Home
last modified time | relevance | path

Searched full:path (Results 2026 - 2050 of 40112) sorted by relevance

1...<<81828384858687888990>>...1605

/third_party/nghttp2/doc/
H A Dnghttpx.142 Set path to server\(aqs private key. Required unless
48 Set path to server\(aqs certificate. Required unless
50 make OCSP stapling work, this must be an absolute path.
58 .B \-b, \-\-backend=(<HOST>,<PORT>|unix:<PATH>)[;[<PATTERN>[:...]][[;<PARAM>]...]
61 domain socket can be specified by prefixing path name
68 consists of path, host + path or just host. The path
70 all request path in its subtree. To deal with the
72 path whic
[all...]
/third_party/node/deps/v8/third_party/zlib/google/
H A Dzip_unittest.cc36 // Convenience macro to create a file path from a string literal.
37 #define FP(path) base::FilePath(FILE_PATH_LITERAL(path))
48 for (base::FilePath path = files.Next(); !path.empty(); path = files.Next()) { in GetRelativePaths()
50 EXPECT_TRUE(dir.AppendRelativePath(path, &relative)); in GetRelativePaths()
163 for (const base::FilePath& path : paths) {
164 const auto it = files_.find(path);
176 bool List(const base::FilePath& path,
258 base::FilePath path; GetDataDirectory() local
274 TestUnzipFile(const base::FilePath& path, bool expect_hidden_files) TestUnzipFile() argument
401 base::FilePath path = GetDataDirectory().AppendASCII("evil.zip"); TEST_F() local
413 base::FilePath path = TEST_F() local
[all...]
/third_party/node/deps/zlib/google/
H A Dzip_unittest.cc36 // Convenience macro to create a file path from a string literal.
37 #define FP(path) base::FilePath(FILE_PATH_LITERAL(path))
48 for (base::FilePath path = files.Next(); !path.empty(); path = files.Next()) { in GetRelativePaths()
50 EXPECT_TRUE(dir.AppendRelativePath(path, &relative)); in GetRelativePaths()
163 for (const base::FilePath& path : paths) {
164 const auto it = files_.find(path);
176 bool List(const base::FilePath& path,
258 base::FilePath path; GetDataDirectory() local
274 TestUnzipFile(const base::FilePath& path, bool expect_hidden_files) TestUnzipFile() argument
401 base::FilePath path = GetDataDirectory().AppendASCII("evil.zip"); TEST_F() local
413 base::FilePath path = TEST_F() local
[all...]
/base/global/resource_management/frameworks/resmgr/include/
H A Dresource_manager_impl.h59 * Add resource path to hap paths
60 * @param path the resource path
61 * @return true if add resource path success, else false
63 virtual bool AddResource(const char *path, const uint32_t &selectedTypes = SELECT_ALL);
65 virtual bool AddPatchResource(const char *path, const char *patchPath);
68 * Add resource path to overlay paths
69 * @param path the resource path
70 * @param overlayPaths the exist overlay resource path
[all...]
/base/security/selinux_adapter/sepolicy/ohos_policy/web/webview/system/
H A Dnormal_hap.te14 #avc: denied { read write } for pid=1912 comm="nweb_test" path="socket:[26685]" dev="sockfs" ino=26685 scontext=u:r:normal_hap:s0 tcontext=u:r:init:s0 tclass=unix_stream_socket permissive=1
18 #avc: denied { open } for pid=1912 comm="nweb_test" path="/data/init_agent/begetctl.log" dev="mmcblk0p11" ino=1044487 scontext=u:r:normal_hap:s0 tcontext=u:object_r:data_init_agent:s0 tclass=file permissive=1
19 #avc: denied { ioctl } for pid=1912 comm="nweb_test" path="/data/init_agent/begetctl.log" dev="mmcblk0p11" ino=1044487 ioctlcmd=0x5413 scontext=u:r:normal_hap:s0 tcontext=u:object_r:data_init_agent:s0 tclass=file permissive=
24 #avc: denied { open } for pid=1912 comm="nweb_test" path="/data/local/debug.log" dev="mmcblk0p11" ino=1175104 scontext=u:r:normal_hap:s0 tcontext=u:object_r:data_local:s0 tclass=file permissive=1
47 #avc: denied { read write } for pid=1953 comm="nweb_test" path="/dev/pts/0" dev="devpts" ino=3 scontext=u:r:normal_hap:s0 tcontext=u:object_r:devpts:s0 tclass=chr_file permissive=1
50 #avc: denied { use } for pid=1953 comm="nweb_test" path="/dev/pts/0" dev="devpts" ino=3 scontext=u:r:normal_hap:s0 tcontext=u:r:hdcd:s0 tclass=fd permissive=1
53 #avc: denied { use } for pid=1953 comm="nweb_test" path="anon_inode:[eventpoll]" dev="anon_inodefs" ino=16043 scontext=u:r:normal_hap:s0 tcontext=u:r:kernel:s0 tclass=fd permissive=1
63 #avc: denied { getattr } for pid=2827 comm="nweb_test" path="/system/usr/ohos_locale_config/supported_regions.xml" dev="mmcblk0p6" ino=2500 scontext=u:r:normal_hap:s0 tcontext=u:object_r:system_usr_file:s0 tclass=file permissive=1
65 #avc: denied { open } for pid=2827 comm="nweb_test" path="/system/usr/ohos_locale_config/supported_regions.xml" dev="mmcblk0p6" ino=2500 scontext=u:r:normal_hap:s0 tcontext=u:object_r:system_usr_file:s0 tclass=file permissive=1
66 #avc: denied { map } for pid=2827 comm="nweb_test" path
[all...]
