Home
last modified time | relevance | path

Searched refs:policies (Results 1 - 25 of 100) sorted by relevance

1234

/third_party/selinux/libsepol/tests/
H A DMakefile27 # In order to load source policies we need to link in the checkpolicy/checkmodule parser and util code.
28 # This is less than ideal, but it makes the tests easier to maintain by allowing source policies
40 m4support := $(wildcard policies/support/*.spt)
41 testsuites := $(wildcard policies/test-*)
45 policies := $(stdpol) $(mlspol) macro
47 all: $(EXE) $(policies)
48 policies: $(policies)
61 rm -f $(policies)
62 rm -f policies/tes
[all...]
H A Dtest-linker.c48 const char *policies[NUM_POLICIES] = { variable
63 if (test_load_policy(&linkedbase, POLICY_BASE, mls, "test-linker", policies[BASEMOD])) in linker_test_init()
66 if (test_load_policy(&basenomods, POLICY_BASE, mls, "test-linker", policies[BASEMOD])) in linker_test_init()
77 if (test_load_policy(modules[i], POLICY_MOD, mls, "test-linker", policies[i])) in linker_test_init()
/third_party/node/deps/openssl/openssl/crypto/x509/
H A Dx509_vpm.c102 sk_ASN1_OBJECT_pop_free(param->policies, ASN1_OBJECT_free); in X509_VERIFY_PARAM_free()
190 if (test_x509_verify_param_copy(policies, NULL)) { in X509_VERIFY_PARAM_inherit()
191 if (!X509_VERIFY_PARAM_set1_policies(dest, src->policies)) in X509_VERIFY_PARAM_inherit()
335 if (param->policies == NULL) { in X509_VERIFY_PARAM_add0_policy()
336 param->policies = sk_ASN1_OBJECT_new_null(); in X509_VERIFY_PARAM_add0_policy()
337 if (param->policies == NULL) in X509_VERIFY_PARAM_add0_policy()
341 if (sk_ASN1_OBJECT_push(param->policies, policy) <= 0) in X509_VERIFY_PARAM_add0_policy()
347 STACK_OF(ASN1_OBJECT) *policies) in X509_VERIFY_PARAM_set1_policies()
356 sk_ASN1_OBJECT_pop_free(param->policies, ASN1_OBJECT_free); in X509_VERIFY_PARAM_set1_policies()
358 if (policies in X509_VERIFY_PARAM_set1_policies()
346 X509_VERIFY_PARAM_set1_policies(X509_VERIFY_PARAM *param, STACK_OF(ASN1_OBJECT) *policies) X509_VERIFY_PARAM_set1_policies() argument
[all...]
H A Dpcy_cache.c27 CERTIFICATEPOLICIES *policies, int crit) in policy_cache_create()
34 if ((num = sk_POLICYINFO_num(policies)) <= 0) in policy_cache_create()
42 policy = sk_POLICYINFO_value(policies, i); in policy_cache_create()
73 sk_POLICYINFO_pop_free(policies, POLICYINFO_free); in policy_cache_create()
107 * don't have any policies. in policy_cache_new()
131 * no point continuing because the valid policies will be NULL. in policy_cache_new()
26 policy_cache_create(X509 *x, CERTIFICATEPOLICIES *policies, int crit) policy_cache_create() argument
H A Dx509_local.h30 STACK_OF(ASN1_OBJECT) *policies; /* Permissible policies */ member
/third_party/openssl/crypto/x509/
H A Dx509_vpm.c102 sk_ASN1_OBJECT_pop_free(param->policies, ASN1_OBJECT_free); in X509_VERIFY_PARAM_free()
190 if (test_x509_verify_param_copy(policies, NULL)) { in X509_VERIFY_PARAM_inherit()
191 if (!X509_VERIFY_PARAM_set1_policies(dest, src->policies)) in X509_VERIFY_PARAM_inherit()
335 if (param->policies == NULL) { in X509_VERIFY_PARAM_add0_policy()
336 param->policies = sk_ASN1_OBJECT_new_null(); in X509_VERIFY_PARAM_add0_policy()
337 if (param->policies == NULL) in X509_VERIFY_PARAM_add0_policy()
340 return sk_ASN1_OBJECT_push(param->policies, policy); in X509_VERIFY_PARAM_add0_policy()
