HomeSort by relevance Sort by last modified time
    Searched full:role (Results 451 - 475 of 1705) sorted by null

<<11121314151617181920>>

  /external/chromium-trace/catapult/third_party/gsutil/gslib/addlhelp/
acls.py 60 2. The bucket ACL plays no role in determining who can read objects; only the
148 "role": "OWNER"
153 "role": "OWNER"
158 "role": "READER"
163 and a Role. Entities are the way you specify an individual or group of
184 "role": "OWNER",
189 "role": "READER",
  /external/selinux/libsepol/tests/
test-deps.c 36 * 5 role in module global.
42 * 10 role in module optional.
48 * 15 role in base optional.
201 do_deps_modreq_global(1, BASE_MODREQ_ROLE_GLOBAL, "modreq-role-global.conf", "mod_global_t");
202 do_deps_modreq_global(0, BASE_MODREQ_ROLE_GLOBAL, "modreq-role-global.conf", "mod_global_t");
284 do_deps_modreq_opt(1, 0, BASE_MODREQ_ROLE_OPT, "modreq-role-opt.conf", "mod_opt_t");
285 do_deps_modreq_opt(0, 0, BASE_MODREQ_ROLE_OPT, "modreq-role-opt.conf", "mod_opt_t");
  /external/chromium-trace/catapult/third_party/gsutil/gslib/
aclhelpers.py 189 entry = entry_class(entityId=self.identifier, role=self.perm,
192 entry = entry_class(entityId=self.identifier, role=self.perm,
195 entry = entry_class(entityId=self.identifier, role=self.perm,
198 entry = entry_class(email=self.identifier, role=self.perm,
201 entry = entry_class(email=self.identifier, role=self.perm,
204 entry = entry_class(domain=self.identifier, role=self.perm,
208 role=self.perm)
210 entry = entry_class(entity=self.public_entity_all_users, role=self.perm)
255 if entry.role != self.perm:
256 entry.role = self.per
    [all...]
  /external/selinux/secilc/docs/
cil_user_statements.md 43 Associates a previously declared [`user`](cil_user_statements.md#user) identifier with a previously declared [`role`](cil_role_statements.md#role) identifier.
67 <td align="left"><p>A previously declared <code>role</code> or <code>roleattribute</code> identifier.</p></td>
74 This example will associate `unconfined.user` to `unconfined.role`:
78 (role role)
79 (userrole user role)
271 (role role)
272 (userrole user role)
    [all...]
cil_xen_statements.md 37 <td align="left"><p>A previously declared <code>context</code> identifier or an anonymous security context (<code>user role type levelrange</code>), the range MUST be defined whether the policy is MLS/MCS enabled or not.</p></td>
77 <td align="left"><p>A previously declared <code>context</code> identifier or an anonymous security context (<code>user role type levelrange</code>), the range MUST be defined whether the policy is MLS/MCS enabled or not.</p></td>
115 <td align="left"><p>A previously declared <code>context</code> identifier or an anonymous security context (<code>user role type levelrange</code>), the range MUST be defined whether the policy is MLS/MCS enabled or not.</p></td>
153 <td align="left"><p>A previously declared <code>context</code> identifier or an anonymous security context (<code>user role type levelrange</code>), the range MUST be defined whether the policy is MLS/MCS enabled or not.</p></td>
191 <td align="left"><p>A previously declared <code>context</code> identifier or an anonymous security context (<code>user role type levelrange</code>), the range MUST be defined whether the policy is MLS/MCS enabled or not.</p></td>
  /external/selinux/sepolgen/src/sepolgen/
access.py 306 """A non-overlapping set of role type statements.
308 This clas allows the incremental addition of role type statements and
316 """Iterate over all of the unique role allows statements in the set."""
321 """Return the unique number of role allow statements."""
324 def add(self, role, type):
325 if role in self.role_types:
326 role_type = self.role_types[role]
329 role_type.role = role
330 self.role_types[role] = role_typ
    [all...]
interfaces.py 163 def role_extract_params(role, params):
164 if access.is_idparam(role.role):
165 return __param_insert(role.role, refpolicy.ROLE, None, params)
293 for role in interface.roles():
294 if role_extract_params(role, self.params):
296 #print "found conflicting role param %s for interface %s" % \
297 # (role.name, interface.name
    [all...]
audit.py 272 if self.scontext.role != self.tcontext.role and self.tcontext.role != "object_r":
273 self.data.append(("role (%s)" % self.scontext.role, 'role (%s)' % self.tcontext.role))
300 context that is not valid. Security contexts are invalid if the role is
301 not authorized for the user or the type is not authorized for the role.
