); in X509_VERIFY_PARAM_set1_policies() 355 if (policies in X509_VERIFY_PARAM_set1_policies() 343 X509_VERIFY_PARAM_set1_policies(X509_VERIFY_PARAM *param, STACK_OF(ASN1_OBJECT) *policies) X509_VERIFY_PARAM_set1_policies() argument [all...] |
H A D | pcy_cache.c | 27 CERTIFICATEPOLICIES *policies, int crit) in policy_cache_create() 34 if ((num = sk_POLICYINFO_num(policies)) <= 0) in policy_cache_create() 42 policy = sk_POLICYINFO_value(policies, i); in policy_cache_create() 73 sk_POLICYINFO_pop_free(policies, POLICYINFO_free); in policy_cache_create() 107 * don't have any policies. in policy_cache_new() 131 * no point continuing because the valid policies will be NULL. in policy_cache_new() 26 policy_cache_create(X509 *x, CERTIFICATEPOLICIES *policies, int crit) policy_cache_create() argument
|
H A D | x509_local.h | 30 STACK_OF(ASN1_OBJECT) *policies; /* Permissible policies */ member
|
/third_party/node/deps/v8/third_party/jinja2/ |
H A D | filters.py | 606 policies = eval_ctx.environment.policies 610 rel.update((policies["urlize.rel"] or "").split()) 612 target = policies["urlize.target"] 694 leeway = env.policies["truncate.leeway"] 1254 policies = eval_ctx.environment.policies 1255 dumper = policies["json.dumps_function"] 1256 options = policies["json.dumps_kwargs"]
|
H A D | ext.py | 324 trimmed = self.environment.policies["ext.i18n.trimmed"] 679 environment.policies["ext.i18n.trimmed"] = True
|
/third_party/node/tools/inspector_protocol/jinja2/ |
H A D | filters.py | 522 policies = eval_ctx.environment.policies 526 rel.update((policies['urlize.rel'] or '').split()) 528 target = policies['urlize.target'] 603 leeway = env.policies['truncate.leeway'] 1072 policies = eval_ctx.environment.policies 1073 dumper = policies['json.dumps_function'] 1074 options = policies['json.dumps_kwargs']
|
H A D | ext.py | 307 trimmed = self.environment.policies['ext.i18n.trimmed'] 603 environment.policies['ext.i18n.trimmed'] = True
|
/third_party/skia/third_party/externals/jinja2/ |
H A D | filters.py | 606 policies = eval_ctx.environment.policies 610 rel.update((policies["urlize.rel"] or "").split()) 612 target = policies["urlize.target"] 694 leeway = env.policies["truncate.leeway"] 1254 policies = eval_ctx.environment.policies 1255 dumper = policies["json.dumps_function"] 1256 options = policies["json.dumps_kwargs"]
|
H A D | ext.py | 324 trimmed = self.environment.policies["ext.i18n.trimmed"] 679 environment.policies["ext.i18n.trimmed"] = True
|
/third_party/python/Lib/test/test_email/ |
H A D | test_policy.py | 47 policies = { variable in PolicyAPITests 64 policies[new_policy]['header_factory'] = new_policy.header_factory 67 for policy, expected in self.policies.items(): 75 for policy, expected in self.policies.items(): 99 for policy, defaults in self.policies.items(): 109 for policyclass, defaults in self.policies.items(): 116 for policyclass in self.policies:
|
/third_party/jinja2/ |
H A D | filters.py | 748 ``env.policies["urlize.extra_schemes"]``, which defaults to no 765 policies = eval_ctx.environment.policies 771 rel_parts.update((policies["urlize.rel"] or "").split()) 775 target = policies["urlize.target"] 778 extra_schemes = policies["urlize.extra_schemes"] or () 879 leeway = env.policies["truncate.leeway"] 1694 policies = eval_ctx.environment.policies 1695 dumps = policies["jso [all...] |
