/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
H A D | AccessControlExceptionTest.java | 46 Permission perm = new AllPermission(); 47 new AccessControlException("001", perm); 54 Permission perm = new UnresolvedPermission("unresolvedType", 56 AccessControlException ex = new AccessControlException("001", perm); 57 assertSame(ex.getPermission(), perm);
|
/external/vboot_reference/tests/tpm_lite/ |
H A D | tpmtest_spaceperm.c | 21 uint32_t perm; local 28 TPM_CHECK(TlclGetPermissions(INDEX0, &perm)); 29 VbAssert((perm & PERMPPGL) == PERMPPGL); 31 TPM_CHECK(TlclGetPermissions(INDEX1, &perm)); 32 VbAssert((perm & PERMPP) == PERMPP);
|
H A D | tpmtest_redefine_unowned.c | 18 uint32_t perm; local 33 perm = TPM_NV_PER_PPWRITE | TPM_NV_PER_GLOBALLOCK; 34 TPM_CHECK(TlclDefineSpace(INDEX0, perm, 2 * sizeof(uint32_t))); 35 TPM_CHECK(TlclDefineSpace(INDEX0, perm, sizeof(uint32_t))); 37 perm = TPM_NV_PER_PPWRITE; 38 TPM_CHECK(TlclDefineSpace(INDEX1, perm, 2 * sizeof(uint32_t))); 39 TPM_CHECK(TlclDefineSpace(INDEX1, perm, sizeof(uint32_t))); 45 TPM_EXPECT(TlclDefineSpace(INDEX0, perm, sizeof(uint32_t)), 49 TPM_CHECK(TlclDefineSpace(INDEX1, perm, 2 * sizeof(uint32_t))); 50 TPM_CHECK(TlclDefineSpace(INDEX1, perm, sizeo [all...] |
H A D | tpmtest_testsetup.c | 18 uint32_t perm; local 33 perm = TPM_NV_PER_PPWRITE | TPM_NV_PER_GLOBALLOCK; 34 TPM_CHECK(TlclDefineSpace(INDEX0, perm, sizeof(uint32_t))); 39 perm = TPM_NV_PER_PPWRITE; 40 TPM_CHECK(TlclDefineSpace(INDEX1, perm, sizeof(uint32_t)));
|
H A D | readonly.c | 38 uint32_t perm = TPM_NV_PER_WRITE_STCLEAR | TPM_NV_PER_PPWRITE; local 43 TlclDefineSpace(INDEX0, perm, 4); 45 TlclDefineSpace(INDEX1, perm, 4); 47 TlclDefineSpace(INDEX2, perm, 4); 49 TlclDefineSpace(INDEX3, perm, 4); 52 perm = TPM_NV_PER_READ_STCLEAR | TPM_NV_PER_WRITE_STCLEAR | 54 TlclDefineSpace(INDEX_INITIALIZED, perm, 1);
|
/external/selinux/policycoreutils/sepolicy/sepolicy/ |
H A D | network.py | 27 def get_types(src, tclass, perm): 28 allows=search([sepolicy.ALLOW],{sepolicy.SOURCE:src,sepolicy.CLASS:tclass, sepolicy.PERMS:perm}) 31 for i in map(lambda y: y[sepolicy.TARGET], filter(lambda x: set(perm).issubset(x[sepolicy.PERMS]), allows)): 37 def get_network_connect(src, protocol, perm): 40 tlist = get_types(src, "%s_socket" % protocol, [perm]) 42 d[(src,protocol,perm)] = [] 54 d[(src,protocol,perm)].append((i, ["all ports with out defined types"])) 56 d[(src,protocol,perm)].append((i, ["all ports"])) 58 d[(src,protocol,perm)].append((i, ["all ports > 1024"])) 60 d[(src,protocol,perm)] [all...] |
H A D | booleans.py | 33 def get_types(src, tclass, perm): 34 allows=search([sepolicy.ALLOW],{sepolicy.SOURCE:src,sepolicy.CLASS:tclass, sepolicy.PERMS:perm}) 36 raise TypeError("The %s type is not allowed to %s any types" % (src, ",".join(perm))) 39 for l in map(lambda y: y[sepolicy.TARGET], filter(lambda x: set(perm).issubset(x[sepolicy.PERMS]), allows)):
|
H A D | communicate.py | 40 def get_types(src, tclass, perm): 41 allows=search([sepolicy.ALLOW],{sepolicy.SOURCE:src,sepolicy.CLASS:tclass, sepolicy.PERMS:perm}) 43 raise ValueError("The %s type is not allowed to %s any types" % (src, ",".join(perm))) 46 for l in map(lambda y: y[sepolicy.TARGET], filter(lambda x: set(perm).issubset(x[sepolicy.PERMS]), allows)):
|
/external/selinux/sepolgen/src/sepolgen/ |
