/external/selinux/libsepol/tests/policies/test-expander/ |
alias-base.conf | 443 role system_r; 444 role user_r; 445 role sysadm_r; 446 role system_r types system_t; 447 role user_r types user_t; 448 role sysadm_r types system_t;
|
/prebuilts/tools/common/m2/repository/com/tunnelvisionlabs/antlr4-master/4.5/ |
antlr4-master-4.5.pom | 38 <role>Project lead - ANTLR</role>
46 <role>Developer</role>
55 <role>Developer - Maven Plugin</role>
|
/prebuilts/tools/common/m2/repository/org/antlr/stringtemplate/3.2.1/ |
stringtemplate-3.2.1.pom | 52 <role>Project Leader</role>
53 <role>Developer - Java Target</role>
63 <role>Developer - Maven stuff</role>
|
/prebuilts/tools/common/m2/repository/org/apache/maven/wagon/wagon/1.0-alpha-6/ |
wagon-1.0-alpha-6.pom | 43 <role>Developer</role>
51 <role>Developer</role>
60 <role>Developer</role>
|
/prebuilts/tools/common/offline-m2/com/tunnelvisionlabs/antlr4-master/4.5/ |
antlr4-master-4.5.pom | 38 <role>Project lead - ANTLR</role>
46 <role>Developer</role>
55 <role>Developer - Maven Plugin</role>
|
/external/clang/include/clang/Analysis/Analyses/ |
ThreadSafety.h | 80 /// \param Kind -- the capability's name parameter (role, mutex, etc). 86 /// \param Kind -- the capability's name parameter (role, mutex, etc). 98 /// \param Kind -- the capability's name parameter (role, mutex, etc). 107 /// \param Kind -- the capability's name parameter (role, mutex, etc). 119 /// \param Kind -- the capability's name parameter (role, mutex, etc). 135 /// \param Kind -- the capability's name parameter (role, mutex, etc). 145 /// \param Kind -- the capability's name parameter (role, mutex, etc). 156 /// \param Kind -- the capability's name parameter (role, mutex, etc). 169 /// \param Kind -- the capability's name parameter (role, mutex, etc). 180 /// \param Kind -- the capability's name parameter (role, mutex, etc) [all...] |
/external/selinux/checkpolicy/ |
module_compiler.c | 168 char *role_id, role_datum_t *role) 186 yyerror2("role %s doesn't exist, is implicit bounds of %s", 191 if (!role->bounds) 192 role->bounds = bounds->s.value; 193 else if (role->bounds != bounds->s.value) { 194 yyerror2("role %s has inconsistent bounds %s/%s", 196 policydbp->p_role_val_to_name[role->bounds - 1]); 207 role_datum_t *role = NULL, *dest_role = NULL; local 212 yyerror("no role name"); 215 if ((role = (role_datum_t *) malloc(sizeof(*role))) == NULL) 869 role_datum_t *role = NULL; local [all...] |
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/awslambda/ |
layer1.py | 69 def add_event_source(self, event_source, function_name, role, 87 action for the IAM role. It also requires permission for the 101 :type role: string 102 :param role: The ARN of the IAM role (invocation role) that AWS Lambda 124 'Role': role, 341 def update_function_configuration(self, function_name, role=None, 357 :type role: strin [all...] |
/external/dbus/doc/ |
diagram.svg | 130 sodipodi:role="line" 150 sodipodi:role="line" 154 sodipodi:role="line" 167 sodipodi:role="line" 184 sodipodi:role="line" 188 sodipodi:role="line" 207 sodipodi:role="line" 211 sodipodi:role="line" 233 sodipodi:role="line" 237 sodipodi:role="line [all...] |
/external/selinux/secilc/docs/ |
cil_constraint_statements.md | 42 <p><code> u1, r1, t1 = Source context: user, role or type</code></p> 43 <p><code> u2, r2, t2 = Target context: user, role or type</code></p> 48 <p><code> role_id : A single role or roleattribute identifier.</code></p> 132 <p><code> u1, r1, t1 = Old context: user, role or type</code></p> 133 <p><code> u2, r2, t2 = New context: user, role or type</code></p> 134 <p><code> u3, r3, t3 = Process context: user, role or type</code></p> 139 <p><code> role_id : A single role or roleattribute identifier.</code></p> 204 <p><code> u1, r1, t1, l1, h1 = Source context: user, role, type, low level or high level</code></p> 205 <p><code> u2, r2, t2, l2, h2 = Target context: user, role, type, low level or high level</code></p> 210 <p><code> role_id : A single role or roleattribute identifier.</code></p [all...] |
/external/skia/tools/ |
buildbot_spec.py | 45 if builder_dict['role'] == builder_name_schema.BUILDER_ROLE_BUILD: 47 elif builder_dict['role'] == builder_name_schema.BUILDER_ROLE_HOUSEKEEPER: 65 if builder_dict['role'] == builder_name_schema.BUILDER_ROLE_HOUSEKEEPER: 74 if builder_dict['role'] == builder_name_schema.BUILDER_ROLE_BUILD: 141 if (builder_dict.get('role') == builder_name_schema.BUILDER_ROLE_BUILD and 160 builder_dict.get('role') == 'Perf'): 189 if builder_dict['role'] in ('Test', 'Perf') and builder_dict['os'] == 'iOS': 267 role = builder_dict['role'] 268 if role == builder_name_schema.BUILDER_ROLE_HOUSEKEEPER [all...] |
/prebuilts/tools/common/m2/repository/org/apache/xbean/xbean/3.4/ |
xbean-3.4.pom | 93 <role>Commiter</role> 102 <role>Commiter</role> 111 <role>Commiter</role> 119 <role>Commiter</role> 127 <role>Commiter</role> [all...] |
/external/selinux/prebuilts/bin/ |
sesearch.py | 58 help="Search role allow rules.") 70 help="Source type/role of the TE/RBAC rule.") 72 help="Target type/role of the TE/RBAC rule.") 78 help="Default of the rule. (type/role/range transition rules)") 92 help="Use regular expression matching for the source type/role.") 94 help="Use regular expression matching for the target type/role.") 98 help="Use regular expression matching for the default type/role.")