/third_party/node/deps/openssl/openssl/crypto/ts/ |
H A D | ts_rsp_sign.c | 151 sk_ASN1_OBJECT_pop_free(ctx->policies, ASN1_OBJECT_free); in TS_RESP_CTX_free() 210 if (ctx->policies == NULL in TS_RESP_CTX_add_policy() 211 && (ctx->policies = sk_ASN1_OBJECT_new_null()) == NULL) in TS_RESP_CTX_add_policy() 215 if (!sk_ASN1_OBJECT_push(ctx->policies, copy)) in TS_RESP_CTX_add_policy() 497 /* Returns the TSA policy based on the requested and acceptable policies. */ 512 for (i = 0; !policy && i < sk_ASN1_OBJECT_num(ctx->policies); ++i) { in ts_RESP_get_policy() 513 ASN1_OBJECT *current = sk_ASN1_OBJECT_value(ctx->policies, i); in ts_RESP_get_policy()
|
H A D | ts_conf.c | 317 char *policies = NCONF_get_string(conf, section, ENV_OTHER_POLICIES); in TS_CONF_set_policies() local 320 if (policies && (list = X509V3_parse_list(policies)) == NULL) { in TS_CONF_set_policies()
|
H A D | ts_local.h | 107 STACK_OF(ASN1_OBJECT) *policies; /* Acceptable policies. */ member 108 ASN1_OBJECT *default_policy; /* It may appear in policies, too. */
|
/third_party/openssl/crypto/ts/ |
H A D | ts_rsp_sign.c | 151 sk_ASN1_OBJECT_pop_free(ctx->policies, ASN1_OBJECT_free); in TS_RESP_CTX_free() 210 if (ctx->policies == NULL in TS_RESP_CTX_add_policy() 211 && (ctx->policies = sk_ASN1_OBJECT_new_null()) == NULL) in TS_RESP_CTX_add_policy() 215 if (!sk_ASN1_OBJECT_push(ctx->policies, copy)) in TS_RESP_CTX_add_policy() 497 /* Returns the TSA policy based on the requested and acceptable policies. */ 512 for (i = 0; !policy && i < sk_ASN1_OBJECT_num(ctx->policies); ++i) { in ts_RESP_get_policy() 513 ASN1_OBJECT *current = sk_ASN1_OBJECT_value(ctx->policies, i); in ts_RESP_get_policy()
|
H A D | ts_conf.c | 317 char *policies = NCONF_get_string(conf, section, ENV_OTHER_POLICIES); in TS_CONF_set_policies() local 320 if (policies && (list = X509V3_parse_list(policies)) == NULL) { in TS_CONF_set_policies()
|
H A D | ts_local.h | 107 STACK_OF(ASN1_OBJECT) *policies; /* Acceptable policies. */ member 108 ASN1_OBJECT *default_policy; /* It may appear in policies, too. */
|
/third_party/ltp/testcases/kernel/hotplug/memory_hotplug/ |
H A D | commands.c | 246 static struct policies { struct 249 } policies[] = { variable 262 * <mpol> is one of the policies[] above. 268 struct policies *polp; in get_mbind_policy() 274 for (polp = policies; polp->pol_name != NULL; ++polp) { in get_mbind_policy()
|
/third_party/node/deps/openssl/openssl/crypto/cmp/ |
H A D | cmp_ctx.c | 226 sk_POLICYINFO_pop_free(ctx->policies, POLICYINFO_free); in OSSL_CMP_CTX_free() 558 if (ctx->policies == NULL in OSSL_CMP_CTX_push0_policy() 559 && (ctx->policies = CERTIFICATEPOLICIES_new()) == NULL) in OSSL_CMP_CTX_push0_policy() 562 return sk_POLICYINFO_push(ctx->policies, pinfo); in OSSL_CMP_CTX_push0_policy()
|
/third_party/openssl/crypto/cmp/ |
H A D | cmp_ctx.c | 226 sk_POLICYINFO_pop_free(ctx->policies, POLICYINFO_free); in OSSL_CMP_CTX_free() 558 if (ctx->policies == NULL in OSSL_CMP_CTX_push0_policy() 559 && (ctx->policies = CERTIFICATEPOLICIES_new()) == NULL) in OSSL_CMP_CTX_push0_policy() 562 return sk_POLICYINFO_push(ctx->policies, pinfo); in OSSL_CMP_CTX_push0_policy()
|