/external/libselinux/src/ |
H A D | context.c | 56 * e.g user:role:type to user:role:type:sens1:cata-sens2:catb 187 def_get(role, COMP_ROLE) 195 def_set(role, COMP_ROLE)
|
/external/selinux/libselinux/src/ |
H A D | context.c | 56 * e.g user:role:type to user:role:type:sens1:cata-sens2:catb 185 def_get(role, COMP_ROLE) 193 def_set(role, COMP_ROLE)
|
H A D | get_context_list.c | 14 const char *role, 33 if (role2 && !strcmp(role, role2)) { 57 const char *role, 68 return get_default_context_with_role(user, role, fromcon, 90 rc = get_default_context_with_role(user, role, newfromcon, newcon); 176 /* Extract the role and type of the fromcon for matching. 13 get_default_context_with_role(const char *user, const char *role, char * fromcon, char ** newcon) argument
|
/external/selinux/libsepol/tests/policies/test-deps/ |
H A D | small-base.conf | 429 role system_r types sys_foo_t; 432 role user_r types user_t; 435 role sysadm_r types sysadm_t; 438 role system_r types { system_t sys_foo_t };
|
/external/selinux/sepolgen/src/sepolgen/ |
H A D | output.py | 105 return cmp(a.role, b.role)
|
/external/jetty/src/java/org/eclipse/jetty/server/ |
H A D | ServletRequestHttpWrapper.java | 111 public boolean isUserInRole(String role) argument
|
/external/selinux/policycoreutils/sepolicy/sepolicy/ |
H A D | manpage.py | 109 for role in get_all_roles(): 110 if role[:-2] in domains or role == "system_r": 112 domains.append(role[:-2]) 194 for role in self.manpage_roles.values(): 195 if len(role): 196 for r in role: 464 self.role = self.domainname + "_r" 471 self.desc = "%s user role" % self.domainname 967 default role ha [all...] |
H A D | generate.py | 748 role = name + "_r" 751 if role not in self.all_roles: 752 tmp = re.sub(role, "system_r", tmp) 767 role = u.split("_u")[0] 769 if (role + "_r") in self.all_roles: 771 newte += re.sub("USER", role, tmp) 844 role = d.split("_t")[0] + "_r" 845 if role in self.all_roles: 847 role %s;""" % role [all...] |
/external/selinux/checkpolicy/test/ |
H A D | dismod.c | 416 char *user, *role, *type; local 421 role = p->p_role_val_to_name[cur->context[0].role - 1]; 424 cur->u.name, cur->sid[0], user, role, type); 430 role = p->p_role_val_to_name[cur->context[0].role - 1]; 433 cur->u.name, cur->sid[0], user, role, type); 464 fprintf(fp, "role transition "); 477 fprintf(fp, "role allow "); 499 role_datum_t *role; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | p2p_supplicant_sd.c | 482 u8 role; local 504 role = *pos++; 505 wpa_printf(MSG_DEBUG, "P2P: WSD for device role 0x%x", role); 507 /* TODO: role specific handling */ 1033 static void wfd_add_sd_req_role(struct wpabuf *tlvs, u8 id, u8 role, argument 1045 wpabuf_put_u8(tlvs, role); 1067 const u8 *dst, const char *role) 1074 subelems = os_strchr(role, ' '); 1083 if (os_strstr(role, "[sourc 1066 wpas_p2p_sd_request_wifi_display(struct wpa_supplicant *wpa_s, const u8 *dst, const char *role) argument [all...] |
/external/selinux/libsepol/src/ |
H A D | policydb.c | 683 * Initialize the role table by implicitly adding role 'object_r'. If 691 role_datum_t *role; local 693 role = calloc(1, sizeof(role_datum_t)); 694 if (!role) { 704 rc = symtab_insert(p, SYM_ROLES, key, role, 707 &role->s.value); 710 if (role->s.value != OBJECT_R_VAL) { 720 free(role); 784 role_datum_t *role; local 875 role_datum_t *role; local 1628 role_set_get_role(role_set_t * x, uint32_t role) argument 2187 role_datum_t *role; local [all...] |
H A D | link.c | 82 "common", "class", "role", "type/attribute", "user", 221 ERR(state->handle, "Found conflicting default role definitions"); 351 role_datum_t *role, *base_role, *new_role = NULL; local 354 role = (role_datum_t *) datum; 358 /* role already exists. check that it is what this 360 * modules both declare role foo_r) is checked during 362 if (role->flavor == ROLE_ATTRIB 365 "%s: Expected %s to be a role attribute, but it was already declared as a regular role.", 368 } else if (role 793 role_datum_t *role = (role_datum_t *) datum; local 1097 role_datum_t *role, *dest_role = NULL; local 2412 role_datum_t *role, *sub_attr; local [all...] |
H A D | expand.c | 388 ERR(state->handle, "Found conflicting default role definitions"); 562 role_datum_t *role = (role_datum_t *) datum; local 566 if (!role->bounds) 572 bounds_val = state->rolemap[role->bounds - 1]; 706 role_datum_t *role = (role_datum_t *) datum; local 709 if (map_ebitmap(&role->dominates, &mapped_roles, state->rolemap)) 712 ebitmap_destroy(&role->dominates); 714 if (ebitmap_cpy(&role->dominates, &mapped_roles)) 722 /* For the role attribute in the base module, escalate its counterpart's 724 * regular role tha 731 role_datum_t *role, *new_role, *regular_role; local 799 role_datum_t *role; local 2411 role_datum_t *role; local [all...] |
