/external/libselinux/src/ |
H A D | mapping.c | 21 access_vector_t perms[sizeof(access_vector_t) * 8]; member in struct:selinux_mapping 70 while (p_in->perms && p_in->perms[k]) { 72 if (!*p_in->perms[k]) { 76 p_out->perms[k] = string_to_av_perm(p_out->value, 77 p_in->perms[k]); 78 if (!p_out->perms[k]) 119 assert(current_mapping[tclass].perms[i]); 120 kperm |= current_mapping[tclass].perms[i]; 156 if (kperm & current_mapping[tclass].perms[ [all...] |
H A D | stringrep.c | 29 char **perms; member in struct:discover_class_node 75 /* allocate array for perms */ 76 node->perms = calloc(MAXVECTORS,sizeof(char*)); 77 if (node->perms == NULL) 101 snprintf(path, sizeof path, "%s/class/%s/perms",selinux_mnt,s); 111 snprintf(path, sizeof path, "%s/class/%s/perms/%s", selinux_mnt,s,dentry->d_name); 133 node->perms[value-1] = strdup(dentry->d_name); 134 if (node->perms[value-1] == NULL) 149 free(node->perms[i]); 153 free(node->perms); [all...] |
H A D | avc.c | 42 security_class_t tclass, access_vector_t perms, 48 access_vector_t perms; member in struct:avc_callback_node 827 access_vector_t perms, 831 security_class_t tclass, access_vector_t perms) 847 c->perms = perms; 860 access_vector_t perms) 864 node->ae.avd.allowed |= perms; 868 node->ae.avd.allowed &= ~perms; 871 node->ae.avd.auditallow |= perms; 824 avc_add_callback(int (*callback) (uint32_t event, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, access_vector_t * out_retained), uint32_t events, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms) argument 859 avc_update_node(uint32_t event, struct avc_node *node, access_vector_t perms) argument 885 avc_update_cache(uint32_t event, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms) argument 923 avc_control(uint32_t event, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, access_vector_t * out_retained) argument 983 avc_ss_grant(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno) argument 1004 avc_ss_try_revoke(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, access_vector_t * out_retained) argument 1024 avc_ss_revoke(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno) argument 1059 avc_ss_set_auditallow(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, uint32_t enable) argument 1080 avc_ss_set_auditdeny(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, uint32_t enable) argument [all...] |
H A D | avc_internal.h | 157 security_class_t tclass, access_vector_t perms, 161 access_vector_t perms, uint32_t seqno, 164 security_class_t tclass, access_vector_t perms, 168 security_class_t tclass, access_vector_t perms, 171 security_class_t tclass, access_vector_t perms,
|
/external/qemu/distrib/libselinux/src/ |
H A D | mapping.c | 21 access_vector_t perms[sizeof(access_vector_t) * 8]; member in struct:selinux_mapping 70 while (p_in->perms && p_in->perms[k]) { 72 if (!*p_in->perms[k]) { 76 p_out->perms[k] = string_to_av_perm(p_out->value, 77 p_in->perms[k]); 78 if (!p_out->perms[k]) 119 assert(current_mapping[tclass].perms[i]); 120 kperm |= current_mapping[tclass].perms[i]; 156 if (kperm & current_mapping[tclass].perms[ [all...] |
H A D | stringrep.c | 29 char **perms; member in struct:discover_class_node 75 /* allocate array for perms */ 76 node->perms = calloc(MAXVECTORS,sizeof(char*)); 77 if (node->perms == NULL) 101 snprintf(path, sizeof path, "%s/class/%s/perms",selinux_mnt,s); 111 snprintf(path, sizeof path, "%s/class/%s/perms/%s", selinux_mnt,s,dentry->d_name); 133 node->perms[value-1] = strdup(dentry->d_name); 134 if (node->perms[value-1] == NULL) 149 free(node->perms[i]); 153 free(node->perms); [all...] |
H A D | avc.c | 42 security_class_t tclass, access_vector_t perms, 48 access_vector_t perms; member in struct:avc_callback_node 827 access_vector_t perms, 831 security_class_t tclass, access_vector_t perms) 847 c->perms = perms; 860 access_vector_t perms) 864 node->ae.avd.allowed |= perms; 868 node->ae.avd.allowed &= ~perms; 871 node->ae.avd.auditallow |= perms; 824 avc_add_callback(int (*callback) (uint32_t event, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, access_vector_t * out_retained), uint32_t events, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms) argument 859 avc_update_node(uint32_t event, struct avc_node *node, access_vector_t perms) argument 885 avc_update_cache(uint32_t event, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms) argument 923 avc_control(uint32_t event, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, access_vector_t * out_retained) argument 983 avc_ss_grant(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno) argument 1004 avc_ss_try_revoke(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, access_vector_t * out_retained) argument 1024 avc_ss_revoke(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno) argument 1059 avc_ss_set_auditallow(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, uint32_t enable) argument 1080 avc_ss_set_auditdeny(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, uint32_t enable) argument [all...] |