|
/frameworks/base/services/usb/java/com/android/server/usb/ |
UsbPortManager.java | 77 // SysFS file that contains a USB port's current power role. (read-write if configurable) 81 // SysFS file that contains a USB port's current data role. (read-write if configurable) 100 // All non-trivial role combinations. 168 // Check whether the new role is actually supported. 171 + "role combination: portId=" + portId 207 logAndPrint(Log.ERROR, pw, "Found mismatch in supported USB role combinations " 208 + "while attempting to change role: " + portInfo 218 logAndPrint(Log.INFO, pw, "Setting USB port mode and role: portId=" + portId 255 // Change power and data role independently as needed. 260 logAndPrint(Log.ERROR, pw, "Failed to set the USB port power role: [all...] |
/external/autotest/client/tests/netperf2/ |
netperf2.py | 36 def run_once(self, server_ip, client_ip, role, test = 'TCP_STREAM', 42 role: 'client' or 'server' 64 self.role = role 78 if role == 'server': 86 if role == 'server': 100 elif role == 'client': 110 raise error.TestError('invalid role specified') 202 if self.role == 'client':
|
/external/autotest/server/cros/servo/ |
pd_console.py | 38 'role': 'Role:\s+([\w]+-[\w]+)', 111 the dict containing port, polarity, role, pd_state, and flags. 122 ['(Port.*) - (Role:.*)\r']) 155 """Get the current PD power role (source or sink) 161 return pd_dict['role'] 179 ['dual-role toggling:\s+([\w ]+)']) 225 status['role'] = state 233 status['role'] = state
|
/external/autotest/client/tests/kvm/tests/ |
migration_multi_host.py | 42 role = params.get("role") 49 if role == 'source': 75 elif role == 'destination': 107 raise error.TestError('Invalid role specified')
|
/external/selinux/libsepol/tests/policies/test-deps/ |
small-base.conf | 429 role system_r types sys_foo_t; 432 role user_r types user_t; 435 role sysadm_r types sysadm_t; 438 role system_r types { system_t sys_foo_t }; 456 # Role Allow
|
/external/selinux/secilc/test/ |
bounds.cil | 6 (role ROLE) 14 (roletype ROLE TYPE) 15 (userrole USER ROLE) 18 (sidcontext SID (USER ROLE TYPE ((SENS)(SENS))))
|
/frameworks/av/services/audiopolicy/common/managerdefinitions/src/ |
Serializer.cpp | 217 const char MixPortTraits::Attributes::role[] = "role"; member in class:android::MixPortTraits::Attributes 229 string role = getXmlAttribute(child, Attributes::role); local 230 if (role.empty()) { 231 ALOGE("%s: No %s found", __FUNCTION__, Attributes::role); 234 ALOGV("%s: Role=%s", __FUNCTION__, role.c_str()); 235 audio_port_role_t portRole = role == "source" ? AUDIO_PORT_ROLE_SOURCE : AUDIO_PORT_ROLE_SINK; 253 // Source role 274 const char DevicePortTraits::Attributes::role[] = "role"; member in class:android::DevicePortTraits::Attributes 293 string role = getXmlAttribute(root, Attributes::role); local [all...] |
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/setools/diff/ |
rbacrules.py | 36 # role allows cannot be modified, only added/removed 50 """Generate the difference in role allow rules between the policies.""" 53 "Generating role allow differences from {0.left_policy} to {0.right_policy}". 118 # 1. change to default role 145 """Wrap role allow rules to allow set operations."""
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/setools/ |
nodeconquery.py | 49 role The criteria to match the context's role. 51 will be used on the role. 106 self.log.debug("Role: {0.role!r}, regex: {0.role_regex}".format(self))
|
portconquery.py | 53 role The criteria to match the context's role. 55 will be used on the role. 124 self.log.debug("Role: {0.role!r}, regex: {0.role_regex}".format(self))
|
/system/bt/bta/av/ |
bta_av_main.c | 63 /* the delay time in milliseconds to retry role switch */ 401 APPL_TRACE_DEBUG("scb hndl x%x, role x%x", p_scb->hndl, p_scb->role); 690 /* if the AV and AVK are both supported, it cannot support the CT role */ 847 ((0 == (p_scb->role & BTA_AV_ROLE_AD_ACP)) || /* Outgoing connection or */ 906 ** Description Receives the role change event from dm 922 /* loop through all the SCBs to find matching peer addresses and report the role change event */ 945 /* restore role switch policy, if role switch failed */ 1050 UINT8 role; local 1100 UINT8 role; local [all...] |
/system/bt/stack/smp/ |
smp_act.c | 108 SMP_TRACE_DEBUG("%s before update role=%d recv=%d local_i_key = %02x, local_r_key = %02x", 109 __func__, p_cb->role, recv, p_cb->local_i_key, p_cb->local_r_key); 121 if (p_cb->role == HCI_ROLE_SLAVE) 570 if (p_dev_rec && (p_cb->role == HCI_ROLE_SLAVE)) 593 if (p_cb->role == HCI_ROLE_SLAVE) 845 if (!p_dev_rec->new_encryption_key_is_p256 && p_cb->role == HCI_ROLE_SLAVE) 853 if (p_dev_rec && (p_cb->role == HCI_ROLE_SLAVE)) [all...] |