/external/chromium-trace/catapult/third_party/Paste/paste/auth/ |
H A D | grantip.py | 4 Grant roles and logins based on IP address. 13 and logins and roles are assigned based on that. 15 ``ip_map`` is a map of {ip_mask: (username, roles)}. Either 16 ``username`` or ``roles`` may be None. Roles may also be prefixed 37 def _convert_user_role(self, username, roles): 38 if roles and isinstance(roles, six.string_types): 39 roles = roles.split(',') 40 return (username, roles) [all...] |
/external/webrtc/webrtc/p2p/base/ |
H A D | transportdescription.cc | 20 const char* const roles[] = { local 27 for (size_t i = 0; i < arraysize(roles); ++i) { 28 if (_stricmp(roles[i], role_str.c_str()) == 0) {
|
/external/selinux/libsepol/include/sepol/ |
H A D | roles.h | 12 char ***roles, unsigned int *nroles);
|
/external/selinux/libsepol/tests/policies/test-hooks/ |
H A D | module_add_symbols.conf | 11 user user_add_1 roles { role_add_1 };
|
/external/snakeyaml/src/test/java/org/yaml/snakeyaml/issues/issue72/ |
H A D | CollectionTest.java | 71 private Collection<Integer> roles; field in class:CollectionTest.CollectionSet 74 roles = new HashSet<Integer>(); 75 roles.add(11); 76 roles.add(13); 80 return roles; 83 public void setRoles(Collection<Integer> roles) { argument 84 this.roles = roles;
|
/external/jetty/src/java/org/eclipse/jetty/security/authentication/ |
H A D | LoginCallbackImpl.java | 46 private String[] roles = IdentityService.NO_ROLES; field in class:LoginCallbackImpl 93 return roles; 98 this.roles = groups;
|
H A D | LoginCallback.java | 50 public void setRoles(String[] roles); argument
|
/external/jetty/src/java/org/eclipse/jetty/security/ |
H A D | SpnegoUserIdentity.java | 34 public SpnegoUserIdentity( Subject subject, Principal principal, List<String> roles ) 38 _roles = roles;
|
H A D | ConstraintAware.java | 33 /** Set Constraint Mappings and roles. 36 * @param roles 38 void setConstraintMappings(List<ConstraintMapping> constraintMappings, Set<String> roles); argument
|
H A D | DefaultIdentityService.java | 32 * associated {@link org.eclipse.jetty.server.UserIdentity.Scope}. If there are roles 48 * If there are roles refs present in the scope, then wrap the UserIdentity 85 public UserIdentity newUserIdentity(final Subject subject, final Principal userPrincipal, final String[] roles) argument 87 return new DefaultUserIdentity(subject,userPrincipal,roles);
|
H A D | DefaultUserIdentity.java | 39 public DefaultUserIdentity(Subject subject, Principal userPrincipal, String[] roles) argument 43 _roles=roles;
|
H A D | IdentityService.java | 80 * @param roles set of roles to include in UserIdentity. 83 UserIdentity newUserIdentity(Subject subject, Principal userPrincipal, String[] roles); argument
|
H A D | PropertyUserStore.java | 143 String roles = null; 147 roles = credentials.substring(c + 1).trim(); 154 if (roles != null && roles.length() > 0) 156 roleArray = roles.split(","); 166 if (roles != null)
|
/external/selinux/libsepol/src/ |
H A D | user_record.c | 19 char **roles; member in struct:sepol_user 21 /* The number of roles */ 181 roles_realloc = realloc(user->roles, 188 user->roles = roles_realloc; 189 user->roles[user->num_roles - 1] = role_cp; 208 if (!strcmp(user->roles[i], role)) 239 free(user->roles[i]); 240 free(user->roles); 241 user->roles = tmp_roles; 246 ERR(handle, "out of memory, could not allocate roles arra [all...] |
