/third_party/selinux/libsepol/tests/ |
H A D | test-linker-roles.c | 34 * - role in appropriate symtab (global and decl) 39 * - role in base, no modules 40 * - role in base optional, no modules 41 * - role a in base, b in module 42 * - role a in base and module (additive) 43 * - role a in base and 2 module 44 * - role a in base optional, b in module 45 * - role a in base, b in module optional 46 * - role a in base optional, b in module optional 47 * - role 56 only_dominates_self(policydb_t * p __attribute__ ((unused)), role_datum_t * role) only_dominates_self() argument 72 role_datum_t *role; base_role_tests() local 101 role_datum_t *role; module_role_tests() local [all...] |
H A D | test-common.c | 191 role_datum_t *role; in test_role_type_set() local 194 role = hashtab_search(decl->p_roles.table, id); in test_role_type_set() 196 role = hashtab_search(p->p_roles.table, id); in test_role_type_set() 198 if (!role) in test_role_type_set() 199 printf("role %s can't be found! \n", id); in test_role_type_set() 201 CU_ASSERT_FATAL(role != NULL); in test_role_type_set() 203 ebitmap_for_each_positive_bit(&role->types.types, tnode, i) { in test_role_type_set() 219 printf("\nrole %s has %d types, %d expected\n", p->sym_val_to_name[SYM_ROLES][role->s.value - 1], found, len); in test_role_type_set() 221 CU_ASSERT(role->types.negset.highbit == 0); in test_role_type_set() 222 CU_ASSERT(role in test_role_type_set() [all...] |
/third_party/selinux/libsepol/src/ |
H A D | context.c | 38 role_datum_t *role; in context_is_valid() local 44 if (!c->role || c->role > p->p_roles.nprim) in context_is_valid() 53 if (c->role != OBJECT_R_VAL) { in context_is_valid() 57 role = p->role_val_to_struct[c->role - 1]; in context_is_valid() 58 if (!role || !ebitmap_get_bit(&role->cache, c->type - 1)) in context_is_valid() 59 /* role may not be associated with type */ in context_is_valid() 63 * User must be authorized for the role in context_is_valid() 156 char *role = strdup(sepol_context_get_role(record)); context_from_record() local [all...] |
H A D | context_record.c | 15 /* Selinux role */ 16 char *role; member 54 return con->role; in sepol_context_get_role() 59 sepol_context_t * con, const char *role) in sepol_context_set_role() 62 char *tmp_role = strdup(role); in sepol_context_set_role() 65 "context role to %s", role); in sepol_context_set_role() 68 free(con->role); in sepol_context_set_role() 69 con->role = tmp_role; in sepol_context_set_role() 135 con->role in sepol_context_create() 58 sepol_context_set_role(sepol_handle_t * handle, sepol_context_t * con, const char *role) sepol_context_set_role() argument [all...] |
H A D | user_record.c | 19 /* The role array */ 173 sepol_user_t * user, const char *role) in sepol_user_add_role() 179 if (sepol_user_has_role(user, role)) in sepol_user_add_role() 182 role_cp = strdup(role); in sepol_user_add_role() 199 ERR(handle, "out of memory, could not add role %s", role); in sepol_user_add_role() 206 int sepol_user_has_role(const sepol_user_t * user, const char *role) in sepol_user_has_role() argument 212 if (!strcmp(user->roles[i], role)) in sepol_user_has_role() 289 void sepol_user_del_role(sepol_user_t * user, const char *role) in sepol_user_del_role() argument 294 if (!strcmp(user->roles[i], role)) { in sepol_user_del_role() 172 sepol_user_add_role(sepol_handle_t * handle, sepol_user_t * user, const char *role) sepol_user_add_role() argument [all...] |
/third_party/node/deps/npm/node_modules/@tufjs/models/dist/ |
H A D | root.js | 11 const role_1 = require("./role"); 16 * The top-level role and metadata file signed by the root keys. 17 * This role specifies trusted keys for all other top-level roles, which may further delegate trust. 26 this.roles = role_1.TOP_LEVEL_ROLE_NAMES.reduce((acc, role) => ({ 28 [role]: new role_1.Role({ keyIDs: [], threshold: 1 }), 33 if (!role_1.TOP_LEVEL_ROLE_NAMES.every((role) => roleNames.has(role))) { 34 throw new error_1.ValueError('missing top-level role'); 39 addKey(key, role) { 40 if (!this.roles[role]) { [all...] |
