/external/jetty/src/java/org/eclipse/jetty/security/ |
SpnegoUserIdentity.java | 52 public boolean isUserInRole(String role, Scope scope) 54 return _roles.contains(role);
|
ConstraintSecurityHandler.java | 157 //Equivalent to <auth-constraint> with list of <security-role-name>s 289 * <li>All users do not need to have a role defined in the deployment descriptor 290 * <li>The * role in a constraint applies to ANY role rather than all roles defined in 408 for (String role : mapping.getConstraint().getRoles()) 409 addRole(role); 421 public void addRole(String role) 423 boolean modified = _roles.add(role); 426 // Add the new role to currently defined any role role info [all...] |
/external/jsr330/ |
pom.xml | 77 <role>developer</role>
|
tck-pom.xml | 80 <role>developer</role>
|
/external/selinux/checkpolicy/test/ |
dismod.c | 416 char *user, *role, *type; local 421 role = p->p_role_val_to_name[cur->context[0].role - 1]; 424 cur->u.name, cur->sid[0], user, role, type); 430 role = p->p_role_val_to_name[cur->context[0].role - 1]; 433 cur->u.name, cur->sid[0], user, role, type); 464 fprintf(fp, "role transition "); 477 fprintf(fp, "role allow "); 499 role_datum_t *role; local [all...] |
/external/selinux/libsepol/include/sepol/policydb/ |
policydb.h | 116 /* Options how a new object user and role should be decided */ 132 /* Role attributes */ 135 ebitmap_t dominates; /* set of roles dominated by this role */ 136 type_set_t types; /* set of authorized types for role */ 138 uint32_t bounds; /* bounds role, if exist */ 139 #define ROLE_ROLE 0 /* regular role in kernel policies */ 146 uint32_t role; /* current role */ member in struct:role_trans 149 uint32_t new_role; /* new role */ 154 uint32_t role; /* current role * member in struct:role_allow [all...] |
/external/selinux/policycoreutils/semanage/ |
semanage.8 | 51 assigned to Linux users when they login and bounds their authorized role set) 58 user identities to authorized role sets. In most cases, only the
|
/external/smali/smalidea/src/main/java/org/jf/smalidea/psi/impl/ |
SmaliImplementsList.java | 78 @Override public Role getRole() { 79 return Role.IMPLEMENTS_LIST;
|
/external/webrtc/webrtc/base/ |
sslstreamadapterhelper.cc | 41 void SSLStreamAdapterHelper::SetServerRole(SSLRole role) { 42 role_ = role;
|
/hardware/intel/common/omx-components/videocodec/ |
OMXComponentDefines.h | 103 #define DECLARE_OMX_COMPONENT(NAME, ROLE, CLASS) \ 105 static const char *gRole = (const char *)(ROLE);\
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/setools/diff/ |
roles.py | 42 "Generating role differences from {0.left_policy} to {0.right_policy}".format(self)) 68 self.log.debug("Resetting role differences")
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/setools/ |
rolequery.py | 35 name The role name to match. 37 will be used on the role names.
|
/prebuilts/tools/common/m2/repository/org/apache/maven/reporting/maven-reporting-api/3.0/ |
maven-reporting-api-3.0.pom | 44 <role>Java Developer</role>
|
/system/bt/bta/jv/ |
bta_jv_api.c | 309 tBTA_JV_STATUS BTA_JvL2capConnectLE(tBTA_SEC sec_mask, tBTA_JV_ROLE role, 323 p_msg->role = role; 362 tBTA_JV_STATUS BTA_JvL2capConnect(int conn_type, tBTA_SEC sec_mask, tBTA_JV_ROLE role, 377 p_msg->role = role; 471 tBTA_JV_STATUS BTA_JvL2capStartServer(int conn_type, tBTA_SEC sec_mask, tBTA_JV_ROLE role, 485 p_msg->role = role; 522 tBTA_JV_STATUS BTA_JvL2capStartServerLE(tBTA_SEC sec_mask, tBTA_JV_ROLE role, [all...] |
/system/bt/stack/avct/ |
avct_api.c | 123 ** the p_cc->role parameter. When this function is called to 139 AVCT_TRACE_API("AVCT_CreateConn: %d, control:%d", p_cc->role, p_cc->control); 152 if (p_cc->role == AVCT_INT) 227 ** the role parameter. When this function is called to 237 UINT16 AVCT_CreateBrowse (UINT8 handle, UINT8 role) 245 AVCT_TRACE_API("AVCT_CreateBrowse: %d", role); 262 if (role == AVCT_INT) 296 UNUSED(role);
|
/system/bt/stack/pan/ |
pan_int.h | 31 ** This role is used to shutdown the profile. Used internally 72 UINT8 role; member in struct:__anon74371
|
/external/selinux/checkpolicy/ |
policy_define.c | 413 yyerror2("conflicting default role information for class %s", id); 2586 role_datum_t *role; local 2837 role_datum_t *role; local 3008 role_datum_t *role; local 3664 role_datum_t *role; local 4283 role_datum_t *role; local [all...] |
/external/selinux/sepolgen/src/sepolgen/ |
refpolicy.py | 42 ROLE = 4 46 field_to_str = ["source", "target", "object", "permission", "role", "destination" ] 48 "permission" : PERMS, "role" : ROLE, "destination" : DEST_TYPE } 127 return filter(lambda x: isinstance(x, Role), walktree(self)) 270 self.role = "" 280 'user:role:type:level'. 289 self.role = fields[1] 304 self.role == other.role and [all...] |
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/sepolgen/ |
refpolicy.py | 42 ROLE = 4 46 field_to_str = ["source", "target", "object", "permission", "role", "destination" ] 48 "permission" : PERMS, "role" : ROLE, "destination" : DEST_TYPE } 127 return filter(lambda x: isinstance(x, Role), walktree(self)) 270 self.role = "" 280 'user:role:type:level'. 289 self.role = fields[1] 304 self.role == other.role and [all...] |
/system/bt/bta/av/ |
bta_av_aact.c | 323 /* if start failed, clear role */ 324 p_scb->role &= ~BTA_AV_ROLE_START_INT; 352 (p_scb->use_rc == TRUE || (p_scb->role & BTA_AV_ROLE_AD_ACP))) 761 ** Description Switch role was not started and a timer was started. 762 ** another attempt to switch role now - still opening. 816 ** Description Handle the role changed event 828 APPL_TRACE_DEBUG("bta_av_role_res q_tag:%d, wait:x%x, role:x%x", p_scb->q_tag, p_scb->wait, p_scb->role); 829 if (p_scb->role & BTA_AV_ROLE_START_INT) 839 p_scb->role &= ~BTA_AV_ROLE_START_INT 1051 UINT8 role = BTA_AV_ROLE_AD_INT; local [all...] |
/external/autotest/server/site_tests/firmware_PDPowerSwap/ |
control | 9 PURPOSE = "Servo based PD power role swap test"
|
/external/autotest/server/site_tests/firmware_PDVbusRequest/ |
control | 18 - PD Dual role mode is operational in the DUT
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/ |
ASN1Choice.java | 4 * Marker interface for CHOICE objects - if you implement this in a role your
|
/external/chromium-trace/catapult/firefighter/default/common/ |
query_filter.py | 27 'role',
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/integration/elastictranscoder/ |
test_layer1.py | 43 self.role_name = 'boto-ets-role-%s' % self.timestamp 49 self.role = self.iam.create_role(self.role_name) 50 self.role_arn = self.role['create_role_response']['create_role_result']\ 51 ['role']['arn']
|