/prebuilts/tools/common/m2/repository/org/ow2/asm/asm-parent/5.0.1/ |
asm-parent-5.0.1.pom | 72 <role>Creator</role> 73 <role>Java Developer</role> 81 <role>Java Developer</role> 89 <role>Java Developer</role>
|
/prebuilts/tools/common/m2/repository/org/ow2/asm/asm-parent/5.0.2/ |
asm-parent-5.0.2.pom | 72 <role>Creator</role> 73 <role>Java Developer</role> 81 <role>Java Developer</role> 89 <role>Java Developer</role>
|
/prebuilts/tools/common/m2/repository/org/ow2/asm/asm-parent/5.0.3/ |
asm-parent-5.0.3.pom | 72 <role>Creator</role> 73 <role>Java Developer</role> 81 <role>Java Developer</role> 89 <role>Java Developer</role>
|
/prebuilts/tools/common/m2/repository/org/ow2/asm/asm-parent/5.0.4/ |
asm-parent-5.0.4.pom | 72 <role>Creator</role> 73 <role>Java Developer</role> 81 <role>Java Developer</role> 89 <role>Java Developer</role>
|
/prebuilts/tools/common/offline-m2/org/ow2/asm/asm-parent/4.0/ |
asm-parent-4.0.pom | 72 <role>Creator</role> 73 <role>Java Developer</role> 81 <role>Java Developer</role> 89 <role>Java Developer</role>
|
/prebuilts/tools/common/offline-m2/org/ow2/asm/asm-parent/5.0.1/ |
asm-parent-5.0.1.pom | 72 <role>Creator</role> 73 <role>Java Developer</role> 81 <role>Java Developer</role> 89 <role>Java Developer</role>
|
/prebuilts/tools/common/offline-m2/org/ow2/asm/asm-parent/5.0.3/ |
asm-parent-5.0.3.pom | 72 <role>Creator</role> 73 <role>Java Developer</role> 81 <role>Java Developer</role> 89 <role>Java Developer</role>
|
/prebuilts/tools/common/offline-m2/org/ow2/asm/asm-parent/5.0.4/ |
asm-parent-5.0.4.pom | 72 <role>Creator</role> 73 <role>Java Developer</role> 81 <role>Java Developer</role> 89 <role>Java Developer</role>
|
/external/selinux/secilc/test/ |
name_resolution_test.cil | 7 (role ROLE) 15 (roletype ROLE TYPE) 16 (userrole USER ROLE) 19 (sidcontext SID (USER ROLE TYPE ((SENS)(SENS))))
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/pulse/ |
ext-device-manager.h | 37 const char *role; member in struct:pa_ext_device_manager_role_priority_info 48 uint32_t n_role_priorities; /**< How many role priorities do we have? */ 49 pa_ext_device_manager_role_priority_info *role_priorities; /**< An array of role priority structures or NULL */ 92 /** Enable the role-based device-priority routing mode. \since 0.9.21 */ 102 const char* role,
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/pulse/ |
ext-device-manager.h | 38 const char *role; member in struct:pa_ext_device_manager_role_priority_info 49 uint32_t n_role_priorities; /**< How many role priorities do we have? */ 50 pa_ext_device_manager_role_priority_info *role_priorities; /**< An array of role priority structures or NULL */ 93 /** Enable the role-based device-priority routing mode. \since 0.9.21 */ 103 const char* role,
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/setools/ |
fsusequery.py | 42 role The criteria to match the context's role. 44 will be used on the role. 69 self.log.debug("Role: {0.role!r}, regex: {0.role_regex}".format(self))
|
genfsconquery.py | 44 role The criteria to match the context's role. 46 will be used on the role. 74 self.log.debug("Role: {0.role!r}, regex: {0.role_regex}".format(self))
|
initsidquery.py | 40 role The criteria to match the context's role. 42 will be used on the role. 62 self.log.debug("Role: {0.role!r}, regex: {0.role_regex}".format(self))
|
netifconquery.py | 40 role The criteria to match the context's role. 42 will be used on the role. 62 self.log.debug("Role: {0.role!r}, regex: {0.role_regex}".format(self))
|
/system/bt/bta/pan/ |
bta_pan_int.h | 89 tBTA_PAN_ROLE role; member in struct:__anon72125 104 tBTA_PAN_ROLE local_role; /* local role */ 105 tBTA_PAN_ROLE peer_role; /* peer role */ 149 tBTA_PAN_ROLE local_role; /* local role */ 150 tBTA_PAN_ROLE peer_role; /* peer role */
|
/prebuilts/tools/common/m2/repository/org/apache/velocity/velocity/1.7/ |
velocity-1.7.pom | 97 <role>Java Developer</role> 107 <role>Java Developer</role> 117 <role>Java Developer</role> 127 <role>Java Developer</role> 138 <role>Java Developer</role> [all...] |
