/external/webrtc/webrtc/p2p/base/ |
H A D | transportdescription.cc | 20 const char* const roles[] = { local 27 for (size_t i = 0; i < arraysize(roles); ++i) { 28 if (_stricmp(roles[i], role_str.c_str()) == 0) {
|
/external/selinux/libsepol/src/ |
H A D | roles.c | 21 /* Fill an array with all valid roles */ 23 sepol_policydb_t * p, char ***roles, unsigned int *nroles) 41 *roles = tmp_roles; 46 ERR(handle, "out of memory, could not list roles"); 22 sepol_role_list(sepol_handle_t * handle, sepol_policydb_t * p, char ***roles, unsigned int *nroles) argument
|
H A D | context.c | 40 ebitmap_t types, roles; local 44 ebitmap_init(&roles);
|
H A D | user_record.c | 19 char **roles; member in struct:sepol_user 21 /* The number of roles */ 187 roles_realloc = realloc(user->roles, 194 user->roles = roles_realloc; 195 user->roles[user->num_roles - 1] = role_cp; 214 if (!strcmp(user->roles[i], role)) 245 free(user->roles[i]); 246 free(user->roles); 247 user->roles = tmp_roles; 252 ERR(handle, "out of memory, could not allocate roles arra [all...] |
H A D | users.c | 22 ebitmap_t *roles; local 31 roles = &(usrdatum->roles.roles); 39 /* Extract roles */ 40 ebitmap_for_each_bit(roles, rnode, bit) { 117 const char **roles = NULL; local 138 if (sepol_user_get_roles(handle, user, &roles, &num_roles) < 0) 165 roldatum = hashtab_search(policydb->p_roles.table, roles[i]); 168 roles[ [all...] |
H A D | expand.c | 526 * The boundaries have to be copied after the types/roles/users are copied, 764 if (map_ebitmap(&role->roles, &mapped_roles, state->rolemap)) 766 if (ebitmap_union(&new_role->roles, &mapped_roles)) { 773 ebitmap_for_each_bit(&role->roles, rnode, i) { 858 * the roles have been added */ 1051 /* get global roles for this user */ 1052 if (role_set_expand(&user->roles, &tmp_union, state->out, state->base, state->rolemap)) { 1058 if (ebitmap_union(&new_user->roles.roles, &tmp_union)) { 1225 ebitmap_t roles, new_role local 1294 ebitmap_t roles, types; local 2432 ebitmap_t mapped_roles, roles; local [all...] |
H A D | link.c | 389 /* new_role's dominates, types and roles field will be copied 555 /* new_users's roles and MLS fields will be copied during 757 * The boundaries have to be copied after the types/roles/users are copied, 1014 static int role_set_or_convert(role_set_t * roles, role_set_t * dst, argument 1022 ebitmap_for_each_bit(&roles->roles, rnode, i) { 1031 if (ebitmap_union(&dst->roles, &tmp)) { 1034 dst->flags |= roles->flags; 1137 ebitmap_for_each_bit(&role->roles, rnode, i) { 1146 if (ebitmap_union(&dest_role->roles, [all...] |
H A D | module_to_cil.c | 190 /* A linked list of all roles stored in the pdb 827 pos = &rs->roles; 934 if (ebitmap_cmp(&rs1->roles, &rs2->roles) == 0) 1025 rc = set_to_names(pdb, 0, &rs->roles, attr_list, names, num_names); 1030 rc = ebitmap_to_names(&rs->roles, pdb->p_role_val_to_name, names, num_names); 1430 rs = &rule->roles; 1471 char **roles = NULL; local 1479 rs = &rule->roles; 1480 rc = process_roleset(pdb, rs, attr_list, &roles, 2271 struct ebitmap roles = user->roles.roles; local [all...] |
/external/snakeyaml/src/test/java/org/yaml/snakeyaml/issues/issue72/ |
H A D | CollectionTest.java | 71 private Collection<Integer> roles; field in class:CollectionTest.CollectionSet 74 roles = new HashSet<Integer>(); 75 roles.add(11); 76 roles.add(13); 80 return roles; 83 public void setRoles(Collection<Integer> roles) { argument 84 this.roles = roles;
|
/external/selinux/libsemanage/src/ |
H A D | users_base_file.c | 27 const char **roles = NULL; local 34 if (fprintf(str, "user %s roles { ", name) < 0) 37 if (semanage_user_base_get_roles(handle, user, &roles, &nroles) < 0) 41 if (fprintf(str, "%s ", roles[i]) < 0) 56 free(roles); 60 free(roles); 97 if (parse_assert_str(handle, info, "roles") < 0)
|
H A D | seusers_local.c | 22 char *roles = NULL; local 38 roles = malloc(size); 39 if (roles) { 40 strcpy(roles,roles_arr[0]); 42 strcat(roles,","); 43 strcat(roles,roles_arr[i]); 51 return roles; 61 char *roles = NULL; local 74 roles = semanage_user_roles(handle, sename); 87 if (roles [all...] |
