Searched refs:role (Results 76 - 100 of 167) sorted by relevance

1234567

/external/libselinux/src/
H A Dcontext.c56 * e.g user:role:type to user:role:type:sens1:cata-sens2:catb
187 def_get(role, COMP_ROLE)
195 def_set(role, COMP_ROLE)
/external/selinux/libselinux/src/
H A Dcontext.c56 * e.g user:role:type to user:role:type:sens1:cata-sens2:catb
185 def_get(role, COMP_ROLE)
193 def_set(role, COMP_ROLE)
H A Dget_context_list.c14 const char *role,
33 if (role2 && !strcmp(role, role2)) {
57 const char *role,
68 return get_default_context_with_role(user, role, fromcon,
90 rc = get_default_context_with_role(user, role, newfromcon, newcon);
176 /* Extract the role and type of the fromcon for matching.
13 get_default_context_with_role(const char *user, const char *role, char * fromcon, char ** newcon) argument
/external/selinux/libsepol/tests/policies/test-deps/
H A Dsmall-base.conf429 role system_r types sys_foo_t;
432 role user_r types user_t;
435 role sysadm_r types sysadm_t;
438 role system_r types { system_t sys_foo_t };
/external/selinux/sepolgen/src/sepolgen/
H A Doutput.py105 return cmp(a.role, b.role)
/external/jetty/src/java/org/eclipse/jetty/server/
H A DServletRequestHttpWrapper.java111 public boolean isUserInRole(String role) argument
/external/selinux/policycoreutils/sepolicy/sepolicy/
H A Dmanpage.py109 for role in get_all_roles():
110 if role[:-2] in domains or role == "system_r":
112 domains.append(role[:-2])
194 for role in self.manpage_roles.values():
195 if len(role):
196 for r in role:
464 self.role = self.domainname + "_r"
471 self.desc = "%s user role" % self.domainname
967 default role ha
[all...]
H A Dgenerate.py748 role = name + "_r"
751 if role not in self.all_roles:
752 tmp = re.sub(role, "system_r", tmp)
767 role = u.split("_u")[0]
769 if (role + "_r") in self.all_roles:
771 newte += re.sub("USER", role, tmp)
844 role = d.split("_t")[0] + "_r"
845 if role in self.all_roles:
847 role %s;""" % role
[all...]
/external/selinux/checkpolicy/test/
H A Ddismod.c416 char *user, *role, *type; local
421 role = p->p_role_val_to_name[cur->context[0].role - 1];
424 cur->u.name, cur->sid[0], user, role, type);
430 role = p->p_role_val_to_name[cur->context[0].role - 1];
433 cur->u.name, cur->sid[0], user, role, type);
464 fprintf(fp, "role transition ");
477 fprintf(fp, "role allow ");
499 role_datum_t *role; local
[all...]
/external/wpa_supplicant_8/wpa_supplicant/
H A Dp2p_supplicant_sd.c482 u8 role; local
504 role = *pos++;
505 wpa_printf(MSG_DEBUG, "P2P: WSD for device role 0x%x", role);
507 /* TODO: role specific handling */
1033 static void wfd_add_sd_req_role(struct wpabuf *tlvs, u8 id, u8 role, argument
1045 wpabuf_put_u8(tlvs, role);
1067 const u8 *dst, const char *role)
1074 subelems = os_strchr(role, ' ');
1083 if (os_strstr(role, "[sourc
1066 wpas_p2p_sd_request_wifi_display(struct wpa_supplicant *wpa_s, const u8 *dst, const char *role) argument
[all...]
/external/selinux/libsepol/src/
H A Dpolicydb.c683 * Initialize the role table by implicitly adding role 'object_r'. If
691 role_datum_t *role; local
693 role = calloc(1, sizeof(role_datum_t));
694 if (!role) {
704 rc = symtab_insert(p, SYM_ROLES, key, role,
707 &role->s.value);
710 if (role->s.value != OBJECT_R_VAL) {
720 free(role);
784 role_datum_t *role; local
875 role_datum_t *role; local
1628 role_set_get_role(role_set_t * x, uint32_t role) argument
2187 role_datum_t *role; local
[all...]
H A Dlink.c82 "common", "class", "role", "type/attribute", "user",
221 ERR(state->handle, "Found conflicting default role definitions");
351 role_datum_t *role, *base_role, *new_role = NULL; local
354 role = (role_datum_t *) datum;
358 /* role already exists. check that it is what this
360 * modules both declare role foo_r) is checked during
362 if (role->flavor == ROLE_ATTRIB
365 "%s: Expected %s to be a role attribute, but it was already declared as a regular role.",
368 } else if (role
793 role_datum_t *role = (role_datum_t *) datum; local
1097 role_datum_t *role, *dest_role = NULL; local
2412 role_datum_t *role, *sub_attr; local
[all...]
H A Dexpand.c388 ERR(state->handle, "Found conflicting default role definitions");
562 role_datum_t *role = (role_datum_t *) datum; local
566 if (!role->bounds)
572 bounds_val = state->rolemap[role->bounds - 1];
706 role_datum_t *role = (role_datum_t *) datum; local
709 if (map_ebitmap(&role->dominates, &mapped_roles, state->rolemap))
