Searched defs:role (Results 26 - 50 of 142) sorted by relevance

123456

/external/selinux/libsepol/src/
H A Dcontext.c38 role_datum_t *role; local
45 if (!c->role || c->role > p->p_roles.nprim)
54 if (c->role != OBJECT_R_VAL) {
58 role = p->role_val_to_struct[c->role - 1];
59 if (!role || !ebitmap_get_bit(&role->cache, c->type - 1))
60 /* role may not be associated with type */
64 * User must be authorized for the role
157 char *role = strdup(sepol_context_get_role(record)); local
[all...]
H A Dcontext_record.c15 /* Selinux role */
16 char *role; member in struct:sepol_context
56 return con->role;
62 sepol_context_t * con, const char *role)
65 char *tmp_role = strdup(role);
68 "context role to %s", role);
71 free(con->role);
72 con->role = tmp_role;
143 con->role
[all...]
H A Duser_record.c18 /* The role array */
177 sepol_user_t * user, const char *role)
183 if (sepol_user_has_role(user, role))
186 role_cp = strdup(role);
200 ERR(handle, "out of memory, could not add role %s", role);
208 int sepol_user_has_role(const sepol_user_t * user, const char *role)
214 if (!strcmp(user->roles[i], role))
293 void sepol_user_del_role(sepol_user_t * user, const char *role)
298 if (!strcmp(user->roles[i], role)) {
176 sepol_user_add_role(sepol_handle_t * handle, sepol_user_t * user, const char *role) argument
[all...]
H A Dusers.c42 char *role = policydb->p_role_val_to_name[bit]; local
43 if (sepol_user_add_role(handle, tmp_record, role) < 0)
161 /* For every role */
164 /* Search for the role */
167 ERR(handle, "undefined role %s for user %s",
172 /* Set the role and every role it dominates */
269 ERR(handle, "unable to expand role set");
/external/snakeyaml/src/test/java/examples/collections/
H A DTypeSafeMap2Test.java154 private String role; field in class:TypeSafeMap2Test.Developer2
159 private Developer2(String name, String role) { argument
161 this.role = role;
173 return role;
176 public void setRole(String role) { argument
177 this.role = role;
200 return "Developer " + name + " " + role;
212 private SuperMan(String name, String role, boolea argument
[all...]
H A DTypeSafeSetImplementationsTest.java147 private String role; field in class:TypeSafeSetImplementationsTest.Developer
152 public Developer(String name, String role) { argument
154 this.role = role;
166 return role;
169 public void setRole(String role) { argument
170 this.role = role;
/external/webrtc/webrtc/base/
H A Dsslstreamadapterhelper.cc41 void SSLStreamAdapterHelper::SetServerRole(SSLRole role) { argument
42 role_ = role;
/external/webrtc/webrtc/p2p/base/
H A Dtransportdescription.h69 bool StringToConnectionRole(const std::string& role_str, ConnectionRole* role);
70 bool ConnectionRoleToString(const ConnectionRole& role, std::string* role_str);
83 ConnectionRole role,
90 connection_role(role),
79 TransportDescription(const std::vector<std::string>& transport_options, const std::string& ice_ufrag, const std::string& ice_pwd, IceMode ice_mode, ConnectionRole role, const rtc::SSLFingerprint* identity_fingerprint, const Candidates& candidates) argument
H A Dtransport.cc73 void Transport::SetIceRole(IceRole role) { argument
74 ice_role_ = role;
113 // trigger an ICE restart and depends on the new ICE role.
369 // ice_lite, this local end point should take CONTROLLING role.
H A Dtransportcontroller_unittest.cc243 // Test that when one channel encounters a role conflict, the ICE role is
264 rtc::SSLRole role; local
265 EXPECT_FALSE(transport_controller_->GetSslRole("video", &role));
266 EXPECT_TRUE(transport_controller_->GetSslRole("audio", &role));
267 EXPECT_EQ(rtc::SSL_CLIENT, role);
425 // Need controlling ICE role to get in failed state.
H A Ddtlstransportchannel.cc172 bool DtlsTransportChannelWrapper::SetSslRole(rtc::SSLRole role) { argument
174 if (ssl_role_ != role) {
181 ssl_role_ = role;
185 bool DtlsTransportChannelWrapper::GetSslRole(rtc::SSLRole* role) const {
186 *role = ssl_role_;
/external/google-tv-pairing-protocol/cpp/src/polo/wire/protobuf/
H A Dprotobufwireadapter.cc240 pairing::message::OptionsMessage::ProtocolRole role = local
243 pairing::message::ConfigurationMessage message(encoding, role);
449 pairing::message::OptionsMessage::ProtocolRole role) {
450 switch (role) {
461 ProtobufWireAdapter::RoleFromProto(Options_RoleType role) { argument
462 switch (role) {
448 RoleToProto( pairing::message::OptionsMessage::ProtocolRole role) argument
/external/selinux/libselinux/src/
H A Dget_context_list.c14 const char *role,
33 if (role2 && !strcmp(role, role2)) {
57 const char *role,
68 return get_default_context_with_role(user, role, fromcon,
90 rc = get_default_context_with_role(user, role, newfromcon, newcon);
