/foundation/window/window_manager/window_scene/test/dms_unittest/ |
H A D | single_display_pocket_fold_policy_test.cpp | 69 SingleDisplayPocketFoldPolicy policy(displayInfoMutex, screenPowerTaskScheduler); in HWTEST_F() 72 policy.ChangeScreenDisplayMode(displayMode); in HWTEST_F() 73 EXPECT_FALSE(policy.onBootAnimation_); in HWTEST_F() 76 policy.ChangeScreenDisplayMode(displayMode); in HWTEST_F() 77 EXPECT_FALSE(policy.onBootAnimation_); in HWTEST_F() 80 policy.ChangeScreenDisplayMode(displayMode); in HWTEST_F() 81 EXPECT_FALSE(policy.onBootAnimation_); in HWTEST_F() 84 policy.ChangeScreenDisplayMode(displayMode); in HWTEST_F() 85 EXPECT_FALSE(policy.onBootAnimation_); in HWTEST_F() 97 SingleDisplayPocketFoldPolicy policy(displayInfoMute in HWTEST_F() [all...] |
H A D | single_display_fold_policy_test.cpp | 64 SingleDisplayFoldPolicy policy(displayInfoMutex, screenPowerTaskScheduler); in HWTEST_F() 67 policy.ChangeScreenDisplayMode(displayMode); in HWTEST_F() 68 EXPECT_FALSE(policy.onBootAnimation_); in HWTEST_F() 71 policy.ChangeScreenDisplayMode(displayMode); in HWTEST_F() 72 EXPECT_FALSE(policy.onBootAnimation_); in HWTEST_F() 75 policy.ChangeScreenDisplayMode(displayMode); in HWTEST_F() 76 EXPECT_FALSE(policy.onBootAnimation_); in HWTEST_F() 79 policy.ChangeScreenDisplayMode(displayMode); in HWTEST_F() 80 EXPECT_FALSE(policy.onBootAnimation_); in HWTEST_F() 92 SingleDisplayFoldPolicy policy(displayInfoMute in HWTEST_F() [all...] |
/third_party/ltp/testcases/kernel/security/tomoyo/ |
H A D | tomoyo_new_file_test.c | 26 static const char *policy = ""; variable 31 printf("%s : ", policy); in show_result() 126 policy = "allow_read /proc/sys/net/ipv4/ip_local_port_range"; in stage_file_test() 127 write_domain_policy(policy, 0); in stage_file_test() 129 write_domain_policy(policy, 1); in stage_file_test() 132 policy = "allow_write /proc/sys/net/ipv4/ip_local_port_range"; in stage_file_test() 133 write_domain_policy(policy, 0); in stage_file_test() 135 write_domain_policy(policy, 1); in stage_file_test() 138 policy = "allow_read/write /proc/sys/net/ipv4/ip_local_port_range"; in stage_file_test() 139 write_domain_policy(policy, in stage_file_test() [all...] |
H A D | tomoyo_policy_memory_test.c | 42 static const char *policy = NULL; variable 63 if (strcmp(buffer, policy)) in check_policy_common() 70 printf("BUG: Policy write error: %s %s at %d\n", policy, in check_policy_common() 191 policy = domain_testcases[j]; in domain_policy_test() 192 printf("Processing: %s\n", policy); in domain_policy_test() 194 fprintf(fp, "%s\n", policy); in domain_policy_test() 197 fprintf(fp, "delete %s\n", policy); in domain_policy_test() 201 fprintf(fp, "%s\n", policy); in domain_policy_test() 203 fprintf(fp, "delete %s\n", policy); in domain_policy_test() 300 policy in exception_policy_test() [all...] |
/third_party/python/Lib/test/test_email/ |
H A D | test_policy.py | 6 import email.policy namespace 30 # These default values are the ones set on email.policy.default. 36 'header_factory': email.policy.EmailPolicy.header_factory, 38 'content_manager': email.policy.EmailPolicy.content_manager, 43 # For each policy under test, we give here what we expect the defaults to 44 # be for that policy. The second argument to make defaults is the 45 # difference between the base defaults and that for the particular policy. 46 new_policy = email.policy.EmailPolicy() 48 email.policy.compat32: make_defaults(compat32_defaults, {}), 49 email.policy [all...] |