/base/security/selinux_adapter/sepolicy/ohos_policy/communication/netmanager/system/
H A Dnetsysnative.te156 # avc: denied { open } for pid=10447 comm="starter" path="/dev/console" dev="tmpfs" ino=39 scontext=u:r:netsysnative:s0 tcontext=u:object_r:dev_console_file:s0 tclass=chr_file permissive=1
159 # avc: denied { open } for pid=2154 comm="charon" path="/data/service/el1/public/vpn" dev="mmcblk0p15" ino=235 scontext=u:r:netsysnative:s0 tcontext=u:object_r:data_service_el1_file:s0 tclass=dir permissive=1
164 # avc: denied { getattr } for pid=2144 comm="starter" path="/data/service/el1/public/vpn/strongswan.conf" dev="mmcblk0p15" ino=2864 scontext=u:r:netsysnative:s0 tcontext=u:object_r:data_service_el1_file:s0 tclass=file permissive=1
165 # avc: denied { map } for pid=2154 comm="charon" path="/data/service/el1/public/vpn/swanctl.conf" dev="mmcblk0p15" ino=2863 scontext=u:r:netsysnative:s0 tcontext=u:object_r:data_service_el1_file:s0 tclass=file permissive=1
168 # avc: denied { append } for pid=3148 comm="pppd" path="/data/service/el1/public/vpn/xl2tpd.log" dev="mmcblk0p15" ino=2652 scontext=u:r:netsysnative:s0 tcontext=u:object_r:data_service_el1_file:s0 tclass=file permissive=1
175 # avc: denied { getattr } for pid=2154 comm="charon" path="/proc/sys/net/core/xfrm_acq_expires" dev="proc" ino=28723 scontext=u:r:netsysnative:s0 tcontext=u:object_r:proc_file:s0 tclass=file permissive=1
176 # avc: denied { ioctl } for pid=10489 comm="charon" path="/proc/sys/net/core/xfrm_acq_expires" dev="proc" ino=20020 ioctlcmd=0x5413 scontext=u:r:netsysnative:s0 tcontext=u:object_r:proc_file:s0 tclass=file permissive=1
184 # avc: denied { getattr } for pid=2154 comm="charon" path="/data/service/el1/public/vpn/charon.vici" dev="mmcblk0p15" ino=2693 scontext=u:r:netsysnative:s0 tcontext=u:object_r:data_service_el1_file:s0 tclass=sock_file permissive=1
190 # avc: denied { getattr } for pid=3203 comm="charon" path="/data/service/el1/public/vpn/l2tp-control" dev="mmcblk0p15" ino=2668 scontext=u:r:netsysnative:s0 tcontext=u:object_r:data_service_el1_file:s0 tclass=fifo_file permissive=1
195 # avc: denied { open } for pid=4364 comm="xl2tpd" path
[all...]
