Searched refs:roles (Results 1 - 25 of 63) sorted by relevance

123

/external/chromium-trace/trace-viewer/third_party/Paste/paste/auth/
H A Dgrantip.py4 Grant roles and logins based on IP address.
13 and logins and roles are assigned based on that.
15 ``ip_map`` is a map of {ip_mask: (username, roles)}. Either
16 ``username`` or ``roles`` may be None. Roles may also be prefixed
37 def _convert_user_role(self, username, roles):
38 if roles and isinstance(roles, six.string_types):
39 roles = roles.split(',')
40 return (username, roles)
[all...]
/external/selinux/libsepol/include/sepol/
H A Droles.h12 char ***roles, unsigned int *nroles);
/external/selinux/libsepol/tests/policies/test-hooks/
H A Dmodule_add_symbols.conf11 user user_add_1 roles { role_add_1 };
/external/jetty/src/java/org/eclipse/jetty/security/authentication/
H A DLoginCallbackImpl.java46 private String[] roles = IdentityService.NO_ROLES; field in class:LoginCallbackImpl
93 return roles;
98 this.roles = groups;
H A DLoginCallback.java50 public void setRoles(String[] roles); argument
/external/jetty/src/java/org/eclipse/jetty/security/
H A DSpnegoUserIdentity.java34 public SpnegoUserIdentity( Subject subject, Principal principal, List<String> roles )
38 _roles = roles;
H A DConstraintAware.java33 /** Set Constraint Mappings and roles.
36 * @param roles
38 void setConstraintMappings(List<ConstraintMapping> constraintMappings, Set<String> roles); argument
H A DDefaultIdentityService.java32 * associated {@link org.eclipse.jetty.server.UserIdentity.Scope}. If there are roles
48 * If there are roles refs present in the scope, then wrap the UserIdentity
85 public UserIdentity newUserIdentity(final Subject subject, final Principal userPrincipal, final String[] roles) argument
87 return new DefaultUserIdentity(subject,userPrincipal,roles);
H A DDefaultUserIdentity.java39 public DefaultUserIdentity(Subject subject, Principal userPrincipal, String[] roles) argument
43 _roles=roles;
H A DIdentityService.java80 * @param roles set of roles to include in UserIdentity.
83 UserIdentity newUserIdentity(Subject subject, Principal userPrincipal, String[] roles); argument
H A DPropertyUserStore.java143 String roles = null;
147 roles = credentials.substring(c + 1).trim();
154 if (roles != null && roles.length() > 0)
156 roleArray = roles.split(",");
166 if (roles != null)
H A DJDBCLoginService.java254 List<String> roles = new ArrayList<String>();
256 roles.add(rs.getString(_roleTableRoleField));
259 return putUser(username, Credential.getCredential(credentials),roles.toArray(new String[roles.size()]));
H A DMappedLoginService.java183 * @param roles The users roles
186 public synchronized UserIdentity putUser(String userName, Credential credential, String[] roles) argument
193 if (roles!=null)
194 for (String role : roles)
198 UserIdentity identity=_identityService.newUserIdentity(subject,userPrincipal,roles);
/external/selinux/libsepol/src/
H A Duser_record.c19 char **roles; member in struct:sepol_user
21 /* The number of roles */
181 roles_realloc = realloc(user->roles,
188 user->roles = roles_realloc;
189 user->roles[user->num_roles - 1] = role_cp;
208 if (!strcmp(user->roles[i], role))
239 free(user->roles[i]);
240 free(user->roles);
241 user->roles = tmp_roles;
246 ERR(handle, "out of memory, could not allocate roles arra
[all...]
H A Dusers.c22 ebitmap_t *roles = &(usrdatum->roles.roles); local
34 /* Extract roles */
35 ebitmap_for_each_bit(roles, rnode, bit) {
112 const char **roles = NULL; local
133 if (sepol_user_get_roles(handle, user, &roles, &num_roles) < 0)
162 (const hashtab_key_t)roles[i]);
165 roles[i], cname);
173 (&(usrdatum->roles
[all...]
H A Droles.c23 /* Fill an array with all valid roles */
25 sepol_policydb_t * p, char ***roles, unsigned int *nroles)
43 *roles = tmp_roles;
48 ERR(handle, "out of memory, could not list roles");
24 sepol_role_list(sepol_handle_t * handle, sepol_policydb_t * p, char ***roles, unsigned int *nroles) argument
H A Dgenusers.c90 ebitmap_destroy(&usrdatum->roles.roles);
91 ebitmap_init(&usrdatum->roles.roles);
130 if (strncasecmp(p, "roles", 5))
174 (&usrdatum->roles.roles, bit, 1)) {
/external/jetty/src/java/org/eclipse/jetty/util/security/
H A DConstraint.java118 public void setRoles(String[] roles) argument
120 _roles = roles;
122 if (roles != null)
123 for (int i = roles.length; !_anyRole && i-- > 0;)
124 _anyRole |= ANY_ROLE.equals(roles[i]);
138 * @return List of roles for this constraint.
178 * @return True if authentication required but no roles set
/external/selinux/libsemanage/src/
H A Dseusers_local.c22 char *roles = NULL; local
38 roles = malloc(size);
39 if (roles) {
40 strcpy(roles,roles_arr[0]);
42 strcat(roles,",");
43 strcat(roles,roles_arr[i]);
51 return roles;
61 char *roles = NULL; local
74 roles = semanage_user_roles(handle, sename);
87 if (roles
[all...]
H A Dusers_base_file.c27 const char **roles = NULL; local
34 if (fprintf(str, "user %s roles { ", name) < 0)
37 if (semanage_user_base_get_roles(handle, user, &roles, &nroles) < 0)
41 if (fprintf(str, "%s ", roles[i]) < 0)
56 free(roles);
60 free(roles);
97 if (parse_assert_str(handle, info, "roles") < 0)
/external/libxml2/include/libxml/
H A Dxlink.h94 * @roles: pointer to the array of locator roles
96 * @from: pointer to the array of source roles found on the arcs
97 * @to: pointer to the array of target roles found on the arcs
111 const xlinkRole *roles,
127 * @roles: pointer to the array of locator roles
139 const xlinkRole *roles,
/external/selinux/libsepol/cil/test/integration_testing/
H A Dnonmls.conf73 user foo_u roles foo_r;
/external/selinux/libsepol/tests/
H A Dtest-expander-users.c37 unsigned char *found; /* array of booleans of roles found */
38 int extra = 0; /* number of extra roles found */
48 ebitmap_for_each_bit(&user->roles.roles, tnode, i) {
/external/selinux/policycoreutils/gui/
H A DusersPage.py106 roles = self.selinuxRolesEntry.get_text()
109 (rc, out) = commands.getstatusoutput("semanage user -a -R '%s' -r %s %s" % (roles, range, user))
117 self.store.set_value(iter, 2, roles)
122 roles = self.selinuxRolesEntry.get_text()
125 (rc, out) = commands.getstatusoutput("semanage user -m -R '%s' -r %s %s" % (roles, range, user))
/external/selinux/checkpolicy/test/
H A Ddismod.c64 "classes", "roles ", "types ", "users ", "bools ",
179 int display_mod_role_set(role_set_t * roles, policydb_t * p, FILE * fp) argument
183 if (roles->flags & ROLE_STAR) {
186 } else if (roles->flags & ROLE_COMP) {
190 for (i = ebitmap_startbit(&roles->roles);
191 i < ebitmap_length(&roles->roles); i++) {
192 if (!ebitmap_get_bit(&roles->roles,
[all...]

Completed in 1358 milliseconds

123