HomeSort by relevance Sort by last modified time
    Searched full:role (Results 401 - 425 of 1713) sorted by null

<<11121314151617181920>>

  /external/jetty/src/java/org/eclipse/jetty/security/
SpnegoUserIdentity.java 52 public boolean isUserInRole(String role, Scope scope)
54 return _roles.contains(role);
ConstraintSecurityHandler.java 157 //Equivalent to <auth-constraint> with list of <security-role-name>s
289 * <li>All users do not need to have a role defined in the deployment descriptor
290 * <li>The * role in a constraint applies to ANY role rather than all roles defined in
408 for (String role : mapping.getConstraint().getRoles())
409 addRole(role);
421 public void addRole(String role)
423 boolean modified = _roles.add(role);
426 // Add the new role to currently defined any role role info
    [all...]
  /external/jsr330/
pom.xml 77 <role>developer</role>
tck-pom.xml 80 <role>developer</role>
  /external/selinux/checkpolicy/test/
dismod.c 416 char *user, *role, *type; local
421 role = p->p_role_val_to_name[cur->context[0].role - 1];
424 cur->u.name, cur->sid[0], user, role, type);
430 role = p->p_role_val_to_name[cur->context[0].role - 1];
433 cur->u.name, cur->sid[0], user, role, type);
464 fprintf(fp, "role transition ");
477 fprintf(fp, "role allow ");
499 role_datum_t *role; local
    [all...]
  /external/selinux/libsepol/include/sepol/policydb/
policydb.h 116 /* Options how a new object user and role should be decided */
132 /* Role attributes */
135 ebitmap_t dominates; /* set of roles dominated by this role */
136 type_set_t types; /* set of authorized types for role */
138 uint32_t bounds; /* bounds role, if exist */
139 #define ROLE_ROLE 0 /* regular role in kernel policies */
146 uint32_t role; /* current role */ member in struct:role_trans
149 uint32_t new_role; /* new role */
154 uint32_t role; /* current role * member in struct:role_allow
    [all...]
  /external/selinux/policycoreutils/semanage/
semanage.8 51 assigned to Linux users when they login and bounds their authorized role set)
58 user identities to authorized role sets. In most cases, only the
  /external/smali/smalidea/src/main/java/org/jf/smalidea/psi/impl/
SmaliImplementsList.java 78 @Override public Role getRole() {
79 return Role.IMPLEMENTS_LIST;
  /external/webrtc/webrtc/base/
sslstreamadapterhelper.cc 41 void SSLStreamAdapterHelper::SetServerRole(SSLRole role) {
42 role_ = role;
  /hardware/intel/common/omx-components/videocodec/
OMXComponentDefines.h 103 #define DECLARE_OMX_COMPONENT(NAME, ROLE, CLASS) \
105 static const char *gRole = (const char *)(ROLE);\
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/setools/diff/
roles.py 42 "Generating role differences from {0.left_policy} to {0.right_policy}".format(self))
68 self.log.debug("Resetting role differences")
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/setools/
rolequery.py 35 name The role name to match.
37 will be used on the role names.
  /prebuilts/tools/common/m2/repository/org/apache/maven/reporting/maven-reporting-api/3.0/
maven-reporting-api-3.0.pom 44 <role>Java Developer</role>
  /system/bt/bta/jv/
bta_jv_api.c 309 tBTA_JV_STATUS BTA_JvL2capConnectLE(tBTA_SEC sec_mask, tBTA_JV_ROLE role,
323 p_msg->role = role;
362 tBTA_JV_STATUS BTA_JvL2capConnect(int conn_type, tBTA_SEC sec_mask, tBTA_JV_ROLE role,
377 p_msg->role = role;
471 tBTA_JV_STATUS BTA_JvL2capStartServer(int conn_type, tBTA_SEC sec_mask, tBTA_JV_ROLE role,
485 p_msg->role = role;
522 tBTA_JV_STATUS BTA_JvL2capStartServerLE(tBTA_SEC sec_mask, tBTA_JV_ROLE role,
    [all...]
  /system/bt/stack/avct/
avct_api.c 123 ** the p_cc->role parameter. When this function is called to
139 AVCT_TRACE_API("AVCT_CreateConn: %d, control:%d", p_cc->role, p_cc->control);
152 if (p_cc->role == AVCT_INT)
227 ** the role parameter. When this function is called to
237 UINT16 AVCT_CreateBrowse (UINT8 handle, UINT8 role)
245 AVCT_TRACE_API("AVCT_CreateBrowse: %d", role);
262 if (role == AVCT_INT)
296 UNUSED(role);
  /system/bt/stack/pan/
pan_int.h 31 ** This role is used to shutdown the profile. Used internally
72 UINT8 role; member in struct:__anon74371
  /external/selinux/checkpolicy/
policy_define.c 413 yyerror2("conflicting default role information for class %s", id);
2586 role_datum_t *role; local
2837 role_datum_t *role; local
3008 role_datum_t *role; local
3664 role_datum_t *role; local
4283 role_datum_t *role; local
    [all...]
  /external/selinux/sepolgen/src/sepolgen/
refpolicy.py 42 ROLE = 4
46 field_to_str = ["source", "target", "object", "permission", "role", "destination" ]
48 "permission" : PERMS, "role" : ROLE, "destination" : DEST_TYPE }
127 return filter(lambda x: isinstance(x, Role), walktree(self))
270 self.role = ""
280 'user:role:type:level'.
289 self.role = fields[1]
304 self.role == other.role and
    [all...]
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/sepolgen/
refpolicy.py 42 ROLE = 4
46 field_to_str = ["source", "target", "object", "permission", "role", "destination" ]
48 "permission" : PERMS, "role" : ROLE, "destination" : DEST_TYPE }
127 return filter(lambda x: isinstance(x, Role), walktree(self))
270 self.role = ""
280 'user:role:type:level'.
289 self.role = fields[1]
304 self.role == other.role and
    [all...]
  /system/bt/bta/av/
bta_av_aact.c 323 /* if start failed, clear role */
324 p_scb->role &= ~BTA_AV_ROLE_START_INT;
352 (p_scb->use_rc == TRUE || (p_scb->role & BTA_AV_ROLE_AD_ACP)))
761 ** Description Switch role was not started and a timer was started.
762 ** another attempt to switch role now - still opening.
816 ** Description Handle the role changed event
828 APPL_TRACE_DEBUG("bta_av_role_res q_tag:%d, wait:x%x, role:x%x", p_scb->q_tag, p_scb->wait, p_scb->role);
829 if (p_scb->role & BTA_AV_ROLE_START_INT)
839 p_scb->role &= ~BTA_AV_ROLE_START_INT
1051 UINT8 role = BTA_AV_ROLE_AD_INT; local
    [all...]
  /external/autotest/server/site_tests/firmware_PDPowerSwap/
control 9 PURPOSE = "Servo based PD power role swap test"
  /external/autotest/server/site_tests/firmware_PDVbusRequest/
control 18 - PD Dual role mode is operational in the DUT
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/
ASN1Choice.java 4 * Marker interface for CHOICE objects - if you implement this in a role your
  /external/chromium-trace/catapult/firefighter/default/common/
query_filter.py 27 'role',
  /external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/integration/elastictranscoder/
test_layer1.py 43 self.role_name = 'boto-ets-role-%s' % self.timestamp
49 self.role = self.iam.create_role(self.role_name)
50 self.role_arn = self.role['create_role_response']['create_role_result']\
51 ['role']['arn']

Completed in 1052 milliseconds

<<11121314151617181920>>