HomeSort by relevance Sort by last modified time
    Searched defs:role (Results 1 - 25 of 248) sorted by null

1 2 3 4 5 6 7 8 910

  /external/webrtc/webrtc/p2p/base/
transportdescriptionfactory.cc 42 // If we are the initiator set role to "actpass".
78 // Setting DTLS role to active.
79 ConnectionRole role = (options.prefer_passive_role) ? local
82 if (!SetSecurityInfo(desc.get(), role)) {
97 TransportDescription* desc, ConnectionRole role) const {
121 // Assign security role.
122 desc->connection_role = role;
  /external/selinux/libsepol/tests/
test-linker-roles.c 33 * - role in appropriate symtab (global and decl)
38 * - role in base, no modules
39 * - role in base optional, no modules
40 * - role a in base, b in module
41 * - role a in base and module (additive)
42 * - role a in base and 2 module
43 * - role a in base optional, b in module
44 * - role a in base, b in module optional
45 * - role a in base optional, b in module optional
46 * - role a in base optional and modul
73 role_datum_t *role; local
102 role_datum_t *role; local
    [all...]
test-common.c 189 role_datum_t *role; local
192 role = hashtab_search(decl->p_roles.table, id);
194 role = hashtab_search(p->p_roles.table, id);
196 if (!role)
197 printf("role %s can't be found! \n", id);
199 CU_ASSERT_FATAL(role != NULL);
201 ebitmap_for_each_bit(&role->types.types, tnode, i) {
218 printf("\nrole %s has %d types, %d expected\n", p->sym_val_to_name[SYM_ROLES][role->s.value - 1], found, len);
220 CU_ASSERT(role->types.negset.highbit == 0);
221 CU_ASSERT(role->types.flags == flags)
    [all...]
  /external/libxml2/
xlink.c 124 xmlChar *type = NULL, *role = NULL; local
154 role = xmlGetNsProp(node, BAD_CAST "role", XLINK_NAMESPACE);
155 if (role != NULL) {
160 if (xmlStrEqual(role, BAD_CAST"xlink:external-linkset"))
167 if (xmlStrEqual(role, buf))
178 if (role != NULL) xmlFree(role);
  /external/selinux/libselinux/utils/
getdefaultcon.c 23 char *user = NULL, *level = NULL, *role=NULL, *seuser=NULL, *dlevel=NULL; local
34 role = strdup(optarg);
70 if (role != NULL && role[0])
71 ret=get_default_context_with_rolelevel(seuser, role, level,cur_context,&usercon);
79 printf("%s: %s from %s %s %s %s -> %s\n", argv[0], user, cur_context, seuser, role, level, usercon);
85 free(role);
  /external/selinux/libsepol/include/sepol/policydb/
context.h 29 * identity, a role, a type and a MLS range.
33 uint32_t role; member in struct:context_struct
77 dst->role = src->role;
87 c->user = c->role = c->type = 0;
94 (c1->role == c2->role) &&
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/pulse/
ext-device-manager.h 37 const char *role; member in struct:pa_ext_device_manager_role_priority_info
48 uint32_t n_role_priorities; /**< How many role priorities do we have? */
49 pa_ext_device_manager_role_priority_info *role_priorities; /**< An array of role priority structures or NULL */
92 /** Enable the role-based device-priority routing mode. \since 0.9.21 */
102 const char* role,
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/pulse/
ext-device-manager.h 38 const char *role; member in struct:pa_ext_device_manager_role_priority_info
49 uint32_t n_role_priorities; /**< How many role priorities do we have? */
50 pa_ext_device_manager_role_priority_info *role_priorities; /**< An array of role priority structures or NULL */
93 /** Enable the role-based device-priority routing mode. \since 0.9.21 */
103 const char* role,
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/setools/
contextquery.py 39 role The role to match in the context.
41 will be used on the role.
59 role = CriteriaDescriptor("role_regex", "lookup_role") variable in class:ContextQuery
77 if self.role and not query.PolicyQuery._match_regex(
78 context.role,
79 self.role,
constraintquery.py 47 role The name of the role to match in the
52 be used on the role.
68 role = CriteriaDescriptor("role_regex", "lookup_role") variable in class:ConstraintQuery
104 self.log.debug("Role: {0.role!r}, regex: {0.role_regex}".format(self))
121 if self.role and not self._match_expr(
123 self.role,
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/setools/policyrep/
context.py 23 from . import role namespace
43 return "{0.user}:{0.role}:{0.type_}:{0.range_}".format(self)
