/external/selinux/libsepol/src/ |
sidtab.c | 7 * Implementation of the SID table type. 19 #define SIDTAB_HASH(sid) \ 20 (sid & SIDTAB_HASH_MASK) 42 int sepol_sidtab_insert(sidtab_t * s, sepol_security_id_t sid, 51 hvalue = SIDTAB_HASH(sid); 54 while (cur != NULL && sid > cur->sid) { 59 if (cur && sid == cur->sid) { 67 newnode->sid = sid 228 sepol_security_id_t sid; local [all...] |
/external/selinux/libsepol/cil/test/integration_testing/ |
nonmls.conf | 5 sid test_sid 8 #sid decl 9 sid security 76 sid test_sid foo_u:foo_r:foo_t
|
/cts/hostsidetests/seccomp/app/src/android/seccomp/cts/app/ |
ZygotePreload.java | 28 static private boolean testSetResUidGidBlocked(int rid, int eid, int sid) { 29 if (!SeccompDeviceTest.testSetresuidBlocked(rid, eid, sid)) { 31 + Integer.toString(eid) + "," + Integer.toString(sid) + ")" 35 if (!SeccompDeviceTest.testSetresgidBlocked(rid, eid, sid)) { 37 + Integer.toString(eid) + "," + Integer.toString(sid) + ")" 45 static private boolean testSetResUidGidAllowed(int rid, int eid, int sid) { 46 if (SeccompDeviceTest.testSetresuidBlocked(rid, eid, sid)) { 48 + Integer.toString(eid) + "," + Integer.toString(sid) + ")" 52 if (SeccompDeviceTest.testSetresgidBlocked(rid, eid, sid)) { 54 + Integer.toString(eid) + "," + Integer.toString(sid) + ") [all...] |
/external/ltp/testcases/kernel/containers/pidns/ |
pidns02.c | 60 #define SID 1 67 pid_t pgid, sid; local 72 sid = getsid(0); 75 if (pgid == PGID && sid == SID) { 77 pgid, sid); 81 "%d\n", pgid, sid);
|
/external/selinux/libsepol/include/sepol/policydb/ |
sidtab.h | 7 * of security context structures indexed by SID value. 20 sepol_security_id_t sid; /* security identifier */ member in struct:sidtab_node 36 unsigned int next_sid; /* next SID to allocate */ 43 sepol_security_id_t sid, 47 sepol_security_id_t sid); 50 int (*apply) (sepol_security_id_t sid, 63 sepol_security_id_t * sid); /* OUT */
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/cms/ |
SignerInfo.java | 26 * sid SignerIdentifier, 46 * sid SignerIdentifier, 79 private SignerIdentifier sid; field in class:SignerInfo 117 * @param sid 125 SignerIdentifier sid, 132 if (sid.isTagged()) 141 this.sid = sid; 151 * @param sid 159 SignerIdentifier sid, [all...] |
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/asn1/cms/ |
SignerInfo.java | 27 * sid SignerIdentifier, 47 * sid SignerIdentifier, 81 private SignerIdentifier sid; field in class:SignerInfo 119 * @param sid 127 SignerIdentifier sid, 134 if (sid.isTagged()) 143 this.sid = sid; 153 * @param sid 161 SignerIdentifier sid, [all...] |
/external/webrtc/talk/app/webrtc/test/ |
fakedatachannelprovider.h | 76 void AddSctpDataStream(int sid) override { 77 ASSERT(sid >= 0); 81 send_ssrcs_.insert(sid); 82 recv_ssrcs_.insert(sid); 85 void RemoveSctpDataStream(int sid) override { 86 ASSERT(sid >= 0); 87 send_ssrcs_.erase(sid); 88 recv_ssrcs_.erase(sid);
|
/bionic/libc/kernel/uapi/linux/netfilter/ |
xt_l2tp.h | 28 __u32 sid; member in struct:xt_l2tp_info
|
/external/kernel-headers/original/uapi/linux/netfilter/ |
xt_l2tp.h | 15 __u32 sid; /* session id */ member in struct:xt_l2tp_info
|
/external/selinux/libsepol/tests/policies/test-expander/ |
base-base-only.conf | 4 sid kernel 42 sid kernel gen_context(myuser_u:myrole_r:mytype_t, s0)
|
/external/selinux/libselinux/include/selinux/ |
