HomeSort by relevance Sort by last modified time
    Searched full:role (Results 451 - 475 of 1713) sorted by null

<<11121314151617181920>>

  /prebuilts/tools/common/offline-m2/com/google/guava/guava-parent/17.0/
guava-parent-17.0.pom 52 <role>owner</role>
53 <role>developer</role>
  /prebuilts/tools/common/offline-m2/com/google/guava/guava-parent/18.0/
guava-parent-18.0.pom 52 <role>owner</role>
53 <role>developer</role>
  /prebuilts/tools/common/offline-m2/com/google/jimfs/jimfs-parent/1.1/
jimfs-parent-1.1.pom 68 <role>owner</role>
69 <role>developer</role>
  /system/bt/stack/avrc/
avrc_opt.c 81 ** function can only be called for controller role connections.
120 ** function can only be called for controller role connections.
164 ** function can only be called for controller role connections.
197 ** function can only be called for target role connections.
  /external/chromium-trace/catapult/third_party/gsutil/gslib/addlhelp/
acls.py 60 2. The bucket ACL plays no role in determining who can read objects; only the
148 "role": "OWNER"
153 "role": "OWNER"
158 "role": "READER"
163 and a Role. Entities are the way you specify an individual or group of
184 "role": "OWNER",
189 "role": "READER",
  /external/selinux/libsepol/tests/
test-deps.c 36 * 5 role in module global.
42 * 10 role in module optional.
48 * 15 role in base optional.
201 do_deps_modreq_global(1, BASE_MODREQ_ROLE_GLOBAL, "modreq-role-global.conf", "mod_global_t");
202 do_deps_modreq_global(0, BASE_MODREQ_ROLE_GLOBAL, "modreq-role-global.conf", "mod_global_t");
284 do_deps_modreq_opt(1, 0, BASE_MODREQ_ROLE_OPT, "modreq-role-opt.conf", "mod_opt_t");
285 do_deps_modreq_opt(0, 0, BASE_MODREQ_ROLE_OPT, "modreq-role-opt.conf", "mod_opt_t");
  /external/chromium-trace/catapult/third_party/gsutil/gslib/
aclhelpers.py 189 entry = entry_class(entityId=self.identifier, role=self.perm,
192 entry = entry_class(entityId=self.identifier, role=self.perm,
195 entry = entry_class(entityId=self.identifier, role=self.perm,
198 entry = entry_class(email=self.identifier, role=self.perm,
201 entry = entry_class(email=self.identifier, role=self.perm,
204 entry = entry_class(domain=self.identifier, role=self.perm,
208 role=self.perm)
210 entry = entry_class(entity=self.public_entity_all_users, role=self.perm)
255 if entry.role != self.perm:
256 entry.role = self.per
    [all...]
  /external/selinux/secilc/docs/
cil_user_statements.md 43 Associates a previously declared [`user`](cil_user_statements.md#user) identifier with a previously declared [`role`](cil_role_statements.md#role) identifier.
67 <td align="left"><p>A previously declared <code>role</code> or <code>roleattribute</code> identifier.</p></td>
74 This example will associate `unconfined.user` to `unconfined.role`:
78 (role role)
79 (userrole user role)
271 (role role)
272 (userrole user role)
    [all...]
cil_xen_statements.md 37 <td align="left"><p>A previously declared <code>context</code> identifier or an anonymous security context (<code>user role type levelrange</code>), the range MUST be defined whether the policy is MLS/MCS enabled or not.</p></td>
77 <td align="left"><p>A previously declared <code>context</code> identifier or an anonymous security context (<code>user role type levelrange</code>), the range MUST be defined whether the policy is MLS/MCS enabled or not.</p></td>
115 <td align="left"><p>A previously declared <code>context</code> identifier or an anonymous security context (<code>user role type levelrange</code>), the range MUST be defined whether the policy is MLS/MCS enabled or not.</p></td>
153 <td align="left"><p>A previously declared <code>context</code> identifier or an anonymous security context (<code>user role type levelrange</code>), the range MUST be defined whether the policy is MLS/MCS enabled or not.</p></td>
191 <td align="left"><p>A previously declared <code>context</code> identifier or an anonymous security context (<code>user role type levelrange</code>), the range MUST be defined whether the policy is MLS/MCS enabled or not.</p></td>
  /external/selinux/sepolgen/src/sepolgen/
access.py 306 """A non-overlapping set of role type statements.