/foundation/filemanagement/storage_service/services/storage_daemon/crypto/src/
H A Dbase_key.cpp110 bool BaseKey::SaveKeyBlob(const KeyBlob &blob, const std::string &path) in SaveKeyBlob() argument
116 LOGI("enter %{public}s, size=%{public}d", path.c_str(), blob.size); in SaveKeyBlob()
117 return WriteFileSync(path.c_str(), blob.data.get(), blob.size); in SaveKeyBlob()
120 bool BaseKey::GenerateAndSaveKeyBlob(KeyBlob &blob, const std::string &path, const uint32_t size) in GenerateAndSaveKeyBlob() argument
125 return SaveKeyBlob(blob, path); in GenerateAndSaveKeyBlob()
128 bool BaseKey::LoadKeyBlob(KeyBlob &blob, const std::string &path, const uint32_t size) in LoadKeyBlob() argument
130 LOGI("enter %{public}s, size=%{public}d", path.c_str(), size); in LoadKeyBlob()
131 std::ifstream file(path, std::ios::binary); in LoadKeyBlob()
133 LOGE("open %{public}s failed, errno %{public}d", path.c_str(), errno); in LoadKeyBlob()
141 LOGE("file:%{public}s size error, real len %{public}d not expected %{public}d", path in LoadKeyBlob()
421 EncryptDe(const UserAuth &auth, const std::string &path) StoreKey() argument
565 DoRestoreKeyOld(const UserAuth &auth, const std::string &path) StoreKey() argument
598 DoRestoreKeyDe(const UserAuth &auth, const std::string &path) StoreKey() argument
625 DoRestoreKeyCeEceSece(const UserAuth &auth, const std::string &path, const uint32_t keyType) StoreKey() argument
673 DoRestoreKey(const UserAuth &auth, const std::string &path) StoreKey() argument
817 WipingActionDir(std::string &path) StoreKey() argument
958 std::string path = candidate.empty() ? keyPath : candidate; StoreKey() local
[all...]
/third_party/libabigail/doc/vizualization/graph/svg/
H A Dsa-C3.svg6 <path style="stroke:none;" d="M 6 -4.984375 C 6 -4.710938 5.929688 -4.460938 5.796875 -4.234375 C 5.660156 -4.015625 5.492188 -3.832031 5.296875 -3.6875 C 5.109375 -3.539062 4.914062 -3.398438 4.71875 -3.265625 C 4.519531 -3.128906 4.347656 -2.972656 4.203125 -2.796875 C 4.066406 -2.628906 4 -2.453125 4 -2.265625 L 4 -1.84375 L 3 -1.84375 L 3 -2.34375 C 3 -2.5625 3.066406 -2.769531 3.203125 -2.96875 C 3.335938 -3.164062 3.503906 -3.332031 3.703125 -3.46875 C 3.898438 -3.613281 4.09375 -3.757812 4.28125 -3.90625 C 4.476562 -4.050781 4.644531 -4.210938 4.78125 -4.390625 C 4.925781 -4.578125 5 -4.773438 5 -4.984375 C 5 -5.285156 4.867188 -5.53125 4.609375 -5.71875 C 4.347656 -5.90625 4 -6 3.5625 -6 C 3.351562 -6 3.207031 -5.910156 3.125 -5.734375 C 3.039062 -5.554688 3 -5.3125 3 -5 L 2 -5 C 2 -5.65625 2.132812 -6.148438 2.40625 -6.484375 C 2.6875 -6.828125 3.09375 -7 3.625 -7 C 4.34375 -7 4.914062 -6.816406 5.34375 -6.453125 C 5.78125 -6.085938 6 -5.597656 6 -4.984375 Z M 4 -1 L 4 0 L 3 0 L 3 -1 Z M 0 1 L 0 -8 L 7 -8 L 7 1 Z M 1 0 L 6 0 L 6 -7 L 1 -7 Z "/>
9 <path style="stroke:none;" d="M 0 -3.46875 C 0 -3.769531 0.0234375 -4.070312 0.078125 -4.375 C 0.140625 -4.675781 0.25 -4.988281 0.40625 -5.3125 C 0.5625 -5.632812 0.753906 -5.914062 0.984375 -6.15625 C 1.210938 -6.394531 1.523438 -6.59375 1.921875 -6.75 C 2.316406 -6.914062 2.757812 -7 3.25 -7 C 4.800781 -7 5.71875 -6.332031 6 -5 L 5 -5 C 4.894531 -5.332031 4.695312 -5.582031 4.40625 -5.75 C 4.113281 -5.914062 3.695312 -6 3.15625 -6 C 2.488281 -6 1.960938 -5.773438 1.578125 -5.328125 C 1.191406 -4.878906 1 -4.265625 1 -3.484375 C 1 -2.722656 1.195312 -2.117188 1.59375 -1.671875 C 2 -1.222656 2.539062 -1 3.21875 -1 C 3.75 -1 4.148438 -1.078125 4.421875 -1.234375 C 4.703125 -1.398438 4.894531 -1.65625 5 -2 L 6 -2 C 5.789062 -0.664062 4.863281 0 3.21875 0 C 2.726562 0 2.289062 -0.078125 1.90625 -0.234375 C 1.519531 -0.390625 1.207031 -0.585938 0.96875 -0.828125 C 0.738281 -1.066406 0.546875 -1.34375 0.390625 -1.65625 C 0.242188 -1.976562 0.140625 -2.285156 0.078125 -2.578125 C 0.0234375 -2.867188 0 -3.164062 0 -3.46875 Z "/>
