/external/libselinux/src/ |
H A D | mapping.h | 16 unmap_class(security_class_t tclass); 19 unmap_perm(security_class_t tclass, access_vector_t tperm); 29 map_perm(security_class_t tclass, access_vector_t kperm); 32 map_decision(security_class_t tclass, struct av_decision *avd);
|
H A D | mapping.c | 101 unmap_class(security_class_t tclass) argument 103 if (tclass < current_mapping_size) 104 return current_mapping[tclass].value; 107 return tclass; 111 unmap_perm(security_class_t tclass, access_vector_t tperm) argument 113 if (tclass < current_mapping_size) { 117 for (i=0; i<current_mapping[tclass].num_perms; i++) 119 assert(current_mapping[tclass].perms[i]); 120 kperm |= current_mapping[tclass].perms[i]; 149 map_perm(security_class_t tclass, access_vector_ argument 169 map_decision(security_class_t tclass, struct av_decision *avd) argument [all...] |
H A D | avc.c | 21 security_class_t tclass; member in struct:avc_entry 42 security_class_t tclass, access_vector_t perms, 47 security_class_t tclass; member in struct:avc_callback_node 63 security_id_t tsid, security_class_t tclass) 65 return ((uintptr_t) ssid ^ ((uintptr_t) tsid << 2) ^ tclass) 295 security_class_t tclass) 313 hvalue = avc_hash(ssid, tsid, tclass); 318 new->ae.tclass = tclass; 328 security_class_t tclass, 62 avc_hash(security_id_t ssid, security_id_t tsid, security_class_t tclass) argument 293 avc_claim_node(security_id_t ssid, security_id_t tsid, security_class_t tclass) argument 326 avc_search_node(security_id_t ssid, security_id_t tsid, security_class_t tclass, int *probes) argument 374 avc_lookup(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t requested, struct avc_entry_ref *aeref) argument 416 avc_insert(security_id_t ssid, security_id_t tsid, security_class_t tclass, struct avc_entry *ae, struct avc_entry_ref *aeref) argument 596 avc_dump_av(security_class_t tclass, access_vector_t av) argument 630 avc_dump_query(security_id_t ssid, security_id_t tsid, security_class_t tclass) argument 643 avc_audit(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t requested, struct av_decision *avd, int result, void *a) argument 774 avc_compute_create(security_id_t ssid, security_id_t tsid, security_class_t tclass, security_id_t *newsid) argument 824 avc_add_callback(int (*callback) (uint32_t event, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, access_vector_t * out_retained), uint32_t events, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms) argument 885 avc_update_cache(uint32_t event, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms) argument 923 avc_control(uint32_t event, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, access_vector_t * out_retained) argument 983 avc_ss_grant(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno) argument 1004 avc_ss_try_revoke(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, access_vector_t * out_retained) argument 1024 avc_ss_revoke(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno) argument 1059 avc_ss_set_auditallow(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, uint32_t enable) argument 1080 avc_ss_set_auditdeny(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, uint32_t enable) argument [all...] |
H A D | compute_av.c | 15 security_class_t tclass, 42 unmap_class(tclass), unmap_perm(tclass, requested)); 63 map_decision(tclass, avd); 13 security_compute_av(const security_context_t scon, const security_context_t tcon, security_class_t tclass, access_vector_t requested, struct av_decision *avd) argument
|
H A D | stringrep.c | 198 access_vector_t string_to_av_perm(security_class_t tclass, const char *s) argument 201 security_class_t kclass = unmap_class(tclass); 208 return map_perm(tclass, 1<<i); 215 const char *security_class_to_string(security_class_t tclass) argument 219 tclass = unmap_class(tclass); 221 node = get_class_cache_entry_value(tclass); 227 const char *security_av_perm_to_string(security_class_t tclass, argument 233 av = unmap_perm(tclass, av); 234 tclass 245 security_av_string(security_class_t tclass, access_vector_t av, char **res) argument [all...] |