avc.h | 19 * SID format and operations 27 #define SECSID_WILD (security_id_t)NULL /* unspecified SID */ 30 * avc_sid_to_context - get copy of context corresponding to SID. 31 * @sid: input SID 35 * @sid in the memory referenced by @ctx. The caller is expected to 38 * available to make the copy, or %EINVAL if the input SID is invalid. 40 int avc_sid_to_context(security_id_t sid, char ** ctx); 41 int avc_sid_to_context_raw(security_id_t sid, char ** ctx); 44 * avc_context_to_sid - get SID for context [all...] |
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/ |
SignerInformationStore.java | 29 SignerId sid = signerInfo.getSID(); local 31 table.put(sid, all); 47 SignerId sid = signer.getSID(); local 49 List list = (ArrayList)table.get(sid); 53 table.put(sid, list);
|
/developers/build/prebuilts/gradle/MediaRouter/Application/src/main/java/com/example/android/mediarouter/provider/ |
SampleMediaRouteProvider.java | 340 String sid = intent.getStringExtra(MediaControlIntent.EXTRA_SESSION_ID); local 341 if (sid != null && !sid.equals(mSessionManager.getSessionId())) { 342 Log.d(TAG, "handlePlay fails because of bad sid="+sid); 352 String sid = intent.getStringExtra(MediaControlIntent.EXTRA_SESSION_ID); local 353 if (sid != null && !sid.equals(mSessionManager.getSessionId())) { 354 Log.d(TAG, "handleEnqueue fails because of bad sid="+sid); 398 String sid = intent.getStringExtra(MediaControlIntent.EXTRA_SESSION_ID); local 420 String sid = intent.getStringExtra(MediaControlIntent.EXTRA_SESSION_ID); local 444 String sid = intent.getStringExtra(MediaControlIntent.EXTRA_SESSION_ID); local 463 String sid = intent.getStringExtra(MediaControlIntent.EXTRA_SESSION_ID); local 478 String sid = intent.getStringExtra(MediaControlIntent.EXTRA_SESSION_ID); local 493 String sid = intent.getStringExtra(MediaControlIntent.EXTRA_SESSION_ID); local 508 String sid = mSessionManager.startSession(); local 528 String sid = intent.getStringExtra(MediaControlIntent.EXTRA_SESSION_ID); local 545 String sid = intent.getStringExtra(MediaControlIntent.EXTRA_SESSION_ID); local [all...] |
/developers/samples/android/media/MediaRouter/Application/src/main/java/com/example/android/mediarouter/provider/ |
SampleMediaRouteProvider.java | 340 String sid = intent.getStringExtra(MediaControlIntent.EXTRA_SESSION_ID); local 341 if (sid != null && !sid.equals(mSessionManager.getSessionId())) { 342 Log.d(TAG, "handlePlay fails because of bad sid="+sid); 352 String sid = intent.getStringExtra(MediaControlIntent.EXTRA_SESSION_ID); local 353 if (sid != null && !sid.equals(mSessionManager.getSessionId())) { 354 Log.d(TAG, "handleEnqueue fails because of bad sid="+sid); 398 String sid = intent.getStringExtra(MediaControlIntent.EXTRA_SESSION_ID); local 420 String sid = intent.getStringExtra(MediaControlIntent.EXTRA_SESSION_ID); local 444 String sid = intent.getStringExtra(MediaControlIntent.EXTRA_SESSION_ID); local 463 String sid = intent.getStringExtra(MediaControlIntent.EXTRA_SESSION_ID); local 478 String sid = intent.getStringExtra(MediaControlIntent.EXTRA_SESSION_ID); local 493 String sid = intent.getStringExtra(MediaControlIntent.EXTRA_SESSION_ID); local 508 String sid = mSessionManager.startSession(); local 528 String sid = intent.getStringExtra(MediaControlIntent.EXTRA_SESSION_ID); local 545 String sid = intent.getStringExtra(MediaControlIntent.EXTRA_SESSION_ID); local [all...] |
/development/samples/browseable/MediaRouter/src/com.example.android.mediarouter/provider/ |
