/external/selinux/libsepol/src/ |
H A D | context.c | 38 role_datum_t *role; local 45 if (!c->role || c->role > p->p_roles.nprim) 54 if (c->role != OBJECT_R_VAL) { 58 role = p->role_val_to_struct[c->role - 1]; 59 if (!role || !ebitmap_get_bit(&role->cache, c->type - 1)) 60 /* role may not be associated with type */ 64 * User must be authorized for the role 157 char *role = strdup(sepol_context_get_role(record)); local [all...] |
H A D | context_record.c | 15 /* Selinux role */ 16 char *role; member in struct:sepol_context 56 return con->role; 62 sepol_context_t * con, const char *role) 65 char *tmp_role = strdup(role); 68 "context role to %s", role); 71 free(con->role); 72 con->role = tmp_role; 143 con->role [all...] |
H A D | user_record.c | 18 /* The role array */ 177 sepol_user_t * user, const char *role) 183 if (sepol_user_has_role(user, role)) 186 role_cp = strdup(role); 200 ERR(handle, "out of memory, could not add role %s", role); 208 int sepol_user_has_role(const sepol_user_t * user, const char *role) 214 if (!strcmp(user->roles[i], role)) 293 void sepol_user_del_role(sepol_user_t * user, const char *role) 298 if (!strcmp(user->roles[i], role)) { 176 sepol_user_add_role(sepol_handle_t * handle, sepol_user_t * user, const char *role) argument [all...] |
H A D | users.c | 42 char *role = policydb->p_role_val_to_name[bit]; local 43 if (sepol_user_add_role(handle, tmp_record, role) < 0) 161 /* For every role */ 164 /* Search for the role */ 167 ERR(handle, "undefined role %s for user %s", 172 /* Set the role and every role it dominates */ 269 ERR(handle, "unable to expand role set");
|
/external/snakeyaml/src/test/java/examples/collections/ |
H A D | TypeSafeMap2Test.java | 154 private String role; field in class:TypeSafeMap2Test.Developer2 159 private Developer2(String name, String role) { argument 161 this.role = role; 173 return role; 176 public void setRole(String role) { argument 177 this.role = role; 200 return "Developer " + name + " " + role; 212 private SuperMan(String name, String role, boolea argument [all...] |
H A D | TypeSafeSetImplementationsTest.java | 147 private String role; field in class:TypeSafeSetImplementationsTest.Developer 152 public Developer(String name, String role) { argument 154 this.role = role; 166 return role; 169 public void setRole(String role) { argument 170 this.role = role;
|
/external/webrtc/webrtc/base/ |
H A D | sslstreamadapterhelper.cc | 41 void SSLStreamAdapterHelper::SetServerRole(SSLRole role) { argument 42 role_ = role;
|
/external/webrtc/webrtc/p2p/base/ |
H A D | transportdescription.h | 69 bool StringToConnectionRole(const std::string& role_str, ConnectionRole* role); 70 bool ConnectionRoleToString(const ConnectionRole& role, std::string* role_str); 83 ConnectionRole role, 90 connection_role(role), 79 TransportDescription(const std::vector<std::string>& transport_options, const std::string& ice_ufrag, const std::string& ice_pwd, IceMode ice_mode, ConnectionRole role, const rtc::SSLFingerprint* identity_fingerprint, const Candidates& candidates) argument
|
H A D | transport.cc | 73 void Transport::SetIceRole(IceRole role) { argument 74 ice_role_ = role; 113 // trigger an ICE restart and depends on the new ICE role. 369 // ice_lite, this local end point should take CONTROLLING role.
|
H A D | transportcontroller_unittest.cc | 243 // Test that when one channel encounters a role conflict, the ICE role is 264 rtc::SSLRole role; local 265 EXPECT_FALSE(transport_controller_->GetSslRole("video", &role)); 266 EXPECT_TRUE(transport_controller_->GetSslRole("audio", &role)); 267 EXPECT_EQ(rtc::SSL_CLIENT, role); 425 // Need controlling ICE role to get in failed state.
