/external/selinux/sepolgen/src/sepolgen/ |
H A D | access.py | 77 .perms - The permissions allowed to the object class. [IdSet] 87 self.perms = refpolicy.IdSet() 101 All of the list elements 3 and greater are treated as perms. 115 self.perms = refpolicy.IdSet(list[3:]) 126 l.extend(self.perms) 134 self.obj_class, self.perms.to_space_str()) 143 if len(self.perms) != len(other.perms): 144 return cmp(len(self.perms), len(other.perms)) [all...] |
H A D | objectmodel.py | 156 def getdefault_direction(self, obj, perms): 158 for perm in perms: 163 def getdefault_distance(self, obj, perms): 165 for perm in perms:
|
H A D | matching.py | 117 # First check that we have enough perms 118 diff = av_req.perms.difference(av_prov.perms) 124 diff = av_prov.perms.difference(av_req.perms) 138 target type, and object class is the same and the perms in prov is 183 pdist = self.perm_maps.getdefault_distance(prov.obj_class, prov.perms) 224 av_dir = self.perm_maps.getdefault_direction(av.obj_class, av.perms) 230 self.perm_maps.getdefault_direction(x.obj_class, x.perms)
|
H A D | refpolicy.py | 346 self.perms = IdSet() 439 The source and target types, object classes, and perms are all represented 444 consistent (e.g., perms that don't match the object classes). It is 458 self.perms = IdSet() 481 self.perms.update(av.perms) 492 self.perms.to_space_str()) 498 difference is the lack of perms and only and sing destination type. 824 for perm in x.perms: 847 def add_obj_class(self, obj_class, perms) [all...] |
H A D | output.py | 83 return cmp(len(a.perms), len(b.perms))
|
/external/libselinux/src/ |
H A D | mapping.c | 20 access_vector_t perms[sizeof(access_vector_t) * 8]; member in struct:selinux_mapping 69 while (p_in->perms[k]) { 71 if (!*p_in->perms[k]) { 75 p_out->perms[k] = string_to_av_perm(p_out->value, 76 p_in->perms[k]); 77 if (!p_out->perms[k]) 123 kperm |= current_mapping[tclass].perms[i]; 168 if (kperm & current_mapping[tclass].perms[i]) { 170 kperm &= ~current_mapping[tclass].perms[i]; 191 if (avd->allowed & current_mapping[tclass].perms[ [all...] |
H A D | stringrep.c | 25 char **perms; member in struct:discover_class_node 71 /* allocate array for perms */ 72 node->perms = calloc(MAXVECTORS,sizeof(char*)); 73 if (node->perms == NULL) 97 snprintf(path, sizeof path, "%s/class/%s/perms",selinux_mnt,s); 107 snprintf(path, sizeof path, "%s/class/%s/perms/%s", selinux_mnt,s,dentry->d_name); 135 node->perms[value-1] = strdup(dentry->d_name); 136 if (node->perms[value-1] == NULL) 151 free(node->perms[i]); 155 free(node->perms); [all...] |
H A D | avc.c | 43 security_class_t tclass, access_vector_t perms, 49 access_vector_t perms; member in struct:avc_callback_node 853 access_vector_t perms, 857 security_class_t tclass, access_vector_t perms) 873 c->perms = perms; 886 access_vector_t perms) 890 node->ae.avd.allowed |= perms; 894 node->ae.avd.allowed &= ~perms; 897 node->ae.avd.auditallow |= perms; 850 avc_add_callback(int (*callback) (uint32_t event, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, access_vector_t * out_retained), uint32_t events, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms) argument 885 avc_update_node(uint32_t event, struct avc_node *node, access_vector_t perms) argument 911 avc_update_cache(uint32_t event, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms) argument 949 avc_control(uint32_t event, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, access_vector_t * out_retained) argument 1009 avc_ss_grant(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno) argument 1030 avc_ss_try_revoke(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, access_vector_t * out_retained) argument 1050 avc_ss_revoke(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno) argument 1085 avc_ss_set_auditallow(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, uint32_t enable) argument 1106 avc_ss_set_auditdeny(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, uint32_t enable) argument [all...] |