308 This clas allows the incremental addition of role type statements and
316 """Iterate over all of the unique role allows statements in the set."""
321 """Return the unique number of role allow statements."""
324 def add(self, role, type):
325 if role in self.role_types:
326 role_type = self.role_types[role]
329 role_type.role = role
330 self.role_types[role] = role_typ
    [all...]
interfaces.py 163 def role_extract_params(role, params):
164 if access.is_idparam(role.role):
165 return __param_insert(role.role, refpolicy.ROLE, None, params)
293 for role in interface.roles():
294 if role_extract_params(role, self.params):
296 #print "found conflicting role param %s for interface %s" % \
297 # (role.name, interface.name
    [all...]
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/sepolgen/
access.py 306 """A non-overlapping set of role type statements.
308 This clas allows the incremental addition of role type statements and
316 """Iterate over all of the unique role allows statements in the set."""
321 """Return the unique number of role allow statements."""
324 def add(self, role, type):
325 if role in self.role_types:
326 role_type = self.role_types[role]
329 role_type.role = role
330 self.role_types[role] = role_typ
    [all...]
interfaces.py 163 def role_extract_params(role, params):
164 if access.is_idparam(role.role):
165 return __param_insert(role.role, refpolicy.ROLE, None, params)
293 for role in interface.roles():
294 if role_extract_params(role, self.params):
296 #print "found conflicting role param %s for interface %s" % \
297 # (role.name, interface.name
    [all...]
  /hardware/intel/common/wrs_omxil_core/core/src/
wrs_omxcore.cpp 308 OMX_IN OMX_STRING role,
323 having_role = cmodule->QueryHavingThisRole(role);
330 LOGV("%s(): component %s has %s role", __FUNCTION__,
331 cname, role);
374 LOGV("%s(): component %s has %s role", __FUNCTION__,
  /external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/elastictranscoder/
layer1.py 145 output_bucket=None, role=None, notifications=None,
173 AWS account that owns the role that is specified by `Role`.
185 :type role: string
186 :param role: The IAM Amazon Resource Name (ARN) for the role that you
349 if role is not None:
350 params['Role'] = role
615 def test_role(self, role=None, input_bucket=None, output_bucket=None
    [all...]
  /external/selinux/policycoreutils/sepolicy/sepolicy/
manpage.py 120 for role in get_all_roles():
121 if role[:-2] in domains or role == "system_r":
123 domains.append(role[:-2])
212 for role in self.manpage_roles.values():
213 if len(role):
214 for r in role:
483 self.role = self.domainname + "_r"
490 self.desc = "%s user role" % self.domainname
985 default role has a default type, \fB%(user)s_t\fP, associated with it
    [all...]
  /prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/x86_64-w64-mingw32/include/
mmdeviceapi.h 148 ERole role,
192 ERole role,
216 #define IMMNotificationClient_OnDefaultDeviceChanged(This,flow,role,pwstrDeviceId) (This)->lpVtbl->OnDefaultDeviceChanged(This,flow,role,pwstrDeviceId)
239 static FORCEINLINE HRESULT IMMNotificationClient_OnDefaultDeviceChanged(IMMNotificationClient* This,EDataFlow flow,ERole role,LPCWSTR pwstrDeviceId) {
240 return This->lpVtbl->OnDefaultDeviceChanged(This,flow,role,pwstrDeviceId);
278 ERole role,
658 ERole role,
701 ERole role,
731 #define IMMDeviceEnumerator_GetDefaultAudioEndpoint(This,dataFlow,role,ppEndpoint) (This)->lpVtbl->GetDefaultAudioEndpoint(This,dataFlow,role,ppEndpoint
    [all...]