12 <path style="stroke:none;" d="M 2.5625 -6 C 1.976562 -6 1.570312 -5.90625 1.34375 -5.71875 C 1.125 -5.539062 1.007812 -5.300781 1 -5 L 0 -5 C 0.0390625 -6.332031 0.890625 -7 2.546875 -7 C 3.304688 -7 3.90625 -6.816406 4.34375 -6.453125 C 4.78125 -6.097656 5 -5.609375 5 -4.984375 C 5 -4.285156 4.628906 -3.8125 3.890625 -3.5625 C 4.285156 -3.4375 4.566406 -3.253906 4.734375 -3.015625 C 4.910156 -2.785156 5 -2.46875 5 -2.0625 C 5 -1.4375 4.769531 -0.9375 4.3125 -0.5625 C 3.863281 -0.1875 3.265625 0 2.515625 0 C 0.953125 0 0.113281 -0.664062 0 -2 L 1 -2 C 1 -1.65625 1.128906 -1.398438 1.390625 -1.234375 C 1.648438 -1.078125 2.035156 -1 2.546875 -1 C 3.003906 -1 3.359375 -1.085938 3.609375 -1.265625 C 3.867188 -1.453125 4 -1.710938 4 -2.046875 C 4 -2.691406 3.515625 -3.015625 2.546875 -3.015625 L 2.125 -3 L 2 -3 L 2 -4 C 2.726562 -4.007812 3.242188 -4.078125 3.546875 -4.203125 C 3.847656 -4.328125 4 -4.578125 4 -4.953125 C 4 -5.273438 3.867188 -5.53125 3.609375 -5.71875 C 3.359375 -5.90625 3.007812 -6 2.5625 -6 Z "/>
15 <path style="stroke:none;" d="M 1 0 L 1 -7 L 3.4375 -7 C 4.238281 -7 4.863281 -6.664062 5.3125 -6 C 5.769531 -5.34375 6 -4.507812 6 -3.5 C 6 -2.5 5.769531 -1.664062 5.3125 -1 C 4.851562 -0.332031 4.226562 0 3.4375 0 Z M 2 -1 L 3.3125 -1 C 3.863281 -1 4.28125 -1.210938 4.5625 -1.640625 C 4.851562 -2.066406 5 -2.6875 5 -3.5 C 5 -4.3125 4.851562 -4.929688 4.5625 -5.359375 C 4.28125 -5.785156 3.863281 -6 3.3125 -6 L 2 -6 Z "/>
18 <path style="stroke:none;" d="M 2.5625 0 L 1.75 0 L 0.09375 -5 L 0.9375 -5 L 2.203125 -0.9375 L 3.53125 -5 L 4.375 -5 Z "/>
21 <path style="stroke:none;" d="M 4.59375 -7 L 4.59375 -6 L 1.625 -6 L 1.484375 -3.796875 C 1.816406 -4.597656 2.191406 -5 2.609375 -5 C 3.316406 -5 3.890625 -4.773438 4.328125 -4.328125 C 4.773438 -3.878906 5 -3.296875 5 -2.578125 C 5 -1.816406 4.757812 -1.195312 4.28125 -0.71875 C 3.8125 -0.238281 3.207031 0 2.46875 0 C 2.175781 0 1.90625 -0.03125 1.65625 -0.09375 C 1.414062 -0.15625 1.210938 -0.226562 1.046875 -0.3125 C 0.890625 -0.394531 0.742188 -0.503906 0.609375 -0.640625 C 0.484375 -0.785156 0.382812 -0.910156 0.3125 -1.015625 C 0.25 -1.117188 0.1875 -1.25 0.125 -1.40625 C 0.0703125 -1.5625 0.0351562 -1.671875 0.015625 -1.734375 C 0.00390625 -1.796875 -0.0078125 -1.882812 -0.03125 -2 L 1 -2 C 1.207031 -1.332031 1.691406 -1 2.453125 -1 C 2.929688 -1 3.304688 -1.128906 3.578125 -1.390625 C 3.859375 -1.660156 4 -2.019531 4 -2.46875 C 4 -2.945312 3.859375 -3.320312 3.578125 -3.59375 C 3.296875 -3.863281 2.921875 -4 2.453125 -4 C 2.179688 -4 1.945312 -3.925781 1.75 -3.78125 C 1.5625 -3.632812 1.363281 -3.375 1.15625 -3 L 0.515625 -3 L 0.921875 -7 Z "/>
24 <path style="stroke:none;" d="M 2 -5 L 1 -5 L 1 -6 C 1.363281 -6.0625 1.597656 -6.144531 1.703125 -6.25 C 1.816406 -6.363281 1.914062 -6.613281 2 -7 L 3 -7 L 3 0 L 2 0 Z "/>