H A D | compute_create.c | 15 security_class_t tclass, 39 snprintf(buf, size, "%s %s %hu", scon, tcon, unmap_class(tclass)); 13 security_compute_create(const security_context_t scon, const security_context_t tcon, security_class_t tclass, security_context_t * newcon) argument
|
H A D | avc_internal.h | 157 security_class_t tclass, access_vector_t perms, 160 security_class_t tclass, 164 security_class_t tclass, access_vector_t perms, 168 security_class_t tclass, access_vector_t perms, 171 security_class_t tclass, access_vector_t perms,
|
/external/libsepol/include/sepol/policydb/ |
H A D | util.h | 28 extern char *sepol_av_to_string(policydb_t * policydbp, uint32_t tclass,
|
H A D | services.h | 45 sepol_security_class_t tclass, /* IN */ 56 sepol_security_class_t tclass, 72 sepol_security_class_t tclass, 83 sepol_security_class_t *tclass); 86 * Return a permission av bit associated with tclass and the string 89 extern int sepol_string_to_av_perm(sepol_security_class_t tclass, 95 * class `tclass' based on a SID pair. 99 sepol_security_class_t tclass, /* IN */ 104 * polyinstantiated object of class `tclass' based on 109 sepol_security_class_t tclass, /* I [all...] |
H A D | policydb.h | 146 uint32_t tclass; /* process class, or new object class */ member in struct:role_trans 161 uint32_t tclass; member in struct:filename_trans 283 uint32_t tclass; member in struct:filename_trans_rule
|
/external/libselinux/include/selinux/ |
H A D | avc.h | 239 * @tclass: target security class 240 * @requested: requested permissions, interpreted based on @tclass 246 * based on @tclass, and call the security server on a cache miss to obtain 258 security_class_t tclass, 266 * @tclass: target security class 267 * @requested: requested permissions, interpreted based on @tclass 273 * based on @tclass, and call the security server on a cache miss to obtain 281 security_class_t tclass, access_vector_t requested, 288 * @tclass: target security class 304 security_class_t tclass, access_vector_ [all...] |
H A D | selinux.h | 165 security_class_t tclass, 173 security_class_t tclass, 180 security_class_t tclass, 187 security_class_t tclass, 265 extern const char *security_av_perm_to_string(security_class_t tclass, 267 extern access_vector_t string_to_av_perm(security_class_t tclass, 272 extern int security_av_string(security_class_t tclass, 278 const char *tclass,
|
/external/kernel-headers/original/linux/ |
H A D | transport_class.h | 39 struct transport_class tclass; member in struct:anon_transport_class 45 .tclass = { \
|
H A D | ipv6.h | 362 __u8 tclass; member in struct:ipv6_pinfo 377 u8 tclass; member in struct:ipv6_pinfo::__anon20327
|
/external/libsepol/src/ |
H A D | services.c | 289 static char *get_class_info(sepol_security_class_t tclass, argument 343 policydb->p_class_val_to_name[tclass - 1]); 351 sepol_av_to_string(policydb, tclass, constraint->permissions)); 378 * 'tclass' should be '0' and r_buf MUST be NULL. 383 sepol_security_class_t tclass, 415 class_buf = get_class_info(tclass, constraint, xcontext); 819 sepol_security_class_t tclass, 835 if (!tclass || tclass > policydb->p_classes.nprim) { 836 ERR(NULL, "unrecognized class %d", tclass); 380 constraint_expr_eval_reason(context_struct_t *scontext, context_struct_t *tcontext, context_struct_t *xcontext, sepol_security_class_t tclass, constraint_node_t *constraint, char **r_buf, unsigned int flags) argument 817 context_struct_compute_av(context_struct_t * scontext, context_struct_t * tcontext, sepol_security_class_t tclass, sepol_access_vector_t requested, struct sepol_av_decision *avd, unsigned int *reason, char **r_buf, unsigned int flags) argument 938 sepol_validate_transition(sepol_security_id_t oldsid, sepol_security_id_t newsid, sepol_security_id_t tasksid, sepol_security_class_t tclass) argument 985 sepol_compute_av_reason(sepol_security_id_t ssid, sepol_security_id_t tsid, sepol_security_class_t tclass, sepol_access_vector_t requested, struct sepol_av_decision *avd, unsigned int *reason) argument 1019 sepol_compute_av_reason_buffer(sepol_security_id_t ssid, sepol_security_id_t tsid, sepol_security_class_t tclass, sepol_access_vector_t requested, struct sepol_av_decision *avd, unsigned int *reason, char **reason_buf, unsigned int flags) argument 1061 sepol_compute_av(sepol_security_id_t ssid, sepol_security_id_t tsid, sepol_security_class_t