HomeSort by relevance Sort by last modified time
    Searched full:role (Results 351 - 375 of 1705) sorted by null

<<11121314151617181920>>

  /external/selinux/libsepol/tests/policies/test-expander/
alias-base.conf 443 role system_r;
444 role user_r;
445 role sysadm_r;
446 role system_r types system_t;
447 role user_r types user_t;
448 role sysadm_r types system_t;
  /prebuilts/tools/common/m2/repository/com/tunnelvisionlabs/antlr4-master/4.5/
antlr4-master-4.5.pom 38 <role>Project lead - ANTLR</role>
46 <role>Developer</role>
55 <role>Developer - Maven Plugin</role>
  /prebuilts/tools/common/m2/repository/org/antlr/stringtemplate/3.2.1/
stringtemplate-3.2.1.pom 52 <role>Project Leader</role>
53 <role>Developer - Java Target</role>
63 <role>Developer - Maven stuff</role>
  /prebuilts/tools/common/m2/repository/org/apache/maven/wagon/wagon/1.0-alpha-6/
wagon-1.0-alpha-6.pom 43 <role>Developer</role>
51 <role>Developer</role>
60 <role>Developer</role>
  /prebuilts/tools/common/offline-m2/com/tunnelvisionlabs/antlr4-master/4.5/
antlr4-master-4.5.pom 38 <role>Project lead - ANTLR</role>
46 <role>Developer</role>
55 <role>Developer - Maven Plugin</role>
  /external/clang/include/clang/Analysis/Analyses/
ThreadSafety.h 80 /// \param Kind -- the capability's name parameter (role, mutex, etc).
86 /// \param Kind -- the capability's name parameter (role, mutex, etc).
98 /// \param Kind -- the capability's name parameter (role, mutex, etc).
107 /// \param Kind -- the capability's name parameter (role, mutex, etc).
119 /// \param Kind -- the capability's name parameter (role, mutex, etc).
135 /// \param Kind -- the capability's name parameter (role, mutex, etc).
145 /// \param Kind -- the capability's name parameter (role, mutex, etc).
156 /// \param Kind -- the capability's name parameter (role, mutex, etc).
169 /// \param Kind -- the capability's name parameter (role, mutex, etc).
180 /// \param Kind -- the capability's name parameter (role, mutex, etc)
    [all...]
  /external/selinux/checkpolicy/
module_compiler.c 168 char *role_id, role_datum_t *role)
186 yyerror2("role %s doesn't exist, is implicit bounds of %s",
191 if (!role->bounds)
192 role->bounds = bounds->s.value;
193 else if (role->bounds != bounds->s.value) {
194 yyerror2("role %s has inconsistent bounds %s/%s",
196 policydbp->p_role_val_to_name[role->bounds - 1]);
207 role_datum_t *role = NULL, *dest_role = NULL; local
212 yyerror("no role name");
215 if ((role = (role_datum_t *) malloc(sizeof(*role))) == NULL)
869 role_datum_t *role = NULL; local
    [all...]
  /external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/awslambda/
layer1.py 69 def add_event_source(self, event_source, function_name, role,
87 action for the IAM role. It also requires permission for the
101 :type role: string
102 :param role: The ARN of the IAM role (invocation role) that AWS Lambda
124 'Role': role,
341 def update_function_configuration(self, function_name, role=None,
357 :type role: strin
    [all...]
  /external/dbus/doc/
diagram.svg 130 sodipodi:role="line"
150 sodipodi:role="line"
154 sodipodi:role="line"
167 sodipodi:role="line"
184 sodipodi:role="line"
188 sodipodi:role="line"
207 sodipodi:role="line"
211 sodipodi:role="line"
233 sodipodi:role="line"
237 sodipodi:role="line
    [all...]
  /external/selinux/secilc/docs/
cil_constraint_statements.md 42 <p><code> u1, r1, t1 = Source context: user, role or type</code></p>
43 <p><code> u2, r2, t2 = Target context: user, role or type</code></p>
48 <p><code> role_id : A single role or roleattribute identifier.</code></p>
132 <p><code> u1, r1, t1 = Old context: user, role or type</code></p>
133 <p><code> u2, r2, t2 = New context: user, role or type</code></p>
134 <p><code> u3, r3, t3 = Process context: user, role or type</code></p>
139 <p><code> role_id : A single role or roleattribute identifier.</code></p>
204 <p><code> u1, r1, t1, l1, h1 = Source context: user, role, type, low level or high level</code></p>
205 <p><code> u2, r2, t2, l2, h2 = Target context: user, role, type, low level or high level</code></p>
210 <p><code> role_id : A single role or roleattribute identifier.</code></p
    [all...]
  /external/skia/tools/
buildbot_spec.py 45 if builder_dict['role'] == builder_name_schema.BUILDER_ROLE_BUILD:
47 elif builder_dict['role'] == builder_name_schema.BUILDER_ROLE_HOUSEKEEPER:
65 if builder_dict['role'] == builder_name_schema.BUILDER_ROLE_HOUSEKEEPER:
74 if builder_dict['role'] == builder_name_schema.BUILDER_ROLE_BUILD:
141 if (builder_dict.get('role') == builder_name_schema.BUILDER_ROLE_BUILD and
160 builder_dict.get('role') == 'Perf'):
189 if builder_dict['role'] in ('Test', 'Perf') and builder_dict['os'] == 'iOS':
267 role = builder_dict['role']
268 if role == builder_name_schema.BUILDER_ROLE_HOUSEKEEPER
    [all...]
  /prebuilts/tools/common/m2/repository/org/apache/xbean/xbean/3.4/
xbean-3.4.pom 93 <role>Commiter</role>
102 <role>Commiter</role>
111 <role>Commiter</role>
119 <role>Commiter</role>
127 <role>Commiter</role>
    [all...]
  /external/selinux/prebuilts/bin/
sesearch.py 58 help="Search role allow rules.")