27 <path style="stroke:none;" d="M 0 -5 C 0.0507812 -6.332031 0.898438 -7 2.546875 -7 C 3.285156 -7 3.882812 -6.789062 4.34375 -6.375 C 4.8125 -5.96875 5.046875 -5.441406 5.046875 -4.796875 C 5.046875 -3.992188 4.484375 -3.335938 3.359375 -2.828125 L 2.296875 -2.34375 C 1.835938 -2.125 1.507812 -1.910156 1.3125 -1.703125 C 1.113281 -1.503906 0.988281 -1.269531 0.9375 -1 L 5 -1 L 5 0 L 1 0 C 1.019531 -0.769531 1.097656 -1.359375 1.234375 -1.765625 C 1.367188 -2.179688 1.625 -2.597656 2 -3.015625 L 2.984375 -3.5 C 3.660156 -3.832031 4 -4.257812 4 -4.78125 C 4 -5.125 3.859375 -5.410156 3.578125 -5.640625 C 3.296875 -5.878906 2.941406 -6 2.515625 -6 C 1.578125 -6 1.070312 -5.664062 1 -5 Z "/>
30 <path style="stroke:none;" d="M 1 -7 L 2 -7 L 2 -3.9375 C 2.25 -4.644531 2.609375 -5 3.078125 -5 C 3.671875 -5 4.140625 -4.78125 4.484375 -4.34375 C 4.828125 -3.90625 5 -3.304688 5 -2.546875 C 5 -1.773438 4.820312 -1.15625 4.46875 -0.6875 C 4.125 -0.226562 3.65625 0 3.0625 0 C 2.601562 0 2.25 -0.363281 2 -1.09375 L 2 0 L 1 0 Z M 2.984375 -4 C 2.679688 -4 2.441406 -3.863281 2.265625 -3.59375 C 2.085938 -3.320312 2 -2.957031 2 -2.5 C 2 -2.039062 2.085938 -1.675781 2.265625 -1.40625 C 2.441406 -1.132812 2.679688 -1 2.984375 -1 C 3.285156 -1 3.53125 -1.132812 3.71875 -1.40625 C 3.90625 -1.675781 4 -2.035156 4 -2.484375 C 4 -2.941406 3.90625 -3.304688 3.71875 -3.578125 C 3.53125 -3.859375 3.285156 -4 2.984375 -4 Z "/>
33 <path styl
[all...]
/third_party/icu/icu4j/tools/misc/
H A D.classpath3 <classpathentry kind="src" path="src"/>
4 <classpathentry kind="con" path="org.eclipse.jdt.launching.JRE_CONTAINER/org.eclipse.jdt.internal.debug.ui.launcher.StandardVMType/JavaSE-1.8"/>
5 <classpathentry combineaccessrules="false" kind="src" path="/icu4j-core"/>
6 <classpathentry combineaccessrules="false" kind="src" path="/icu4j-translit"/>
7 <classpathentry combineaccessrules="false" kind="src" path="/icu4j-collate"/>
8 <classpathentry combineaccessrules="false" kind="src" path="/icu4j-test-framework"/>
9 <classpathentry kind="output" path="out/bin"/>
/third_party/node/test/parallel/
H A Dtest-fs-rmdir-recursive-sync-warns-not-found.js6 const path = require('path');
11 // Should warn when trying to delete a nonexistent path
14 'In future versions of Node.js, fs.rmdir(path, { recursive: true }) ' +
15 'will be removed. Use fs.rm(path, { recursive: true }) instead',
19 () => fs.rmdirSync(path.join(tmpdir.path, 'noexist.txt'),
H A Dtest-fs-rmdir-recursive-warns-not-found.js5 const path = require('path');
10 // Should warn when trying to delete a nonexistent path
13 'In future versions of Node.js, fs.rmdir(path, { recursive: true }) ' +
14 'will be removed. Use fs.rm(path, { recursive: true }) instead',
18 path.join(tmpdir.path, 'noexist.txt'),
H A Dtest-require-unicode.js6 const path = require('path');
11 const dirname = path.join(tmpdir.path, '\u4e2d\u6587\u76ee\u5f55');
13 fs.writeFileSync(path.join(dirname, 'file.js'), 'module.exports = 42;');
14 fs.writeFileSync(path.join(dirname, 'package.json'),
17 assert.strictEqual(require(path.join(dirname, 'file.js')), 42);
/third_party/node/deps/npm/node_modules/bin-links/lib/
H A Dget-node-modules.js1 // we know it's global and/or not top, so the path has to be
5 const { dirname, basename } = require('path')
8 module.exports = path => {
9 if (memo.has(path)) {
10 return memo.get(path)
13 const scopeOrNm = dirname(path)
17 memo.set(path, nm)
/third_party/mesa3d/src/gallium/drivers/radeonsi/glsl_tests/
H A Dlit.cfg23 llvm_tools_dir = os.path.join(llvm_obj_root, 'bin')
25 # Tweak the PATH to include the tools dir.