tclass, sepol_access_vector_t requested, struct sepol_av_decision *avd) argument 1076 sepol_string_to_security_class(const char *class_name, sepol_security_class_t *tclass) argument 1099 sepol_string_to_av_perm(sepol_security_class_t tclass, const char *perm_name, sepol_access_vector_t *av) argument 1195 compute_sid_handle_invalid_context(context_struct_t * scontext, context_struct_t * tcontext, sepol_security_class_t tclass, context_struct_t * newcontext) argument 1223 sepol_compute_sid(sepol_security_id_t ssid, sepol_security_id_t tsid, sepol_security_class_t tclass, uint32_t specified, sepol_security_id_t * out_sid) argument 1347 sepol_transition_sid(sepol_security_id_t ssid, sepol_security_id_t tsid, sepol_security_class_t tclass, sepol_security_id_t * out_sid) argument 1360 sepol_member_sid(sepol_security_id_t ssid, sepol_security_id_t tsid, sepol_security_class_t tclass, sepol_security_id_t * out_sid) argument 1372 sepol_change_sid(sepol_security_id_t ssid, sepol_security_id_t tsid, sepol_security_class_t tclass, sepol_security_id_t * out_sid) argument [all...] |
H A D | mls.h | 61 sepol_security_class_t tclass,
|
H A D | util.c | 77 char *sepol_av_to_string(policydb_t * policydbp, uint32_t tclass, argument 88 cladatum = policydbp->class_val_to_struct[tclass - 1];
|
H A D | mls.c | 608 sepol_security_class_t tclass, 621 rtr->target_class == tclass) { 629 if (tclass == SECCLASS_PROCESS) 605 mls_compute_sid(policydb_t * policydb, context_struct_t * scontext, context_struct_t * tcontext, sepol_security_class_t tclass, uint32_t specified, context_struct_t * newcontext) argument
|
/external/antlr/antlr-3.4/runtime/Ruby/lib/antlr3/ |
H A D | template.rb | 145 Context.define( self, name, parameters ) do | tclass | 146 self::TEMPLATES[ name ] = tclass 147 ERB.new( source, nil, '%' ).def_method( tclass, 'to_s' ) 149 define_template_methods( tclass ) 161 context.define_alias( new_name ) do | tclass | 162 self::TEMPLATES[ new_name ] = tclass 163 define_template_methods( tclass )
|
/external/checkpolicy/ |
H A D | checkpolicy.c | 290 extern char *av_to_string(uint32_t tclass, sepol_access_vector_t av); 379 sepol_security_class_t tclass; local 668 tclass = atoi(ans); 669 if (!tclass 670 || tclass > policydb.p_classes.nprim) { 675 policydb.class_val_to_struct[tclass - 1]; 687 tclass = cladatum->s.value; 695 ret = sepol_compute_av(ssid, tsid, tclass, 0, &avd); 784 tclass = atoi(ans); 785 if (!tclass [all...] |
/external/checkpolicy/test/ |
H A D | dispol.c | 66 char *stype, *ttype, *tclass; local 69 tclass = p->p_class_val_to_name[key->target_class - 1]; 71 fprintf(fp, "%s %s : %s ", stype, ttype, tclass); 73 fprintf(fp, "%s %u : %s ", stype, key->target_type, tclass); 75 fprintf(fp, "%u %s : %s ", key->source_type, ttype, tclass); 78 tclass); 352 display_id(p, fp, SYM_CLASSES, rt->tclass - 1, ":"); 366 display_id(p, fp, SYM_CLASSES, ft->tclass - 1, ":");
|
/external/chromium_org/third_party/openssl/openssl/crypto/asn1/ |
H A D | tasn_enc.c | 273 int i, ret, flags, ttag, tclass, ndef; local 289 tclass = flags & ASN1_TFLG_TAG_CLASS; 295 tclass = iclass & ASN1_TFLG_TAG_CLASS; 300 tclass = 0; 308 * 'tclass' is the class and iclass is any flags passed 343 skaclass = tclass; 374 ASN1_put_object(out, ndef, sklen, ttag, tclass); 403 ASN1_put_object(out, ndef, i, ttag, tclass); 414 ttag, tclass | iclass);
|
/external/openssl/crypto/asn1/ |
H A D | tasn_enc.c | 273 int i, ret, flags, ttag, tclass, ndef; local 289 tclass = flags & ASN1_TFLG_TAG_CLASS; 295 tclass = iclass & ASN1_TFLG_TAG_CLASS; 300 tclass = 0; 308 * 'tclass' is the class and iclass is any flags passed 343 skaclass = tclass; 374 ASN1_put_object(out, ndef, sklen, ttag, tclass); 403 ASN1_put_object(out, ndef, i, ttag, tclass); 414 ttag, tclass | iclass);
|
/external/ipsec-tools/src/racoon/ |
H A D | security.c | 221 security_class_t tclass; local 252 tclass = SECCLASS_ASSOCIATION; 254 rtn = avc_has_perm(slsid, rangesid, tclass, av, NULL, &avd);
|
/external/iputils/ |
H A D | ping6.c | 146 __u32 tclass; variable 746 tclass = hextoui(optarg); 747 if (errno || (tclass & ~0xff)) { 748 fprintf(stderr, "ping: Invalid tclass %s\n", optarg); 1190 &tclass, sizeof(tclass)) == -1) { 1859 " [-Q tclass]"
|