712 ebitmap_destroy(&role->dominates);
714 if (ebitmap_cpy(&role->dominates, &mapped_roles))
722 /* For the role attribute in the base module, escalate its counterpart's
724 * regular role tha
731 role_datum_t *role, *new_role, *regular_role; local
799 role_datum_t *role; local
2411 role_datum_t *role; local
[all...]
H A Dmodule_to_cil.c165 role_datum_t *role; member in struct:role_list_node
188 * with each role when printing role_type statements
281 role_datum_t *role = data; local
290 role_node->role = role;
683 statement = "role";
991 ts = &role_node->role->types;
1346 uint32_t role; local
1366 for (role = 0; role < num_role_name
2008 struct role_datum *role = datum; local
2911 char *role = NULL; local
[all...]
/external/selinux/checkpolicy/
H A Dpolicy_define.c413 yyerror2("conflicting default role information for class %s", id);
2531 /* The role-types rule is no longer used to declare regular role or
2532 * role attribute, but solely aimed for declaring role-types associations.
2536 role_datum_t *role; local
2548 yyerror("no role name for role-types rule?");
2553 yyerror2("role %s is not within scope", id);
2558 role
2787 role_datum_t *role; local
2958 role_datum_t *role; local
3608 role_datum_t *role; local
4227 role_datum_t *role; local
[all...]
/external/google-tv-pairing-protocol/java/src/com/google/polo/wire/json/
H A DJsonMessageBuilder.java236 ProtocolRole role = ProtocolRole.fromIntVal(
238 options.setProtocolRolePreference(role);
258 ProtocolRole role = ProtocolRole.fromIntVal(
260 return new ConfigurationMessage(encoding, role);
/external/google-tv-pairing-protocol/java/src/com/google/polo/wire/xml/
H A DXmlMessageBuilder.java78 private static final String CONFIG_FIELD_CLIENT_ROLE = "role";
296 ProtocolRole role = ProtocolRole.fromIntVal(
298 options.setProtocolRolePreference(role);
319 ProtocolRole role = ProtocolRole.fromIntVal(
322 return new ConfigurationMessage(encoding, role);
/external/clang/test/CXX/temp/temp.decls/temp.friend/
H A Dp1.cpp289 void foo(Role<N, test13::Foo> &role) { argument
290 (void) role.x;
/external/jetty/src/java/org/eclipse/jetty/security/
H A DMappedLoginService.java194 for (String role : roles)
195 subject.getPrincipals().add(new RolePrincipal(role));
H A DPropertyUserStore.java168 for (String role : roleArray)
170 subject.getPrincipals().add(new RolePrincipal(role));
/external/selinux/sepolgen/tests/
H A Dtest_refpolicy.py42 self.assertEquals(sc.role, "object_r")
55 self.assertEquals(sc.role, "object_r")
/external/jetty/src/java/org/eclipse/jetty/servlet/
H A DServletHolder.java223 /** Link a user role.
224 * Translate the role name used by a servlet, to the link name
226 * @param name The role name as used by the servlet
227 * @param link The role name as used by the container.
237 /** get a user role link.
238 * @param name The name of the role
557 // pop run-as role
633 public void setRunAsRole(String role) argument
635 _runAsRole = role;
696 // pop run-as role
835 setRunAsRole(String role) argument
[all...]
/external/selinux/libsepol/cil/src/
H A Dcil.c123 CIL_KEY_ROLE = cil_strpool_add("role");
1455 struct cil_role *role = ctx->role; local
1458 str_len += (strlen(user->datum.fqn) + strlen(role->datum.fqn) + strlen(type->datum.fqn) + 3);
1518 struct cil_role *role = ctx->role; local
1521 buf_pos = sprintf(str_tmp, "\t%s:%s:%s", user->datum.fqn, role->datum.fqn,
1760 (*context)->role = NULL;
1894 (*userrole)->role = NULL;
1922 (*roletype)->role
2348 cil_role_init(struct cil_role **role) argument
[all...]
H A Dcil_binary.h87 * Insert cil role structure into sepol policydb.
89 * @param[in] pdb The policy database to insert the role into.
105 int cil_roletype_to_policydb(policydb_t *pdb, const struct cil_db *db, struct cil_role *role);
268 * Insert cil role transition structure into sepol policydb.
270 * @param[in] pdb The policy database to insert the role transition into.
278 * Insert cil role allow structure into sepol policydb.
280 * @param[in] pdb The policy database to insert the role allow into.
H A Dcil_internal.h422 void *role; member in struct:cil_userrole
472 void *role; /* role or attribute */ member in struct:cil_roletype
584 void *src; /* role or attribute */
586 void *tgt; /* role or attribute */
645 struct cil_role *role; member in struct:cil_context
959 void cil_role_init(struct cil_role **role);

Completed in 509 milliseconds

1234567