H A D | delegations.js | 10 const role_1 = require("./role"); 24 throw new error_1.ValueError('Delegated role name conflicts with top-level role name'); 41 for (const role of Object.values(this.roles)) { 42 if (role.isDelegatedPath(targetPath)) { 43 yield { role: role.name, terminating: role.terminating }; 49 role: this.succinctRoles.getRoleForTarget(targetPath), 89 return Object.values(roles).map((role) [all...] |
H A D | metadata.js | 56 let role; 61 role = this.signed.roles[delegatedRole]; 69 role = this.signed.delegations.roles[delegatedRole]; 73 role = this.signed.delegations.succinctRoles; 80 if (!role) { 84 role.keyIDs.forEach((keyID) => { 98 if (signingKeys.size < role.threshold) { 99 throw new error_1.UnsignedMetadataError(`${delegatedRole} was signed by ${signingKeys.size}/${role.threshold} keys`);
|
/third_party/pulseaudio/src/modules/ |
H A D | module-intended-roles.c | 64 static bool role_match(pa_proplist *proplist, const char *role) { in role_match() argument 65 return pa_str_in_list_spaces(pa_proplist_gets(proplist, PA_PROP_DEVICE_INTENDED_ROLES), role); in role_match() 69 const char *role; in sink_input_new_hook_callback() local 87 if (!(role = pa_proplist_gets(new_data->proplist, PA_PROP_MEDIA_ROLE))) { in sink_input_new_hook_callback() 88 pa_log_debug("Not setting device for stream %s, because it lacks role.", pa_strnull(pa_proplist_gets(new_data->proplist, PA_PROP_MEDIA_NAME))); in sink_input_new_hook_callback() 94 if (role_match(c->default_sink->proplist, role) && pa_sink_input_new_data_set_sink(new_data, c->default_sink, false, false)) in sink_input_new_hook_callback() 105 if (role_match(s->proplist, role) && pa_sink_input_new_data_set_sink(new_data, s, false, false)) in sink_input_new_hook_callback() 113 const char *role; in source_output_new_hook_callback() local 131 if (!(role = pa_proplist_gets(new_data->proplist, PA_PROP_MEDIA_ROLE))) { in source_output_new_hook_callback() 132 pa_log_debug("Not setting device for stream %s, because it lacks role in source_output_new_hook_callback() 173 const char *role; sink_put_hook_callback() local 220 const char *role; source_put_hook_callback() local 275 const char *role; sink_unlink_hook_callback() local 326 const char *role; source_unlink_hook_callback() local [all...] |
H A D | module-augment-properties.c | 56 char *role; member 71 pa_xfree(r->role); in rule_free() 109 pa_xfree(r->role); in parse_categories() 110 r->role = pa_xstrdup("game"); in parse_categories() 112 pa_xfree(r->role); in parse_categories() 113 r->role = pa_xstrdup("phone"); in parse_categories() 230 pa_xfree(r->role); in update_rule() 231 r->application_name = r->icon_name = r->role = NULL; in update_rule() 267 if (r->role) in apply_rule() 269 pa_proplist_sets(p, PA_PROP_MEDIA_ROLE, r->role); in apply_rule() [all...] |
H A D | stream-interaction.c | 78 const char *role, *trigger_role; in get_trigger_role() local 81 if (!(role = pa_proplist_gets(GET_PROPLIST_FROM_STREAM(stream), PA_PROP_MEDIA_ROLE))) in get_trigger_role() 82 role = "no_role"; in get_trigger_role() 89 if (pa_streq(role, trigger_role)) in get_trigger_role() 95 if (pa_streq(role, trigger_role)) in get_trigger_role() 140 /* Find any trigger role among the sink-inputs and source-outputs. */ in find_global_trigger_stream() 198 const char *role; in apply_interaction_to_sink() local 203 if (!(role = pa_proplist_gets(j->proplist, PA_PROP_MEDIA_ROLE))) in apply_interaction_to_sink() 204 role = "no_role"; in apply_interaction_to_sink() 207 if ((trigger = pa_streq(role, interaction_rol in apply_interaction_to_sink() 253 const char *role; remove_interactions() local [all...] |
