/external/selinux/libsepol/include/sepol/ |
H A D | context_record.h | 25 sepol_context_t * con, const char *role);
|
/external/selinux/libsepol/tests/policies/test-deps/ |
H A D | base-notmetreq.conf | 424 role system_r; 425 role system_r types sys_foo_t; 428 role user_r; 429 role user_r types user_t; 432 role sysadm_r; 433 role sysadm_r types sysadm_t; 436 role system_r; 437 role system_r types { system_t sys_foo_t };
|
/external/google-tv-pairing-protocol/cpp/src/polo/wire/protobuf/ |
H A D | protobufwireadapter.h | 133 // Converts a role type from the internal representation to the protobuf 136 pairing::message::OptionsMessage::ProtocolRole role); 138 // Converts a role type from the protobuf representation to the internal 141 Options_RoleType role);
|
H A D | protobufwireadapter.cc | 240 pairing::message::OptionsMessage::ProtocolRole role = local 243 pairing::message::ConfigurationMessage message(encoding, role); 449 pairing::message::OptionsMessage::ProtocolRole role) { 450 switch (role) { 461 ProtobufWireAdapter::RoleFromProto(Options_RoleType role) { argument 462 switch (role) { 448 RoleToProto( pairing::message::OptionsMessage::ProtocolRole role) argument
|
/external/selinux/policycoreutils/mcstrans/share/examples/urcsts/ |
H A D | secolor.conf | 12 role * = black black
|
/external/selinux/policycoreutils/mcstrans/share/examples/urcsts-via-include/ |
H A D | secolor.conf | 12 role * = black black
|
/external/selinux/sepolgen/src/sepolgen/ |
H A D | access.py | 305 """A non-overlapping set of role type statements. 307 This clas allows the incremental addition of role type statements and 315 """Iterate over all of the unique role allows statements in the set.""" 320 """Return the unique number of role allow statements.""" 323 def add(self, role, type): 324 if self.role_types.has_key(role): 325 role_type = self.role_types[role] 328 role_type.role = role 329 self.role_types[role] [all...] |
H A D | audit.py | 265 if self.scontext.role != self.tcontext.role and self.tcontext.role != "object_r": 266 self.data.append(("role (%s)" % self.scontext.role, 'role (%s)' % self.tcontext.role)) 293 context that is not valid. Security contexts are invalid if the role is 294 not authorized for the user or the type is not authorized for the role. 297 just the type and role [all...] |
H A D | interfaces.py | 163 def role_extract_params(role, params): 164 if access.is_idparam(role.role): 165 return __param_insert(role.role, refpolicy.ROLE, None, params) 293 for role in interface.roles(): 294 if role_extract_params(role, self.params): 296 #print "found conflicting role param %s for interface %s" % \ 297 # (role.name, interface.name)
|
H A D | refpolicy.py | 47 field_to_str = ["source", "target", "object", "permission", "role", "destination" ] 49 "permission" : PERMS, "role" : ROLE, "destination" : DEST_TYPE } 271 self.role = "" 281 'user:role:type:level'. 290 self.role = fields[1] 305 self.role == other.role and \ 322 'user:role:type:level'. 324 fields = [self.user, self.role, self.type] 370 self.role [all...] |
/external/selinux/sepolgen/tests/ |
H A D | test_audit.py | 73 self.assertEquals(avc.scontext.role, "system_r") 78 self.assertEquals(avc.tcontext.role, "object_r") 96 self.assertEquals(avc.scontext.role, "system_r") 101 self.assertEquals(avc.tcontext.role, "object_r") 120 self.assertEquals(avc.scontext.role, "system_r") 125 self.assertEquals(avc.tcontext.role, "system_r")
|
/external/jetty/src/java/org/eclipse/jetty/security/ |
H A D | ConstraintSecurityHandler.java | 157 //Equivalent to <auth-constraint> with list of <security-role-name>s 289 * <li>All users do not need to have a role defined in the deployment descriptor 290 * <li>The * role in a constraint applies to ANY role rather than all roles defined in 408 for (String role : mapping.getConstraint().getRoles()) 409 addRole(role); 421 public void addRole(String role) argument 423 boolean modified = _roles.add(role); 426 // Add the new role to currently defined any role rol [all...] |
