/third_party/node/deps/npm/node_modules/@tufjs/models/dist/ |
H A D | root.js | 17 * This role specifies trusted keys for all other top-level roles, which may further delegate trust. 25 if (!options.roles) { 26 this.roles = role_1.TOP_LEVEL_ROLE_NAMES.reduce((acc, role) => ({ 32 const roleNames = new Set(Object.keys(options.roles)); 36 this.roles = options.roles; 40 if (!this.roles[role]) { 43 if (!this.roles[role].keyIDs.includes(key.keyID)) { 44 this.roles[role].keyIDs.push(key.keyID); 55 util_1.default.isDeepStrictEqual(this.roles, othe [all...] |
H A D | delegations.js | 15 * Targets roles that are trusted to provide signed metadata files 22 if (options.roles) { 23 if (Object.keys(options.roles).some((roleName) => role_1.TOP_LEVEL_ROLE_NAMES.includes(roleName))) { 28 this.roles = options.roles; 35 util_1.default.isDeepStrictEqual(this.roles, other.roles) && 40 if (this.roles) { 41 for (const role of Object.values(this.roles)) { 59 if (this.roles) { [all...] |
H A D | metadata.js | 61 role = this.signed.roles[delegatedRole]; 68 if (this.signed.delegations.roles) { 69 role = this.signed.delegations.roles[delegatedRole];
|
/third_party/selinux/libsepol/src/ |
H A D | user_record.c | 20 char **roles; member 22 /* The number of roles */ 186 roles_realloc = reallocarray(user->roles, in sepol_user_add_role() 193 user->roles = roles_realloc; in sepol_user_add_role() 194 user->roles[user->num_roles - 1] = role_cp; in sepol_user_add_role() 212 if (!strcmp(user->roles[i], role)) in sepol_user_has_role() 242 free(user->roles[i]); in sepol_user_set_roles() 243 free(user->roles); in sepol_user_set_roles() 244 user->roles = tmp_roles; in sepol_user_set_roles() 249 ERR(handle, "out of memory, could not allocate roles arra in sepol_user_set_roles() [all...] |
H A D | users.c | 22 ebitmap_t *roles; in user_to_record() local 31 roles = &(usrdatum->roles.roles); in user_to_record() 39 /* Extract roles */ in user_to_record() 40 ebitmap_for_each_positive_bit(roles, rnode, bit) { in user_to_record() 115 const char **roles = NULL; in sepol_user_modify() local 136 if (sepol_user_get_roles(handle, user, &roles, &num_roles) < 0) in sepol_user_modify() 163 roldatum = hashtab_search(policydb->p_roles.table, roles[i]); in sepol_user_modify() 166 roles[ in sepol_user_modify() [all...] |
H A D | expand.c | 74 static int ebitmap_expand_roles(policydb_t *p, ebitmap_t *roles) in ebitmap_expand_roles() argument 82 ebitmap_for_each_positive_bit(roles, node, bit) { in ebitmap_expand_roles() 91 if (ebitmap_union(&tmp, &role->roles)) { in ebitmap_expand_roles() 97 ebitmap_destroy(roles); in ebitmap_expand_roles() 98 if (ebitmap_cpy(roles, &tmp)) { in ebitmap_expand_roles() 560 * The boundaries have to be copied after the types/roles/users are copied, 798 if (map_ebitmap(&role->roles, &mapped_roles, state->rolemap)) in role_fix_callback() 800 if (ebitmap_union(&new_role->roles, &mapped_roles)) { in role_fix_callback() 807 ebitmap_for_each_positive_bit(&role->roles, rnode, i) { in role_fix_callback() 890 * the roles hav in role_copy_callback() 1261 ebitmap_t roles, new_roles; copy_role_allows() local 1326 ebitmap_t roles, types; copy_role_trans() local 2456 ebitmap_t mapped_roles, roles; role_set_expand() local [all...] |
H A D | link.c | 391 /* new_role's dominates, types and roles field will be copied in role_copy_callback() 557 /* new_users's roles and MLS fields will be copied during in user_copy_callback() 759 * The boundaries have to be copied after the types/roles/users are copied, 1013 static int role_set_or_convert(role_set_t * roles, role_set_t * dst, in role_set_or_convert() argument 1019 if (ebitmap_convert(&roles->roles, &tmp, mod->map[SYM_ROLES])) in role_set_or_convert() 1021 if (ebitmap_union(&dst->roles, &tmp)) { in role_set_or_convert() 1024 dst->flags |= roles->flags; in role_set_or_convert() 1118 if (ebitmap_convert(&role->roles, &e_tmp, mod->map[SYM_ROLES])) in role_fix_callback() 1120 if (ebitmap_union(&dest_role->roles, in role_fix_callback() [all...] |
