/external/libsepol/tests/policies/test-expander/ |
H A D | user-base.conf | 50 sid kernel 459 sid kernel gen_context(system_u:system_r:system_t, s0)
|
/external/libsepol/tests/policies/test-hooks/ |
H A D | cmp_policy.conf | 50 sid kernel 443 sid kernel gen_context(g_b_user_1:g_b_role_1:g_b_type_1, s0)
|
H A D | small-base.conf | 50 sid kernel 443 sid kernel gen_context(g_b_user_1:g_b_role_1:g_b_type_1, s0)
|
/external/mesa3d/src/gallium/drivers/svga/ |
H A D | svga_winsys.h | 93 uint32 *sid, 161 * and returns the surface ID (sid). Surfaces are generic
|
/external/chromium_org/third_party/freetype/src/cff/ |
H A D | cffload.c | 623 FT_UInt sid ) 626 if ( sid == 0xFFFFU ) 630 if ( sid > 390 ) 631 return cff_index_get_string( font, sid - 391 ); 638 return (FT_String *)font->psnames->adobe_std_strings( sid ); 914 /* Read the first glyph sid of the range. */ 1075 /* Zero out the code to gid/sid mappings. */ 1262 FT_UInt sid = encoding->sids[j]; local 1266 if ( sid ) 1267 gid = cff_charset_cid_to_gindex( charset, sid ); [all...] |
/external/chromium_org/third_party/mesa/src/src/gallium/winsys/svga/drm/ |
H A D | vmw_screen_svga.c | 172 surface->sid = vmw_ioctl_surface_create(vws, 175 if(surface->sid == SVGA3D_INVALID_ID)
|
/external/elfutils/0.153/backends/ |
H A D | linux-core-note.c | 128 FIELD (identity, PID_T, sid, 'd'), 163 FIELD (identity, PID_T, sid, 'd'),
|
/external/freetype/src/cff/ |
H A D | cffload.c | 623 FT_UInt sid ) 626 if ( sid == 0xFFFFU ) 630 if ( sid > 390 ) 631 return cff_index_get_string( font, sid - 391 ); 638 return (FT_String *)font->psnames->adobe_std_strings( sid ); 921 /* Read the first glyph sid of the range. */ 1082 /* Zero out the code to gid/sid mappings. */ 1269 FT_UInt sid = encoding->sids[j]; local 1273 if ( sid ) 1274 gid = cff_charset_cid_to_gindex( charset, sid ); [all...] |
/external/kernel-headers/original/uapi/drm/ |
H A D | vmwgfx_drm.h | 179 * @sid: Surface id of created surface or surface to destroy or reference. 187 int32_t sid; member in struct:drm_vmw_surface_arg 227 * Puts a reference on a host surface with a give sid, as previously 732 * @sid: Surface id to present from. 745 uint32_t sid; member in struct:drm_vmw_present_arg
|
/external/kernel-headers/original/uapi/rdma/ |
H A D | ib_user_cm.h | 136 __be64 sid; member in struct:ib_ucm_req 200 __be64 sid; member in struct:ib_ucm_sidr_req
|
/external/mesa3d/src/gallium/winsys/svga/drm/ |
H A D | vmw_screen_svga.c | 172 surface->sid = vmw_ioctl_surface_create(vws, 175 if(surface->sid == SVGA3D_INVALID_ID)
|
/external/pdfium/core/src/fxge/fx_freetype/fxft2.5.01/src/cff/ |
H A D | cffload.c | 623 FT_UInt sid ) 626 if ( sid == 0xFFFFU ) 630 if ( sid > 390 ) 631 return cff_index_get_string( font, sid - 391 ); 638 return (FT_String *)font->psnames->adobe_std_strings( sid ); 914 /* Read the first glyph sid of the range. */ 1075 /* Zero out the code to gid/sid mappings. */ 1262 FT_UInt sid = encoding->sids[j]; local 1266 if ( sid ) 1267 gid = cff_charset_cid_to_gindex( charset, sid ); [all...] |
/external/ppp/pppd/plugins/rp-pppoe/ |
H A D | plugin.c | 162 sp.sa_addr.pppoe.sid = conn->session; 238 sp.sa_addr.pppoe.sid = 0;
|
/external/chromium_org/sandbox/win/src/ |
H A D | restricted_token_unittest.cc | 12 #include "sandbox/win/src/sid.h" 161 ATL::CSid sid; local 163 dacl.GetAclEntry(i, &sid, &mask); 164 if (sid == ATL::Sids::RestrictedCode() && mask == GENERIC_ALL) { 406 // Checks if a sid is in the restricting list of the restricted token. 410 ATL::CSid sid, int count) { 432 if (sids[i] == sid) { 567 // Verify that all group sids are in the restricting sid list. 574 // Verify that the user is in the restricting sid list. 409 CheckRestrictingSid(const ATL::CAccessToken &restricted_token, ATL::CSid sid, int count) argument