176 /* Extract the role and type of the fromcon for matching.
13 get_default_context_with_role(const char *user, const char *role, char * fromcon, char ** newcon) argument
/external/selinux/libsepol/tests/
H A Dtest-common.c188 role_datum_t *role; local
191 role = hashtab_search(decl->p_roles.table, id);
193 role = hashtab_search(p->p_roles.table, id);
195 if (!role)
196 printf("role %s can't be found! \n", id);
198 CU_ASSERT_FATAL(role != NULL);
200 ebitmap_for_each_bit(&role->types.types, tnode, i) {
217 printf("\nrole %s has %d types, %d expected\n", p->sym_val_to_name[SYM_ROLES][role->s.value - 1], found, len);
219 CU_ASSERT(role->types.negset.highbit == 0);
220 CU_ASSERT(role
[all...]
/external/sl4a/Common/src/com/googlecode/android_scripting/facade/bluetooth/
H A DBluetoothHealthFacade.java141 @RpcParameter(name = "role") Integer role) throws Exception{
138 bluetoothHealthRegisterAppConfiguration( @pcParametername = �) String name, @RpcParameter(name = �) Integer dataType, @RpcParameter(name = �) Integer role) argument
/external/wpa_supplicant_8/hostapd/src/p2p/
H A Dp2p_invitation.c648 int p2p_invite(struct p2p_data *p2p, const u8 *peer, enum p2p_invite_role role, argument
655 p2p_dbg(p2p, "Request to invite peer " MACSTR " role=%d persistent=%d "
657 MAC2STR(peer), role, persistent_group, force_freq);
674 p2p->retry_invite_req = role == P2P_INVITE_ROLE_GO &&
687 role != P2P_INVITE_ROLE_CLIENT) < 0)
690 if (persistent_group && role == P2P_INVITE_ROLE_CLIENT && !force_freq &&
711 p2p->inv_role = role;
/external/wpa_supplicant_8/src/p2p/
H A Dp2p_invitation.c648 int p2p_invite(struct p2p_data *p2p, const u8 *peer, enum p2p_invite_role role, argument
655 p2p_dbg(p2p, "Request to invite peer " MACSTR " role=%d persistent=%d "
657 MAC2STR(peer), role, persistent_group, force_freq);
674 p2p->retry_invite_req = role == P2P_INVITE_ROLE_GO &&
687 role != P2P_INVITE_ROLE_CLIENT) < 0)
690 if (persistent_group && role == P2P_INVITE_ROLE_CLIENT && !force_freq &&
711 p2p->inv_role = role;
/external/wpa_supplicant_8/wpa_supplicant/dbus/
H A Ddbus_new_handlers_wps.c25 int role; /* 0 - not set, 1 - enrollee, 2 - registrar */ member in struct:wps_start_params
52 params->role = 1;
54 params->role = 2;
56 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Unknown role %s", val);
217 * information about role (enrollee or registrar), authorization method
254 "dbus: WPS.Start - Pin required for registrar role");
256 message, "Pin required for registrar role.");
268 if (params.role == 0) {
272 } else if (params.role == 2) {
275 "dbus: WPS.Start - Pin required for registrar role");
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/p2p/
H A Dp2p_invitation.c648 int p2p_invite(struct p2p_data *p2p, const u8 *peer, enum p2p_invite_role role, argument
655 p2p_dbg(p2p, "Request to invite peer " MACSTR " role=%d persistent=%d "
657 MAC2STR(peer), role, persistent_group, force_freq);
674 p2p->retry_invite_req = role == P2P_INVITE_ROLE_GO &&
687 role != P2P_INVITE_ROLE_CLIENT) < 0)
690 if (persistent_group && role == P2P_INVITE_ROLE_CLIENT && !force_freq &&
711 p2p->inv_role = role;
/external/clang/test/CXX/temp/temp.decls/temp.friend/
H A Dp1.cpp289 void foo(Role<N, test13::Foo> &role) { argument
290 (void) role.x;
/external/webrtc/talk/app/webrtc/
H A Ddatachannel.cc47 bool SctpSidAllocator::AllocateSid(rtc::SSLRole role, int* sid) { argument
48 int potential_sid = (role == rtc::SSL_CLIENT) ? 0 : 1;
/external/wpa_supplicant_8/wpa_supplicant/hidl/1.0/
H A Dhidl.cpp494 struct wpa_supplicant *wpa_s, const struct wpa_ssid *ssid, const char *role)
496 if (!wpa_s || !ssid || !role)
507 hidl_manager->notifyP2pGroupRemoved(wpa_s, ssid, role);
493 wpas_hidl_notify_p2p_group_removed( struct wpa_supplicant *wpa_s, const struct wpa_ssid *ssid, const char *role) argument
H A Dhidl.h77 const char *role);
184 struct wpa_supplicant *wpa_s, const struct wpa_ssid *ssid, const char *role)
183 wpas_hidl_notify_p2p_group_removed( struct wpa_supplicant *wpa_s, const struct wpa_ssid *ssid, const char *role) argument
/external/selinux/checkpolicy/test/
H A Ddismod.c416 char *user, *role, *type; local
421 role = p->p_role_val_to_name[cur->context[0].role - 1];
424 cur->u.name, cur->sid[0], user, role, type);
430 role = p->p_role_val_to_name[cur->context[0].role - 1];
433 cur->u.name, cur->sid[0], user, role, type);
464 fprintf(fp, "role transition ");
477 fprintf(fp, "role allow ");
499 role_datum_t *role; local
[all...]
/external/selinux/libsepol/cil/src/
H A Dcil_reset_ast.c137 static void cil_reset_role(struct cil_role *role) argument
140 role->bounds = NULL;

Completed in 425 milliseconds

123456