26 path = os.path.pathsep.join((llvm_tools_dir, config.environment['PATH']))
27 config.environment['PATH'] = path
/third_party/typescript/src/tsserver/
H A Dtsconfig.json16 { "path": "../compiler", "prepend": true },
17 { "path": "../services", "prepend": true },
18 { "path": "../jsTyping", "prepend": true },
19 { "path": "../server", "prepend": true },
20 { "path": "../webServer", "prepend": true },
21 { "path": "../deprecatedCompat", "prepend": true },
22 { "path": "../linter", "prepend": true }
/third_party/skia/docs/examples/
H A DPath_isInterpolatable.cpp7 SkPath path, path2; in REG_FIDDLE() local
8 path.moveTo(20, 20); in REG_FIDDLE()
9 path.lineTo(40, 40); in REG_FIDDLE()
10 path.lineTo(20, 20); in REG_FIDDLE()
11 path.lineTo(40, 40); in REG_FIDDLE()
12 path.close(); in REG_FIDDLE()
14 SkDebugf("paths are " "%s" "interpolatable", path.isInterpolatable(path2) ? "" : "not "); in REG_FIDDLE()
H A DPath_moveTo.cpp8 SkPath path; in REG_FIDDLE() local
9 path.addRect(rect); in REG_FIDDLE()
10 path.moveTo(rect.fLeft, rect.fTop); in REG_FIDDLE()
11 path.lineTo(rect.fRight, rect.fBottom); in REG_FIDDLE()
12 path.moveTo(rect.fLeft, rect.fBottom); in REG_FIDDLE()
13 path.lineTo(rect.fRight, rect.fTop); in REG_FIDDLE()
16 canvas->drawPath(path, paint); in REG_FIDDLE()
/third_party/rust/crates/rustix/src/fs/
H A Dmemfd_create.rs2 use crate::{backend, io, path};
6 /// `memfd_create(path, flags)`
13 pub fn memfd_create<P: path::Arg>(path: P, flags: MemfdFlags) -> io::Result<OwnedFd> { in memfd_create()
14 path.into_with_c_str(|path| backend::fs::syscalls::memfd_create(path, flags)) in memfd_create()
/third_party/json/tests/reports/2016-09-09-nativejson_benchmark/
H A Dconformance_Nlohmann (C++11).md109 <svg aria-hidden="true" class="octicon octicon-mark-github" height="32" version="1.1" viewBox="0 0 16 16" width="32"><path d="M8 0C3.58 0 0 3.58 0 8c0 3.54 2.29 6.53 5.47 7.59.4.07.55-.17.55-.38 0-.19-.01-.82-.01-1.49-2.01.37-2.53-.49-2.69-.94-.09-.23-.48-.94-.82-1.13-.28-.15-.68-.52-.01-.53.63-.01 1.08.58 1.23.82.72 1.21 1.87.87 2.33.66.07-.52.28-.87.51-1.07-1.78-.2-3.64-.89-3.64-3.95 0-.87.31-1.59.82-2.15-.08-.2-.36-1.02.08-2.12 0 0 .67-.21 2.2.82.64-.18 1.32-.27 2-.27.68 0 1.36.09 2 .27 1.53-1.04 2.2-.82 2.2-.82.44 1.1.16 1.92.08 2.12.51.56.82 1.27.82 2.15 0 3.07-1.87 3.75-3.65 3.95.29.25.54.73.54 1.48 0 1.07-.01 1.93-.01 2.2 0 .21.15.46.55.38A8.013 8.013 0 0 0 16 8c0-4.42-3.58-8-8-8z"></path></svg>
113 <svg aria-hidden="true" class="octicon octicon-three-bars" height="24" version="1.1" viewBox="0 0 12 16" width="18"><path d="M11.41 9H.59C0 9 0 8.59 0 8c0-.59 0-1 .59-1H11.4c.59 0 .59.41.59 1 0 .59 0 1-.59 1h.01zm0-4H.59C0 5 0 4.59 0 4c0-.59 0-1 .59-1H11.4c.59 0 .59.41.59 1 0 .59 0 1-.59 1h.01zM.59 11H11.4c.59 0 .59.41.59 1 0 .59 0 1-.59 1H.59C0 13 0 12.59 0 12c0-.59 0-1 .59-1z"></path></svg>
