/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | notify.h | 95 const char *role);
|
H A D | notify.c | 565 const char *role) 567 wpas_dbus_signal_p2p_group_removed(wpa_s, role); 563 wpas_notify_p2p_group_removed(struct wpa_supplicant *wpa_s, const struct wpa_ssid *ssid, const char *role) argument
|
/external/selinux/libsepol/cil/src/ |
H A D | cil_verify.c | 655 struct cil_role *role = node->data; local 658 struct cil_role *r1 = role; 659 struct cil_role *r2 = role->bounds; 663 cil_log(CIL_ERR, "Circular bounds found for role %s\n", r1->datum.name); 679 cil_log(CIL_ERR, "Invalid role at line %d of %s\n", node->line, node->path); 718 struct cil_role *role = ctx->role; local 731 if (userrole == role) { 748 if (role->types != NULL) { 749 if (!ebitmap_get_bit(role [all...] |
H A D | cil_binary.c | 119 cil_log(CIL_INFO, "Failed to find role %s in sepol hashtab\n", datum->fqn); 177 cil_log(CIL_ERR, "Failed to copy role bits\n"); 181 struct cil_role *role = (struct cil_role *)datum; local 183 if (ebitmap_set_bit(new, role->value, 1)) { 184 cil_log(CIL_ERR, "Failed to set role bit\n"); 423 cil_log(CIL_INFO, "Failed to set dominates bit for role\n"); 456 cil_log(CIL_ERR, "Failed to insert role bounds for role %s\n", cil_role->datum.fqn); 460 int cil_roletype_to_policydb(policydb_t *pdb, const struct cil_db *db, struct cil_role *role) argument 464 if (role 3408 role_datum_t *role = (role_datum_t *)datum; local [all...] |
H A D | cil_reset_ast.c | 112 static void cil_reset_role(struct cil_role *role) argument 115 role->bounds = NULL;
|
H A D | cil_tree.c | 551 if (context->role != NULL) { 552 cil_log(CIL_INFO, " %s", context->role->datum.name); 636 struct cil_role *role = node->data; local 637 cil_log(CIL_INFO, "ROLE: %s\n", role->datum.name); 650 if (userrole->role != NULL) { 651 cil_log(CIL_INFO, " %s", ((struct cil_symtab_datum *)userrole->role)->name); 707 if (roletype->role != NULL) { 708 datum = roletype->role; 790 cil_log(CIL_INFO, "ROLEBOUNDS: role: %s, bounds: %s\n", bnds->parent_str, bnds->child_str); 1549 case CIL_ROLE: cil_log(CIL_INFO, "role [all...] |
H A D | cil_build_ast.h | 94 void cil_destroy_role(struct cil_role *role); 104 void cil_destroy_roleattribute(struct cil_roleattribute *role);
|
/external/selinux/libsepol/src/ |
H A D | users.c | 37 char *role = policydb->p_role_val_to_name[bit]; local 38 if (sepol_user_add_role(handle, tmp_record, role) < 0) 157 /* For every role */ 160 /* Search for the role */ 164 ERR(handle, "undefined role %s for user %s", 169 /* Set the role and every role it dominates */ 264 ERR(handle, "unable to expand role set");
|
H A D | write.c | 522 buf[0] = cpu_to_le32(tr->role); 553 buf[0] = cpu_to_le32(ra->role); 814 buf[items++] = cpu_to_le32(c->role); 1038 role_datum_t *role; local 1045 role = (role_datum_t *) datum; 1054 if ((role->flavor == ROLE_ATTRIB) && 1063 buf[items++] = cpu_to_le32(role->s.value); 1065 buf[items++] = cpu_to_le32(role->bounds); 1074 if (ebitmap_write(&role->dominates, fp)) 1077 if (ebitmap_write(&role 1927 role_datum_t *role = datum; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
H A D | dbus_new.h | 182 const char *role); 375 const char *role) 374 wpas_dbus_signal_p2p_group_removed(struct wpa_supplicant *wpa_s, const char *role) argument
|
/external/wpa_supplicant_8/hostapd/src/p2p/ |
H A D | p2p_invitation.c | 633 int p2p_invite(struct p2p_data *p2p, const u8 *peer, enum p2p_invite_role role, argument 640 p2p_dbg(p2p, "Request to invite peer " MACSTR " role=%d persistent=%d " 642 MAC2STR(peer), role, persistent_group, force_freq); 659 p2p->retry_invite_req = role == P2P_INVITE_ROLE_GO && 672 role != P2P_INVITE_ROLE_CLIENT) < 0) 675 if (persistent_group && role == P2P_INVITE_ROLE_CLIENT && !force_freq && 696 p2p->inv_role = role;
|
H A D | p2p.h | 184 * role - Info about the roles to be used for this connection 186 u8 role; member in struct:p2ps_provision 972 * Get information about a possible local GO role 1031 u8 (*p2ps_group_capability)(void *ctx, u8 incoming, u8 role); 1343 * @role: Local role in the group 1356 int p2p_invite(struct p2p_data *p2p, const u8 *peer, enum p2p_invite_role role,
|
H A D | p2p_build.c | 333 enum p2p_role_indication role) 341 wpabuf_put_u8(buf, (u8) role); /* Role indication */ 344 oper_class, channel, role); 331 p2p_buf_add_oob_go_neg_channel(struct wpabuf *buf, const char *country, u8 oper_class, u8 channel, enum p2p_role_indication role) argument
|
/external/wpa_supplicant_8/src/p2p/ |
H A D | p2p_invitation.c | 633 int p2p_invite(struct p2p_data *p2p, const u8 *peer, enum p2p_invite_role role, argument 640 p2p_dbg(p2p, "Request to invite peer " MACSTR " role=%d persistent=%d " 642 MAC2STR(peer), role, persistent_group, force_freq); 659 p2p->retry_invite_req = role == P2P_INVITE_ROLE_GO && 672 role != P2P_INVITE_ROLE_CLIENT) < 0) 675 if (persistent_group && role == P2P_INVITE_ROLE_CLIENT && !force_freq && 696 p2p->inv_role = role;
|
H A D | p2p.h | 184 * role - Info about the roles to be used for this connection 186 u8 role; member in struct:p2ps_provision 972 * Get information about a possible local GO role 1031 u8 (*p2ps_group_capability)(void *ctx, u8 incoming, u8 role); 1343 * @role: Local role in the group 1356 int p2p_invite(struct p2p_data *p2p, const u8 *peer, enum p2p_invite_role role,
|
H A D | p2p_build.c | 333 enum p2p_role_indication role) 341 wpabuf_put_u8(buf, (u8) role); /* Role indication */ 344 oper_class, channel, role); 331 p2p_buf_add_oob_go_neg_channel(struct wpabuf *buf, const char *country, u8 oper_class, u8 channel, enum p2p_role_indication role) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/p2p/ |
H A D | p2p_invitation.c | 633 int p2p_invite(struct p2p_data *p2p, const u8 *peer, enum p2p_invite_role role, argument 640 p2p_dbg(p2p, "Request to invite peer " MACSTR " role=%d persistent=%d " 642 MAC2STR(peer), role, persistent_group, force_freq); 659 p2p->retry_invite_req = role == P2P_INVITE_ROLE_GO && 672 role != P2P_INVITE_ROLE_CLIENT) < 0) 675 if (persistent_group && role == P2P_INVITE_ROLE_CLIENT && !force_freq && 696 p2p->inv_role = role;
|
H A D | p2p.h | 184 * role - Info about the roles to be used for this connection 186 u8 role; member in struct:p2ps_provision 972 * Get information about a possible local GO role 1031 u8 (*p2ps_group_capability)(void *ctx, u8 incoming, u8 role); 1343 * @role: Local role in the group 1356 int p2p_invite(struct p2p_data *p2p, const u8 *peer, enum p2p_invite_role role,
|
/external/google-breakpad/src/testing/gtest/test/ |
H A D | gtest-death-test_test.cc | 825 void SetParameters(bool create, DeathTest::TestRole role, 874 TestRole role, int status, bool passed) : 875 parent_(parent), role_(role), status_(status), passed_(passed) { 919 DeathTest::TestRole role, 922 role_ = role; 873 MockDeathTest(MockDeathTestFactory *parent, TestRole role, int status, bool passed) argument 918 SetParameters(bool create, DeathTest::TestRole role, int status, bool passed) argument
|
/external/gtest/test/ |
H A D | gtest-death-test_test.cc | 823 void SetParameters(bool create, DeathTest::TestRole role, 872 TestRole role, int status, bool passed) : 873 parent_(parent), role_(role), status_(status), passed_(passed) { 917 DeathTest::TestRole role, 920 role_ = role; 871 MockDeathTest(MockDeathTestFactory *parent, TestRole role, int status, bool passed) argument 916 SetParameters(bool create, DeathTest::TestRole role, int status, bool passed) argument
|
/external/protobuf/gtest/test/ |
H A D | gtest-death-test_test.cc | 706 void SetParameters(bool create, DeathTest::TestRole role, 755 TestRole role, int status, bool passed) : 756 parent_(parent), role_(role), status_(status), passed_(passed) { 799 DeathTest::TestRole role, 802 role_ = role; 754 MockDeathTest(MockDeathTestFactory *parent, TestRole role, int status, bool passed) argument 798 SetParameters(bool create, DeathTest::TestRole role, int status, bool passed) argument
|
/external/selinux/policycoreutils/sepolicy/ |
H A D | search.c | 165 const qpol_role_t *role = NULL; local 186 if (qpol_role_allow_get_source_role(q, rule, &role)) { 189 if (qpol_role_get_name(q, role, &tmp)) { 196 if (qpol_role_allow_get_target_role(q, rule, &role)) { 199 if (qpol_role_get_name(q, role, &tmp)) {
|
/external/selinux/sepolgen/src/sepolgen/ |
H A D | refparser.py | 174 'role' : 'ROLE', 574 s.role = p[3] 772 r.role = p[2] 858 t.role = p[2]
|
/external/selinux/checkpolicy/ |
H A D | policy_scan.l | 80 role { return(ROLE); }
|
/external/selinux/libsepol/include/sepol/policydb/ |
H A D | policydb.h | 116 /* Options how a new object user and role should be decided */ 135 ebitmap_t dominates; /* set of roles dominated by this role */ 136 type_set_t types; /* set of authorized types for role */ 138 uint32_t bounds; /* bounds role, if exist */ 139 #define ROLE_ROLE 0 /* regular role in kernel policies */ 146 uint32_t role; /* current role */ member in struct:role_trans 149 uint32_t new_role; /* new role */ 154 uint32_t role; /* current role */ member in struct:role_allow [all...] |