/external/selinux/libsepol/include/sepol/ |
roles.h | 12 char ***roles, unsigned int *nroles);
|
/external/webrtc/webrtc/p2p/base/ |
transportdescription.cc | 20 const char* const roles[] = { local 27 for (size_t i = 0; i < arraysize(roles); ++i) { 28 if (_stricmp(roles[i], role_str.c_str()) == 0) {
|
/external/selinux/libsepol/tests/policies/test-hooks/ |
module_add_symbols.conf | 11 user user_add_1 roles { role_add_1 };
|
/external/snakeyaml/src/test/java/org/yaml/snakeyaml/issues/issue72/ |
CollectionTest.java | 71 private Collection<Integer> roles; field in class:CollectionTest.CollectionSet 74 roles = new HashSet<Integer>(); 75 roles.add(11); 76 roles.add(13); 80 return roles; 83 public void setRoles(Collection<Integer> roles) { 84 this.roles = roles;
|
/external/selinux/libsepol/src/ |
user_record.c | 19 char **roles; member in struct:sepol_user 21 /* The number of roles */ 171 /* Roles */ 192 roles_realloc = realloc(user->roles, 198 user->roles = roles_realloc; 199 user->roles[user->num_roles - 1] = role_cp; 218 if (!strcmp(user->roles[i], role)) 249 free(user->roles[i]); 250 free(user->roles); 251 user->roles = tmp_roles [all...] |
users.c | 22 ebitmap_t *roles; local 31 roles = &(usrdatum->roles.roles); 39 /* Extract roles */ 40 ebitmap_for_each_bit(roles, rnode, bit) { 117 const char **roles = NULL; local 138 if (sepol_user_get_roles(handle, user, &roles, &num_roles) < 0) 165 roldatum = hashtab_search(policydb->p_roles.table, roles[i]); 168 roles[i], cname) [all...] |
roles.c | 21 /* Fill an array with all valid roles */ 23 sepol_policydb_t * p, char ***roles, unsigned int *nroles) 41 *roles = tmp_roles; 46 ERR(handle, "out of memory, could not list roles");
|
genusers.c | 91 ebitmap_destroy(&usrdatum->roles.roles); 92 ebitmap_init(&usrdatum->roles.roles); 131 if (strncasecmp(p, "roles", 5)) 175 (&usrdatum->roles.roles, bit, 1)) {
|
/external/selinux/libsemanage/src/ |
seusers_local.c | 22 char *roles = NULL; local 39 roles = strdup(""); 41 roles = malloc(size); 42 if (roles) { 43 strcpy(roles,roles_arr[0]); 45 strcat(roles,","); 46 strcat(roles,roles_arr[i]); 55 return roles; 65 char *roles = NULL; local 84 roles = semanage_user_roles(handle, sename) [all...] |
users_base_file.c | 27 const char **roles = NULL; local 34 if (fprintf(str, "user %s roles { ", name) < 0) 37 if (semanage_user_base_get_roles(handle, user, &roles, &nroles) < 0) 41 if (fprintf(str, "%s ", roles[i]) < 0) 56 free(roles); 60 free(roles); 97 if (parse_assert_str(handle, info, "roles") < 0)
|
/device/google/marlin/camera/mm-image-codec/qomx_core/ |
qomx_core.h | 62 * @roles: array of roles played by the component 74 char *roles[OMX_CORE_MAX_ROLES]; //Roles played by the component member in struct:_omx_core_component_t
|
/frameworks/av/media/libstagefright/omx/include/media/stagefright/omx/ |
SoftOMXPlugin.h | 45 Vector<String8> *roles);
|
OMXMaster.h | 50 Vector<String8> *roles);
|
/external/libxml2/include/libxml/ |
xlink.h | 94 * @roles: pointer to the array of locator roles 96 * @from: pointer to the array of source roles found on the arcs 97 * @to: pointer to the array of target roles found on the arcs 111 const xlinkRole *roles, 127 * @roles: pointer to the array of locator roles 139 const xlinkRole *roles,
|
