Searched refs:role (Results 51 - 75 of 167) sorted by relevance

1234567

/external/selinux/libsepol/include/sepol/
H A Dcontext_record.h25 sepol_context_t * con, const char *role);
/external/selinux/libsepol/tests/policies/test-deps/
H A Dbase-notmetreq.conf424 role system_r;
425 role system_r types sys_foo_t;
428 role user_r;
429 role user_r types user_t;
432 role sysadm_r;
433 role sysadm_r types sysadm_t;
436 role system_r;
437 role system_r types { system_t sys_foo_t };
/external/google-tv-pairing-protocol/cpp/src/polo/wire/protobuf/
H A Dprotobufwireadapter.h133 // Converts a role type from the internal representation to the protobuf
136 pairing::message::OptionsMessage::ProtocolRole role);
138 // Converts a role type from the protobuf representation to the internal
141 Options_RoleType role);
H A Dprotobufwireadapter.cc240 pairing::message::OptionsMessage::ProtocolRole role = local
243 pairing::message::ConfigurationMessage message(encoding, role);
449 pairing::message::OptionsMessage::ProtocolRole role) {
450 switch (role) {
461 ProtobufWireAdapter::RoleFromProto(Options_RoleType role) { argument
462 switch (role) {
448 RoleToProto( pairing::message::OptionsMessage::ProtocolRole role) argument
/external/selinux/policycoreutils/mcstrans/share/examples/urcsts/
H A Dsecolor.conf12 role * = black black
/external/selinux/policycoreutils/mcstrans/share/examples/urcsts-via-include/
H A Dsecolor.conf12 role * = black black
/external/selinux/sepolgen/src/sepolgen/
H A Daccess.py305 """A non-overlapping set of role type statements.
307 This clas allows the incremental addition of role type statements and
315 """Iterate over all of the unique role allows statements in the set."""
320 """Return the unique number of role allow statements."""
323 def add(self, role, type):
324 if self.role_types.has_key(role):
325 role_type = self.role_types[role]
328 role_type.role = role
329 self.role_types[role]
[all...]
H A Daudit.py265 if self.scontext.role != self.tcontext.role and self.tcontext.role != "object_r":
266 self.data.append(("role (%s)" % self.scontext.role, 'role (%s)' % self.tcontext.role))
293 context that is not valid. Security contexts are invalid if the role is
294 not authorized for the user or the type is not authorized for the role.
297 just the type and role
[all...]
H A Dinterfaces.py163 def role_extract_params(role, params):
164 if access.is_idparam(role.role):
165 return __param_insert(role.role, refpolicy.ROLE, None, params)
293 for role in interface.roles():
294 if role_extract_params(role, self.params):
296 #print "found conflicting role param %s for interface %s" % \
297 # (role.name, interface.name)
H A Drefpolicy.py47 field_to_str = ["source", "target", "object", "permission", "role", "destination" ]
49 "permission" : PERMS, "role" : ROLE, "destination" : DEST_TYPE }
271 self.role = ""
281 'user:role:type:level'.
290 self.role = fields[1]
305 self.role == other.role and \
322 'user:role:type:level'.
324 fields = [self.user, self.role, self.type]
370 self.role
[all...]
/external/selinux/sepolgen/tests/
H A Dtest_audit.py73 self.assertEquals(avc.scontext.role, "system_r")
78 self.assertEquals(avc.tcontext.role, "object_r")
96 self.assertEquals(avc.scontext.role, "system_r")
101 self.assertEquals(avc.tcontext.role, "object_r")
120 self.assertEquals(avc.scontext.role, "system_r")
125 self.assertEquals(avc.tcontext.role, "system_r")
/external/jetty/src/java/org/eclipse/jetty/security/
H A DConstraintSecurityHandler.java157 //Equivalent to <auth-constraint> with list of <security-role-name>s
289 * <li>All users do not need to have a role defined in the deployment descriptor
290 * <li>The * role in a constraint applies to ANY role rather than all roles defined in
408 for (String role : mapping.getConstraint().getRoles())
409 addRole(role);
421 public void addRole(String role) argument
423 boolean modified = _roles.add(role);
426 // Add the new role to currently defined any role rol
[all...]
H A DSpnegoLoginService.java140 String role = clientName.substring(clientName.indexOf('@') + 1);