/third_party/skia/infra/bots/recipe_modules/builder_name_schema/ |
H A D | builder_name_schema.py | 74 for role in BUILDER_ROLES: 75 assert role in BUILDER_NAME_SCHEMA 89 role_key = 'role' 91 role_key = 'sub-role-%d' % depth 92 role = parts.get(role_key) 93 if not role: 95 s = BUILDER_NAME_SCHEMA.get(role) 97 raise ValueError('Invalid parts; unknown role %s' % role) 98 rv_parts.append(role) [all...] |
/third_party/selinux/libselinux/utils/ |
H A D | getdefaultcon.c | 23 char *user = NULL, *level = NULL, *role=NULL, *seuser=NULL, *dlevel=NULL; in main() local 35 free(role); in main() 36 role = strdup(optarg); in main() 78 if (role != NULL && role[0]) in main() 79 ret=get_default_context_with_rolelevel(seuser, role, level,cur_context,&usercon); in main() 87 printf("%s: %s from %s %s %s %s -> %s\n", argv[0], user, cur_context, seuser, role, level, usercon); in main() 93 free(role); in main()
|
/third_party/selinux/libselinux/src/ |
H A D | get_default_type.c | 8 static int find_default_type(FILE * fp, const char *role, char **type); 10 int get_default_type(const char *role, char **type) in get_default_type() argument 18 if (find_default_type(fp, role, type) < 0) { in get_default_type() 27 static int find_default_type(FILE * fp, const char *role, char **type) in find_default_type() argument 35 len = strlen(role); in find_default_type() 50 if (!strncmp(role, ptr, len)) { in find_default_type()
|
/third_party/skia/infra/bots/recipe_modules/builder_name_schema/examples/ |
H A D | full.py | 24 api.builder_name_schema.MakeBuilderName(role='nope') 34 api.builder_name_schema.MakeBuilderName(role='Build', bogus='BOGUS') 40 role='Build', 67 api.builder_name_schema.MakeBuilderName(role='Upload') 73 'role': 'Upload', 74 'sub-role-1': 'fake', 82 role='Build',
|
/third_party/node/deps/openssl/openssl/ssl/statem/ |
H A D | extensions_cust.c | 75 * Find a custom extension from the list. The |role| param is there to 82 ENDPOINT role, unsigned int ext_type, in custom_ext_find() 90 && (role == ENDPOINT_BOTH || role == meth->role in custom_ext_find() 91 || meth->role == ENDPOINT_BOTH)) { in custom_ext_find() 120 ENDPOINT role = ENDPOINT_BOTH; in custom_ext_parse() local 123 role = s->server ? ENDPOINT_SERVER : ENDPOINT_CLIENT; in custom_ext_parse() 125 meth = custom_ext_find(exts, role, ext_type, NULL); in custom_ext_parse() 260 custom_ext_method *methdst = custom_ext_find(dst, methsrc->role, in custom_exts_copy_flags() 81 custom_ext_find(const custom_ext_methods *exts, ENDPOINT role, unsigned int ext_type, size_t *idx) custom_ext_find() argument 347 add_custom_ext_intern(SSL_CTX *ctx, ENDPOINT role, unsigned int ext_type, unsigned int context, SSL_custom_ext_add_cb_ex add_cb, SSL_custom_ext_free_cb_ex free_cb, void *add_arg, SSL_custom_ext_parse_cb_ex parse_cb, void *parse_arg) add_custom_ext_intern() argument 412 add_old_custom_ext(SSL_CTX *ctx, ENDPOINT role, unsigned int ext_type, unsigned int context, custom_ext_add_cb add_cb, custom_ext_free_cb free_cb, void *add_arg, custom_ext_parse_cb parse_cb, void *parse_arg) add_old_custom_ext() argument [all...] |
/third_party/openssl/ssl/statem/ |
H A D | extensions_cust.c | 75 * Find a custom extension from the list. The |role| param is there to 82 ENDPOINT role, unsigned int ext_type, in custom_ext_find() 90 && (role == ENDPOINT_BOTH || role == meth->role in custom_ext_find() 91 || meth->role == ENDPOINT_BOTH)) { in custom_ext_find() 120 ENDPOINT role = ENDPOINT_BOTH; in custom_ext_parse() local 123 role = s->server ? ENDPOINT_SERVER : ENDPOINT_CLIENT; in custom_ext_parse() 125 meth = custom_ext_find(exts, role, ext_type, NULL); in custom_ext_parse() 260 custom_ext_method *methdst = custom_ext_find(dst, methsrc->role, in custom_exts_copy_flags() 81 