182 <svg aria-hidden="true" class="octicon octicon-eye" height="16" version="1.1" viewBox="0 0 16 16" width="16"><path d="M8.06 2C3 2 0 8 0 8s3 6 8.06 6C13 14 16 8 16 8s-3-6-7.94-6zM8 12c-2.2 0-4-1.78-4-4 0-2.2 1.8-4 4-4 2.22 0 4 1.8 4 4 0 2.22-1.78 4-4 4zm2-4c0 1.11-.89 2-2 2-1.11 0-2-.89-2-2 0-1.11.89-2 2-2 1.11 0 2 .89 2 2z"></path></svg>
196 <svg aria-hidden="true" class="octicon octicon-star" height="16" version="1.1" viewBox="0 0 14 16" width="14"><path d="M14 6l-4.9-.64L7 1 4.9 5.36 0 6l3.6 3.26L2.67 14 7 11.67 11.33 14l-.93-4.74z"></path></svg>
211 <svg aria-hidden="true" class="octicon octicon-repo-forked" height="16" version="1.1" viewBox="0 0 10 16" width="10"><path d="M8 1a1.993 1.993 0 0 0-1 3.72V6L5 8 3 6V4.72A1.993 1.993 0 0 0 2 1a1.993 1.993 0 0 0-1 3.72V6.5l3 3v1.78A1.993 1.993 0 0 0 5 15a1.993 1.993 0 0 0 1-3.72V9.5l3-3V4.72A1.993 1.993 0 0 0 8 1zM2 4.2C1.34 4.2.8 3.65.8 3c0-.65.55-1.2 1.2-1.2.65 0 1.2.55 1.2 1.2 0 .65-.55 1.2-1.2 1.2zm3 10c-.66 0-1.2-.55-1.2-1.2 0-.65.55-1.2 1.2-1.2.65 0 1.2.55 1.2 1.2 0 .65-.55 1.2-1.2 1.2zm3-10c-.66 0-1.2-.55-1.2-1.2 0-.65.55-1.2 1.2-1.2.65 0 1.2.55 1.2 1.2 0 .65-.55 1.2-1.2 1.2z"></path></sv
[all...]
/third_party/littlefs/scripts/
H A Dtest.py38 def openio(path, mode='r', buffering=-1):
40 if path == '-':
46 return open(path, mode, buffering)
52 self.path = config.pop('path')
149 def __init__(self, path, args={}):
150 self.path = path
151 self.name = os.path.basename(path)
[all...]
/base/security/access_token/
H A DOAT.xml23 2. policyitem: The fields type, name, path, desc is required, and the fields rule, group, filefilter is optional,the default value is:
24 <policyitem type="" name="" path="" desc="" rule="may" group="defaultGroup" filefilter="defaultPolicyFilter"/>
26 "compatibility" is used to check license compatibility in the specified path;
27 "license" is used to check source license header in the specified path;
28 "copyright" is used to check source copyright header in the specified path;
29 "import" is used to check source dependency in the specified path, such as import ... ,include ...
30 "filetype" is used to check file type in the specified path, supported file types: archive, binary
31 "filename" is used to check whether the specified file exists in the specified path(projectroot means the root dir of the project), supported file names: LICENSE, README, README.OpenSource
33 5. policyitem path: This field is used for define the source file scope to apply this policyitem, the "!" prefix means exclude the files. For example, "!.*/lib/.*" means files in lib dir will be exclude while process this policyitem.
37 8. filefilter: Filter rules, the type filename is used to filter file name, the type filepath is used to filter file path
[all...]