H A D | test_generator.py | 8 from email import policy namespace 15 policy = policy.default variable in TestGeneratorBase 17 def msgmaker(self, msg, policy=None): 18 policy = self.policy if policy is None else policy 19 return self.msgfunc(msg, policy=policy) [all...] |
H A D | __init__.py | 26 # Currently the default policy is compat32. By setting that as the default 29 policy = compat32 variable in TestEmailBase 42 return email.message_from_file(fp, policy=self.policy) 44 def _str_msg(self, string, message=None, policy=None): 45 if policy is None: 46 policy = self.policy 49 return email.message_from_string(string, message, policy=policy) [all...] |
/third_party/node/deps/openssl/openssl/crypto/x509/ |
H A D | v3_pci.c | 78 if (pci->proxyPolicy->policy && pci->proxyPolicy->policy->data) in i2r_pci() 80 pci->proxyPolicy->policy->length, in i2r_pci() 81 pci->proxyPolicy->policy->data); in i2r_pci() 87 ASN1_OCTET_STRING **policy) in process_pci_value() 114 } else if (strcmp(val->name, "policy") == 0) { in process_pci_value() 118 if (*policy == NULL) { in process_pci_value() 119 *policy = ASN1_OCTET_STRING_new(); in process_pci_value() 120 if (*policy == NULL) { in process_pci_value() 136 tmp_data = OPENSSL_realloc((*policy) in process_pci_value() 85 process_pci_value(CONF_VALUE *val, ASN1_OBJECT **language, ASN1_INTEGER **pathlen, ASN1_OCTET_STRING **policy) process_pci_value() argument 246 ASN1_OCTET_STRING *policy = NULL; r2i_pci() local [all...] |
/third_party/openssl/crypto/x509/ |
H A D | v3_pci.c | 78 if (pci->proxyPolicy->policy && pci->proxyPolicy->policy->data) in i2r_pci() 80 pci->proxyPolicy->policy->length, in i2r_pci() 81 pci->proxyPolicy->policy->data); in i2r_pci() 87 ASN1_OCTET_STRING **policy) in process_pci_value() 114 } else if (strcmp(val->name, "policy") == 0) { in process_pci_value() 118 if (*policy == NULL) { in process_pci_value() 119 *policy = ASN1_OCTET_STRING_new(); in process_pci_value() 120 if (*policy == NULL) { in process_pci_value() 136 tmp_data = OPENSSL_realloc((*policy) in process_pci_value() 85 process_pci_value(CONF_VALUE *val, ASN1_OBJECT **language, ASN1_INTEGER **pathlen, ASN1_OCTET_STRING **policy) process_pci_value() argument 246 ASN1_OCTET_STRING *policy = NULL; r2i_pci() local [all...] |
/foundation/communication/netmanager_ext/services/netfirewallmanager/src/ |
H A D | netfirewall_policy_manager.cpp | 45 int32_t NetFirewallPolicyManager::SetNetFirewallPolicy(const int32_t userId, const sptr<NetFirewallPolicy> &policy) in SetNetFirewallPolicy() argument 47 if (policy == nullptr) { in SetNetFirewallPolicy() 48 NETMGR_EXT_LOG_E("SetNetFirewallPolicy failed, policy is nullptr."); in SetNetFirewallPolicy() 57 preferencesHelper_->SaveBool(NET_FIREWALL_IS_OPEN, policy->isOpen); in SetNetFirewallPolicy() 58 preferencesHelper_->SaveInt(NET_FIREWALL_IN_ACTION, static_cast<int>(policy->inAction)); in SetNetFirewallPolicy() 59 preferencesHelper_->SaveInt(NET_FIREWALL_OUT_ACTION, static_cast<int>(policy->outAction)); in