/external/sepolicy/tools/ |
H A D | sepolicy-analyze.c | 178 uint32_t perms) 188 (policydb, key->target_class, perms)); 385 uint32_t perms = node->datum.data & d->data; local 386 if ((attrib1 && perms == node->datum.data) || 387 (attrib2 && perms == d->data)) { 177 display_allow(policydb_t *policydb, avtab_key_t *key, int idx, uint32_t perms) argument
|
/external/qemu/distrib/libselinux/include/selinux/ |
H A D | selinux.h | 254 const char *perms[sizeof(access_vector_t) * 8 + 1]; member in struct:security_class_mapping
|
/external/qemu/distrib/libselinux/src/ |
H A D | avc.c | 42 security_class_t tclass, access_vector_t perms, 48 access_vector_t perms; member in struct:avc_callback_node 827 access_vector_t perms, 831 security_class_t tclass, access_vector_t perms) 847 c->perms = perms; 860 access_vector_t perms) 864 node->ae.avd.allowed |= perms; 868 node->ae.avd.allowed &= ~perms; 871 node->ae.avd.auditallow |= perms; 824 avc_add_callback(int (*callback) (uint32_t event, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, access_vector_t * out_retained), uint32_t events, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms) argument 859 avc_update_node(uint32_t event, struct avc_node *node, access_vector_t perms) argument 885 avc_update_cache(uint32_t event, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms) argument 923 avc_control(uint32_t event, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, access_vector_t * out_retained) argument 983 avc_ss_grant(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno) argument 1004 avc_ss_try_revoke(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, access_vector_t * out_retained) argument 1024 avc_ss_revoke(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno) argument 1059 avc_ss_set_auditallow(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, uint32_t enable) argument 1080 avc_ss_set_auditdeny(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, uint32_t enable) argument [all...] |
H A D | mapping.c | 21 access_vector_t perms[sizeof(access_vector_t) * 8]; member in struct:selinux_mapping 70 while (p_in->perms && p_in->perms[k]) { 72 if (!*p_in->perms[k]) { 76 p_out->perms[k] = string_to_av_perm(p_out->value, 77 p_in->perms[k]); 78 if (!p_out->perms[k]) 119 assert(current_mapping[tclass].perms[i]); 120 kperm |= current_mapping[tclass].perms[i]; 156 if (kperm & current_mapping[tclass].perms[ [all...] |
H A D | stringrep.c | 29 char **perms; member in struct:discover_class_node 75 /* allocate array for perms */ 76 node->perms = calloc(MAXVECTORS,sizeof(char*)); 77 if (node->perms == NULL) 101 snprintf(path, sizeof path, "%s/class/%s/perms",selinux_mnt,s); 111 snprintf(path, sizeof path, "%s/class/%s/perms/%s", selinux_mnt,s,dentry->d_name); 133 node->perms[value-1] = strdup(dentry->d_name); 134 if (node->perms[value-1] == NULL) 149 free(node->perms[i]); 153 free(node->perms); [all...] |
/external/pdfium/core/src/fpdfapi/fpdf_parser/ |
H A D | fpdf_parser_encrypt.cpp | 346 CFX_ByteString perms = m_pEncryptDict->GetString(FX_BSTRC("Perms"));
local 347 if (perms.IsEmpty()) {
353 if (copy_len > (FX_DWORD)perms.GetLength()) {
354 copy_len = perms.GetLength();
356 FXSYS_memcpy32(perms_buf, (FX_LPCBYTE)perms, copy_len);
|
/external/llvm/include/llvm/Support/ |
H A D | FileSystem.h | 73 enum perms { enum in namespace:llvm::sys::fs 97 // Helper functions so that you can use & and | to manipulate perms bits: 98 inline perms operator|(perms l , perms r) { 99 return static_cast<perms>( 102 inline perms operator&(perms l , perms r) { 103 return static_cast<perms>( [all...] |
/external/libselinux/include/selinux/ |
H A D | selinux.h | 254 const char *perms[sizeof(access_vector_t) * 8 + 1]; member in struct:security_class_mapping
|
/external/libselinux/src/ |
H A D | avc.c | 42 security_class_t tclass, access_vector_t perms, 48 access_vector_t perms; member in struct:avc_callback_node 827 access_vector_t perms, 831 security_class_t tclass, access_vector_t perms) 847 c->perms = perms; 860 access_vector_t perms) 864 node->ae.avd.allowed |= perms; 868 node->ae.avd.allowed &= ~perms; 871 node->ae.avd.auditallow |= perms; 824 avc_add_callback(int (*callback) (uint32_t event, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, access_vector_t * out_retained), uint32_t events, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms) argument 859 avc_update_node(uint32_t event, struct avc_node *node, access_vector_t perms) argument 885 avc_update_cache(uint32_t event, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms) argument 923 avc_control(uint32_t event, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, access_vector_t * out_retained) argument 983 avc_ss_grant(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno) argument 1004 avc_ss_try_revoke(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, access_vector_t * out_retained) argument 1024 avc_ss_revoke(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno) argument 1059 avc_ss_set_auditallow(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, uint32_t enable) argument 1080 avc_ss_set_auditdeny(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, uint32_t enable) argument [all...] |