304 just the type and role
    [all...]
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/sepolgen/
access.py 306 """A non-overlapping set of role type statements.
308 This clas allows the incremental addition of role type statements and
316 """Iterate over all of the unique role allows statements in the set."""
321 """Return the unique number of role allow statements."""
324 def add(self, role, type):
325 if role in self.role_types:
326 role_type = self.role_types[role]
329 role_type.role = role
330 self.role_types[role] = role_typ
    [all...]
interfaces.py 163 def role_extract_params(role, params):
164 if access.is_idparam(role.role):
165 return __param_insert(role.role, refpolicy.ROLE, None, params)
293 for role in interface.roles():
294 if role_extract_params(role, self.params):
296 #print "found conflicting role param %s for interface %s" % \
297 # (role.name, interface.name
    [all...]
audit.py 272 if self.scontext.role != self.tcontext.role and self.tcontext.role != "object_r":
273 self.data.append(("role (%s)" % self.scontext.role, 'role (%s)' % self.tcontext.role))
300 context that is not valid. Security contexts are invalid if the role is
301 not authorized for the user or the type is not authorized for the role.
304 just the type and role
    [all...]
  /hardware/intel/common/wrs_omxil_core/core/src/
wrs_omxcore.cpp 308 OMX_IN OMX_STRING role,
323 having_role = cmodule->QueryHavingThisRole(role);
330 LOGV("%s(): component %s has %s role", __FUNCTION__,
331 cname, role);
374 LOGV("%s(): component %s has %s role", __FUNCTION__,
  /external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/elastictranscoder/
layer1.py 145 output_bucket=None, role=None, notifications=None,
173 AWS account that owns the role that is specified by `Role`.
185 :type role: string
186 :param role: The IAM Amazon Resource Name (ARN) for the role that you
349 if role is not None:
350 params['Role'] = role
615 def test_role(self, role=None, input_bucket=None, output_bucket=None
    [all...]
  /external/selinux/policycoreutils/sepolicy/sepolicy/
manpage.py 120 for role in get_all_roles():
121 if role[:-2] in domains or role == "system_r":
123 domains.append(role[:-2])
212 for role in self.manpage_roles.values():
213 if len(role):
214 for r in role:
483 self.role = self.domainname + "_r"
490 self.desc = "%s user role" % self.domainname
985 default role has a default type, \fB%(user)s_t\fP, associated with it
    [all...]
  /prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/x86_64-w64-mingw32/include/
mmdeviceapi.h 148 ERole role,
192 ERole role,
216 #define IMMNotificationClient_OnDefaultDeviceChanged(This,flow,role,pwstrDeviceId) (This)->lpVtbl->OnDefaultDeviceChanged(This,flow,role,pwstrDeviceId)
239 static FORCEINLINE HRESULT IMMNotificationClient_OnDefaultDeviceChanged(IMMNotificationClient* This,EDataFlow flow,ERole role,LPCWSTR pwstrDeviceId) {
240 return This->lpVtbl->OnDefaultDeviceChanged(This,flow,role,pwstrDeviceId);
278 ERole role,
658 ERole role,
701 ERole role,
731 #define IMMDeviceEnumerator_GetDefaultAudioEndpoint(This,dataFlow,role,ppEndpoint) (This)->lpVtbl->GetDefaultAudioEndpoint(This,dataFlow,role,ppEndpoint
    [all...]
  /external/chromium-trace/catapult/third_party/gsutil/gslib/tests/
test_acl.py 33 PUBLIC_READ_JSON_ACL_TEXT = '"entity":"allUsers","role":"READER"'
109 """Ensures that whitespace is allowed in role and entity elements."""
113 acl_string = re.sub(r'"role"', r'"role" \n', acl_string)
327 perm: Role (permission) to match.
337 entry.role == perm):
341 entry.role == perm):
345 entry.role == perm):
347 elif (scope == 'Project' and entry.role == perm and
352 entry.role == perm)
    [all...]
  /external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/iam/
connection.py     [all...]
