/external/chromium-trace/catapult/third_party/gsutil/gslib/addlhelp/ |
acls.py | 60 2. The bucket ACL plays no role in determining who can read objects; only the 148 "role": "OWNER" 153 "role": "OWNER" 158 "role": "READER" 163 and a Role. Entities are the way you specify an individual or group of 184 "role": "OWNER", 189 "role": "READER",
|
/external/selinux/libsepol/tests/ |
test-deps.c | 36 * 5 role in module global. 42 * 10 role in module optional. 48 * 15 role in base optional. 201 do_deps_modreq_global(1, BASE_MODREQ_ROLE_GLOBAL, "modreq-role-global.conf", "mod_global_t"); 202 do_deps_modreq_global(0, BASE_MODREQ_ROLE_GLOBAL, "modreq-role-global.conf", "mod_global_t"); 284 do_deps_modreq_opt(1, 0, BASE_MODREQ_ROLE_OPT, "modreq-role-opt.conf", "mod_opt_t"); 285 do_deps_modreq_opt(0, 0, BASE_MODREQ_ROLE_OPT, "modreq-role-opt.conf", "mod_opt_t");
|
/external/chromium-trace/catapult/third_party/gsutil/gslib/ |
aclhelpers.py | 189 entry = entry_class(entityId=self.identifier, role=self.perm, 192 entry = entry_class(entityId=self.identifier, role=self.perm, 195 entry = entry_class(entityId=self.identifier, role=self.perm, 198 entry = entry_class(email=self.identifier, role=self.perm, 201 entry = entry_class(email=self.identifier, role=self.perm, 204 entry = entry_class(domain=self.identifier, role=self.perm, 208 role=self.perm) 210 entry = entry_class(entity=self.public_entity_all_users, role=self.perm) 255 if entry.role != self.perm: 256 entry.role = self.per [all...] |
/external/selinux/secilc/docs/ |
cil_user_statements.md | 43 Associates a previously declared [`user`](cil_user_statements.md#user) identifier with a previously declared [`role`](cil_role_statements.md#role) identifier. 67 <td align="left"><p>A previously declared <code>role</code> or <code>roleattribute</code> identifier.</p></td> 74 This example will associate `unconfined.user` to `unconfined.role`: 78 (role role) 79 (userrole user role) 271 (role role) 272 (userrole user role) [all...] |
cil_xen_statements.md | 37 <td align="left"><p>A previously declared <code>context</code> identifier or an anonymous security context (<code>user role type levelrange</code>), the range MUST be defined whether the policy is MLS/MCS enabled or not.</p></td> 77 <td align="left"><p>A previously declared <code>context</code> identifier or an anonymous security context (<code>user role type levelrange</code>), the range MUST be defined whether the policy is MLS/MCS enabled or not.</p></td> 115 <td align="left"><p>A previously declared <code>context</code> identifier or an anonymous security context (<code>user role type levelrange</code>), the range MUST be defined whether the policy is MLS/MCS enabled or not.</p></td> 153 <td align="left"><p>A previously declared <code>context</code> identifier or an anonymous security context (<code>user role type levelrange</code>), the range MUST be defined whether the policy is MLS/MCS enabled or not.</p></td> 191 <td align="left"><p>A previously declared <code>context</code> identifier or an anonymous security context (<code>user role type levelrange</code>), the range MUST be defined whether the policy is MLS/MCS enabled or not.</p></td>
|
/external/selinux/sepolgen/src/sepolgen/ |
access.py | 306 """A non-overlapping set of role type statements. 308 This clas allows the incremental addition of role type statements and 316 """Iterate over all of the unique role allows statements in the set.""" 321 """Return the unique number of role allow statements.""" 324 def add(self, role, type): 325 if role in self.role_types: 326 role_type = self.role_types[role] 329 role_type.role = role 330 self.role_types[role] = role_typ [all...] |
interfaces.py | 163 def role_extract_params(role, params): 164 if access.is_idparam(role.role): 165 return __param_insert(role.role, refpolicy.ROLE, None, params) 293 for role in interface.roles(): 294 if role_extract_params(role, self.params): 296 #print "found conflicting role param %s for interface %s" % \ 297 # (role.name, interface.name [all...] |
audit.py | 272 if self.scontext.role != self.tcontext.role and self.tcontext.role != "object_r": 273 self.data.append(("role (%s)" % self.scontext.role, 'role (%s)' % self.tcontext.role)) 300 context that is not valid. Security contexts are invalid if the role is 301 not authorized for the user or the type is not authorized for the role. 304 just the type and role [all...] |