SetNetFirewallPolicy() 64 int32_t NetFirewallPolicyManager::GetNetFirewallPolicy(const int32_t userId, sptr<NetFirewallPolicy> &policy) in GetNetFirewallPolicy() argument 66 if (policy == nullptr) { in GetNetFirewallPolicy() 67 NETMGR_EXT_LOG_E("GetNetFirewallPolicy failed, policy is nullptr."); in GetNetFirewallPolicy() 72 policy in GetNetFirewallPolicy() 82 IsFirewallStatusChange(const sptr<NetFirewallPolicy> &policy) IsFirewallStatusChange() argument 89 IsFirewallActionChange(const sptr<NetFirewallPolicy> &policy) IsFirewallActionChange() argument 97 SetCurrentUserFirewallPolicy(const sptr<NetFirewallPolicy> &policy) SetCurrentUserFirewallPolicy() argument 110 GetCurrentNetFirewallPolicy(sptr<NetFirewallPolicy> &policy) GetCurrentNetFirewallPolicy() argument 210 LoadPolicyFormPreference(const int32_t userId, sptr<NetFirewallPolicy> &policy) LoadPolicyFormPreference() argument [all...] |
/foundation/resourceschedule/resource_schedule_service/ressched/plugins/cgroup_sched_plugin/framework/process_group/src/ |
H A D | cgroup_action.cpp | 67 void CgroupAction::AddSchedPolicyDeclaration(const SchedPolicy policy, in AddSchedPolicyDeclaration() argument 73 __func__, policy, fullName.c_str(), abbrName.c_str()); in AddSchedPolicyDeclaration() 76 if (policy >= SP_UPPER_LIMIT) { in AddSchedPolicyDeclaration() 78 __func__, policy, fullName.c_str(), abbrName.c_str()); in AddSchedPolicyDeclaration() 84 if (fullNames_.find(policy) != fullNames_.end()) { in AddSchedPolicyDeclaration() 91 PGCGS_LOGI("%{public}s add sched policy: %{public}u, %{public}s, %{public}s", in AddSchedPolicyDeclaration() 92 __func__, policy, fullName.c_str(), abbrName.c_str()); in AddSchedPolicyDeclaration() 93 fullNames_[policy] = fullName; in AddSchedPolicyDeclaration() 94 abbrNames_[policy] = abbrName; in AddSchedPolicyDeclaration() 106 bool CgroupAction::IsSchedPolicyValid(SchedPolicy policy) in IsSchedPolicyValid() argument 112 GetSchedPolicyFullName(SchedPolicy policy) GetSchedPolicyFullName() argument 121 GetSchedPolicyAbbrName(SchedPolicy policy) GetSchedPolicyAbbrName() argument 130 SetThreadSchedPolicy(int tid, SchedPolicy policy) SetThreadSchedPolicy() argument 141 SetThreadGroupSchedPolicy(int tid, SchedPolicy policy) SetThreadGroupSchedPolicy() argument 152 SetSchedPolicyByExecutor(int tid, int policy, uint32_t resType) SetSchedPolicyByExecutor() argument 190 GetSchedPolicy(int tid, SchedPolicy* policy) GetSchedPolicy() argument 222 GetSchedPolicyByName(const std::string& name, SchedPolicy* policy) GetSchedPolicyByName() argument [all...] |
H A D | sched_policy.cpp | 28 int SetThreadSchedPolicy(int tid, int policy) in SetThreadSchedPolicy() argument 36 SchedPolicy schedPolicy = SchedPolicy(policy); in SetThreadSchedPolicy() 39 ret = CgroupAction::GetInstance().SetSchedPolicyByExecutor(tid, policy, in SetThreadSchedPolicy() 45 int SetThreadGroupSchedPolicy(int pid, int policy) in SetThreadGroupSchedPolicy() argument 53 SchedPolicy schedPolicy = SchedPolicy(policy); in SetThreadGroupSchedPolicy() 56 ret = CgroupAction::GetInstance().SetSchedPolicyByExecutor(pid, policy, in SetThreadGroupSchedPolicy() 62 int GetThreadSchedPolicy(int tid, SchedPolicy* policy) in GetThreadSchedPolicy() argument 70 return