H A D | avc_internal.h | 157 security_class_t tclass, access_vector_t perms, 161 access_vector_t perms, uint32_t seqno, 164 security_class_t tclass, access_vector_t perms, 168 security_class_t tclass, access_vector_t perms, 171 security_class_t tclass, access_vector_t perms,
|
/external/chromium_org/ppapi/shared_impl/ |
H A D | ppapi_permissions.cc | 15 PpapiPermissions::PpapiPermissions(uint32 perms) : permissions_(perms) {} argument
|
H A D | ppapi_permissions.h | 56 explicit PpapiPermissions(uint32 perms);
|
/external/sepolicy/tools/sepolicy-analyze/ |
H A D | utils.h | 12 void display_allow(policydb_t *policydb, avtab_key_t *key, int idx, uint32_t perms);
|
H A D | dups.c | 59 uint32_t perms = node->datum.data & d->data; local 60 if ((attrib1 && perms == node->datum.data) || 61 (attrib2 && perms == d->data)) {
|
H A D | utils.c | 12 void display_allow(policydb_t *policydb, avtab_key_t *key, int idx, uint32_t perms) argument 22 (policydb, key->target_class, perms));
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
H A D | ProtectionDomainTest.java | 44 private PermissionCollection perms = null; field in class:ProtectionDomainTest 61 perms = allperm.newPermissionCollection(); 62 perms.add(allperm); 77 new ProtectionDomain(cs, perms); 84 assertFalse(perms.isReadOnly()); 85 new ProtectionDomain(null, perms); 86 assertTrue(perms.isReadOnly()); 96 new ProtectionDomain(null, perms, null, null); 100 new ProtectionDomain(cs, perms, classldr, principals); 125 assertSame(new ProtectionDomain(null, perms) [all...] |
/external/chromium_org/chrome/browser/resources/cryptotoken/ |
H A D | gnubbydevice.js | 128 chrome.permissions.getAll(function(perms) { 129 if (!perms.hasOwnProperty('permissions')) { 134 var permissions = perms['permissions'];
|
/external/llvm/include/llvm/Support/ |
H A D | FileSystem.h | 73 enum perms { enum in namespace:llvm::sys::fs 97 // Helper functions so that you can use & and | to manipulate perms bits: 98 inline perms operator|(perms l , perms r) { 99 return static_cast<perms>( 102 inline perms operator&(perms l , perms r) { 103 return static_cast<perms>( [all...] |
/external/chromium_org/content/renderer/pepper/ |
H A D | host_dispatcher_wrapper.cc | 22 const ppapi::PpapiPermissions& perms, 27 permissions_(perms), 18 HostDispatcherWrapper( PluginModule* module, base::ProcessId peer_pid, int plugin_child_id, const ppapi::PpapiPermissions& perms, bool is_external) argument
|
H A D | host_dispatcher_wrapper.h | 32 const ppapi::PpapiPermissions& perms,
|
H A D | plugin_module.cc | 385 ppapi::PpapiPermissions perms(PepperPluginRegistry::GetInstance() 389 RendererPpapiHostImpl::CreateOnModuleForInProcess(module, perms); 400 const ppapi::PpapiPermissions& perms) 409 permissions_(ppapi::PpapiPermissions::GetForCommandLine(perms.GetBits())), 397 PluginModule(const std::string& name, const std::string& version, const base::FilePath& path, const ppapi::PpapiPermissions& perms) argument
|
/external/libselinux/include/selinux/ |
H A D | avc.h | 364 * @perms: permissions 368 * and the permissions @perms, interpreting 369 * @perms based on @tclass. Returns %0 on success or 375 access_vector_t perms, 379 access_vector_t perms);
|
/external/qemu/distrib/libselinux/include/selinux/ |
H A D | avc.h | 364 * @perms: permissions 368 * and the permissions @perms, interpreting 369 * @perms based on @tclass. Returns %0 on success or 375 access_vector_t perms, 379 access_vector_t perms);
|
/external/clang/include/clang/Basic/ |
H A D | VirtualFileSystem.h | 40 llvm::sys::fs::perms Perms; 51 llvm::sys::fs::perms Perms); 60 llvm::sys::fs::perms getPermissions() const { return Perms; } 67 void setPermissions(llvm::sys::fs::perms p) { Perms = p; }
|
/external/llvm/include/llvm/Object/ |
H A D | Archive.h | 41 sys::fs::perms getAccessMode() const; 82 sys::fs::perms getAccessMode() const {
|
/external/guava/guava-tests/test/com/google/common/util/concurrent/ |
H A D | JSR166TestCase.java | 667 Permissions perms = new Permissions(); field in class:JSR166TestCase.AdjustablePolicy 670 perms.add(permission); 672 void addPermission(Permission perm) { perms.add(perm); } 673 void clearPermissions() { perms = new Permissions(); } 675 return perms; 678 return perms; 681 return perms.implies(p);
|
/external/genext2fs/ |
H A D | genext2fs.c | 212 #define FM_IMASK 0007777 // *all* perms mask for everything below 2254 make_perms(uint32 mode, char perms[11]) argument 2256 strcpy(perms, "----------"); 2258 perms[1] = 'r'; 2260 perms[2] = 'w'; 2262 perms[3] = 'x'; 2264 perms[4] = 'r'; 2266 perms[5] = 'w'; 2268 perms[6] = 'x'; 2270 perms[ 2317 char perms[11]; local [all...] |