H A D | mapping.c | 21 access_vector_t perms[sizeof(access_vector_t) * 8]; member in struct:selinux_mapping 70 while (p_in->perms && p_in->perms[k]) { 72 if (!*p_in->perms[k]) { 76 p_out->perms[k] = string_to_av_perm(p_out->value, 77 p_in->perms[k]); 78 if (!p_out->perms[k]) 119 assert(current_mapping[tclass].perms[i]); 120 kperm |= current_mapping[tclass].perms[i]; 156 if (kperm & current_mapping[tclass].perms[ [all...] |
H A D | stringrep.c | 29 char **perms; member in struct:discover_class_node 75 /* allocate array for perms */ 76 node->perms = calloc(MAXVECTORS,sizeof(char*)); 77 if (node->perms == NULL) 101 snprintf(path, sizeof path, "%s/class/%s/perms",selinux_mnt,s); 111 snprintf(path, sizeof path, "%s/class/%s/perms/%s", selinux_mnt,s,dentry->d_name); 133 node->perms[value-1] = strdup(dentry->d_name); 134 if (node->perms[value-1] == NULL) 149 free(node->perms[i]); 153 free(node->perms); [all...] |
/external/libsepol/include/sepol/policydb/ |
H A D | policydb.h | 260 class_perm_node_t *perms; member in struct:avrule 728 /* the config flags related to unknown classes/perms are bits 2 and 3 */
|
/external/libsepol/src/ |
H A D | expand.c | 1753 uint32_t ttype, class_perm_node_t * perms, 1773 cur = perms; 1862 class_perm_node_t * perms, avtab_t * avtab, 1887 cur = perms; 1950 cond, i, i, source_rule->perms, 1957 other, i, i, source_rule->perms, 1968 cond, i, j, source_rule->perms, 1975 other, i, j, source_rule->perms, 2666 cur_perm = source_rule->perms; 2680 if (!avrule->perms) 1749 expand_terule_helper(sepol_handle_t * handle, policydb_t * p, uint32_t * typemap, uint32_t specified, cond_av_list_t ** cond, cond_av_list_t ** other, uint32_t stype, uint32_t ttype, class_perm_node_t * perms, avtab_t * avtab, int enabled) argument 1858 expand_avrule_helper(sepol_handle_t * handle, uint32_t specified, cond_av_list_t ** cond, uint32_t stype, uint32_t ttype, class_perm_node_t * perms, avtab_t * avtab, int enabled) argument [all...] |
/external/guava/guava-tests/test/com/google/common/util/concurrent/ |
H A D | JSR166TestCase.java | 667 Permissions perms = new Permissions(); field in class:JSR166TestCase.AdjustablePolicy 670 perms.add(permission); 672 void addPermission(Permission perm) { perms.add(perm); } 673 void clearPermissions() { perms = new Permissions(); } 675 return perms; 678 return perms; 681 return perms.implies(p);
|
/external/genext2fs/ |
H A D | genext2fs.c | 212 #define FM_IMASK 0007777 // *all* perms mask for everything below 2254 make_perms(uint32 mode, char perms[11]) argument 2256 strcpy(perms, "----------"); 2258 perms[1] = 'r'; 2260 perms[2] = 'w'; 2262 perms[3] = 'x'; 2264 perms[4] = 'r'; 2266 perms[5] = 'w'; 2268 perms[6] = 'x'; 2270 perms[ 2317 char perms[11]; local [all...] |
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
H A D | org.eclipse.pde.core_3.6.1.v20100902_r361.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
H A D | org.eclipse.equinox.p2.touchpoint.eclipse_2.0.2.R36x_v20100823.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
H A D | org.eclipse.equinox.p2.touchpoint.natives_1.0.200.v20100503a.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
H A D | org.eclipse.osgi_3.6.1.R36x_v20100806.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
H A D | org.eclipse.osgi_3.6.2.R36x_v20101103.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
/external/chromium_org/ppapi/host/ |
H A D | ppapi_host.cc | 32 const PpapiPermissions& perms) 34 permissions_(perms), 31 PpapiHost(IPC::Sender* sender, const PpapiPermissions& perms) argument
|
/external/chromium_org/ppapi/shared_impl/ |
H A D | ppapi_permissions.cc | 15 PpapiPermissions::PpapiPermissions(uint32 perms) : permissions_(perms) {} argument
|
/external/chromium_org/content/renderer/pepper/ |
H A D | host_dispatcher_wrapper.cc | 22 const ppapi::PpapiPermissions& perms, 27 permissions_(perms), 18 HostDispatcherWrapper( PluginModule* module, base::ProcessId peer_pid, int plugin_child_id, const ppapi::PpapiPermissions& perms, bool is_external) argument
|
H A D | plugin_module.cc | 380 ppapi::PpapiPermissions perms(PepperPluginRegistry::GetInstance() 384 RendererPpapiHostImpl::CreateOnModuleForInProcess(module, perms); 394 const ppapi::PpapiPermissions& perms) 402 permissions_(ppapi::PpapiPermissions::GetForCommandLine(perms.GetBits())), 392 PluginModule(const std::string& name, const base::FilePath& path, const ppapi::PpapiPermissions& perms) argument
|
/external/chromium_org/chrome/renderer/ |
H A D | chrome_content_renderer_client.cc | 504 const extensions::APIPermission::ID perms[] = { local 507 for (size_t i = 0; i < arraysize(perms); ++i) { 508 if (extension->permissions_data()->HasAPIPermission(perms[i]))
|