/external/selinux/checkpolicy/test/ |
H A D | dismod.c | 64 "classes", "roles ", "types ", "users ", "bools ", 179 int display_mod_role_set(role_set_t * roles, policydb_t * p, FILE * fp) argument 183 if (roles->flags & ROLE_STAR) { 186 } else if (roles->flags & ROLE_COMP) { 190 for (i = ebitmap_startbit(&roles->roles); 191 i < ebitmap_length(&roles->roles); i++) { 192 if (!ebitmap_get_bit(&roles->roles, [all...] |
/external/selinux/python/sepolgen/src/sepolgen/ |
H A D | refpolicy.py | 129 def roles(self): member in class:Node 858 self.roles = IdSet() 874 for role in self.roles:
|
/external/selinux/python/sepolicy/sepolicy/ |
H A D | __init__.py | 107 roles = None variable 136 global roles 145 roles = None 183 'roles': map(str, x.expand()), 222 'roles': map(str, x.roles), 823 global roles 824 if roles: 825 return roles 828 roles [all...] |
/external/selinux/checkpolicy/ |
H A D | policy_parse.y | 79 %type <ptr> role_def roles 505 role_dominance : DOMINANCE '{' roles '}' 515 roles : role_def label 517 | roles role_def 522 | ROLE identifier_push '{' roles '}'
|
H A D | policy_define.c | 2703 if (ebitmap_set_bit(&attr->roles, (r->s.value - 1), TRUE)) { 2768 if (ebitmap_set_bit(&attr->roles, (r->s.value - 1), TRUE)) { 2855 /* go through all the roles */ 2951 * Now go through all the roles and escalate this role's 3023 if (ebitmap_set_bit(&set->roles, r->s.value - 1, TRUE)) { 3036 role_set_t roles; local 3059 role_set_init(&roles); 3066 if (set_roles(&roles, id)) 3118 if (role_set_expand(&roles, &e_roles, policydbp, NULL, NULL)) 3170 rule->roles [all...] |
/external/selinux/libsepol/cil/src/ |
H A D | cil_policy.c | 1495 static void cil_role_types_to_policy(FILE *out, struct cil_list *roles, struct cil_list *types) argument 1502 cil_list_for_each(i1, roles) { 1527 static void cil_roleattributes_to_policy(FILE *out, struct cil_list *roles, struct cil_list *attributes) argument 1534 cil_list_for_each(i1, roles) { 1540 if (ebitmap_get_bit(attribute->roles, role->value)) { 1588 struct cil_list *roles = NULL; local 1598 if (ebitmap_get_bit(user->roles, role->value)) { 1600 cil_list_init(&roles, CIL_LIST); 1602 cil_list_append(roles, CIL_ROLE, role); 1607 fprintf(out, " roles"); [all...] |
H A D | cil_internal.h | 435 ebitmap_t *roles; member in struct:cil_user 496 ebitmap_t *roles; member in struct:cil_roleattribute 897 /* Default labeling behavior for users, roles, and types */
|
/external/selinux/libsepol/include/sepol/policydb/ |
H A D | policydb.h | 79 * users, roles, types, sensitivities, categories, etc. 92 ebitmap_t roles; member in struct:role_set 136 ebitmap_t dominates; /* set of roles dominated by this role */ 143 ebitmap_t roles; /* roles with this attribute */ member in struct:role_datum 198 role_set_t roles; /* set of authorized roles for user */ member in struct:user_datum 294 role_set_t roles; /* current role */ member in struct:role_trans_rule 302 role_set_t roles; /* current role */ member in struct:role_allow_rule 303 role_set_t new_roles; /* new roles */ [all...] |
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
H A D | org.eclipse.equinox.security_1.0.200.v20100503.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
H A D | org.mortbay.jetty.server_6.1.23.v201004211559.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
/external/guice/extensions/struts2/lib/ |
H A D | jetty-6.1.0.jar | ... Node) String role
java.util.Iterator iter
Object roles
String guarantee
String method
org.mortbay.jetty. ... |
H A D | struts2-core-2.2.1.jar | META-INF/ META-INF/MANIFEST.MF org/ org/apache/ org/apache/struts2/ org/apache/struts2/dispatcher/ ... |
/external/guice/extensions/persist/lib/ |
H A D | hsqldb.jar | META-INF/ META-INF/MANIFEST.MF org/ org/hsqldb/ org/hsqldb/index/ org/hsqldb/jdbc/ org/ ... |
H A D | hibernate3.jar | META-INF/ META-INF/MANIFEST.MF org/ org/hibernate/ org/hibernate/AssertionFailure.class AssertionFailure. ... |