H A D | module_to_cil.c | 165 role_datum_t *role; member in struct:role_list_node 188 * with each role when printing role_type statements 281 role_datum_t *role = data; local 290 role_node->role = role; 683 statement = "role"; 991 ts = &role_node->role->types; 1346 uint32_t role; local 1366 for (role = 0; role < num_role_name 2008 struct role_datum *role = datum; local 2911 char *role = NULL; local [all...] |
/external/selinux/checkpolicy/ |
H A D | policy_define.c | 413 yyerror2("conflicting default role information for class %s", id); 2531 /* The role-types rule is no longer used to declare regular role or 2532 * role attribute, but solely aimed for declaring role-types associations. 2536 role_datum_t *role; local 2548 yyerror("no role name for role-types rule?"); 2553 yyerror2("role %s is not within scope", id); 2558 role 2787 role_datum_t *role; local 2958 role_datum_t *role; local 3608 role_datum_t *role; local 4227 role_datum_t *role; local [all...] |
/external/google-tv-pairing-protocol/java/src/com/google/polo/wire/json/ |
H A D | JsonMessageBuilder.java | 236 ProtocolRole role = ProtocolRole.fromIntVal( 238 options.setProtocolRolePreference(role); 258 ProtocolRole role = ProtocolRole.fromIntVal( 260 return new ConfigurationMessage(encoding, role);
|
/external/google-tv-pairing-protocol/java/src/com/google/polo/wire/xml/ |
H A D | XmlMessageBuilder.java | 78 private static final String CONFIG_FIELD_CLIENT_ROLE = "role"; 296 ProtocolRole role = ProtocolRole.fromIntVal( 298 options.setProtocolRolePreference(role); 319 ProtocolRole role = ProtocolRole.fromIntVal( 322 return new ConfigurationMessage(encoding, role);
|
/external/clang/test/CXX/temp/temp.decls/temp.friend/ |
H A D | p1.cpp | 289 void foo(Role<N, test13::Foo> &role) { argument 290 (void) role.x;
|
/external/jetty/src/java/org/eclipse/jetty/security/ |
H A D | MappedLoginService.java | 194 for (String role : roles) 195 subject.getPrincipals().add(new RolePrincipal(role));
|
H A D | PropertyUserStore.java | 168 for (String role : roleArray) 170 subject.getPrincipals().add(new RolePrincipal(role));
|
/external/selinux/sepolgen/tests/ |
H A D | test_refpolicy.py | 42 self.assertEquals(sc.role, "object_r") 55 self.assertEquals(sc.role, "object_r")
|
/external/jetty/src/java/org/eclipse/jetty/servlet/ |
H A D | ServletHolder.java | 223 /** Link a user role. 224 * Translate the role name used by a servlet, to the link name 226 * @param name The role name as used by the servlet 227 * @param link The role name as used by the container. 237 /** get a user role link. 238 * @param name The name of the role 557 // pop run-as role 633 public void setRunAsRole(String role) argument 635 _runAsRole = role; 696 // pop run-as role 835 setRunAsRole(String role) argument [all...] |
/external/selinux/libsepol/cil/src/ |
H A D | cil.c | 123 CIL_KEY_ROLE = cil_strpool_add("role"); 1455 struct cil_role *role = ctx->role; local 1458 str_len += (strlen(user->datum.fqn) + strlen(role->datum.fqn) + strlen(type->datum.fqn) + 3); 1518 struct cil_role *role = ctx->role; local 1521 buf_pos = sprintf(str_tmp, "\t%s:%s:%s", user->datum.fqn, role->datum.fqn, 1760 (*context)->role = NULL; 1894 (*userrole)->role = NULL; 1922 (*roletype)->role 2348 cil_role_init(struct cil_role **role) argument [all...] |
H A D | cil_binary.h | 87 * Insert cil role structure into sepol policydb. 89 * @param[in] pdb The policy database to insert the role into. 105 int cil_roletype_to_policydb(policydb_t *pdb, const struct cil_db *db, struct cil_role *role); 268 * Insert cil role transition structure into sepol policydb. 270 * @param[in] pdb The policy database to insert the role transition into. 278 * Insert cil role allow structure into sepol policydb. 280 * @param[in] pdb The policy database to insert the role allow into.
|
H A D | cil_internal.h | 422 void *role; member in struct:cil_userrole 472 void *role; /* role or attribute */ member in struct:cil_roletype 584 void *src; /* role or attribute */ 586 void *tgt; /* role or attribute */ 645 struct cil_role *role; member in struct:cil_context 959 void cil_role_init(struct cil_role **role);
|