CgroupAction::GetInstance().GetSchedPolicy(tid, policy); in GetThreadSchedPolicy() 73 int GetSchedPolicyByName(const std::string& name, SchedPolicy* policy) in GetSchedPolicyByName() argument 75 return CgroupAction::GetInstance().GetSchedPolicyByName(name, policy); in GetSchedPolicyByName() 78 GetSchedPolicyShortenedName(SchedPolicy policy) GetSchedPolicyShortenedName() argument 83 GetSchedPolicyFullName(SchedPolicy policy) GetSchedPolicyFullName() argument 88 AddSchedPolicyDeclaration(SchedPolicy policy, const std::string& fullName, const std::string& abbrName) AddSchedPolicyDeclaration() argument [all...] |
/foundation/communication/netmanager_base/services/netpolicymanager/src/core/ |
H A D | net_policy_rule.cpp | 27 // Init uid、policy and background allow status from file,and save uid、policy into uidPolicyRules_. in Init() 28 NETMGR_LOG_I("Start init uid and policy."); in Init() 33 auto policy = CommonUtils::StrToUint(i.policy.c_str()); in Init() local 34 uidPolicyRules_[uid] = {.policy_ = policy}; in Init() 35 TransPolicyToRule(uid, policy); in Init() 42 for (const auto &[uid, policy] : uidPolicyRules_) { in TransPolicyToRule() 43 TransPolicyToRule(uid, policy.policy_); in TransPolicyToRule() 49 uint32_t policy in TransPolicyToRule() local 61 TransPolicyToRule(uint32_t uid, uint32_t policy) TransPolicyToRule() argument 88 BuildTransCondition(uint32_t uid, uint32_t policy) BuildTransCondition() argument 118 TransConditionToRuleAndNetsys(uint32_t policyCondition, uint32_t uid, uint32_t policy) TransConditionToRuleAndNetsys() argument 210 ChangePolicyToPolicyTransitionCondition(uint32_t policy) ChangePolicyToPolicyTransitionCondition() argument 218 GetPolicyByUid(uint32_t uid, uint32_t &policy) GetPolicyByUid() argument 230 GetUidsByPolicy(uint32_t policy, std::vector<uint32_t> &uids) GetUidsByPolicy() argument 305 uint32_t policy = 0; GetBackgroundPolicyByUid() local 440 IsValidNetPolicy(uint32_t policy) IsValidNetPolicy() argument 476 SetNetworkAccessPolicy(uint32_t uid, NetworkAccessPolicy policy, bool reconfirmFlag, bool isBroker) SetNetworkAccessPolicy() argument [all...] |
/foundation/resourceschedule/resource_schedule_service/ressched/plugins/cgroup_sched_plugin/test/unittest/ |
H A D | process_group_test.cpp | 25 static bool CovertSchedPolicyStringToEnumType(char* policyStr, SchedPolicy* policy) in CovertSchedPolicyStringToEnumType() argument 34 *policy = policyItem; in CovertSchedPolicyStringToEnumType() 46 SchedPolicy policy; in SetThreadSchedPolicyTest() local 47 if (!CovertSchedPolicyStringToEnumType(policyStr, &policy)) { in SetThreadSchedPolicyTest() 50 if (SetThreadSchedPolicy(tid, policy) == 0) { in SetThreadSchedPolicyTest() 51 std::cout << "Set thread tid = << "<< tid << " SolicyPolicy = "<< policy << "ok." << std::endl; in SetThreadSchedPolicyTest() 61 SchedPolicy policy; in SetThreadGroupSchedPolicyTest() local 62 if (!CovertSchedPolicyStringToEnumType(policyStr, &policy)) { in SetThreadGroupSchedPolicyTest() 65 if (SetThreadGroupSchedPolicy(pid, policy) == 0) { in SetThreadGroupSchedPolicyTest() 66 std::cout << "Set thread group pid = << "<< pid << " SolicyPolicy = "<< policy << "o in SetThreadGroupSchedPolicyTest() 75 SchedPolicy policy; GetThreadSchedPolicyTest() local 77 std::cout << "Get the SolicyPolicy of thread tid = " << tid << " is " << policy << "\\n"; GetThreadSchedPolicyTest() local 89 SchedPolicy policy = static_cast<SchedPolicy>(policyNum); GetSchedPolicyShortenedNameTest() local 102 SchedPolicy policy = static_cast<SchedPolicy>(policyNum); GetSchedPolicyFullNameTest() local [all...] |
