/external/chromium-trace/trace-viewer/third_party/Paste/paste/auth/ |
H A D | grantip.py | 4 Grant roles and logins based on IP address. 13 and logins and roles are assigned based on that. 15 ``ip_map`` is a map of {ip_mask: (username, roles)}. Either 16 ``username`` or ``roles`` may be None. Roles may also be prefixed 37 def _convert_user_role(self, username, roles): 38 if roles and isinstance(roles, six.string_types): 39 roles = roles.split(',') 40 return (username, roles) [all...] |
/external/selinux/libsepol/include/sepol/ |
H A D | roles.h | 12 char ***roles, unsigned int *nroles);
|
/external/selinux/libsepol/tests/policies/test-hooks/ |
H A D | module_add_symbols.conf | 11 user user_add_1 roles { role_add_1 };
|
/external/jetty/src/java/org/eclipse/jetty/security/authentication/ |
H A D | LoginCallbackImpl.java | 46 private String[] roles = IdentityService.NO_ROLES; field in class:LoginCallbackImpl 93 return roles; 98 this.roles = groups;
|
H A D | LoginCallback.java | 50 public void setRoles(String[] roles); argument
|
/external/jetty/src/java/org/eclipse/jetty/security/ |
H A D | SpnegoUserIdentity.java | 34 public SpnegoUserIdentity( Subject subject, Principal principal, List<String> roles ) 38 _roles = roles;
|
H A D | ConstraintAware.java | 33 /** Set Constraint Mappings and roles. 36 * @param roles 38 void setConstraintMappings(List<ConstraintMapping> constraintMappings, Set<String> roles); argument
|
H A D | DefaultIdentityService.java | 32 * associated {@link org.eclipse.jetty.server.UserIdentity.Scope}. If there are roles 48 * If there are roles refs present in the scope, then wrap the UserIdentity 85 public UserIdentity newUserIdentity(final Subject subject, final Principal userPrincipal, final String[] roles) argument 87 return new DefaultUserIdentity(subject,userPrincipal,roles);
|
H A D | DefaultUserIdentity.java | 39 public DefaultUserIdentity(Subject subject, Principal userPrincipal, String[] roles) argument 43 _roles=roles;
|
H A D | IdentityService.java | 80 * @param roles set of roles to include in UserIdentity. 83 UserIdentity newUserIdentity(Subject subject, Principal userPrincipal, String[] roles); argument
|
H A D | PropertyUserStore.java | 143 String roles = null; 147 roles = credentials.substring(c + 1).trim(); 154 if (roles != null && roles.length() > 0) 156 roleArray = roles.split(","); 166 if (roles != null)
|
H A D | JDBCLoginService.java | 254 List<String> roles = new ArrayList<String>(); 256 roles.add(rs.getString(_roleTableRoleField)); 259 return putUser(username, Credential.getCredential(credentials),roles.toArray(new String[roles.size()]));
|
H A D | MappedLoginService.java | 183 * @param roles The users roles 186 public synchronized UserIdentity putUser(String userName, Credential credential, String[] roles) argument 193 if (roles!=null) 194 for (String role : roles) 198 UserIdentity identity=_identityService.newUserIdentity(subject,userPrincipal,roles);
|
/external/selinux/libsepol/src/ |
H A D | user_record.c | 19 char **roles; member in struct:sepol_user 21 /* The number of roles */ 181 roles_realloc = realloc(user->roles, 188 user->roles = roles_realloc; 189 user->roles[user->num_roles - 1] = role_cp; 208 if (!strcmp(user->roles[i], role)) 239 free(user->roles[i]); 240 free(user->roles); 241 user->roles = tmp_roles; 246 ERR(handle, "out of memory, could not allocate roles arra [all...] |