344 STACK_OF(ASN1_OBJECT) *policies) in X509_VERIFY_PARAM_set1_policies()
353 sk_ASN1_OBJECT_pop_free(param->policies, ASN1_OBJECT_free); in X509_VERIFY_PARAM_set1_policies()
355 if (policies in X509_VERIFY_PARAM_set1_policies()
343 X509_VERIFY_PARAM_set1_policies(X509_VERIFY_PARAM *param, STACK_OF(ASN1_OBJECT) *policies) X509_VERIFY_PARAM_set1_policies() argument
[all...]
H A Dpcy_cache.c27 CERTIFICATEPOLICIES *policies, int crit) in policy_cache_create()
34 if ((num = sk_POLICYINFO_num(policies)) <= 0) in policy_cache_create()
42 policy = sk_POLICYINFO_value(policies, i); in policy_cache_create()
73 sk_POLICYINFO_pop_free(policies, POLICYINFO_free); in policy_cache_create()
107 * don't have any policies. in policy_cache_new()
131 * no point continuing because the valid policies will be NULL. in policy_cache_new()
26 policy_cache_create(X509 *x, CERTIFICATEPOLICIES *policies, int crit) policy_cache_create() argument
H A Dx509_local.h30 STACK_OF(ASN1_OBJECT) *policies; /* Permissible policies */ member
/third_party/node/deps/v8/third_party/jinja2/
H A Dfilters.py606 policies = eval_ctx.environment.policies
610 rel.update((policies["urlize.rel"] or "").split())
612 target = policies["urlize.target"]
694 leeway = env.policies["truncate.leeway"]
1254 policies = eval_ctx.environment.policies
1255 dumper = policies["json.dumps_function"]
1256 options = policies["json.dumps_kwargs"]
H A Dext.py324 trimmed = self.environment.policies["ext.i18n.trimmed"]
679 environment.policies["ext.i18n.trimmed"] = True
/third_party/node/tools/inspector_protocol/jinja2/
H A Dfilters.py522 policies = eval_ctx.environment.policies
526 rel.update((policies['urlize.rel'] or '').split())
528 target = policies['urlize.target']
603 leeway = env.policies['truncate.leeway']
1072 policies = eval_ctx.environment.policies
1073 dumper = policies['json.dumps_function']
1074 options = policies['json.dumps_kwargs']
H A Dext.py307 trimmed = self.environment.policies['ext.i18n.trimmed']
603 environment.policies['ext.i18n.trimmed'] = True
/third_party/skia/third_party/externals/jinja2/
H A Dfilters.py606 policies = eval_ctx.environment.policies
610 rel.update((policies["urlize.rel"] or "").split())
612 target = policies["urlize.target"]
694 leeway = env.policies["truncate.leeway"]
1254 policies = eval_ctx.environment.policies
1255 dumper = policies["json.dumps_function"]
1256 options = policies["json.dumps_kwargs"]
H A Dext.py324 trimmed = self.environment.policies["ext.i18n.trimmed"]
679 environment.policies["ext.i18n.trimmed"] = True
/third_party/python/Lib/test/test_email/
H A Dtest_policy.py47 policies = { variable in PolicyAPITests
64 policies[new_policy]['header_factory'] = new_policy.header_factory
67 for policy, expected in self.policies.items():
75 for policy, expected in self.policies.items():
99 for policy, defaults in self.policies.items():
109 for policyclass, defaults in self.policies.items():
116 for policyclass in self.policies:
/third_party/jinja2/
H A Dfilters.py748 ``env.policies["urlize.extra_schemes"]``, which defaults to no
765 policies = eval_ctx.environment.policies
771 rel_parts.update((policies["urlize.rel"] or "").split())
775 target = policies["urlize.target"]