H A D | objectmodel.py | 84 def __init__(self, perm, dir, weight): 85 self.perm = perm 90 return "<sepolgen.objectmodel.PermMap %s %s %d>" % (self.perm, 122 raise ValueError("duplicate class in perm map") 131 cur[pm.perm] = pm 133 def get(self, obj, perm): 141 return self.classes[obj][perm] 143 def getdefault(self, obj, perm): 151 pm = self.classes[obj][perm] [all...] |
/external/eigen/Eigen/src/OrderingMethods/ |
H A D | Ordering.h | 60 void operator()(const MatrixType& mat, PermutationType& perm) argument 68 internal::minimum_degree_ordering(symm, perm); 73 void operator()(const SparseSelfAdjointView<SrcType, SrcUpLo>& mat, PermutationType& perm) argument 79 internal::minimum_degree_ordering(C, perm); 101 void operator()(const MatrixType& /*mat*/, PermutationType& perm) argument 103 perm.resize(0); 121 /** Compute the permutation vector \a perm form the sparse matrix \a mat 125 void operator() (const MatrixType& mat, PermutationType& perm) argument 147 perm.resize(n); 148 for (Index i = 0; i < n; i++) perm [all...] |
/external/apache-harmony/security/src/test/api/java/tests/api/java/security/ |
H A D | AccessControlContextTest.java | 37 final Permission perm = new PropertyPermission("java.class.path", 39 PermissionCollection col = perm.newPermissionCollection(); 40 col.add(perm); 45 acc.checkPermission(perm); 56 acc.checkPermission(perm);
|
/external/selinux/sepolgen/tests/ |
H A D | test_objectmodel.py | 30 self.assertEquals(pm.perm, "mount") 37 self.assertEquals(pm.perm, "foo") 42 self.assertEquals(pm.perm, "bar")
|
/external/mesa3d/src/mesa/program/ |
H A D | prog_noise.c | 79 unsigned char perm[512] = { 151, 160, 137, 91, 90, 15, variable 225 n0 = t0 * t0 * grad1(perm[i0 & 0xff], x0); 229 n1 = t1 * t1 * grad1(perm[i1 & 0xff], x1); 284 /* Wrap the integer indices at 256, to avoid indexing perm[] out of bounds */ 294 n0 = t0 * t0 * grad2(perm[ii + perm[jj]], x0, y0); 302 n1 = t1 * t1 * grad2(perm[ii + i1 + perm[jj + j1]], x1, y1); 310 n2 = t2 * t2 * grad2(perm[ii + 1 + perm[j [all...] |
/external/sepolicy/tools/ |
H A D | sepolicy-check.c | 18 fprintf(stderr, "%s -s <source> -t <target> -c <class> -p <perm> -P <policy file>\n", arg0); 57 int check_perm(avtab_ptr_t current, perm_datum_t *perm) { argument 58 uint16_t perm_bitmask = 1U << (perm->s.value - 1); 66 perm_datum_t *perm, policydb_t *policy, avtab_t *avtab) { 89 match &= check_perm(cur, perm); 120 perm_datum_t *perm = NULL; local 152 perm = hashtab_search(cls->permissions.table, p); 153 if (perm == NULL) { 155 fprintf(stderr, "perm %s does not exist in class %s\n", p, c); 158 perm 63 expand_and_check(int s_op, uint32_t source_type, int t_op, uint32_t target_type, int c_op, uint32_t target_class, perm_datum_t *perm, policydb_t *policy, avtab_t *avtab) argument 235 char *policy = NULL, *source = NULL, *target = NULL, *class = NULL, *perm = NULL; local [all...] |
/external/sepolicy/tools/sepolicy-analyze/ |
H A D | Android.mk | 10 LOCAL_SRC_FILES := sepolicy-analyze.c dups.c neverallow.c perm.c typecmp.c booleans.c attribute.c utils.c
|
/external/jetty/src/java/org/eclipse/jetty/util/security/ |
H A D | UnixCrypt.java | 129 byte[] perm = new byte[64]; 138 perm[i] = (byte) 0; 153 perm[i] = (byte) k; 155 init_perm(PC1ROT, perm, 8); 162 perm[i] = temp[i] = 0; 173 perm[i] = temp[k]; 176 init_perm(PC2ROT[j], perm, 8); 194 perm[i * 8 + j] = (byte) k; 198 init_perm(IE3264, perm, 8); 210 perm[ 387 init_perm(long[][] perm, byte[] p, int chars_out) argument [all...] |
/external/openssh/ |
H A D | sftp-common.h | 40 u_int32_t perm; member in struct:Attrib
|
/external/selinux/libsepol/src/ |
H A D | util.c | 83 char *perm = NULL, *p; local 101 perm = v.name; 102 if (perm) { 105 perm);