/base/security/code_signature/interfaces/innerkits/code_sign_utils/src/
H A Dcode_sign_enable_multi_task.cpp70 int32_t CodeSignEnableMultiTask::IsFsVerityEnabled(const std::string &path) in IsFsVerityEnabled() argument
72 int32_t fd = open(path.c_str(), O_RDONLY); in IsFsVerityEnabled()
74 LOG_ERROR("Open file failed, path = %{public}s, errno = <%{public}d, %{public}s>", in IsFsVerityEnabled()
75 path.c_str(), errno, strerror(errno)); in IsFsVerityEnabled()
80 LOG_INFO("Fs-verity is not enable for file = %{public}s.", path.c_str()); in IsFsVerityEnabled()
87 const std::string &path, CallbackFunc &func) in ExecuteEnableCodeSignTask()
96 ExecuteEnableCodeSignTask(i, taskRet, ownerId, path, func); in ExecuteEnableCodeSignTask()
130 const std::string &ownerId, const std::string &path, CallbackFunc &func) in ExecuteEnableCodeSignTask()
132 auto enableCodeSignTask = [this, index, &ownerId, &path, &func, &taskRet]() { in ExecuteEnableCodeSignTask()
145 int32_t ret = CheckOwnerId(path, ownerI in ExecuteEnableCodeSignTask()
86 ExecuteEnableCodeSignTask(const std::string &ownerId, const std::string &path, CallbackFunc &func) ExecuteEnableCodeSignTask() argument
129 ExecuteEnableCodeSignTask(uint32_t &index, int32_t &taskRet, const std::string &ownerId, const std::string &path, CallbackFunc &func) ExecuteEnableCodeSignTask() argument
165 CheckOwnerId(const std::string &path, const std::string &ownerId, const uint8_t *sigPtr, uint32_t sigSize) CheckOwnerId() argument
[all...]
/base/tee/tee_client/services/authentication/
H A Dtcu_authentication.c60 static int IsNotValidFname(const char *path) in IsNotValidFname() argument
62 if (path == NULL) { in IsNotValidFname()
68 if (strstr(path, "..") != NULL) { in IsNotValidFname()
76 static int GetFileSize(const char *path, int *realSize) in GetFileSize() argument
84 bool paramInvlid = ((path == NULL) || (IsNotValidFname(path) != 0) || (strlen(path) > PATH_MAX) || in GetFileSize()
85 (realpath(path, realPath) == NULL)); in GetFileSize()
124 static int GetFileInfo(int bufLen, uint8_t *buffer, const char *path) in GetFileInfo() argument
130 bool paramInvlid = ((buffer == NULL) || (path in GetFileInfo()
[all...]
/base/security/selinux_adapter/sepolicy/ohos_policy/update/updater/system/
H A Dhilogd.te15 # avc: denied { read write } for pid=221 comm="hilogd" path="/dev/console" dev="rootfs" ino=5960 scontext=u:r:hilogd:s0 tcontext=u:object_r:rootfs:s0 tclass=chr_file permissive=1
16 # avc: denied { ioctl } for pid=227 comm="hilogd.pst_res" path="/dev/console" dev="rootfs" ino=17236 ioctlcmd=0x5413 scontext=u:r:hilogd:s0 tcontext=u:object_r:rootfs:s0 tclass=chr_file permissive=1
20 # avc: denied { read write } for pid=221 comm="hilogd" path="socket:[27872]" dev="sockfs" ino=27872 scontext=u:r:hilogd:s0 tcontext=u:r:ueventd:s0 tclass=netlink_kobject_uevent_socket permissive=1
24 # avc: denied { open } for pid=227 comm="hilogd" path="/dev/__parameters__/u:object_r:musl_param:s0" dev="tmpfs" ino=40 scontext=u:r:hilogd:s0 tcontext=u:object_r:musl_param:s0 tclass=file permissive=1
25 # avc: denied { map } for pid=227 comm="hilogd" path="/dev/__parameters__/u:object_r:musl_param:s0" dev="tmpfs" ino=40 scontext=u:r:hilogd:s0 tcontext=u:object_r:musl_param:s0 tclass=file permissive=1
31 #avc: denied { write } for pid=230 comm="hilogd.control" path="/data/log/hilog/.persisterInfo_2.info" dev="rootfs" ino=27737 scontext=u:r:hilogd:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
32 #avc: denied { entrypoint } for pid=221 comm="init" path="/bin/hilogd" dev="rootfs" ino=17505 scontext=u:r:hilogd:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
33 #avc: denied { map } for pid=221 comm="hilogd" path="/bin/hilogd" dev="rootfs" ino=17505 scontext=u:r:hilogd:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
34 #avc: denied { read } for pid=221 comm="hilogd" path="/bin/hilogd" dev="rootfs" ino=17505 scontext=u:r:hilogd:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
35 #avc: denied { execute } for pid=221 comm="hilogd" path
[all...]
/base/security/selinux_adapter/scripts/
H A Dbuild_ignore_cfg.py26 parser.add_argument("--dst-dir", help="the output dest path", required=True)
27 parser.add_argument("--source-root-dir", help="project root path", required=True)
47 path = os.path.join(root_dir, i)
48 if os.path.exists(path):
49 build_dir_list.append(path)
51 raise Exception(f"following path not exists!! {path}")
89 :param search_dir: path t
[all...]

Completed in 14 milliseconds

1...<<81828384858687888990>>...1605