/external/libsepol/include/sepol/ |
H A D | roles.h | 8 char ***roles, unsigned int *nroles);
|
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/ |
H A D | transportdescription.cc | 35 const char* const roles[] = { local 42 for (size_t i = 0; i < ARRAY_SIZE(roles); ++i) { 43 if (stricmp(roles[i], role_str.c_str()) == 0) {
|
/external/libsepol/tests/policies/test-hooks/ |
H A D | module_add_symbols.conf | 11 user user_add_1 roles { role_add_1 };
|
/external/libsepol/src/ |
H A D | user_record.c | 19 char **roles; member in struct:sepol_user 21 /* The number of roles */ 181 roles_realloc = realloc(user->roles, 188 user->roles = roles_realloc; 189 user->roles[user->num_roles - 1] = role_cp; 208 if (!strcmp(user->roles[i], role)) 239 free(user->roles[i]); 240 free(user->roles); 241 user->roles = tmp_roles; 246 ERR(handle, "out of memory, could not allocate roles arra [all...] |
H A D | users.c | 22 ebitmap_t *roles = &(usrdatum->roles.roles); local 34 /* Extract roles */ 35 ebitmap_for_each_bit(roles, rnode, bit) { 112 const char **roles = NULL; local 133 if (sepol_user_get_roles(handle, user, &roles, &num_roles) < 0) 162 (const hashtab_key_t)roles[i]); 165 roles[i], cname); 173 (&(usrdatum->roles [all...] |
H A D | roles.c | 23 /* Fill an array with all valid roles */ 25 sepol_policydb_t * p, char ***roles, unsigned int *nroles) 43 *roles = tmp_roles; 48 ERR(handle, "out of memory, could not list roles"); 24 sepol_role_list(sepol_handle_t * handle, sepol_policydb_t * p, char ***roles, unsigned int *nroles) argument
|
H A D | genusers.c | 90 ebitmap_destroy(&usrdatum->roles.roles); 91 ebitmap_init(&usrdatum->roles.roles); 130 if (strncasecmp(p, "roles", 5)) 174 (&usrdatum->roles.roles, bit, 1)) {
|
H A D | hierarchy.c | 441 if (up && !ebitmap_contains(&up->roles.roles, &u->roles.roles)) {
|
H A D | context.c | 39 ebitmap_t types, roles; local 43 ebitmap_init(&roles);
|
H A D | link.c | 389 /* new_role's dominates, types and roles field will be copied 555 /* new_users's roles and MLS fields will be copied during 756 * The boundaries have to be copied after the types/roles/users are copied, 1013 static int role_set_or_convert(role_set_t * roles, role_set_t * dst, argument 1021 ebitmap_for_each_bit(&roles->roles, rnode, i) { 1030 if (ebitmap_union(&dst->roles, &tmp)) { 1033 dst->flags |= roles->flags; 1136 ebitmap_for_each_bit(&role->roles, rnode, i) { 1145 if (ebitmap_union(&dest_role->roles, [all...] |
H A D | expand.c | 601 * The boundaries have to be copied after the types/roles/users are copied, 839 if (map_ebitmap(&role->roles, &mapped_roles, state->rolemap)) 841 if (ebitmap_union(&new_role->roles, &mapped_roles)) { 848 ebitmap_for_each_bit(&role->roles, rnode, i) { 933 * the roles have been added */ 1125 /* get global roles for this user */ 1126 if (role_set_expand(&user->roles, &tmp_union, state->out, state->base, state->rolemap)) { 1132 if (ebitmap_union(&new_user->roles.roles, &tmp_union)) { 1299 ebitmap_t roles, new_role local 1368 ebitmap_t roles, types; local 2450 ebitmap_t mapped_roles, roles; local [all...] |
H A D | policydb.c | 376 "roles", 430 ebitmap_init(&x->roles); 435 ebitmap_destroy(&x->roles); 444 ebitmap_init(&x->roles); 453 ebitmap_destroy(&x->roles); 473 role_set_init(&x->roles); 484 role_set_destroy(&x->roles); 551 role_set_init(&x->roles); 559 role_set_destroy(&x->roles); 605 role_set_init(&x->roles); [all...] |
H A D | write.c | 574 if (ebitmap_write(&x->roles, fp)) 1020 * when writing the roles symbol table. They are also skipped 1062 if (ebitmap_write(&role->roles, fp)) 1173 if (ebitmap_write(&usrdatum->roles.roles, fp)) 1176 if (role_set_write(&usrdatum->roles, fp)) 1594 if (role_set_write(&tr->roles, fp)) 1623 if (role_set_write(&ra->roles, fp)) 1865 /* uncount attribute from total number of roles */
|
/external/chromium_org/third_party/libxml/src/include/libxml/ |
H A D | xlink.h | 94 * @roles: pointer to the array of locator roles 96 * @from: pointer to the array of source roles found on the arcs 97 * @to: pointer to the array of target roles found on the arcs 111 const xlinkRole *roles, 127 * @roles: pointer to the array of locator roles 139 const xlinkRole *roles,