|
H A D | avrule_block.c | 180 perm_datum_t *perm; local 189 perm = hashtab_search(cladatum->permissions.table, perm_id); 190 if (perm == NULL && cladatum->comdatum != 0) { 193 perm = 197 if (perm == NULL) {
|
/external/libselinux/src/ |
H A D | checkAccess.c | 20 int selinux_check_access(const char * scon, const char * tcon, const char *class, const char *perm, void *aux) { argument 50 av = string_to_av_perm(sclass, perm); 53 avc_log(SELINUX_ERROR, "Unknown permission %s for class %s", perm, class);
|
/external/selinux/libselinux/src/ |
H A D | checkAccess.c | 20 int selinux_check_access(const char *scon, const char *tcon, const char *class, const char *perm, void *aux) { argument 50 av = string_to_av_perm(sclass, perm); 53 avc_log(SELINUX_ERROR, "Unknown permission %s for class %s", perm, class);
|
/external/eigen/Eigen/src/SparseCore/ |
H A D | SparsePermutation.h | 48 permut_sparsematrix_product_retval(const PermutationType& perm, const MatrixType& matrix) argument 49 : m_permutation(perm), m_matrix(matrix) 82 PermutationMatrix<Dynamic,Dynamic,Index> perm; local 84 perm = m_permutation; 86 perm = m_permutation.transpose(); 90 sizes[perm.indices().coeff(it.index())]++; 94 tmp.insertByOuterInner(perm.indices().coeff(it.index()),j) = it.value(); 112 operator*(const SparseMatrixBase<SparseDerived>& matrix, const PermutationBase<PermDerived>& perm) argument 114 return internal::permut_sparsematrix_product_retval<PermutationBase<PermDerived>, SparseDerived, OnTheRight, false>(perm, matrix.derived()); 121 operator*( const PermutationBase<PermDerived>& perm, cons argument [all...] |
H A D | SparseSelfAdjointView.h | 42 void permute_symm_to_symm(const MatrixType& mat, SparseMatrix<typename MatrixType::Scalar,DestOrder,typename MatrixType::Index>& _dest, const typename MatrixType::Index* perm = 0); 45 void permute_symm_to_fullsymm(const MatrixType& mat, SparseMatrix<typename MatrixType::Scalar,DestOrder,typename MatrixType::Index>& _dest, const typename MatrixType::Index* perm = 0); 138 SparseSymmetricPermutationProduct<_MatrixTypeNested,UpLo> twistedBy(const PermutationMatrix<Dynamic,Dynamic,Index>& perm) const 140 return SparseSymmetricPermutationProduct<_MatrixTypeNested,UpLo>(m_matrix, perm); 314 void permute_symm_to_fullsymm(const MatrixType& mat, SparseMatrix<typename MatrixType::Scalar,DestOrder,typename MatrixType::Index>& _dest, const typename MatrixType::Index* perm) argument 333 Index jp = perm ? perm[j] : j; 339 Index ip = perm ? perm[i] : i; 370 Index jp = perm 401 permute_symm_to_symm(const MatrixType& mat, SparseMatrix<typename MatrixType::Scalar,DstOrder,typename MatrixType::Index>& _dest, const typename MatrixType::Index* perm) argument 478 SparseSymmetricPermutationProduct(const MatrixType& mat, const Perm& perm) argument [all...] |
H A D | SparseColEtree.h | 58 * \param perm The permutation to apply to the column of \b mat 61 int coletree(const MatrixType& mat, IndexVector& parent, IndexVector& firstRowElt, typename MatrixType::Index *perm=0) argument 81 if(perm) pcol = perm[col]; 103 if(perm) pcol = perm[col];
|
/external/mksh/src/ |
H A D | check.pl | 474 local($type, $perm, $rest, $c, $len, $name); 479 # format is: type perm "name" 480 ($type, $perm, $rest) = 486 $perm = oct($perm) if $perm =~ /^\d+$/; 489 if (!chmod($perm, $name)) { 491 "$prog:$test{':long-name'}: can't chmod $perm $name - $!\n"; 495 if (!mkdir($name, $perm)) { 497 "$prog:$test{':long-name'}: can't mkdir $perm [all...] |