/external/selinux/libsepol/cil/test/integration_testing/ |
nonmls.conf | 73 user foo_u roles foo_r;
|
/external/selinux/libsepol/tests/ |
test-expander-users.c | 37 unsigned char *found; /* array of booleans of roles found */ 38 int extra = 0; /* number of extra roles found */ 48 ebitmap_for_each_bit(&user->roles.roles, tnode, i) {
|
/frameworks/av/media/libstagefright/omx/ |
SoftOMXPlugin.cpp | 204 Vector<String8> *roles) { 210 roles->clear(); 211 roles->push(String8(kComponents[i].mRole));
|
OMXMaster.cpp | 213 Vector<String8> *roles) { 216 roles->clear(); 225 return plugin->getRolesOfComponent(name, roles);
|
/external/autotest/frontend/server/ |
models.py | 21 'Roles : %(roles)s\n' 49 roles = ','.join([r.role for r in self.roles.all()]) 54 'roles': roles, 66 return [r.role for r in self.roles.all()] 76 'roles': ['drone', 'scheduler'], 85 details['roles'] = self.get_role_names() 97 # Valid roles for a server [all...] |
/development/tools/repo_diff/service/repodiff/remote_scripts/ |
gce_startup.sh | 23 gcloud projects add-iam-policy-binding $googleProjectID --member serviceAccount:$serviceAccount --role roles/compute.instanceAdmin.v1
|
/external/selinux/gui/ |
usersPage.py | 69 col = Gtk.TreeViewColumn(_("SELinux Roles"), Gtk.CellRendererText(), text=2) 110 roles = self.selinuxRolesEntry.get_text() 113 (rc, out) = getstatusoutput("semanage user -a -R '%s' -r %s %s" % (roles, range, user)) 121 self.store.set_value(iter, 2, roles) 126 roles = self.selinuxRolesEntry.get_text() 129 (rc, out) = getstatusoutput("semanage user -m -R '%s' -r %s %s" % (roles, range, user))
|
/external/selinux/checkpolicy/test/ |
dismod.c | 64 "classes", "roles ", "types ", "users ", "bools ", 179 int display_mod_role_set(role_set_t * roles, policydb_t * p, FILE * fp) 183 if (roles->flags & ROLE_STAR) { 186 } else if (roles->flags & ROLE_COMP) { 190 for (i = ebitmap_startbit(&roles->roles); 191 i < ebitmap_length(&roles->roles); i++) { 192 if (!ebitmap_get_bit(&roles->roles, i) [all...] |
/external/autotest/site_utils/ |
server_manager_unittest.py | 65 'roles': QueriableList([self.DRONE_ROLE]), 71 'roles': QueriableList([self.DRONE_ROLE]), 77 'roles': QueriableList([self.SCHEDULER_ROLE]), 83 'roles': QueriableList([self.SCHEDULER_ROLE]), 177 self.mox.StubOutWithMock(self.REPAIR_REQUIRED_DRONE.roles, 'get') 178 self.REPAIR_REQUIRED_DRONE.roles.get( 213 self.mox.StubOutWithMock(self.REPAIR_REQUIRED_DRONE.roles, 'filter') 214 self.REPAIR_REQUIRED_DRONE.roles.filter( 235 self.mox.StubOutWithMock(self.PRIMARY_DRONE.roles, 'filter') 239 self.PRIMARY_DRONE.roles.filter [all...] |
server_manager_actions.py | 102 def try_execute(server, roles, enable, post_change, 108 @param roles: A list of roles changed. 109 @param enable: Set to True if the roles are enabled, i.e., added to server. 110 If it's False, the roles are removed from the server. 141 for role in roles:
|
server_manager.py | 104 server.roles.get(role=role).delete() 133 if (not server.roles.all() and 143 unique_roles = server.roles.filter( 171 # Apply actions to enable/disable roles of the server after the status is 178 print ('Status of server %s is changed from %s to %s. Affected roles: %s' % 219 'current roles first.' % hostname) 220 for role in server.roles.all():
|