  /external/chromium-trace/catapult/third_party/gsutil/gslib/tests/
test_acl.py 33 PUBLIC_READ_JSON_ACL_TEXT = '"entity":"allUsers","role":"READER"'
109 """Ensures that whitespace is allowed in role and entity elements."""
113 acl_string = re.sub(r'"role"', r'"role" \n', acl_string)
327 perm: Role (permission) to match.
337 entry.role == perm):
341 entry.role == perm):
345 entry.role == perm):
347 elif (scope == 'Project' and entry.role == perm and
352 entry.role == perm)
    [all...]
  /external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/iam/
connection.py     [all...]
  /external/chromium-trace/catapult/third_party/gsutil/third_party/boto/bin/
launch_instance 136 parser.add_option("--role", help="IAM Role to use, this implies --no-add-cred", dest="role")
156 if not options.nocred and not options.role:
219 if options.role:
220 instance_profile_name = options.role
  /external/selinux/libselinux/src/
get_context_list.c 14 const char *role,
33 if (role2 && !strcmp(role, role2)) {
57 const char *role,
68 return get_default_context_with_role(user, role, fromcon,
90 rc = get_default_context_with_role(user, role, newfromcon, newcon);
176 /* Extract the role and type of the fromcon for matching.
  /frameworks/av/services/audiopolicy/common/managerdefinitions/src/
ConfigParsingUtils.cpp 151 audio_port_role_t role)
155 sp<IOProfile> profile = new IOProfile(String8(root->name), role);
171 if (role == AUDIO_PORT_ROLE_SINK) {
181 if (role == AUDIO_PORT_ROLE_SINK) {
210 role == AUDIO_PORT_ROLE_SINK ? "Input" : "Output");
213 role == AUDIO_PORT_ROLE_SINK ? "Input" : "Output",
  /system/bt/bta/ag/
bta_ag_sdp.c 81 if (p_scb->role == BTA_AG_ACP)
318 else if (service & BTA_HSP_SERVICE_MASK && p_scb->role == BTA_AG_INT)
348 if (p_scb->role == BTA_AG_INT)
414 if (service & BTA_HFP_SERVICE_MASK && p_scb->role == BTA_AG_INT)
424 else if (service & BTA_HFP_SERVICE_MASK && p_scb->role == BTA_AG_ACP)
433 else if (service & BTA_HSP_SERVICE_MASK && p_scb->role == BTA_AG_INT)
  /system/bt/stack/btm/
btm_acl.c 393 /* if the disconnected channel has a pending role switch, clear it now */
560 ** Description This function is called to get the role of the local device
577 /* Get the current role */
587 ** Description This function is called to switch role between master and
588 ** slave. If role is already set it will do nothing. If the
592 ** Returns BTM_SUCCESS if already in specified role.
596 ** BTM_MODE_UNSUPPORTED if local device does not support role switching
625 BTM_TRACE_DEBUG ("Role switch on other device is in progress 0x%02x%02x%02x%02x%02x%02x",
635 /* Finished if already in desired role */
647 /* Ignore role switch request if the previous request was not completed *
    [all...]
  /system/bt/stack/smp/
smp_act.c 110 SMP_TRACE_DEBUG("%s before update role=%d recv=%d local_i_key = %02x, local_r_key = %02x",
111 __func__, p_cb->role, recv, p_cb->local_i_key, p_cb->local_r_key);
123 if (p_cb->role == HCI_ROLE_SLAVE)
575 if (p_dev_rec && (p_cb->role == HCI_ROLE_SLAVE))
598 if (p_cb->role == HCI_ROLE_SLAVE)
850 if (!p_dev_rec->new_encryption_key_is_p256 && p_cb->role == HCI_ROLE_SLAVE)
858 if (p_dev_rec && (p_cb->role == HCI_ROLE_SLAVE))
    [all...]

Completed in 339 milliseconds

<<11121314151617181920>>