70 help="Source type/role of the TE/RBAC rule.")
72 help="Target type/role of the TE/RBAC rule.")
78 help="Default of the rule. (type/role/range transition rules)")
92 help="Use regular expression matching for the source type/role.")
94 help="Use regular expression matching for the target type/role.")
98 help="Use regular expression matching for the default type/role.")
  /frameworks/base/services/usb/java/com/android/server/usb/
UsbPortManager.java 77 // SysFS file that contains a USB port's current power role. (read-write if configurable)
81 // SysFS file that contains a USB port's current data role. (read-write if configurable)
100 // All non-trivial role combinations.
168 // Check whether the new role is actually supported.
171 + "role combination: portId=" + portId
207 logAndPrint(Log.ERROR, pw, "Found mismatch in supported USB role combinations "
208 + "while attempting to change role: " + portInfo
218 logAndPrint(Log.INFO, pw, "Setting USB port mode and role: portId=" + portId
255 // Change power and data role independently as needed.
260 logAndPrint(Log.ERROR, pw, "Failed to set the USB port power role:
    [all...]
  /external/autotest/client/tests/netperf2/
netperf2.py 36 def run_once(self, server_ip, client_ip, role, test = 'TCP_STREAM',
42 role: 'client' or 'server'
64 self.role = role
78 if role == 'server':
86 if role == 'server':
100 elif role == 'client':
110 raise error.TestError('invalid role specified')
202 if self.role == 'client':
  /external/autotest/server/cros/servo/
pd_console.py 38 'role': 'Role:\s+([\w]+-[\w]+)',
111 the dict containing port, polarity, role, pd_state, and flags.
122 ['(Port.*) - (Role:.*)\r'])
155 """Get the current PD power role (source or sink)
161 return pd_dict['role']
179 ['dual-role toggling:\s+([\w ]+)'])
225 status['role'] = state
233 status['role'] = state
  /external/autotest/client/tests/kvm/tests/
migration_multi_host.py 42 role = params.get("role")
49 if role == 'source':
75 elif role == 'destination':
107 raise error.TestError('Invalid role specified')
  /external/selinux/libsepol/tests/policies/test-deps/
small-base.conf 429 role system_r types sys_foo_t;
432 role user_r types user_t;
435 role sysadm_r types sysadm_t;
438 role system_r types { system_t sys_foo_t };
456 # Role Allow
  /external/selinux/secilc/test/
bounds.cil 6 (role ROLE)
14 (roletype ROLE TYPE)
15 (userrole USER ROLE)
18 (sidcontext SID (USER ROLE TYPE ((SENS)(SENS))))
  /frameworks/av/services/audiopolicy/common/managerdefinitions/src/
Serializer.cpp 217 const char MixPortTraits::Attributes::role[] = "role"; member in class:android::MixPortTraits::Attributes
229 string role = getXmlAttribute(child, Attributes::role); local
230 if (role.empty()) {
231 ALOGE("%s: No %s found", __FUNCTION__, Attributes::role);
234 ALOGV("%s: Role=%s", __FUNCTION__, role.c_str());
235 audio_port_role_t portRole = role == "source" ? AUDIO_PORT_ROLE_SOURCE : AUDIO_PORT_ROLE_SINK;
253 // Source role
274 const char DevicePortTraits::Attributes::role[] = "role"; member in class:android::DevicePortTraits::Attributes
293 string role = getXmlAttribute(root, Attributes::role); local
    [all...]
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/setools/diff/
rbacrules.py 36 # role allows cannot be modified, only added/removed
50 """Generate the difference in role allow rules between the policies."""
53 "Generating role allow differences from {0.left_policy} to {0.right_policy}".
118 # 1. change to default role
145 """Wrap role allow rules to allow set operations."""
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/setools/
nodeconquery.py 49 role The criteria to match the context's role.
51 will be used on the role.
106 self.log.debug("Role: {0.role!r}, regex: {0.role_regex}".format(self))
portconquery.py 53 role The criteria to match the context's role.
55 will be used on the role.
124 self.log.debug("Role: {0.role!r}, regex: {0.role_regex}".format(self))
  /system/bt/bta/av/
bta_av_main.c 63 /* the delay time in milliseconds to retry role switch */
401 APPL_TRACE_DEBUG("scb hndl x%x, role x%x", p_scb->hndl, p_scb->role);
690 /* if the AV and AVK are both supported, it cannot support the CT role */
847 ((0 == (p_scb->role & BTA_AV_ROLE_AD_ACP)) || /* Outgoing connection or */
906 ** Description Receives the role change event from dm
922 /* loop through all the SCBs to find matching peer addresses and report the role change event */
945 /* restore role switch policy, if role switch failed */
1050 UINT8 role; local
1100 UINT8 role; local
    [all...]
  /system/bt/stack/smp/
smp_act.c 108 SMP_TRACE_DEBUG("%s before update role=%d recv=%d local_i_key = %02x, local_r_key = %02x",
109 __func__, p_cb->role, recv, p_cb->local_i_key, p_cb->local_r_key);
121 if (p_cb->role == HCI_ROLE_SLAVE)
570 if (p_dev_rec && (p_cb->role == HCI_ROLE_SLAVE))
593 if (p_cb->role == HCI_ROLE_SLAVE)
845 if (!p_dev_rec->new_encryption_key_is_p256 && p_cb->role == HCI_ROLE_SLAVE)
853 if (p_dev_rec && (p_cb->role == HCI_ROLE_SLAVE))
    [all...]

Completed in 710 milliseconds

<<11121314151617181920>>