H A D | users.c | 22 ebitmap_t *roles = &(usrdatum->roles.roles); local 34 /* Extract roles */ 35 ebitmap_for_each_bit(roles, rnode, bit) { 112 const char **roles = NULL; local 133 if (sepol_user_get_roles(handle, user, &roles, &num_roles) < 0) 162 (const hashtab_key_t)roles[i]); 165 roles[i], cname); 173 (&(usrdatum->roles [all...] |
H A D | roles.c | 23 /* Fill an array with all valid roles */ 25 sepol_policydb_t * p, char ***roles, unsigned int *nroles) 43 *roles = tmp_roles; 48 ERR(handle, "out of memory, could not list roles"); 24 sepol_role_list(sepol_handle_t * handle, sepol_policydb_t * p, char ***roles, unsigned int *nroles) argument
|
H A D | genusers.c | 90 ebitmap_destroy(&usrdatum->roles.roles); 91 ebitmap_init(&usrdatum->roles.roles); 130 if (strncasecmp(p, "roles", 5)) 174 (&usrdatum->roles.roles, bit, 1)) {
|
/external/jetty/src/java/org/eclipse/jetty/util/security/ |
H A D | Constraint.java | 118 public void setRoles(String[] roles) argument 120 _roles = roles; 122 if (roles != null) 123 for (int i = roles.length; !_anyRole && i-- > 0;) 124 _anyRole |= ANY_ROLE.equals(roles[i]); 138 * @return List of roles for this constraint. 178 * @return True if authentication required but no roles set
|
/external/selinux/libsemanage/src/ |
H A D | seusers_local.c | 22 char *roles = NULL; local 38 roles = malloc(size); 39 if (roles) { 40 strcpy(roles,roles_arr[0]); 42 strcat(roles,","); 43 strcat(roles,roles_arr[i]); 51 return roles; 61 char *roles = NULL; local 74 roles = semanage_user_roles(handle, sename); 87 if (roles [all...] |
H A D | users_base_file.c | 27 const char **roles = NULL; local 34 if (fprintf(str, "user %s roles { ", name) < 0) 37 if (semanage_user_base_get_roles(handle, user, &roles, &nroles) < 0) 41 if (fprintf(str, "%s ", roles[i]) < 0) 56 free(roles); 60 free(roles); 97 if (parse_assert_str(handle, info, "roles") < 0)
|
/external/libxml2/include/libxml/ |
H A D | xlink.h | 94 * @roles: pointer to the array of locator roles 96 * @from: pointer to the array of source roles found on the arcs 97 * @to: pointer to the array of target roles found on the arcs 111 const xlinkRole *roles, 127 * @roles: pointer to the array of locator roles 139 const xlinkRole *roles,
|
/external/selinux/libsepol/cil/test/integration_testing/ |
H A D | nonmls.conf | 73 user foo_u roles foo_r;
|
/external/selinux/libsepol/tests/ |
H A D | test-expander-users.c | 37 unsigned char *found; /* array of booleans of roles found */ 38 int extra = 0; /* number of extra roles found */ 48 ebitmap_for_each_bit(&user->roles.roles, tnode, i) {
|
/external/autotest/frontend/server/ |
H A D | models.py | 21 'Roles : %(roles)s\n' 49 roles = ','.join([r.role for r in self.roles.all()]) 54 'roles': roles, 66 return [r.role for r in self.roles.all()] 76 'roles': ['drone', 'scheduler'], 85 details['roles'] = self.get_role_names() 97 # Valid roles for a server. 102 # When deleting any of following roles fro [all...] |
/external/autotest/site_utils/ |
H A D | deploy_production.py | 33 @returns: A list of a list of tuple of (server_name, server_status, roles). 42 # 'roles': ['drone', 'scheduler'], 55 servers = [s for s in servers if 'devserver' not in s['roles'] and 56 'crash_server' not in s['roles'] and 57 'reserve' not in s['roles']] 64 info = (server['hostname'], server['status'], server['roles']) 66 order = min([PUSH_ORDER[r] for r in server['roles'] 70 # All roles are not indexed in PUSH_ORDER. 73 # Push all servers with unknown roles together. 191 @param servers: A list of tuple of (server_name, server_status, roles) [all...] |