/prebuilts/tools/common/m2/repository/commons-logging/commons-logging/1.1.3/ |
commons-logging-1.1.3.pom | 53 <role>Java Developer</role> 62 <role>Java Developer</role> 133 <role>Provided patch</role> 140 <role>Lumberjack logging abstraction</role> 146 <role>Provided patch</role> [all...] |
/external/selinux/libselinux/src/ |
query_user_context.c | 109 char role[100]; /* The role requested by the user */ local 124 new_context = context_new("user:role:type:level"); 126 new_context = context_new("user:role:type"); 144 get_field("role", role, rolelen); 145 if (context_role_set(new_context, role)) {
|
/external/selinux/libsemanage/src/ |
user_record.c | 180 /* Role management */ 188 semanage_user_t * user, const char *role) 191 return semanage_user_base_add_role(handle, user->base, role); 196 void semanage_user_del_role(semanage_user_t * user, const char *role) 199 semanage_user_base_del_role(user->base, role); 202 int semanage_user_has_role(const semanage_user_t * user, const char *role) 205 return semanage_user_base_has_role(user->base, role);
|
/external/selinux/policycoreutils/sepolicy/ |
sepolicy-generate.8 | 102 .I \-r, \-\-role 103 Enter role(s) to which this admin user will transition. 118 Generate Policy for Administrator Login User Role 127 Generate Policy for Confined Root Administrator Role 136 Generate Policy for Desktop Login User Role 151 Generate Policy for Minimal Terminal Login User Role 154 Generate Policy for Minimal X Windows Login User Role
|
/system/bt/stack/pan/ |
pan_main.c | 87 ** remote_uuid - UUID of the source role (peer device role) 88 ** local_uuid - UUID of the destination role (local device role) 89 ** is_role_change - Flag to indicate that it is a role change 105 ** If we are in GN or NAP role and have one or more 107 ** for user role reject it. 108 ** If we are in user role with one connection active 182 PAN_TRACE_EVENT ("pan_conn_ind_cb - for handle %d, current role %d, dst uuid 0x%x, src uuid 0x%x, role change %s" [all...] |
/external/tpm2/generator/ |
commands.txt | 175 _COMMENT handle of parent for new object Auth Index: 1 Auth Role: USER 221 _COMMENT TPM handle of parent key; shall not be a reserved handle Auth Index: 1 Auth Role: USER 311 _COMMENT handle of the object associated with certificate in credentialBlob Auth Index: 1 Auth Role: ADMIN 314 _COMMENT loaded key used to decrypt the TPMS_SENSITIVE in credentialBlob Auth Index: 2 Auth Role: USER 372 _COMMENT handle of a loaded data object Auth Index: 1 Auth Role: USER 394 _COMMENT handle of the object Auth Index: 1 Auth Role: ADMIN 422 _COMMENT loaded object to duplicate Auth Index: 1 Auth Role: DUP 459 _COMMENT parent of object Auth Index: 1 Auth Role: User 495 _COMMENT the handle of the new parent for the object Auth Index: 1 Auth Role: USER 561 _COMMENT RSA key to use for decryption Auth Index: 1 Auth Role: USE [all...] |
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/sts/ |
connection.py | 286 specify the role with the appropriate permissions) to get 300 are associated with the access policy of the role being 305 intersection of the role's access policy and the policy that 310 To assume a role, your AWS account must be trusted by the 311 role. The trust relationship is defined in the role's trust 312 policy when the IAM role is created. You must also have a 320 :param role_arn: The Amazon Resource Name (ARN) of the role that the 324 :param role_session_name: An identifier for the assumed role session. 332 associated with the role. Use this policy to further restrict th [all...] |
/external/jetty/src/java/org/eclipse/jetty/server/ |
UserIdentity.java | 26 /** User object that encapsulates user identity and operations such as run-as-role actions, 48 /** Check if the user is in a role. 50 * container code which will be using translated role names. 51 * @param role A role name. 53 * @return True if the user can act in that role. 55 boolean isUserInRole(String role, Scope scope); 81 * @return A map of role reference names that converts from names used by application code 105 public boolean isUserInRole(String role, Scope scope)
|