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/sepolgen/ |
access.py | 306 """A non-overlapping set of role type statements. 308 This clas allows the incremental addition of role type statements and 316 """Iterate over all of the unique role allows statements in the set.""" 321 """Return the unique number of role allow statements.""" 324 def add(self, role, type): 325 if role in self.role_types: 326 role_type = self.role_types[role] 329 role_type.role = role 330 self.role_types[role] = role_typ [all...] |
interfaces.py | 163 def role_extract_params(role, params): 164 if access.is_idparam(role.role): 165 return __param_insert(role.role, refpolicy.ROLE, None, params) 293 for role in interface.roles(): 294 if role_extract_params(role, self.params): 296 #print "found conflicting role param %s for interface %s" % \ 297 # (role.name, interface.name [all...] |
audit.py | 272 if self.scontext.role != self.tcontext.role and self.tcontext.role != "object_r": 273 self.data.append(("role (%s)" % self.scontext.role, 'role (%s)' % self.tcontext.role)) 300 context that is not valid. Security contexts are invalid if the role is 301 not authorized for the user or the type is not authorized for the role. 304 just the type and role [all...] |
/hardware/intel/common/wrs_omxil_core/core/src/ |
wrs_omxcore.cpp | 308 OMX_IN OMX_STRING role, 323 having_role = cmodule->QueryHavingThisRole(role); 330 LOGV("%s(): component %s has %s role", __FUNCTION__, 331 cname, role); 374 LOGV("%s(): component %s has %s role", __FUNCTION__,
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/elastictranscoder/ |
layer1.py | 145 output_bucket=None, role=None, notifications=None, 173 AWS account that owns the role that is specified by `Role`. 185 :type role: string 186 :param role: The IAM Amazon Resource Name (ARN) for the role that you 349 if role is not None: 350 params['Role'] = role 615 def test_role(self, role=None, input_bucket=None, output_bucket=None [all...] |
/external/selinux/policycoreutils/sepolicy/sepolicy/ |
manpage.py | 120 for role in get_all_roles(): 121 if role[:-2] in domains or role == "system_r": 123 domains.append(role[:-2]) 212 for role in self.manpage_roles.values(): 213 if len(role): 214 for r in role: 483 self.role = self.domainname + "_r" 490 self.desc = "%s user role" % self.domainname 985 default role has a default type, \fB%(user)s_t\fP, associated with it [all...] |
/prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/x86_64-w64-mingw32/include/ |
mmdeviceapi.h | 148 ERole role, 192 ERole role, 216 #define IMMNotificationClient_OnDefaultDeviceChanged(This,flow,role,pwstrDeviceId) (This)->lpVtbl->OnDefaultDeviceChanged(This,flow,role,pwstrDeviceId) 239 static FORCEINLINE HRESULT IMMNotificationClient_OnDefaultDeviceChanged(IMMNotificationClient* This,EDataFlow flow,ERole role,LPCWSTR pwstrDeviceId) { 240 return This->lpVtbl->OnDefaultDeviceChanged(This,flow,role,pwstrDeviceId); 278 ERole role, 658 ERole role, 701 ERole role, 731 #define IMMDeviceEnumerator_GetDefaultAudioEndpoint(This,dataFlow,role,ppEndpoint) (This)->lpVtbl->GetDefaultAudioEndpoint(This,dataFlow,role,ppEndpoint [all...] |
/external/chromium-trace/catapult/third_party/gsutil/gslib/tests/ |
test_acl.py | 33 PUBLIC_READ_JSON_ACL_TEXT = '"entity":"allUsers","role":"READER"' 109 """Ensures that whitespace is allowed in role and entity elements.""" 113 acl_string = re.sub(r'"role"', r'"role" \n', acl_string) 327 perm: Role (permission) to match. 337 entry.role == perm): 341 entry.role == perm): 345 entry.role == perm): 347 elif (scope == 'Project' and entry.role == perm and 352 entry.role == perm) [all...] |
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/iam/ |
connection.py | [all...] |
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/bin/ |
launch_instance | 136 parser.add_option("--role", help="IAM Role to use, this implies --no-add-cred", dest="role") 156 if not options.nocred and not options.role: 219 if options.role: 220 instance_profile_name = options.role
|
/external/selinux/libselinux/src/ |
get_context_list.c | 14 const char *role, 33 if (role2 && !strcmp(role, role2)) { 57 const char *role, 68 return get_default_context_with_role(user, role, fromcon, 90 rc = get_default_context_with_role(user, role, newfromcon, newcon); 176 /* Extract the role and type of the fromcon for matching.