H A D | users.c | 22 ebitmap_t *roles = &(usrdatum->roles.roles); local 34 /* Extract roles */ 35 ebitmap_for_each_bit(roles, rnode, bit) { 112 const char **roles = NULL; local 133 if (sepol_user_get_roles(handle, user, &roles, &num_roles) < 0) 162 (const hashtab_key_t)roles[i]); 165 roles[i], cname); 173 (&(usrdatum->roles [all...] |
H A D | roles.c | 23 /* Fill an array with all valid roles */ 25 sepol_policydb_t * p, char ***roles, unsigned int *nroles) 43 *roles = tmp_roles; 48 ERR(handle, "out of memory, could not list roles"); 24 sepol_role_list(sepol_handle_t * handle, sepol_policydb_t * p, char ***roles, unsigned int *nroles) argument
|
H A D | genusers.c | 90 ebitmap_destroy(&usrdatum->roles.roles); 91 ebitmap_init(&usrdatum->roles.roles); 130 if (strncasecmp(p, "roles", 5)) 174 (&usrdatum->roles.roles, bit, 1)) {
|
/external/jetty/src/java/org/eclipse/jetty/util/security/ |
H A D | Constraint.java | 118 public void setRoles(String[] roles) argument 120 _roles = roles; 122 if (roles != null) 123 for (int i = roles.length; !_anyRole && i-- > 0;) 124 _anyRole |= ANY_ROLE.equals(roles[i]); 138 * @return List of roles for this constraint. 178 * @return True if authentication required but no roles set
|
/external/selinux/libsemanage/src/ |
H A D | seusers_local.c | 22 char *roles = NULL; local 38 roles = malloc(size); 39 if (roles) { 40 strcpy(roles,roles_arr[0]); 42 strcat(roles,","); 43 strcat(roles,roles_arr[i]); 51 return roles; 61 char *roles = NULL; local 74 roles = semanage_user_roles(handle, sename); 87 if (roles [all...] |
H A D | users_base_file.c | 27 const char **roles = NULL; local 34 if (fprintf(str, "user %s roles { ", name) < 0) 37 if (semanage_user_base_get_roles(handle, user, &roles, &nroles) < 0) 41 if (fprintf(str, "%s ", roles[i]) < 0) 56 free(roles); 60 free(roles); 97 if (parse_assert_str(handle, info, "roles") < 0)
|
/external/libxml2/include/libxml/ |
H A D | xlink.h | 94 * @roles: pointer to the array of locator roles 96 * @from: pointer to the array of source roles found on the arcs 97 * @to: pointer to the array of target roles found on the arcs 111 const xlinkRole *roles, 127 * @roles: pointer to the array of locator roles 139 const xlinkRole *roles,
|
/external/selinux/libsepol/cil/test/integration_testing/ |
H A D | nonmls.conf | 73 user foo_u roles foo_r;
|
/external/selinux/libsepol/tests/ |
H A D | test-expander-users.c | 37 unsigned char *found; /* array of booleans of roles found */ 38 int extra = 0; /* number of extra roles found */ 48 ebitmap_for_each_bit(&user->roles.roles, tnode, i) {
|
/external/selinux/policycoreutils/gui/ |
H A D | usersPage.py | 106 roles = self.selinuxRolesEntry.get_text() 109 (rc, out) = commands.getstatusoutput("semanage user -a -R '%s' -r %s %s" % (roles, range, user)) 117 self.store.set_value(iter, 2, roles) 122 roles = self.selinuxRolesEntry.get_text() 125 (rc, out) = commands.getstatusoutput("semanage user -m -R '%s' -r %s %s" % (roles, range, user))
|
/external/selinux/checkpolicy/test/ |
H A D | dismod.c | 64 "classes", "roles ", "types ", "users ", "bools ", 179 int display_mod_role_set(role_set_t * roles, policydb_t * p, FILE * fp) argument 183 if (roles->flags & ROLE_STAR) { 186 } else if (roles->flags & ROLE_COMP) { 190 for (i = ebitmap_startbit(&roles->roles); 191 i < ebitmap_length(&roles->roles); i++) { 192 if (!ebitmap_get_bit(&roles->roles, [all...] |