/external/libselinux/src/ |
H A D | compute_av.c | 17 struct av_decision *avd) 54 &avd->allowed, &avd->decided, 55 &avd->auditallow, &avd->auditdeny, 56 &avd->seqno, &avd->flags); 61 avd->flags = 0; 63 map_decision(tclass, avd); 13 security_compute_av(const security_context_t scon, const security_context_t tcon, security_class_t tclass, access_vector_t requested, struct av_decision *avd) argument
|
H A D | mapping.c | 169 map_decision(security_class_t tclass, struct av_decision *avd) argument 176 if (avd->allowed & current_mapping[tclass].perms[i]) 178 avd->allowed = result; 181 if (avd->decided & current_mapping[tclass].perms[i]) 183 avd->decided = result; 186 if (avd->auditallow & current_mapping[tclass].perms[i]) 188 avd->auditallow = result; 191 if (avd->auditdeny & current_mapping[tclass].perms[i]) 193 avd->auditdeny = result;
|
H A D | mapping.h | 32 map_decision(security_class_t tclass, struct av_decision *avd);
|
H A D | avc.c | 22 struct av_decision avd; member in struct:avc_entry 292 ae->avd.allowed = ae->avd.decided = 0; 293 ae->avd.auditallow = ae->avd.auditdeny = 0; 388 if (node && ((node->ae.avd.decided & requested) == requested)) { 414 * sequence number @ae->avd.seqno is not less than the latest 427 if (ae->avd.seqno < avc_cache.latest_notif) { 430 ae->avd.seqno, avc_cache.latest_notif); 442 node->ae.avd 651 avc_audit(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t requested, struct av_decision *avd, int result, void *a) argument 770 struct av_decision avd; local [all...] |
/external/qemu/android/ |
H A D | main.c | 175 AvdInfo* avd; local 269 avd = createAVD(opts, &inAndroidBuild); 270 opts->snapstorage = avdInfo_getSnapStoragePath(avd); 298 avd = android_avdInfo = createAVD(opts, &inAndroidBuild); 311 avdInfo_getSkinInfo(avd, &skinName, &skinDir); 323 /* update the avd hw config from this new skin */ 324 avdInfo_getSkinHardwareIni(avd, opts->skin, opts->skindir); 328 opts->dynamic_skin = avdInfo_shouldUseDynamicSkin(avd); 333 if (avdInfo_initHwConfig(avd, hw) < 0) { 391 char* tracePath = avdInfo_getTracePath(avd, opt [all...] |
H A D | main-common.h | 19 #include "android/avd/hw-config.h" 88 * avd - AVD info containig paths for the hardware configuration. 93 void updateHwConfigFromAVD(AndroidHwConfig* hwConfig, struct AvdInfo* avd,
|
H A D | cmdline-options.h | 28 * and will be ignored if you start the emulator with the -avd <name> flag. 30 * However, if you use them with -avd-create <name>, these options will be 88 CFG_PARAM( avd, "<name>", "use a specific android virtual device" )
|
H A D | main-common.c | 27 #include "android/avd/util.h" 1015 if (opts->avd == NULL) { 1049 if (opts->avd == NULL && !android_build_out) 1059 "If you are an Android SDK user, please use '@<name>' or '-avd <name>'\n" 1060 "to start a given virtual device (see -help-avd for details).\n\n" 1097 "with the '-avd <name>' option. Read -help-avd for more information.\n\n" 1121 if (opts->avd != NULL) 1123 ret = avdInfo_new( opts->avd, android_avdParams ); 1126 dprint("could not find virtual device named '%s'", opts->avd); [all...] |
H A D | cmdline-option.c | 61 * '-avd <name>' 64 opt->avd = aread[0]+1;
|
H A D | main-emulator.c | 30 #include <android/avd/util.h> 104 * 1) an avd name either in the form or '-avd <name>' or '@<name>' 120 if (!strcmp(opt,"-avd") && nn+1 < argc) {
|
/external/libsepol/include/sepol/policydb/ |
H A D | services.h | 47 struct sepol_av_decision *avd); /* OUT */ 58 struct sepol_av_decision *avd,
|
H A D | conditional.h | 134 struct sepol_av_decision *avd);
|
/external/libsepol/src/ |
H A D | services.c | 311 struct sepol_av_decision *avd, 332 avd->allowed = 0; 333 avd->decided = 0xffffffff; 334 avd->auditallow = 0; 335 avd->auditdeny = 0xffffffff; 336 avd->seqno = latest_granting; 361 avd->allowed |= node->datum.data; 364 avd->auditallow |= node->datum.data; 366 avd->auditdeny &= node->datum.data; 370 cond_compute_av(&policydb->te_cond_avtab, &avkey, avd); 307 context_struct_compute_av(context_struct_t * scontext, context_struct_t * tcontext, sepol_security_class_t tclass, sepol_access_vector_t requested, struct sepol_av_decision *avd, unsigned int *reason) argument 473 sepol_compute_av_reason(sepol_security_id_t ssid, sepol_security_id_t tsid, sepol_security_class_t tclass, sepol_access_vector_t requested, struct sepol_av_decision *avd, unsigned int *reason) argument 502 sepol_compute_av(sepol_security_id_t ssid, sepol_security_id_t tsid, sepol_security_class_t tclass, sepol_access_vector_t requested, struct sepol_av_decision *avd) argument 1297 struct sepol_av_decision avd; local [all...] |
H A D | conditional.c | 879 struct sepol_av_decision *avd) 883 if (!ctab || !key || !avd) 890 avd->allowed |= node->datum.data; 898 avd->auditdeny &= node->datum.data; 901 avd->auditallow |= node->datum.data; 878 cond_compute_av(avtab_t * ctab, avtab_key_t * key, struct sepol_av_decision *avd) argument
|
H A D | expand.c | 3076 avtab_datum_t *avd; local 3097 avd = &node->datum; 3101 avd->data |= d->data; 3104 avd->data &= d->data; 3207 avtab_datum_t *avd; local 3232 avd = &node->datum; 3236 avd->data |= d->data; 3239 avd->data &= d->data;
|
/external/libselinux/include/selinux/ |
H A D | avc.h | 242 * @avd: access vector decisions 249 * in @avd. Return %0 if all @requested permissions are granted, -%1 with 260 struct avc_entry_ref *aeref, struct av_decision *avd); 290 * @avd: access vector decisions 305 struct av_decision *avd, int result, void *auditdata);
|
H A D | selinux.h | 167 struct av_decision *avd);
|
/external/ipsec-tools/src/racoon/ |
H A D | security.c | 220 struct av_decision avd; local 254 rtn = avc_has_perm(slsid, rangesid, tclass, av, NULL, &avd);
|
/external/checkpolicy/ |
H A D | checkpolicy.c | 382 struct sepol_av_decision avd; local 695 ret = sepol_compute_av(ssid, tsid, tclass, 0, &avd); 699 for (i = 1; i <= sizeof(avd.allowed) * 8; i++) { 700 if (avd.allowed & (1 << (i - 1))) {
|