778 extra_schemes = policies["urlize.extra_schemes"] or ()
879 leeway = env.policies["truncate.leeway"]
1694 policies = eval_ctx.environment.policies
1695 dumps = policies["jso
[all...]
/third_party/node/deps/openssl/openssl/crypto/ts/
H A Dts_rsp_sign.c151 sk_ASN1_OBJECT_pop_free(ctx->policies, ASN1_OBJECT_free); in TS_RESP_CTX_free()
210 if (ctx->policies == NULL in TS_RESP_CTX_add_policy()
211 && (ctx->policies = sk_ASN1_OBJECT_new_null()) == NULL) in TS_RESP_CTX_add_policy()
215 if (!sk_ASN1_OBJECT_push(ctx->policies, copy)) in TS_RESP_CTX_add_policy()
497 /* Returns the TSA policy based on the requested and acceptable policies. */
512 for (i = 0; !policy && i < sk_ASN1_OBJECT_num(ctx->policies); ++i) { in ts_RESP_get_policy()
513 ASN1_OBJECT *current = sk_ASN1_OBJECT_value(ctx->policies, i); in ts_RESP_get_policy()
H A Dts_conf.c317 char *policies = NCONF_get_string(conf, section, ENV_OTHER_POLICIES); in TS_CONF_set_policies() local
320 if (policies && (list = X509V3_parse_list(policies)) == NULL) { in TS_CONF_set_policies()
H A Dts_local.h107 STACK_OF(ASN1_OBJECT) *policies; /* Acceptable policies. */ member
108 ASN1_OBJECT *default_policy; /* It may appear in policies, too. */
/third_party/openssl/crypto/ts/
H A Dts_rsp_sign.c151 sk_ASN1_OBJECT_pop_free(ctx->policies, ASN1_OBJECT_free); in TS_RESP_CTX_free()
210 if (ctx->policies == NULL in TS_RESP_CTX_add_policy()
211 && (ctx->policies = sk_ASN1_OBJECT_new_null()) == NULL) in TS_RESP_CTX_add_policy()
215 if (!sk_ASN1_OBJECT_push(ctx->policies, copy)) in TS_RESP_CTX_add_policy()
497 /* Returns the TSA policy based on the requested and acceptable policies. */
512 for (i = 0; !policy && i < sk_ASN1_OBJECT_num(ctx->policies); ++i) { in ts_RESP_get_policy()
513 ASN1_OBJECT *current = sk_ASN1_OBJECT_value(ctx->policies, i); in ts_RESP_get_policy()
H A Dts_conf.c317 char *policies = NCONF_get_string(conf, section, ENV_OTHER_POLICIES); in TS_CONF_set_policies() local
320 if (policies && (list = X509V3_parse_list(policies)) == NULL) { in TS_CONF_set_policies()
H A Dts_local.h107 STACK_OF(ASN1_OBJECT) *policies; /* Acceptable policies. */ member
108 ASN1_OBJECT *default_policy; /* It may appear in policies, too. */
/third_party/ltp/testcases/kernel/hotplug/memory_hotplug/
H A Dcommands.c246 static struct policies { struct
249 } policies[] = { variable
262 * <mpol> is one of the policies[] above.
268 struct policies *polp; in get_mbind_policy()
274 for (polp = policies; polp->pol_name != NULL; ++polp) { in get_mbind_policy()
/third_party/node/deps/openssl/openssl/crypto/cmp/
H A Dcmp_ctx.c226 sk_POLICYINFO_pop_free(ctx->policies, POLICYINFO_free); in OSSL_CMP_CTX_free()
558 if (ctx->policies == NULL in OSSL_CMP_CTX_push0_policy()
559 && (ctx->policies = CERTIFICATEPOLICIES_new()) == NULL) in OSSL_CMP_CTX_push0_policy()
562 return sk_POLICYINFO_push(ctx->policies, pinfo); in OSSL_CMP_CTX_push0_policy()
/third_party/openssl/crypto/cmp/
H A Dcmp_ctx.c226 sk_POLICYINFO_pop_free(ctx->policies, POLICYINFO_free); in OSSL_CMP_CTX_free()
558 if (ctx->policies == NULL in OSSL_CMP_CTX_push0_policy()
559 && (ctx->policies = CERTIFICATEPOLICIES_new()) == NULL) in OSSL_CMP_CTX_push0_policy()
562 return sk_POLICYINFO_push(ctx->policies, pinfo); in OSSL_CMP_CTX_push0_policy()

Completed in 34 milliseconds

1234