145 LOG.debug("Client Default Role: " + role);
152 return _identityService.newUserIdentity(subject,user, new String[]{role});
/external/selinux/libsemanage/src/
H A Duser_internal.h116 const char *role);
119 const char *role);
122 const char *role);
H A Duser_record.c188 semanage_user_t * user, const char *role)
191 return semanage_user_base_add_role(handle, user->base, role);
196 void semanage_user_del_role(semanage_user_t * user, const char *role)
199 semanage_user_base_del_role(user->base, role);
202 int semanage_user_has_role(const semanage_user_t * user, const char *role) argument
205 return semanage_user_base_has_role(user->base, role);
187 semanage_user_add_role(semanage_handle_t * handle, semanage_user_t * user, const char *role) argument
/external/wpa_supplicant_8/wpa_supplicant/dbus/
H A Ddbus_new_handlers_wps.c25 int role; /* 0 - not set, 1 - enrollee, 2 - registrar */ member in struct:wps_start_params
52 params->role = 1;
54 params->role = 2;
56 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Unknown role %s", val);
217 * information about role (enrollee or registrar), authorization method
254 "dbus: WPS.Start - Pin required for registrar role");
256 message, "Pin required for registrar role.");
268 if (params.role == 0) {
272 } else if (params.role == 2) {
275 "dbus: WPS.Start - Pin required for registrar role");
[all...]
/external/jetty/src/java/org/eclipse/jetty/security/authentication/
H A DSessionAuthentication.java76 public boolean isUserInRole(Scope scope, String role) argument
78 return _userIdentity.isUserInRole(role, scope);
/external/jetty/src/java/org/eclipse/jetty/server/
H A DAuthentication.java45 boolean isUserInRole(UserIdentity.Scope scope,String role); argument
/external/libxml2/include/libxml/
H A Dxlink.h27 * then the link detection layer will expand role="foo:myrole"
76 * @role: the role string
85 const xlinkRole role,
/external/selinux/libsepol/tests/policies/test-expander/
H A Dsmall-base.conf470 role system_r;
471 role system_r types sys_foo_t;
474 role user_r;
475 role user_r types user_t;
478 role sysadm_r;
479 role sysadm_r types sysadm_t;
482 role system_r types { system_t sys_foo_t };
/external/google-tv-pairing-protocol/java/src/com/google/polo/wire/protobuf/
H A DProtobufWireAdapter.java400 private int toProto(OptionsMessage.ProtocolRole role) { argument
401 switch (role) {
516 OptionsMessage.ProtocolRole role = OptionsMessage.ProtocolRole.UNKNOWN;
520 role = OptionsMessage.ProtocolRole.INPUT_DEVICE;
523 role = OptionsMessage.ProtocolRole.DISPLAY_DEVICE;
527 return new ConfigurationMessage(enc, role);
/external/selinux/libsepol/cil/src/
H A Dcil_post.c354 struct cil_role *role = node->data; local
355 if (role->datum.nodes->head->data == node) {
359 role->value = db->num_roles;
428 struct cil_role *role = node->data; local
432 db->val_to_role[role->value] = role;
634 cil_log(CIL_ERR, "Failed to expand role attribute to bitmap\n");
657 struct cil_role *role = (struct cil_role *)datum; local
658 if (ebitmap_set_bit(bitmap, role->value, 1)) {
659 cil_log(CIL_ERR, "Failed to set role bi
1038 __cil_role_assign_types(struct cil_role *role, struct cil_symtab_datum *datum) argument
1100 struct cil_role *role = NULL; local
1114 struct cil_role *role = roletype->role; local
[all...]
/external/selinux/libsepol/src/
H A Dservices.c208 * For user and role plus types (for policy vers <
508 val1 = scontext->role;
509 val2 = tcontext->role;
645 val1 = c->role;
928 * role is changing, then check the (current_role, new_role)
933 scontext->role != tcontext->role) {
935 if (scontext->role == ra->role &&
936 tcontext->role
1570 role_datum_t *role; local
1996 role_datum_t *role; local
[all...]
/external/selinux/libsepol/tests/policies/test-hooks/
H A Dcmp_policy.conf423 role g_b_role_1 types g_b_type_1;
425 role g_b_role_2 types g_b_type_1;
426 role g_b_role_3 types g_b_type_1;
H A Dsmall-base.conf423 role g_b_role_1 types g_b_type_1;
425 role g_b_role_2 types g_b_type_1;
426 role g_b_role_3 types g_b_type_1;

Completed in 679 milliseconds

1234567