/third_party/ltp/testcases/kernel/syscalls/mbind/ |
H A D | mbind01.c | 29 #define POLICY_DESC(x) .policy = x, .desc = #x 30 #define POLICY_DESC_TEXT(x, y) .policy = x, .desc = #x" ("y")" 40 int policy; member 139 static void check_policy_pref_or_local(int policy) in check_policy_pref_or_local() argument 141 if (policy != MPOL_PREFERRED && policy != MPOL_LOCAL) { in check_policy_pref_or_local() 142 tst_res(TFAIL, "Wrong policy: %s(%d), " in check_policy_pref_or_local() 144 tst_mempolicy_mode_name(policy), policy); in check_policy_pref_or_local() 152 TEST(mbind(p, MEM_LENGTH, tc->policy, nodemas in test_default() 194 int policy, fail = 0; do_test() local [all...] |
/third_party/ltp/testcases/realtime/stress/pi-tests/ |
H A D | testpi-3.c | 80 int policy; 101 int rc, i, j, policy, tid = gettid(); in func_nonrt() local 117 pthread_getschedparam(pthr->pthread, &policy, &schedp); in func_nonrt() 124 pthr->priority, policy, schedp.sched_priority); in func_nonrt() 129 policy = sched_getscheduler(tid); in func_nonrt() 132 policy, schedp.sched_priority); in func_nonrt() 150 int rc, i, j, policy, tid = gettid(); in func_rt() local 166 pthread_getschedparam(pthr->pthread, &policy, &schedp); in func_rt() 174 pthr->priority, policy, schedp.sched_priority); in func_rt() 184 policy in func_rt() 206 int rc, i, j, policy, tid = gettid(); func_noise() local 253 int retc, policy, inherit; startThread() local [all...] |
/foundation/filemanagement/app_file_service/tests/mock/file_permission_native/src/ |
H A D | sandbox_mock.cpp | 22 const std::vector<PolicyInfo> &policy, std::vector<bool> &result) in CheckPersistPolicy() 24 return SandboxManagerKitMock::sandboxManagerKitMock->CheckPersistPolicy(tokenId, policy, result); in CheckPersistPolicy() 27 int32_t SandboxManagerKit::PersistPolicy(const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result) in PersistPolicy() argument 29 return SandboxManagerKitMock::sandboxManagerKitMock->PersistPolicy(policy, result); in PersistPolicy() 32 int32_t SandboxManagerKit::UnPersistPolicy(const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result) in UnPersistPolicy() argument 34 return SandboxManagerKitMock::sandboxManagerKitMock->UnPersistPolicy(policy, result); in UnPersistPolicy() 37 int32_t SandboxManagerKit::StartAccessingPolicy(const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result) in StartAccessingPolicy() argument 39 return SandboxManagerKitMock::sandboxManagerKitMock->StartAccessingPolicy(policy, result); in StartAccessingPolicy() 42 int32_t SandboxManagerKit::StopAccessingPolicy(const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result) in StopAccessingPolicy() argument 44 return SandboxManagerKitMock::sandboxManagerKitMock->StopAccessingPolicy(policy, resul in StopAccessingPolicy() 21 CheckPersistPolicy(uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<bool> &result) CheckPersistPolicy() argument [all...] |