custom_ext_find(const custom_ext_methods *exts, ENDPOINT role, unsigned int ext_type, size_t *idx) custom_ext_find() argument 345 add_custom_ext_intern(SSL_CTX *ctx, ENDPOINT role, unsigned int ext_type, unsigned int context, SSL_custom_ext_add_cb_ex add_cb, SSL_custom_ext_free_cb_ex free_cb, void *add_arg, SSL_custom_ext_parse_cb_ex parse_cb, void *parse_arg) add_custom_ext_intern() argument 410 add_old_custom_ext(SSL_CTX *ctx, ENDPOINT role, unsigned int ext_type, unsigned int context, custom_ext_add_cb add_cb, custom_ext_free_cb free_cb, void *add_arg, custom_ext_parse_cb parse_cb, void *parse_arg) add_old_custom_ext() argument [all...] |
/third_party/skia/infra/bots/gen_tasks_logic/ |
H A D | job_builder.go | 155 if b.role("Build") { 161 if b.role("BuildStats") { 175 if b.role("Test") { 183 if b.role("FM") { 189 if b.role("Canary") { 206 // TODO(kjlubick) make this a new role 212 if b.role("Perf") { 228 } else if b.frequency("OnDemand") || b.role("Canary") {
|
H A D | schema.go | 37 // role returns true if the role for this job equals any of the given values. 38 func (p parts) role(eq ...string) bool { 39 return p.equal("role", eq...) 146 // matchRole returns true if the role for this job matches any of the given 149 return p.matchPart("role", re...) 301 parse = func(depth int, role string, parts []string) ([]string, error) { 302 s, ok := s.Schema[role] 304 return nil, fmt.Errorf("Invalid job name; %q is not a valid role.", role) [all...] |
/third_party/selinux/libsepol/include/sepol/policydb/ |
H A D | context.h | 31 * identity, a role, a type and a MLS range. 35 uint32_t role; member 124 dst->role = src->role; in context_cpy() 134 c->user = c->role = c->type = 0; in context_destroy() 141 (c1->role == c2->role) && in context_cmp()
|
/third_party/selinux/checkpolicy/ |
H A D | module_compiler.c | 57 [SYM_ROLES] = "role", 217 char *role_id, role_datum_t *role) in role_implicit_bounds() 235 yyerror2("role %s doesn't exist, is implicit bounds of %s", in role_implicit_bounds() 240 if (!role->bounds) in role_implicit_bounds() 241 role->bounds = bounds->s.value; in role_implicit_bounds() 242 else if (role->bounds != bounds->s.value) { in role_implicit_bounds() 243 yyerror2("role %s has inconsistent bounds %s/%s", in role_implicit_bounds() 245 policydbp->p_role_val_to_name[role->bounds - 1]); in role_implicit_bounds() 253 static int create_role(uint32_t scope, unsigned char isattr, role_datum_t **role, char **key) in create_role() argument 260 *role in create_role() 216 role_implicit_bounds(hashtab_t roles_tab, char *role_id, role_datum_t *role) role_implicit_bounds() argument 319 role_datum_t *role = NULL; declare_role() local 896 role_datum_t *role = NULL; require_role_or_attribute() local [all...] |
/third_party/cJSON/tests/unity/auto/ |
H A D | colour_prompt.rb | 112 def colour_puts(role, str) 113 ColourCommandLine.new.out_c(:puts, role, str) 116 def colour_print(role, str) 117 ColourCommandLine.new.out_c(:print, role, str)
|
/third_party/unity/auto/ |
H A D | colour_prompt.rb | 113 def colour_puts(role, str) 114 ColourCommandLine.new.out_c(:puts, role, str) 117 def colour_print(role, str) 118 ColourCommandLine.new.out_c(:print, role, str)
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/wpa_gui-qt4/ |
H A D | eventhistory.cpp | 27 QVariant EventListModel::data(const QModelIndex &index, int role) const in data() 32 if (role == Qt::DisplayRole) in data() 48 int role) const in headerData() 50 if (role != Qt::DisplayRole) in headerData()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/wpa_gui-qt4/ |
H A D | eventhistory.cpp | 27 QVariant EventListModel::data(const QModelIndex &index, int role) const in data() 32 if (role == Qt::DisplayRole) in data() 48 int role) const in headerData() 50 if (role != Qt::DisplayRole) in headerData()
|