SampleMediaRouteProvider.java | 341 String sid = intent.getStringExtra(MediaControlIntent.EXTRA_SESSION_ID); local 342 if (sid != null && !sid.equals(mSessionManager.getSessionId())) { 343 Log.d(TAG, "handlePlay fails because of bad sid="+sid); 353 String sid = intent.getStringExtra(MediaControlIntent.EXTRA_SESSION_ID); local 354 if (sid != null && !sid.equals(mSessionManager.getSessionId())) { 355 Log.d(TAG, "handleEnqueue fails because of bad sid="+sid); 399 String sid = intent.getStringExtra(MediaControlIntent.EXTRA_SESSION_ID); local 421 String sid = intent.getStringExtra(MediaControlIntent.EXTRA_SESSION_ID); local 445 String sid = intent.getStringExtra(MediaControlIntent.EXTRA_SESSION_ID); local 464 String sid = intent.getStringExtra(MediaControlIntent.EXTRA_SESSION_ID); local 479 String sid = intent.getStringExtra(MediaControlIntent.EXTRA_SESSION_ID); local 494 String sid = intent.getStringExtra(MediaControlIntent.EXTRA_SESSION_ID); local 509 String sid = mSessionManager.startSession(); local 529 String sid = intent.getStringExtra(MediaControlIntent.EXTRA_SESSION_ID); local 546 String sid = intent.getStringExtra(MediaControlIntent.EXTRA_SESSION_ID); local [all...] |
/external/mesa3d/src/gallium/winsys/svga/drm/ |
vmw_surface.h | 54 uint32_t sid; member in struct:vmw_svga_winsys_surface 74 assert(!surf || surf->sid != SVGA3D_INVALID_ID);
|
/external/webrtc/talk/app/webrtc/ |
datachannel.h | 57 // Adds the data channel SID to the transport for SCTP. 58 virtual void AddSctpDataStream(int sid) = 0; 59 // Removes the data channel SID from the transport for SCTP. 60 virtual void RemoveSctpDataStream(int sid) = 0; 94 bool AllocateSid(rtc::SSLRole role, int* sid); 96 // Attempts to reserve a specific sid. Returns false if it's unavailable. 97 bool ReserveSid(int sid); 99 // Indicates that |sid| isn't in use any more, and is thus available again. 100 void ReleaseSid(int sid); 103 // Checks if |sid| is available to be assigned to a new SCTP data channel [all...] |
datachannel.cc | 47 bool SctpSidAllocator::AllocateSid(rtc::SSLRole role, int* sid) { 56 *sid = potential_sid; 61 bool SctpSidAllocator::ReserveSid(int sid) { 62 if (!IsSidAvailable(sid)) { 65 used_sids_.insert(sid); 69 void SctpSidAllocator::ReleaseSid(int sid) { 70 auto it = used_sids_.find(sid); 76 bool SctpSidAllocator::IsSidAvailable(int sid) const { 77 if (sid < 0 || sid > static_cast<int>(cricket::kMaxSctpSid)) [all...] |
/external/icu/icu4c/source/tools/genrb/ |
wrtxml.cpp | 557 char *sid = NULL; local 563 sid = getID(id, resname, sid); 565 sid = getID(id, NULL, sid); 570 printAttribute("id", sid, (int32_t) uprv_strlen(sid)); 592 return sid; 625 char *sid = NULL; local 633 sid = printContainer(res, trans_unit, NULL, NULL, id, status) 661 char *sid = NULL; local 692 char* sid = NULL; local 729 char* sid = NULL; local 778 char* sid = NULL; local 807 char* sid = NULL; local 930 char* sid = NULL; local [all...] |
/external/selinux/libselinux/src/ |
avc_sidtab.h | 3 * of security context structures indexed by SID value. 31 const char * ctx, security_id_t * sid) hidden;
|
selinuxswig_ruby.i | 15 /* return a sid along with the result */ 16 %typemap(argout) (security_id_t * sid) {
|
/external/u-boot/arch/arm/mach-sunxi/ |
cpu_info.c | 137 int sunxi_get_sid(unsigned int *sid) 140 return axp_get_sid(sid); 143 * H3 SID controller has a bug, which makes the initial value of 145 * Read the value directly from SID controller, in order to get 152 sid[i] = sun8i_efuse_read(i * 4); 159 sid[i] = readl((ulong)SUNXI_SID_BASE + 4 * i);
|
/external/webrtc/webrtc/p2p/base/ |
portallocator.cc | 32 const std::string& sid,
|
/external/u-boot/include/ |
axp_pmic.h | 39 int axp_get_sid(unsigned int *sid);
|