|
/frameworks/av/services/audiopolicy/common/managerdefinitions/src/ |
ConfigParsingUtils.cpp | 151 audio_port_role_t role) 155 sp<IOProfile> profile = new IOProfile(String8(root->name), role); 171 if (role == AUDIO_PORT_ROLE_SINK) { 181 if (role == AUDIO_PORT_ROLE_SINK) { 210 role == AUDIO_PORT_ROLE_SINK ? "Input" : "Output"); 213 role == AUDIO_PORT_ROLE_SINK ? "Input" : "Output",
|
/system/bt/bta/ag/ |
bta_ag_sdp.c | 81 if (p_scb->role == BTA_AG_ACP) 318 else if (service & BTA_HSP_SERVICE_MASK && p_scb->role == BTA_AG_INT) 348 if (p_scb->role == BTA_AG_INT) 414 if (service & BTA_HFP_SERVICE_MASK && p_scb->role == BTA_AG_INT) 424 else if (service & BTA_HFP_SERVICE_MASK && p_scb->role == BTA_AG_ACP) 433 else if (service & BTA_HSP_SERVICE_MASK && p_scb->role == BTA_AG_INT)
|
/system/bt/stack/btm/ |
btm_acl.c | 393 /* if the disconnected channel has a pending role switch, clear it now */ 560 ** Description This function is called to get the role of the local device 577 /* Get the current role */ 587 ** Description This function is called to switch role between master and 588 ** slave. If role is already set it will do nothing. If the 592 ** Returns BTM_SUCCESS if already in specified role. 596 ** BTM_MODE_UNSUPPORTED if local device does not support role switching 625 BTM_TRACE_DEBUG ("Role switch on other device is in progress 0x%02x%02x%02x%02x%02x%02x", 635 /* Finished if already in desired role */ 647 /* Ignore role switch request if the previous request was not completed * [all...] |
/external/selinux/checkpolicy/ |
ChangeLog | 52 * implement new default labeling behaviors for usr, role, range 80 * dispol output of role trans 90 * Add role attribute support by Harry Ciao 130 * Update checkpolicy for user and role mapping support from Joshua Brindle. 156 * Deprecate role dominance in parser. 238 * Moved processing of role and user require statements to 2nd pass. 244 * Fixed bug in role dominance (define_role_dom). 324 * Merged bugfix for dup role transition error messages from 334 * Merged bug fix for role dominance handling from Darrel Goeddel (TCS). 385 (other than in neverallow statements) and in role set [all...] |
/frameworks/base/core/java/android/bluetooth/ |
BluetoothHealth.java | 37 * <p> How to connect to a health device which is acting in the source role. 63 * Health Profile Source Role - the health device. 68 * Health Profile Sink Role the device talking to the health device. 139 * @param dataType The dataType of the Source role of Health Profile to which 156 * SOURCE role.This is an asynchronous call and so 162 * @param dataType The dataType of the Source role of Health Profile. 170 public boolean registerAppConfiguration(String name, int dataType, int role, 173 if (!isEnabled() || !checkAppParam(name, role, channelType, callback)) return result; 178 new BluetoothHealthAppConfiguration(name, dataType, role, channelType); 555 private boolean checkAppParam(String name, int role, int channelType [all...] |
/system/bt/stack/include/ |
avrc_api.h | 45 /* Control role - same as AVCT_TARGET/AVCT_CONTROL */ 50 /* Connection role */ 167 UINT8 conn; /* Connection role (Initiator/acceptor) */ 168 UINT8 control; /* Control role (Control/Target) */ 263 ** The connection can be a target, a controller or for both role, 279 ** p_ccb->conn: AVCTP connection role. This is set to 283 ** p_ccb->control: Control role. This is set to 377 ** function can only be called for controller role connections. 400 ** function can only be called for controller role connections. 428 ** function can only be called for controller role connections [all...] |