H A D | module_to_cil.c | 197 /* A linked list of all roles stored in the pdb 842 pos = &rs->roles; in cil_print_attr_strs() 943 if (ebitmap_cmp(&rs1->roles, &rs2->roles) == 0) in search_attr_list() 1041 rc = set_to_names(pdb, 0, &rs->roles, attr_list, names, num_names); in process_roleset() 1046 rc = ebitmap_to_names(&rs->roles, pdb->p_role_val_to_name, names, num_names); in process_roleset() 1445 rs = &rule->roles; in role_trans_to_cil() 1483 char **roles = NULL; in role_allows_to_cil() local 1491 rs = &rule->roles; in role_allows_to_cil() 1492 rc = process_roleset(pdb, rs, attr_list, &roles, in role_allows_to_cil() 2314 struct ebitmap roles = user->roles.roles; user_to_cil() local [all...] |
H A D | context.c | 40 ebitmap_t types, roles; in context_is_valid() local 43 ebitmap_init(&roles); in context_is_valid()
|
H A D | kernel_to_conf.c | 2332 char *name, *roles, *level, *range; in write_user_decl_rules_to_conf() local 2365 if (!ebitmap_is_empty(&user->roles.roles)) { in write_user_decl_rules_to_conf() 2366 roles = ebitmap_to_str(&user->roles.roles, in write_user_decl_rules_to_conf() 2368 if (!roles) { in write_user_decl_rules_to_conf() 2372 if (strchr(roles, ' ')) { in write_user_decl_rules_to_conf() 2373 sepol_printf(out, " roles { %s }", roles); in write_user_decl_rules_to_conf() [all...] |
H A D | hierarchy.c | 567 if (up && !ebitmap_contains(&up->roles.roles, &u->roles.roles)) { in bounds_check_user_callback()
|
H A D | policydb_validate.c | 161 if (validate_ebitmap(&role_set->roles, role)) in validate_role_set() 446 if (validate_ebitmap(&role->roles, &flavors[SYM_ROLES])) in validate_role_datum() 622 if (validate_role_set(&user->roles, &flavors[SYM_ROLES])) in validate_user_datum() 1200 if (validate_role_set(&role_trans->roles, &flavors[SYM_ROLES])) in validate_role_trans_rules() 1220 if (validate_role_set(&role_allow->roles, &flavors[SYM_ROLES])) in validate_role_allow_rules()
|
H A D | policydb.c | 469 "roles", 523 ebitmap_init(&x->roles); in role_set_init() 528 ebitmap_destroy(&x->roles); in role_set_destroy() 537 ebitmap_init(&x->roles); in role_datum_init() 546 ebitmap_destroy(&x->roles); in role_datum_destroy() 566 role_set_init(&x->roles); in user_datum_init() 577 role_set_destroy(&x->roles); in user_datum_destroy() 646 role_set_init(&x->roles); in role_trans_rule_init() 654 role_set_destroy(&x->roles); in role_trans_rule_destroy() 700 role_set_init(&x->roles); in role_allow_rule_init() [all...] |
/third_party/selinux/checkpolicy/test/ |
H A D | dismod.c | 63 "classes", "roles ", "types ", "users ", "bools ", 178 static int display_mod_role_set(role_set_t * roles, policydb_t * p, FILE * fp) in display_mod_role_set() argument 182 if (roles->flags & ROLE_STAR) { in display_mod_role_set() 185 } else if (roles->flags & ROLE_COMP) { in display_mod_role_set() 189 for (i = ebitmap_startbit(&roles->roles); in display_mod_role_set() 190 i < ebitmap_length(&roles->roles); i++) { in display_mod_role_set() 191 if (!ebitmap_get_bit(&roles->roles, in display_mod_role_set() [all...] |
/third_party/pulseaudio/src/modules/ |