45 return "{0.user}:{0.role}:{0.type_}".format(self)
53 def role(self): member in class:Context
54 """The role portion of the context."""
55 return role.role_factory(self.policy, self.qpol_symbol.role(self.policy))
user.py 21 from . import role namespace
52 item = role.role_factory(self.policy, role_)
57 # will confuse, especially for role set equality user queries.
rbacrule.py 24 from . import role namespace
73 """A role allow rule."""
85 """The rule's source role."""
86 return role.role_factory(self.policy, self.qpol_symbol.source_role(self.policy))
90 """The rule's target role."""
91 return role.role_factory(self.policy, self.qpol_symbol.target_role(self.policy))
96 raise exception.RuleUseError("Role allow rules do not have an object class.")
100 """The rule's default role."""
101 raise exception.RuleUseError("Role allow rules do not have a default role."
    [all...]
  /external/selinux/libselinux/src/
query_user_context.c 109 char role[100]; /* The role requested by the user */ local
124 new_context = context_new("user:role:type:level");
126 new_context = context_new("user:role:type");
144 get_field("role", role, rolelen);
145 if (context_role_set(new_context, role)) {
  /external/selinux/libsepol/src/
context.c 37 role_datum_t *role; local
44 if (!c->role || c->role > p->p_roles.nprim)
53 if (c->role != OBJECT_R_VAL) {
55 * Role must be authorized for the type.
57 role = p->role_val_to_struct[c->role - 1];
58 if (!ebitmap_get_bit(&role->cache, c->type - 1))
59 /* role may not be associated with type */
63 * User must be authorized for the role
156 char *role = strdup(sepol_context_get_role(record)); local
    [all...]
context_record.c 14 /* Selinux role */
15 char *role; member in struct:sepol_context
51 /* Role */
55 return con->role;
61 sepol_context_t * con, const char *role)
64 char *tmp_role = strdup(role);
67 "context role to %s", role);
70 free(con->role);
71 con->role = tmp_role
    [all...]
users.c 37 char *role = policydb->p_role_val_to_name[bit]; local
38 if (sepol_user_add_role(handle, tmp_record, role) < 0)
157 /* For every role */
160 /* Search for the role */
164 ERR(handle, "undefined role %s for user %s",
169 /* Set the role and every role it dominates */
264 ERR(handle, "unable to expand role set");
  /external/snakeyaml/src/test/java/examples/collections/
TypeSafePriorityTest.java 91 private String role; field in class:TypeSafePriorityTest.Developer
96 public Developer(String name, String role) {
98 this.role = role;
110 return role;
113 public void setRole(String role) {
114 this.role = role;
  /prebuilts/eclipse/maven/apache-maven-3.2.1/lib/
plexus-component-annotations-1.5.5.jar 
  /prebuilts/eclipse/mavenplugins/tycho/tycho-dependencies-m2repo/org/codehaus/plexus/plexus-component-annotations/1.5.5/
plexus-component-annotations-1.5.5.jar 
  /prebuilts/tools/common/m2/repository/org/codehaus/plexus/plexus-component-annotations/1.5.5/
plexus-component-annotations-1.5.5.jar 
  /prebuilts/tools/common/m2/repository/org/codehaus/plexus/plexus-component-annotations/1.6/
plexus-component-annotations-1.6.jar 
  /external/autotest/frontend/server/
models.py 49 roles = ','.join([r.role for r in self.roles.all()])
62 """Get a list of role names of the server.
64 @return: A list of role names of the server.
66 return [r.role for r in self.roles.all()]
96 """Role associated with hosts."""
101 ROLE = enum.Enum(*ROLE_LIST, string_values=True)
104 ROLES_REQUIRE_BACKUP = [ROLE.SCHEDULER, ROLE.HOST_SCHEDULER,
105 ROLE.DATABASE, ROLE.SUITE_SCHEDULER
115 role = dbmodels.CharField(max_length=128, choices=ROLE.choices()) variable in class:ServerRole
    [all...]
  /external/jetty/src/java/org/eclipse/jetty/security/
SpnegoLoginService.java 140 String role = clientName.substring(clientName.indexOf('@') + 1); local
145 LOG.debug("Client Default Role: " + role);
152 return _identityService.newUserIdentity(subject,user, new String[]{role});
  /external/libweave/src/privet/
cloud_delegate.cc 171 UserRole role; variable
173 if (!StringToEnum(str_scope, &role)) {
175 "Invalid role: '%s'", str_scope.c_str());
181 command, Command::Origin::kLocal, role, &id, &error);

Completed in 604 milliseconds

1 2 3 4 5 6 7 8 910