/third_party/python/Lib/email/ |
H A D | generator.py | 38 policy=None): 44 Optional mangle_from_ is a flag that, when True (the default if policy 55 The policy keyword specifies a policy object that controls a number of 56 aspects of the generator's operation. If no policy is specified, 57 the policy associated with the Message object passed to the 63 mangle_from_ = True if policy is None else policy.mangle_from_ 67 self.policy = policy [all...] |
/third_party/libwebsockets/lib/secure-streams/ |
H A D | secure-streams.c | 205 if (!h->policy || !(h->policy->flags & LWSSSPOLF_PERF) || !h->wsi || in lws_conmon_ss_json() 495 lws_ss_metadata_t *md = lws_ss_policy_metadata(h->policy, name), in lws_ss_exp_cb_metadata() 537 !!(h->policy->flags & LWSSSPOLF_WAKE_SUSPEND__VALIDITY)], in lws_ss_set_timeout_us() 557 ms = lws_retry_get_delay_ms(h->context, h->policy->retry_bo, in _lws_ss_backoff() 685 if (!h->policy) { in _lws_ss_client_connect() 686 lwsl_err("%s: ss with no policy\n", __func__); in _lws_ss_client_connect() 702 if (h->policy == &pol_smd) { in _lws_ss_client_connect() 734 if (lws_strexp_expand(&exp, h->policy->endpoint, in _lws_ss_client_connect() 735 strlen(h->policy in _lws_ss_client_connect() [all...] |
/foundation/resourceschedule/resource_schedule_service/ressched/plugins/cgroup_sched_plugin/framework/process_group/include/ |
H A D | cgroup_action.h | 35 void AddSchedPolicyDeclaration(SchedPolicy policy, const std::string& fullName, const std::string& abbrName); 37 const char* GetSchedPolicyFullName(SchedPolicy policy); 38 const char* GetSchedPolicyAbbrName(SchedPolicy policy); 40 bool SetThreadSchedPolicy(int tid, SchedPolicy policy); 41 bool SetThreadGroupSchedPolicy(int tid, SchedPolicy policy); 42 int SetSchedPolicyByExecutor(int tid, int policy, uint32_t resType); 43 int GetSchedPolicy(int tid, SchedPolicy* policy); 44 int GetSchedPolicyByName(const std::string& name, SchedPolicy* policy); 55 std::mutex mutex_; // for sched policy maps 62 bool IsSchedPolicyValid(SchedPolicy policy); [all...] |
/foundation/filemanagement/app_file_service/tests/mock/file_permission_native/include/ |
H A D | sandbox_mock.h | 30 const std::vector<PolicyInfo> &policy, 32 virtual int32_t PersistPolicy(const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result) = 0; 33 virtual int32_t UnPersistPolicy(const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result) = 0; 34 virtual int32_t StartAccessingPolicy(const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result) = 0; 35 virtual int32_t StopAccessingPolicy(const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result) = 0; 42 int32_t(uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<bool> &result)); 43 MOCK_METHOD2(PersistPolicy, int32_t(const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result)); 44 MOCK_METHOD2(UnPersistPolicy, int32_t(const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result)); 45 MOCK_METHOD2(StartAccessingPolicy, int32_t(const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result)); 46 MOCK_METHOD2(StopAccessingPolicy, int32_t(const std::vector<PolicyInfo> &policy, st [all...] |
/third_party/python/Lib/email/mime/ |
