/external/libselinux/src/ |
H A D | mapping.c | 21 access_vector_t perms[sizeof(access_vector_t) * 8]; member in struct:selinux_mapping 70 while (p_in->perms && p_in->perms[k]) { 72 if (!*p_in->perms[k]) { 76 p_out->perms[k] = string_to_av_perm(p_out->value, 77 p_in->perms[k]); 78 if (!p_out->perms[k]) 119 assert(current_mapping[tclass].perms[i]); 120 kperm |= current_mapping[tclass].perms[i]; 156 if (kperm & current_mapping[tclass].perms[ [all...] |
H A D | stringrep.c | 29 char **perms; member in struct:discover_class_node 75 /* allocate array for perms */ 76 node->perms = calloc(MAXVECTORS,sizeof(char*)); 77 if (node->perms == NULL) 101 snprintf(path, sizeof path, "%s/class/%s/perms",selinux_mnt,s); 111 snprintf(path, sizeof path, "%s/class/%s/perms/%s", selinux_mnt,s,dentry->d_name); 133 node->perms[value-1] = strdup(dentry->d_name); 134 if (node->perms[value-1] == NULL) 149 free(node->perms[i]); 153 free(node->perms); [all...] |
H A D | avc.c | 42 security_class_t tclass, access_vector_t perms, 48 access_vector_t perms; member in struct:avc_callback_node 835 access_vector_t perms, 839 security_class_t tclass, access_vector_t perms) 855 c->perms = perms; 868 access_vector_t perms) 872 node->ae.avd.allowed |= perms; 876 node->ae.avd.allowed &= ~perms; 879 node->ae.avd.auditallow |= perms; 832 avc_add_callback(int (*callback) (uint32_t event, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, access_vector_t * out_retained), uint32_t events, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms) argument 867 avc_update_node(uint32_t event, struct avc_node *node, access_vector_t perms) argument 893 avc_update_cache(uint32_t event, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms) argument 931 avc_control(uint32_t event, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, access_vector_t * out_retained) argument 991 avc_ss_grant(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno) argument 1012 avc_ss_try_revoke(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, access_vector_t * out_retained) argument 1032 avc_ss_revoke(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno) argument 1067 avc_ss_set_auditallow(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, uint32_t enable) argument 1088 avc_ss_set_auditdeny(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, uint32_t enable) argument [all...] |
/external/libselinux/include/selinux/ |
H A D | selinux.h | 253 const char *perms[sizeof(access_vector_t) * 8 + 1]; member in struct:security_class_mapping
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
H A D | ProtectionDomainTest.java | 44 private PermissionCollection perms = null; field in class:ProtectionDomainTest 61 perms = allperm.newPermissionCollection(); 62 perms.add(allperm); 77 new ProtectionDomain(cs, perms); 84 assertFalse(perms.isReadOnly()); 85 new ProtectionDomain(null, perms); 86 assertTrue(perms.isReadOnly()); 96 new ProtectionDomain(null, perms, null, null); 100 new ProtectionDomain(cs, perms, classldr, principals); 125 assertSame(new ProtectionDomain(null, perms) [all...] |
/external/chromium/chrome/browser/extensions/ |
H A D | extension_management_api.cc | 94 const std::set<std::string> perms = extension.api_permissions(); local 96 if (!perms.empty()) { 98 for (perms_iter = perms.begin(); perms_iter != perms.end(); ++perms_iter) {
|
/external/dbus/bus/ |
H A D | selinux.c | 178 access_vector_t perms, access_vector_t *out_retained) 176 policy_reload_callback(u_int32_t event, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, access_vector_t *out_retained) argument
|
/external/guava/guava-tests/test/com/google/common/util/concurrent/ |
H A D | JSR166TestCase.java | 667 Permissions perms = new Permissions(); field in class:JSR166TestCase.AdjustablePolicy 670 perms.add(permission); 672 void addPermission(Permission perm) { perms.add(perm); } 673 void clearPermissions() { perms = new Permissions(); } 675 return perms; 678 return perms; 681 return perms.implies(p);
|
/external/llvm/include/llvm/Support/ |
H A D | FileSystem.h | 99 enum perms { enum in namespace:llvm::sys::fs 124 // Helper functions so that you can use & and | to manipulate perms bits: 125 inline perms operator|(perms l , perms r) { 126 return static_cast<perms>( 129 inline perms operator&(perms l , perms r) { 130 return static_cast<perms>( [all...] |
/external/checkpolicy/ |
H A D | policy_define.c | 1443 perm->next = avrule->perms; 1444 avrule->perms = perm; 1597 class_perm_node_t *perms, *tail = NULL, *cur_perms = NULL; local 1643 perms = NULL; 1656 if (!perms) 1657 perms = cur_perms; 1664 cur_perms = perms; 1721 avrule->perms = perms;
|
/external/libsepol/src/ |
H A D | expand.c | 1598 uint32_t ttype, class_perm_node_t * perms, 1618 cur = perms; 1707 class_perm_node_t * perms, avtab_t * avtab, 1732 cur = perms; 1798 source_rule->perms, 1811 source_rule->perms, 1827 source_rule->perms, 1840 source_rule->perms, 2512 cur_perm = source_rule->perms; 2526 if (!avrule->perms) 1594 expand_terule_helper(sepol_handle_t * handle, policydb_t * p, uint32_t * typemap, uint32_t specified, cond_av_list_t ** cond, cond_av_list_t ** other, uint32_t stype, uint32_t ttype, class_perm_node_t * perms, avtab_t * avtab, int enabled) argument 1703 expand_avrule_helper(sepol_handle_t * handle, uint32_t specified, cond_av_list_t ** cond, uint32_t stype, uint32_t ttype, class_perm_node_t * perms, avtab_t * avtab, int enabled) argument [all...] |
/external/genext2fs/ |
H A D | genext2fs.c | 212 #define FM_IMASK 0007777 // *all* perms mask for everything below 2253 make_perms(uint32 mode, char perms[11]) argument 2255 strcpy(perms, "----------"); 2257 perms[1] = 'r'; 2259 perms[2] = 'w'; 2261 perms[3] = 'x'; 2263 perms[4] = 'r'; 2265 perms[5] = 'w'; 2267 perms[6] = 'x'; 2269 perms[ 2316 char perms[11]; local [all...] |
/external/libsepol/include/sepol/policydb/ |
H A D | policydb.h | 246 class_perm_node_t *perms; member in struct:avrule 705 /* the config flags related to unknown classes/perms are bits 2 and 3 */
|
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
H A D | org.eclipse.equinox.p2.touchpoint.natives_1.0.200.v20100503a.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
H A D | org.eclipse.osgi_3.6.1.R36x_v20100806.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
H A D | org.eclipse.osgi_3.6.2.R36x_v20101103.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
H A D | org.eclipse.equinox.p2.touchpoint.eclipse_2.0.2.R36x_v20100823.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
H A D | org.eclipse.pde.core_3.6.1.v20100902_r361.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |