Searched defs:perms (Results 1 - 25 of 30) sorted by relevance

12

/external/sepolicy/tools/sepolicy-analyze/
H A Dutils.c12 void display_allow(policydb_t *policydb, avtab_key_t *key, int idx, uint32_t perms) argument
22 (policydb, key->target_class, perms));
H A Ddups.c59 uint32_t perms = node->datum.data & d->data; local
60 if ((attrib1 && perms == node->datum.data) ||
61 (attrib2 && perms == d->data)) {
H A Dneverallow.c186 class_perm_node_t **perms)
363 *perms = classperms;
411 if (read_classperms(policydb, &p, end, &avrule->perms))
185 read_classperms(policydb_t *policydb, char **ptr, char *end, class_perm_node_t **perms) argument
/external/libselinux/src/
H A Dmapping.c20 access_vector_t perms[sizeof(access_vector_t) * 8]; member in struct:selinux_mapping
69 while (p_in->perms[k]) {
71 if (!*p_in->perms[k]) {
75 p_out->perms[k] = string_to_av_perm(p_out->value,
76 p_in->perms[k]);
77 if (!p_out->perms[k])
123 kperm |= current_mapping[tclass].perms[i];
168 if (kperm & current_mapping[tclass].perms[i]) {
170 kperm &= ~current_mapping[tclass].perms[i];
191 if (avd->allowed & current_mapping[tclass].perms[
[all...]
H A Dstringrep.c25 char **perms; member in struct:discover_class_node
71 /* allocate array for perms */
72 node->perms = calloc(MAXVECTORS,sizeof(char*));
73 if (node->perms == NULL)
97 snprintf(path, sizeof path, "%s/class/%s/perms",selinux_mnt,s);
107 snprintf(path, sizeof path, "%s/class/%s/perms/%s", selinux_mnt,s,dentry->d_name);
135 node->perms[value-1] = strdup(dentry->d_name);
136 if (node->perms[value-1] == NULL)
151 free(node->perms[i]);
155 free(node->perms);
[all...]
H A Davc.c43 security_class_t tclass, access_vector_t perms,
49 access_vector_t perms; member in struct:avc_callback_node
853 access_vector_t perms,
857 security_class_t tclass, access_vector_t perms)
873 c->perms = perms;
886 access_vector_t perms)
890 node->ae.avd.allowed |= perms;
894 node->ae.avd.allowed &= ~perms;
897 node->ae.avd.auditallow |= perms;
850 avc_add_callback(int (*callback) (uint32_t event, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, access_vector_t * out_retained), uint32_t events, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms) argument
885 avc_update_node(uint32_t event, struct avc_node *node, access_vector_t perms) argument
911 avc_update_cache(uint32_t event, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms) argument
949 avc_control(uint32_t event, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, access_vector_t * out_retained) argument
1009 avc_ss_grant(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno) argument
1030 avc_ss_try_revoke(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, access_vector_t * out_retained) argument
1050 avc_ss_revoke(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno) argument
1085 avc_ss_set_auditallow(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, uint32_t enable) argument
1106 avc_ss_set_auditdeny(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, uint32_t enable) argument
[all...]
/external/selinux/libselinux/src/
H A Dmapping.c20 access_vector_t perms[sizeof(access_vector_t) * 8]; member in struct:selinux_mapping
69 while (p_in->perms[k]) {
71 if (!*p_in->perms[k]) {
75 p_out->perms[k] = string_to_av_perm(p_out->value,
76 p_in->perms[k]);
77 if (!p_out->perms[k])
123 kperm |= current_mapping[tclass].perms[i];
168 if (kperm & current_mapping[tclass].perms[i]) {
170 kperm &= ~current_mapping[tclass].perms[i];
191 if (avd->allowed & current_mapping[tclass].perms[
[all...]
H A Dstringrep.c25 char **perms; member in struct:discover_class_node
71 /* allocate array for perms */
72 node->perms = calloc(MAXVECTORS,sizeof(char*));
73 if (node->perms == NULL)
97 snprintf(path, sizeof path, "%s/class/%s/perms",selinux_mnt,s);
107 snprintf(path, sizeof path, "%s/class/%s/perms/%s", selinux_mnt,s,dentry->d_name);
135 node->perms[value-1] = strdup(dentry->d_name);
136 if (node->perms[value-1] == NULL)
151 free(node->perms[i]);
155 free(node->perms);
[all...]
H A Davc.c43 security_class_t tclass, access_vector_t perms,
49 access_vector_t perms; member in struct:avc_callback_node
913 access_vector_t perms,
917 security_class_t tclass, access_vector_t perms)
933 c->perms = perms;
946 access_vector_t perms)
950 node->ae.avd.allowed |= perms;
954 node->ae.avd.allowed &= ~perms;
957 node->ae.avd.auditallow |= perms;
910 avc_add_callback(int (*callback) (uint32_t event, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, access_vector_t * out_retained), uint32_t events, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms) argument
945 avc_update_node(uint32_t event, struct avc_node *node, access_vector_t perms) argument
971 avc_update_cache(uint32_t event, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms) argument
1009 avc_control(uint32_t event, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, access_vector_t * out_retained) argument
1069 avc_ss_grant(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno) argument
1090 avc_ss_try_revoke(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, access_vector_t * out_retained) argument
1110 avc_ss_revoke(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno) argument
1145 avc_ss_set_auditallow(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, uint32_t enable) argument
1166 avc_ss_set_auditdeny(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, uint32_t enable) argument
[all...]
/external/libselinux/include/selinux/
H A Dselinux.h254 const char *perms[sizeof(access_vector_t) * 8 + 1]; member in struct:security_class_mapping
/external/selinux/libselinux/include/selinux/
H A Dselinux.h358 const char *perms[sizeof(access_vector_t) * 8 + 1]; member in struct:security_class_mapping
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/
H A DProtectionDomainTest.java44 private PermissionCollection perms = null; field in class:ProtectionDomainTest
61 perms = allperm.newPermissionCollection();
62 perms.add(allperm);
77 new ProtectionDomain(cs, perms);
84 assertFalse(perms.isReadOnly());
85 new ProtectionDomain(null, perms);
86 assertTrue(perms.isReadOnly());
96 new ProtectionDomain(null, perms, null, null);
100 new ProtectionDomain(cs, perms, classldr, principals);
125 assertSame(new ProtectionDomain(null, perms)
[all...]
/external/selinux/libsepol/include/sepol/policydb/
H A Davtab.h78 uint32_t perms[8]; member in struct:avtab_operations
H A Dpolicydb.h247 uint32_t perms[8]; member in struct:av_operations
279 class_perm_node_t *perms; member in struct:avrule
751 /* the config flags related to unknown classes/perms are bits 2 and 3 */
/external/vboot_reference/firmware/lib/
H A Drollback_index.c612 uint32_t perms, uid; local
623 RETURN_ON_FAILURE(TlclGetPermissions(KERNEL_NV_INDEX, &perms));
625 if (TPM_NV_PER_PPWRITE != perms || ROLLBACK_SPACE_KERNEL_UID != uid)
/external/guava/guava-tests/test/com/google/common/util/concurrent/
H A DJSR166TestCase.java669 Permissions perms = new Permissions(); field in class:JSR166TestCase.AdjustablePolicy
672 perms.add(permission);
674 void addPermission(Permission perm) { perms.add(perm); }
675 void clearPermissions() { perms = new Permissions(); }
677 return perms;
680 return perms;
683 return perms.implies(p);
/external/pdfium/core/src/fpdfapi/fpdf_parser/
H A Dfpdf_parser_encrypt.cpp345 CFX_ByteString perms = m_pEncryptDict->GetString(FX_BSTRC("Perms")); local
346 if (perms.IsEmpty()) {
352 if (copy_len > (FX_DWORD)perms.GetLength()) {
353 copy_len = perms.GetLength();
355 FXSYS_memcpy32(perms_buf, (FX_LPCBYTE)perms, copy_len);
/external/llvm/include/llvm/Support/
H A DFileSystem.h73 enum perms { enum in namespace:llvm::sys::fs
97 // Helper functions so that you can use & and | to manipulate perms bits:
98 inline perms operator|(perms l , perms r) {
99 return static_cast<perms>(
102 inline perms operator&(perms l , perms r) {
103 return static_cast<perms>(
[all...]
/external/selinux/libsepol/cil/src/
H A Dcil_post.c1361 ebitmap_t *perms; member in struct:perm_to_list
1368 ebitmap_t *perms = perm_args->perms; local
1373 if (!ebitmap_get_bit(perms, value)) {
1382 static int __evaluate_perm_expression(struct cil_list *perms, enum cil_flavor flavor, symtab_t *class_symtab, symtab_t *common_symtab, unsigned int num_perms, struct cil_list **new_list, struct cil_db *db) argument
1388 if (cil_verify_is_list(perms, CIL_PERM)) {
1393 rc = __cil_expr_to_bitmap(perms, &bitmap, num_perms, db);
1402 args.perms = &bitmap;
1427 common_symtab = &common->perms;
1430 rc = __evaluate_perm_expression(cp->perms, CIL_PER
[all...]
H A Dcil_binary.c84 uint32_t perms; member in struct:cil_neverallow_rule
247 cil_list_for_each(i, cp->perms) {
279 cil_symtab_map(&class->perms, __add_classes_from_map_perms, class_list);
1247 int __cil_perms_to_datum(struct cil_list *perms, class_datum_t *sepol_class, uint32_t *datum) argument
1255 cil_list_for_each(curr_perm, perms) {
1327 static void __cil_neverallow_handle(struct cil_list *neverallows, struct cil_symtab_datum *src, struct cil_symtab_datum *tgt, uint32_t class, uint32_t perms) argument
1337 new->perms = perms;
1381 static int __cil_check_neverallows(struct cil_list *neverallows, struct cil_symtab_datum *src, struct cil_symtab_datum *tgt, uint32_t class, uint32_t perms) argument
1394 if ((curr_rule->perms
2291 cil_constrain_to_policydb_helper(policydb_t *pdb, const struct cil_db *db, struct cil_symtab_datum *class, struct cil_list *perms, struct cil_list *expr) argument
[all...]
H A Dcil_build_ast.c357 struct cil_tree_node *perms = NULL; local
375 perms = parse_current->next->next->cl_head;
376 rc = cil_gen_perm_nodes(db, perms, ast_node, CIL_PERM, &class->num_perms);
399 cil_symtab_destroy(&class->perms);
531 int cil_fill_perms(struct cil_tree_node *start_perm, struct cil_list **perms) argument
545 rc = cil_gen_expr(start_perm, CIL_PERM, perms);
597 cil_list_destroy(&cp->perms, CIL_FALSE);
640 /* Class-perms form: SET1 */
645 /* Class-perms form: (CLASS1 (PERM1 ...)) */
5675 // To avoid parsing list of perms agai
[all...]
H A Dcil_internal.h336 struct cil_list *classperms; /* Only used for map perms */
341 symtab_t perms; member in struct:cil_class
360 struct cil_list *perms; member in struct:cil_classperms
/external/selinux/libsepol/src/
H A Dexpand.c1673 uint32_t ttype, class_perm_node_t * perms,
1693 cur = perms;
1782 class_perm_node_t * perms, avtab_t * avtab,
1825 cur = perms;
1873 for (i = 0; i < ARRAY_SIZE(operations->perms); i++) {
1874 node->datum.ops->perms[i] |= operations->perms[i];
1902 cond, i, i, source_rule->perms,
1909 other, i, i, source_rule->perms,
1920 cond, i, j, source_rule->perms,
1669 expand_terule_helper(sepol_handle_t * handle, policydb_t * p, uint32_t * typemap, uint32_t specified, cond_av_list_t ** cond, cond_av_list_t ** other, uint32_t stype, uint32_t ttype, class_perm_node_t * perms, avtab_t * avtab, int enabled) argument
1778 expand_avrule_helper(sepol_handle_t * handle, uint32_t specified, cond_av_list_t ** cond, uint32_t stype, uint32_t ttype, class_perm_node_t * perms, avtab_t * avtab, int enabled, av_operations_t *operations) argument
[all...]
H A Dmodule_to_cil.c546 char *perms; local
581 perms = sepol_av_to_string(pdb, classperm->tclass, classperm->data);
582 if (perms == NULL) {
590 perms + 1);
1087 rc = avrule_to_cil(indent, pdb, avrule->specified, snames[s], tnames[t], avrule->perms);
1094 rc = avrule_to_cil(indent, pdb, avrule->specified, snames[s], "self", avrule->perms);
1565 struct class_perm_datum *perms; member in struct:class_perm_array
1573 arr->perms[arr->count].name = key;
1574 arr->perms[arr->count].val = datum->s.value;
1596 arr.perms
1842 char *perms; local
[all...]
/external/selinux/checkpolicy/
H A Dpolicy_define.c1582 perm->next = avrule->perms;
1583 avrule->perms = perm;
1944 class_perm_node_t *perms, *tail = NULL, *cur_perms = NULL; local
1996 perms = NULL;
2009 if (!perms)
2010 perms = cur_perms;
2018 avrule->perms = perms;
2041 ops->perms[i] |= ~0U;
2044 ops->perms[
2349 class_perm_node_t *perms, *tail = NULL, *cur_perms = NULL; local
[all...]

Completed in 979 milliseconds

12