|
/external/libsepol/tests/ |
H A D | test-expander-users.c | 37 unsigned char *found; /* array of booleans of roles found */ 38 int extra = 0; /* number of extra roles found */ 48 ebitmap_for_each_bit(&user->roles.roles, tnode, i) {
|
/external/libxml2/include/libxml/ |
H A D | xlink.h | 94 * @roles: pointer to the array of locator roles 96 * @from: pointer to the array of source roles found on the arcs 97 * @to: pointer to the array of target roles found on the arcs 111 const xlinkRole *roles, 127 * @roles: pointer to the array of locator roles 139 const xlinkRole *roles,
|
/external/checkpolicy/test/ |
H A D | dismod.c | 64 "classes", "roles ", "types ", "users ", "bools ", 179 int display_mod_role_set(role_set_t * roles, policydb_t * p, FILE * fp) argument 183 if (roles->flags & ROLE_STAR) { 186 } else if (roles->flags & ROLE_COMP) { 190 for (i = ebitmap_startbit(&roles->roles); 191 i < ebitmap_length(&roles->roles); i++) { 192 if (!ebitmap_get_bit(&roles->roles, [all...] |
/external/libsepol/ |
H A D | Android.mk | 34 src/roles.c \
|
/external/libsepol/include/sepol/policydb/ |
H A D | policydb.h | 76 * users, roles, types, sensitivities, categories, etc. 89 ebitmap_t roles; member in struct:role_set 133 ebitmap_t dominates; /* set of roles dominated by this role */ 140 ebitmap_t roles; /* roles with this attribute */ member in struct:role_datum 193 role_set_t roles; /* set of authorized roles for user */ member in struct:user_datum 270 role_set_t roles; /* current role */ member in struct:role_trans_rule 278 role_set_t roles; /* current role */ member in struct:role_allow_rule 279 role_set_t new_roles; /* new roles */ [all...] |
/external/chromium_org/third_party/WebKit/Source/core/accessibility/ |
H A D | AXObject.cpp | 60 const RoleEntry roles[] = { local 87 // "option" isn't here because it may map to different roles depending on the parent element's role 126 for (size_t i = 0; i < WTF_ARRAY_LENGTH(roles); ++i) 127 roleMap->set(roles[i].ariaRole, roles[i].webcoreRole);
|
/external/checkpolicy/ |
H A D | policy_parse.y | 78 %type <ptr> role_def roles 481 role_dominance : DOMINANCE '{' roles '}' 491 roles : role_def label 493 | roles role_def 498 | ROLE identifier_push '{' roles '}'
|
H A D | policy_scan.l | 82 roles { return(ROLES); }
|
H A D | policy_define.c | 2010 if (ebitmap_set_bit(&attr->roles, (r->s.value - 1), TRUE)) { 2074 if (ebitmap_set_bit(&attr->roles, (r->s.value - 1), TRUE)) { 2161 /* go through all the roles */ 2257 * Now go through all the roles and escalate this role's 2329 if (ebitmap_set_bit(&set->roles, r->s.value - 1, TRUE)) { 2342 role_set_t roles; local 2365 role_set_init(&roles); 2372 if (set_roles(&roles, id)) 2421 if (role_set_expand(&roles, &e_roles, policydbp, NULL, NULL)) 2473 rule->roles [all...] |
/external/sepolicy/ |
H A D | Android.mk | 92 roles \
|
/external/chromium_org/third_party/accessibility-audit/ |
H A D | axs_testing.js | 907 return{roles:b, valid:c}; 1276 b.roles = f; 1277 if (!f.valid || !f.roles) { 1280 for (var e = f.roles, g = 0;g < e.length;g++) { 1586 axs.AuditRule.specs.badAriaRole = {name:"badAriaRole", heading:"Elements with ARIA roles must use a valid, non-abstract ARIA role", url:"https://github.com/GoogleChrome/accessibility-developer-tools/wiki/Audit-Rules#-ax_aria_01--elements-with-aria-roles-must-use-a-valid-non-abstract-aria-role", severity:axs.constants.Severity.SEVERE, relevantElementMatcher:function(a) { 1684 axs.AuditRule.specs.requiredAriaAttributeMissing = {name:"requiredAriaAttributeMissing", heading:"Elements with ARIA roles must have all required attributes for that role", url:"https://github.com/GoogleChrome/accessibility-developer-tools/wiki/Audit-Rules#-ax_aria_03--elements-with-aria-roles-must-have-all-required-attributes-for-that-role", severity:axs.constants.Severity.SEVERE, relevantElementMatcher:function(a) { 1691 for (var c = 0;c < b.roles.length;c++) { 1692 var d = b.roles[ [all...] |