H A D | base.py | 9 import email.policy namespace 19 def __init__(self, _maintype, _subtype, *, policy=None, **_params): 26 if policy is None: 27 policy = email.policy.compat32 28 message.Message.__init__(self, policy=policy)
|
/third_party/node/deps/npm/node_modules/make-fetch-happen/lib/cache/ |
H A D | policy.js | 51 this.policy = new CacheSemantics(this.request, this.response, policyOptions) 56 // the value to Date.now() which means a policy created from a 58 this.policy._responseTime = this.entry.metadata.time 81 const policy = new CacheSemantics(requestObject(request), emptyResponse, policyOptions) 82 return policy.storable() 85 // returns true if the policy satisfies the request 120 return this.policy.storable() 127 return !!this.policy._rescc['must-revalidate'] 137 return !this.policy.satisfiesWithoutRevalidation(_req) 141 return this.policy [all...] |
/foundation/systemabilitymgr/samgr_lite/samgr_endpoint/source/ |
H A D | endpoint.c | 63 PolicyTrans *policy;
member 75 static boolean JudgePolicy(uid_t callingUid, const PolicyTrans *policy, uint32 policyNum);
76 static boolean SearchFixedPolicy(uid_t callingUid, PolicyTrans policy);
78 const PolicyTrans *policy, uint32 policyNum);
81 PolicyTrans **policy, uint32 *policyNum);
82 static void GetRemotePolicy(IpcIo *reply, PolicyTrans **policy, uint32 *policyNum);
131 router->policy = NULL;
in SAMGR_AddRouter() 291 PolicyTrans *policy = NULL;
in SAMGR_ProcPolicy() local 293 ret = RegisterIdentity(endpoint->context, saName, &saInfo, &policy, &policyNum);
in SAMGR_ProcPolicy() 294 if (ret != EC_SUCCESS || policy in SAMGR_ProcPolicy() 319 AddPolicyToRouter(const Endpoint *endpoint, const SvcIdentity *saInfo, const PolicyTrans *policy, uint32 policyNum) AddPolicyToRouter() argument 491 RegisterIdentity(const IpcContext *context, const SaName *saName, SvcIdentity *saInfo, PolicyTrans **policy, uint32 *policyNum) RegisterIdentity() argument 619 GetRemotePolicy(IpcIo *reply, PolicyTrans **policy, uint32 *policyNum) GetRemotePolicy() argument 660 JudgePolicy(uid_t callingUid, const PolicyTrans *policy, uint32 policyNum) JudgePolicy() argument 679 SearchFixedPolicy(uid_t callingUid, PolicyTrans policy) SearchFixedPolicy() argument [all...] |
H A D | samgr_small_ipc_adapter.c | 29 static void GetRemotePolicy(IpcIo *reply, PolicyTrans **policy, uint32 *policyNum);
30 static boolean JudgePolicy(uid_t callingUid, const PolicyTrans *policy, uint32 policyNum);
31 static boolean SearchFixedPolicy(uid_t callingUid, PolicyTrans policy);
153 int ret = RegisterIdentity(&(router->saName), &identity, &(router->policy),
in RegisterRemoteFeatures() 164 int RegisterIdentity(const SaName *saName, SvcIdentity *saInfo, PolicyTrans **policy, uint32 *policyNum)
in RegisterIdentity() argument 193 GetRemotePolicy(&reply, policy, policyNum);
in RegisterIdentity() 241 !JudgePolicy(uid, (const PolicyTrans *)(router->policy), router->policyNum)) {
in HandleIpc() 249 static boolean JudgePolicy(uid_t callingUid, const PolicyTrans *policy, uint32 policyNum)
in JudgePolicy() argument 251 if (policy == NULL) {
in JudgePolicy() 257 if (policy[ in JudgePolicy() 266 SearchFixedPolicy(uid_t callingUid, PolicyTrans policy) SearchFixedPolicy() argument 322 GetRemotePolicy(IpcIo *reply, PolicyTrans **policy, uint32 *policyNum) GetRemotePolicy() argument [all...] |