H A D | stream-interaction.c | 421 const char *roles; in pa_stream_interaction_init() local 450 roles = pa_modargs_get_value(ma, "trigger_roles", NULL); in pa_stream_interaction_init() 451 if (roles) { in pa_stream_interaction_init() 454 while ((n = pa_split(roles, "/", &split_state))) { in pa_stream_interaction_init() 459 roles = pa_modargs_get_value(ma, "ducking_roles", NULL); in pa_stream_interaction_init() 460 if (roles) { in pa_stream_interaction_init() 463 while ((n = pa_split(roles, "/", &split_state))) { in pa_stream_interaction_init() 498 roles = pa_modargs_get_value(ma, "trigger_roles", NULL); in pa_stream_interaction_init() 499 if (roles) { in pa_stream_interaction_init() 503 while ((roles_in_group = pa_split(roles, "/", in pa_stream_interaction_init() [all...] |
/third_party/selinux/libsepol/tests/ |
H A D | test-expander-users.c | 38 unsigned char *found; /* array of booleans of roles found */ in check_user_roles() 39 int extra = 0; /* number of extra roles found */ in check_user_roles() 49 ebitmap_for_each_positive_bit(&user->roles.roles, tnode, i) { in check_user_roles()
|
/third_party/selinux/libsepol/include/sepol/policydb/ |
H A D | policydb.h | 82 * users, roles, types, sensitivities, categories, etc. 95 ebitmap_t roles; member 140 ebitmap_t dominates; /* set of roles dominated by this role */ 147 ebitmap_t roles; /* roles with this attribute */ member 207 role_set_t roles; /* set of authorized roles for user */ member 303 role_set_t roles; /* current role */ member 311 role_set_t roles; /* current role */ member 312 role_set_t new_roles; /* new roles */ [all...] |
/third_party/mesa3d/docs/_exts/ |
H A D | nir.py | 125 roles = { variable in NIRDomain 126 'alu-op' : sphinx.roles.XRefRole(),
|
/third_party/selinux/libsepol/cil/src/ |
H A D | cil_post.c | 978 attr->roles = cil_malloc(sizeof(*attr->roles)); in __evaluate_role_expression() 979 rc = __cil_expr_list_to_bitmap(attr->expr_list, attr->roles, db->num_roles, db); in __evaluate_role_expression() 982 ebitmap_destroy(attr->roles); in __evaluate_role_expression() 983 free(attr->roles); in __evaluate_role_expression() 984 attr->roles = NULL; in __evaluate_role_expression() 998 if (attr->roles == NULL) { in __cil_role_to_bitmap() 1002 ebitmap_union(bitmap, attr->roles); in __cil_role_to_bitmap() 1562 if (attr->roles == NULL) { in __cil_post_db_attr_helper() 1663 ebitmap_for_each_positive_bit(attr->roles, rnod in __cil_post_db_roletype_helper() [all...] |
H A D | cil_policy.c | 1493 static void cil_role_types_to_policy(FILE *out, struct cil_list *roles, struct cil_list *types) in cil_role_types_to_policy() argument 1500 cil_list_for_each(i1, roles) { in cil_role_types_to_policy() 1525 static void cil_roleattributes_to_policy(FILE *out, struct cil_list *roles, struct cil_list *attributes) in cil_roleattributes_to_policy() argument 1532 cil_list_for_each(i1, roles) { in cil_roleattributes_to_policy() 1538 if (ebitmap_get_bit(attribute->roles, role->value)) { in cil_roleattributes_to_policy() 1586 struct cil_list *roles = NULL; in cil_users_to_policy() local 1596 if (ebitmap_get_bit(user->roles, role->value)) { in cil_users_to_policy() 1598 cil_list_init(&roles, CIL_LIST); in cil_users_to_policy() 1600 cil_list_append(roles, CIL_ROLE, role); in cil_users_to_policy() 1605 fprintf(out, " roles"); in cil_users_to_policy() [all...] |
/third_party/python/Doc/tools/ |
H A D | rstlint.py | 45 roles = [ variable 102 all_roles = "(" + "|".join(roles) + ")"
|
/third_party/selinux/checkpolicy/ |
H A D | policy_parse.y | 79 %type <ptr> role_def roles 514 role_dominance : DOMINANCE '{' roles '}' 524 roles : role_def label 526 | roles role_def 531 | ROLE identifier_push '{' roles '}'
|
/third_party/libuv/docs/src/sphinx-plugins/ |
H A D | manpage.py | 14 from docutils.parsers.rst.roles import set_classes
|
/third_party/node/deps/npm/node_modules/npm-profile/lib/ |
H A D | index.js | 136 roles: [], 162 roles: [], 189 if (!body[k] || k === 'roles') {
|
/third_party/typescript/tests/baselines/reference/ |
H A D | recursiveConditionalCrash3.js | 38 roles: CanBeExpanded<Role[]>
|