|
H A D | dtlstransportchannel.cc | 172 bool DtlsTransportChannelWrapper::SetSslRole(rtc::SSLRole role) { argument 174 if (ssl_role_ != role) { 181 ssl_role_ = role; 185 bool DtlsTransportChannelWrapper::GetSslRole(rtc::SSLRole* role) const { 186 *role = ssl_role_;
|
/external/google-tv-pairing-protocol/cpp/src/polo/wire/protobuf/ |
H A D | protobufwireadapter.cc | 240 pairing::message::OptionsMessage::ProtocolRole role = local 243 pairing::message::ConfigurationMessage message(encoding, role); 449 pairing::message::OptionsMessage::ProtocolRole role) { 450 switch (role) { 461 ProtobufWireAdapter::RoleFromProto(Options_RoleType role) { argument 462 switch (role) { 448 RoleToProto( pairing::message::OptionsMessage::ProtocolRole role) argument
|
/external/selinux/libselinux/src/ |
H A D | get_context_list.c | 14 const char *role, 33 if (role2 && !strcmp(role, role2)) { 57 const char *role, 68 return get_default_context_with_role(user, role, fromcon, 90 rc = get_default_context_with_role(user, role, newfromcon, newcon); 176 /* Extract the role and type of the fromcon for matching. 13 get_default_context_with_role(const char *user, const char *role, char * fromcon, char ** newcon) argument
|
/external/selinux/libsepol/tests/ |
H A D | test-common.c | 188 role_datum_t *role; local 191 role = hashtab_search(decl->p_roles.table, id); 193 role = hashtab_search(p->p_roles.table, id); 195 if (!role) 196 printf("role %s can't be found! \n", id); 198 CU_ASSERT_FATAL(role != NULL); 200 ebitmap_for_each_bit(&role->types.types, tnode, i) { 217 printf("\nrole %s has %d types, %d expected\n", p->sym_val_to_name[SYM_ROLES][role->s.value - 1], found, len); 219 CU_ASSERT(role->types.negset.highbit == 0); 220 CU_ASSERT(role [all...] |
/external/sl4a/Common/src/com/googlecode/android_scripting/facade/bluetooth/ |
H A D | BluetoothHealthFacade.java | 141 @RpcParameter(name = "role") Integer role) throws Exception{ 138 bluetoothHealthRegisterAppConfiguration( @pcParametername = �) String name, @RpcParameter(name = �) Integer dataType, @RpcParameter(name = �) Integer role) argument
|
/external/wpa_supplicant_8/hostapd/src/p2p/ |
H A D | p2p_invitation.c | 648 int p2p_invite(struct p2p_data *p2p, const u8 *peer, enum p2p_invite_role role, argument 655 p2p_dbg(p2p, "Request to invite peer " MACSTR " role=%d persistent=%d " 657 MAC2STR(peer), role, persistent_group, force_freq); 674 p2p->retry_invite_req = role == P2P_INVITE_ROLE_GO && 687 role != P2P_INVITE_ROLE_CLIENT) < 0) 690 if (persistent_group && role == P2P_INVITE_ROLE_CLIENT && !force_freq && 711 p2p->inv_role = role;
|
/external/wpa_supplicant_8/src/p2p/ |
H A D | p2p_invitation.c | 648 int p2p_invite(struct p2p_data *p2p, const u8 *peer, enum p2p_invite_role role, argument 655 p2p_dbg(p2p, "Request to invite peer " MACSTR " role=%d persistent=%d " 657 MAC2STR(peer), role, persistent_group, force_freq); 674 p2p->retry_invite_req = role == P2P_INVITE_ROLE_GO && 687 role != P2P_INVITE_ROLE_CLIENT) < 0) 690 if (persistent_group && role == P2P_INVITE_ROLE_CLIENT && !force_freq && 711 p2p->inv_role = role;
|
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
H A D | dbus_new_handlers_wps.c | 25 int role; /* 0 - not set, 1 - enrollee, 2 - registrar */ member in struct:wps_start_params 52 params->role = 1; 54 params->role = 2; 56 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Unknown role %s", val); 217 * information about role (enrollee or registrar), authorization method 254 "dbus: WPS.Start - Pin required for registrar role"); 256 message, "Pin required for registrar role."); 268 if (params.role == 0) { 272 } else if (params.role == 2) { 275 "dbus: WPS.Start - Pin required for registrar role"); [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/p2p/ |
H A D | p2p_invitation.c | 648 int p2p_invite(struct p2p_data *p2p, const u8 *peer, enum p2p_invite_role role, argument 655 p2p_dbg(p2p, "Request to invite peer " MACSTR " role=%d persistent=%d " 657 MAC2STR(peer), role, persistent_group, force_freq); 674 p2p->retry_invite_req = role == P2P_INVITE_ROLE_GO && 687 role != P2P_INVITE_ROLE_CLIENT) < 0) 690 if (persistent_group && role == P2P_INVITE_ROLE_CLIENT && !force_freq && 711 p2p->inv_role = role;
|
/external/clang/test/CXX/temp/temp.decls/temp.friend/ |
H A D | p1.cpp | 289 void foo(Role<N, test13::Foo> &role) { argument 290 (void) role.x;
|
/external/webrtc/talk/app/webrtc/ |
H A D | datachannel.cc | 47 bool SctpSidAllocator::AllocateSid(rtc::SSLRole role, int* sid) { argument 48 int potential_sid = (role == rtc::SSL_CLIENT) ? 0 : 1;
|
/external/wpa_supplicant_8/wpa_supplicant/hidl/1.0/ |
H A D | hidl.cpp | 494 struct wpa_supplicant *wpa_s, const struct wpa_ssid *ssid, const char *role) 496 if (!wpa_s || !ssid || !role) 507 hidl_manager->notifyP2pGroupRemoved(wpa_s, ssid, role); 493 wpas_hidl_notify_p2p_group_removed( struct wpa_supplicant *wpa_s, const struct wpa_ssid *ssid, const char *role) argument
|
H A D | hidl.h | 77 const char *role); 184 struct wpa_supplicant *wpa_s, const struct wpa_ssid *ssid, const char *role) 183 wpas_hidl_notify_p2p_group_removed( struct wpa_supplicant *wpa_s, const struct wpa_ssid *ssid, const char *role) argument
|
/external/selinux/checkpolicy/test/ |
H A D | dismod.c | 416 char *user, *role, *type; local 421 role = p->p_role_val_to_name[cur->context[0].role - 1]; 424 cur->u.name, cur->sid[0], user, role, type); 430 role = p->p_role_val_to_name[cur->context[0].role - 1]; 433 cur->u.name, cur->sid[0], user, role, type); 464 fprintf(fp, "role transition "); 477 fprintf(fp, "role allow "); 499 role_datum_t *role; local [all...] |
/external/selinux/libsepol/cil/src/ |
H A D | cil_reset_ast.c | 137 static void cil_reset_role(struct cil_role *role) argument 140 role->bounds = NULL;
|