H A D | SpnegoLoginService.java | 140 String role = clientName.substring(clientName.indexOf('@') + 1); 145 LOG.debug("Client Default Role: " + role); 152 return _identityService.newUserIdentity(subject,user, new String[]{role});
|
/external/selinux/libsemanage/src/ |
H A D | user_internal.h | 116 const char *role); 119 const char *role); 122 const char *role);
|
H A D | user_record.c | 188 semanage_user_t * user, const char *role) 191 return semanage_user_base_add_role(handle, user->base, role); 196 void semanage_user_del_role(semanage_user_t * user, const char *role) 199 semanage_user_base_del_role(user->base, role); 202 int semanage_user_has_role(const semanage_user_t * user, const char *role) argument 205 return semanage_user_base_has_role(user->base, role); 187 semanage_user_add_role(semanage_handle_t * handle, semanage_user_t * user, const char *role) argument
|
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
H A D | dbus_new_handlers_wps.c | 25 int role; /* 0 - not set, 1 - enrollee, 2 - registrar */ member in struct:wps_start_params 52 params->role = 1; 54 params->role = 2; 56 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Unknown role %s", val); 217 * information about role (enrollee or registrar), authorization method 254 "dbus: WPS.Start - Pin required for registrar role"); 256 message, "Pin required for registrar role."); 268 if (params.role == 0) { 272 } else if (params.role == 2) { 275 "dbus: WPS.Start - Pin required for registrar role"); [all...] |
/external/jetty/src/java/org/eclipse/jetty/security/authentication/ |
H A D | SessionAuthentication.java | 76 public boolean isUserInRole(Scope scope, String role) argument 78 return _userIdentity.isUserInRole(role, scope);
|
/external/jetty/src/java/org/eclipse/jetty/server/ |
H A D | Authentication.java | 45 boolean isUserInRole(UserIdentity.Scope scope,String role); argument
|
/external/libxml2/include/libxml/ |
H A D | xlink.h | 27 * then the link detection layer will expand role="foo:myrole" 76 * @role: the role string 85 const xlinkRole role,
|
/external/selinux/libsepol/tests/policies/test-expander/ |
H A D | small-base.conf | 470 role system_r; 471 role system_r types sys_foo_t; 474 role user_r; 475 role user_r types user_t; 478 role sysadm_r; 479 role sysadm_r types sysadm_t; 482 role system_r types { system_t sys_foo_t };
|
/external/google-tv-pairing-protocol/java/src/com/google/polo/wire/protobuf/ |
H A D | ProtobufWireAdapter.java | 400 private int toProto(OptionsMessage.ProtocolRole role) { argument 401 switch (role) { 516 OptionsMessage.ProtocolRole role = OptionsMessage.ProtocolRole.UNKNOWN; 520 role = OptionsMessage.ProtocolRole.INPUT_DEVICE; 523 role = OptionsMessage.ProtocolRole.DISPLAY_DEVICE; 527 return new ConfigurationMessage(enc, role);
|
/external/selinux/libsepol/cil/src/ |
H A D | cil_post.c | 354 struct cil_role *role = node->data; local 355 if (role->datum.nodes->head->data == node) { 359 role->value = db->num_roles; 428 struct cil_role *role = node->data; local 432 db->val_to_role[role->value] = role; 634 cil_log(CIL_ERR, "Failed to expand role attribute to bitmap\n"); 657 struct cil_role *role = (struct cil_role *)datum; local 658 if (ebitmap_set_bit(bitmap, role->value, 1)) { 659 cil_log(CIL_ERR, "Failed to set role bi 1038 __cil_role_assign_types(struct cil_role *role, struct cil_symtab_datum *datum) argument 1100 struct cil_role *role = NULL; local 1114 struct cil_role *role = roletype->role; local [all...] |
/external/selinux/libsepol/src/ |
H A D | services.c | 208 * For user and role plus types (for policy vers < 508 val1 = scontext->role; 509 val2 = tcontext->role; 645 val1 = c->role; 928 * role is changing, then check the (current_role, new_role) 933 scontext->role != tcontext->role) { 935 if (scontext->role == ra->role && 936 tcontext->role 1570 role_datum_t *role; local 1996 role_datum_t *role; local [all...] |
/external/selinux/libsepol/tests/policies/test-hooks/ |
H A D | cmp_policy.conf | 423 role g_b_role_1 types g_b_type_1; 425 role g_b_role_2 types g_b_type_1; 426 role g_b_role_3 types g_b_type_1;
|
H A D | small-base.conf | 423 role g_b_role_1 types g_b_type_1; 425 role g_b_role_2 types g_b_type_1; 426 role g_b_role_3 types g_b_type_1;
|