  /external/chromium-trace/catapult/third_party/gsutil/third_party/boto/bin/
launch_instance 136 parser.add_option("--role", help="IAM Role to use, this implies --no-add-cred", dest="role")
156 if not options.nocred and not options.role:
219 if options.role:
220 instance_profile_name = options.role
  /external/selinux/libselinux/src/
get_context_list.c 14 const char *role,
33 if (role2 && !strcmp(role, role2)) {
57 const char *role,
68 return get_default_context_with_role(user, role, fromcon,
90 rc = get_default_context_with_role(user, role, newfromcon, newcon);
176 /* Extract the role and type of the fromcon for matching.
  /frameworks/av/services/audiopolicy/common/managerdefinitions/src/
ConfigParsingUtils.cpp 151 audio_port_role_t role)
155 sp<IOProfile> profile = new IOProfile(String8(root->name), role);
171 if (role == AUDIO_PORT_ROLE_SINK) {
181 if (role == AUDIO_PORT_ROLE_SINK) {
210 role == AUDIO_PORT_ROLE_SINK ? "Input" : "Output");
213 role == AUDIO_PORT_ROLE_SINK ? "Input" : "Output",
  /system/bt/bta/ag/
bta_ag_sdp.c 81 if (p_scb->role == BTA_AG_ACP)
318 else if (service & BTA_HSP_SERVICE_MASK && p_scb->role == BTA_AG_INT)
348 if (p_scb->role == BTA_AG_INT)
414 if (service & BTA_HFP_SERVICE_MASK && p_scb->role == BTA_AG_INT)
424 else if (service & BTA_HFP_SERVICE_MASK && p_scb->role == BTA_AG_ACP)
433 else if (service & BTA_HSP_SERVICE_MASK && p_scb->role == BTA_AG_INT)
  /system/bt/stack/btm/
btm_acl.c 393 /* if the disconnected channel has a pending role switch, clear it now */
560 ** Description This function is called to get the role of the local device
577 /* Get the current role */
587 ** Description This function is called to switch role between master and
588 ** slave. If role is already set it will do nothing. If the
592 ** Returns BTM_SUCCESS if already in specified role.
596 ** BTM_MODE_UNSUPPORTED if local device does not support role switching
625 BTM_TRACE_DEBUG ("Role switch on other device is in progress 0x%02x%02x%02x%02x%02x%02x",
635 /* Finished if already in desired role */
647 /* Ignore role switch request if the previous request was not completed *
    [all...]
  /external/selinux/checkpolicy/
ChangeLog 52 * implement new default labeling behaviors for usr, role, range
80 * dispol output of role trans
90 * Add role attribute support by Harry Ciao
130 * Update checkpolicy for user and role mapping support from Joshua Brindle.
156 * Deprecate role dominance in parser.
238 * Moved processing of role and user require statements to 2nd pass.
244 * Fixed bug in role dominance (define_role_dom).
324 * Merged bugfix for dup role transition error messages from
334 * Merged bug fix for role dominance handling from Darrel Goeddel (TCS).
385 (other than in neverallow statements) and in role set
    [all...]
  /frameworks/base/core/java/android/bluetooth/
BluetoothHealth.java 37 * <p> How to connect to a health device which is acting in the source role.
63 * Health Profile Source Role - the health device.
68 * Health Profile Sink Role the device talking to the health device.
139 * @param dataType The dataType of the Source role of Health Profile to which
156 * SOURCE role.This is an asynchronous call and so
162 * @param dataType The dataType of the Source role of Health Profile.
170 public boolean registerAppConfiguration(String name, int dataType, int role,
173 if (!isEnabled() || !checkAppParam(name, role, channelType, callback)) return result;
178 new BluetoothHealthAppConfiguration(name, dataType, role, channelType);
555 private boolean checkAppParam(String name, int role, int channelType
    [all...]
  /system/bt/stack/include/
avrc_api.h 45 /* Control role - same as AVCT_TARGET/AVCT_CONTROL */
50 /* Connection role */
167 UINT8 conn; /* Connection role (Initiator/acceptor) */
168 UINT8 control; /* Control role (Control/Target) */
263 ** The connection can be a target, a controller or for both role,
279 ** p_ccb->conn: AVCTP connection role. This is set to
283 ** p_ccb->control: Control role. This is set to
377 ** function can only be called for controller role connections.
400 ** function can only be called for controller role connections.
428 ** function can only be called for controller role connections
    [all...]

Completed in 3780 milliseconds

<<11121314151617181920>>