|
H A D | sandbox_policy_base.cc | 309 ResultCode PolicyBase::SetAppContainer(const wchar_t* sid) { argument 322 ResultCode rv = appcontainer_list_->SetAppContainer(sid, capabilities_); 329 ResultCode PolicyBase::SetCapability(const wchar_t* sid) { argument 330 capabilities_.push_back(sid);
|
/external/chromium_org/third_party/mesa/src/src/gallium/drivers/svga/svgadump/ |
H A D | svga_dump.c | 351 _debug_printf("\t\t.target.sid = %u\n", (*cmd).target.sid); 365 _debug_printf("\t\t.src.sid = %u\n", (*cmd).src.sid); 368 _debug_printf("\t\t.dest.sid = %u\n", (*cmd).dest.sid); 559 _debug_printf("\t\t.sid = %u\n", (*cmd).sid); 1071 _debug_printf("\t\t.sid = %u\n", (*cmd).sid); [all...] |
/external/mesa3d/src/gallium/drivers/svga/svgadump/ |
H A D | svga_dump.c | 351 _debug_printf("\t\t.target.sid = %u\n", (*cmd).target.sid); 365 _debug_printf("\t\t.src.sid = %u\n", (*cmd).src.sid); 368 _debug_printf("\t\t.dest.sid = %u\n", (*cmd).dest.sid); 559 _debug_printf("\t\t.sid = %u\n", (*cmd).sid); 1071 _debug_printf("\t\t.sid = %u\n", (*cmd).sid); [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_gpsk_common.c | 412 * @sid: Buffer for 17-byte Session ID 421 u8 method_type, u8 *sid, size_t *sid_len) 465 sid[0] = method_type; 466 os_memcpy(sid + 1, kdf_out, sizeof(kdf_out)); 416 eap_gpsk_derive_session_id(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 method_type, u8 *sid, size_t *sid_len) argument
|
/external/wpa_supplicant_8/hostapd/src/wps/ |
H A D | wps_er.c | 226 char sid[100]; local 250 uuid_bin2str(ap->sid, sid, sizeof(sid)); 256 path, inet_ntoa(dst.sin_addr), ntohs(dst.sin_port), sid); 367 static int wps_er_get_sid(struct wps_er_ap *ap, char *sid) argument 372 if (!sid) { 378 pos = os_strstr(sid, "uuid:"); 382 sid); 387 if (uuid_str2bin(pos, ap->sid) < [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_gpsk_common.c | 412 * @sid: Buffer for 17-byte Session ID 421 u8 method_type, u8 *sid, size_t *sid_len) 465 sid[0] = method_type; 466 os_memcpy(sid + 1, kdf_out, sizeof(kdf_out)); 416 eap_gpsk_derive_session_id(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 method_type, u8 *sid, size_t *sid_len) argument
|
/external/wpa_supplicant_8/src/wps/ |
H A D | wps_er.c | 226 char sid[100]; local 250 uuid_bin2str(ap->sid, sid, sizeof(sid)); 256 path, inet_ntoa(dst.sin_addr), ntohs(dst.sin_port), sid); 367 static int wps_er_get_sid(struct wps_er_ap *ap, char *sid) argument 372 if (!sid) { 378 pos = os_strstr(sid, "uuid:"); 382 sid); 387 if (uuid_str2bin(pos, ap->sid) < [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_gpsk_common.c | 412 * @sid: Buffer for 17-byte Session ID 421 u8 method_type, u8 *sid, size_t *sid_len) 465 sid[0] = method_type; 466 os_memcpy(sid + 1, kdf_out, sizeof(kdf_out)); 416 eap_gpsk_derive_session_id(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 method_type, u8 *sid, size_t *sid_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/wps/ |
H A D | wps_er.c | 226 char sid[100]; local 250 uuid_bin2str(ap->sid, sid, sizeof(sid)); 256 path, inet_ntoa(dst.sin_addr), ntohs(dst.sin_port), sid); 367 static int wps_er_get_sid(struct wps_er_ap *ap, char *sid) argument 372 if (!sid) { 378 pos = os_strstr(sid, "uuid:"); 382 sid); 387 if (uuid_str2bin(pos, ap->sid) < [all...] |
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/ |
H A D | portallocator.h | 138 const std::string& sid,
|
H A D | session.h | 95 const std::string& sid, 99 sid_(sid), 273 const std::string& sid, 602 const std::string& sid, const std::string& content_type, 93 TransportProxy( rtc::Thread* worker_thread, const std::string& sid, const std::string& content_name, TransportWrapper* transport) argument
|