H A D | avc_internal.h | 157 security_class_t tclass, access_vector_t perms, 161 access_vector_t perms, uint32_t seqno, 164 security_class_t tclass, access_vector_t perms, 168 security_class_t tclass, access_vector_t perms, 171 security_class_t tclass, access_vector_t perms,
|
/external/selinux/libselinux/src/ |
H A D | mapping.c | 20 access_vector_t perms[sizeof(access_vector_t) * 8]; member in struct:selinux_mapping 69 while (p_in->perms[k]) { 71 if (!*p_in->perms[k]) { 75 p_out->perms[k] = string_to_av_perm(p_out->value, 76 p_in->perms[k]); 77 if (!p_out->perms[k]) 123 kperm |= current_mapping[tclass].perms[i]; 168 if (kperm & current_mapping[tclass].perms[i]) { 170 kperm &= ~current_mapping[tclass].perms[i]; 191 if (avd->allowed & current_mapping[tclass].perms[ [all...] |
H A D | stringrep.c | 25 char **perms; member in struct:discover_class_node 71 /* allocate array for perms */ 72 node->perms = calloc(MAXVECTORS,sizeof(char*)); 73 if (node->perms == NULL) 97 snprintf(path, sizeof path, "%s/class/%s/perms",selinux_mnt,s); 107 snprintf(path, sizeof path, "%s/class/%s/perms/%s", selinux_mnt,s,dentry->d_name); 135 node->perms[value-1] = strdup(dentry->d_name); 136 if (node->perms[value-1] == NULL) 151 free(node->perms[i]); 155 free(node->perms); [all...] |
H A D | avc.c | 43 security_class_t tclass, access_vector_t perms, 49 access_vector_t perms; member in struct:avc_callback_node 913 access_vector_t perms, 917 security_class_t tclass, access_vector_t perms) 933 c->perms = perms; 946 access_vector_t perms) 950 node->ae.avd.allowed |= perms; 954 node->ae.avd.allowed &= ~perms; 957 node->ae.avd.auditallow |= perms; 910 avc_add_callback(int (*callback) (uint32_t event, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, access_vector_t * out_retained), uint32_t events, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms) argument 945 avc_update_node(uint32_t event, struct avc_node *node, access_vector_t perms) argument 971 avc_update_cache(uint32_t event, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms) argument 1009 avc_control(uint32_t event, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, access_vector_t * out_retained) argument 1069 avc_ss_grant(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno) argument 1090 avc_ss_try_revoke(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, access_vector_t * out_retained) argument 1110 avc_ss_revoke(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno) argument 1145 avc_ss_set_auditallow(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, uint32_t enable) argument 1166 avc_ss_set_auditdeny(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, uint32_t enable) argument [all...] |
H A D | avc_internal.h | 157 security_class_t tclass, access_vector_t perms, 161 access_vector_t perms, uint32_t seqno, 164 security_class_t tclass, access_vector_t perms, 168 security_class_t tclass, access_vector_t perms, 171 security_class_t tclass, access_vector_t perms,
|
/external/sepolicy/tools/sepolicy-analyze/ |
H A D | utils.h | 12 void display_allow(policydb_t *policydb, avtab_key_t *key, int idx, uint32_t perms);
|
H A D | dups.c | 59 uint32_t perms = node->datum.data & d->data; local 60 if ((attrib1 && perms == node->datum.data) || 61 (attrib2 && perms == d->data)) {
|
H A D | utils.c | 12 void display_allow(policydb_t *policydb, avtab_key_t *key, int idx, uint32_t perms) argument 22 (policydb, key->target_class, perms));
|
/external/selinux/sepolgen/tests/ |
H A D | test_access.py | 33 self.assertTrue(isinstance(a.perms, refpolicy.IdSet)) 42 a.perms.update(["read", "write"]) 48 self.assertEqual(a.perms, l.perms) 55 a.perms.update(["read", "write"]) 62 self.assertEqual(a.perms, l.perms) 69 a.perms.update(["read", "write"]) 83 a.perms.update(["read", "write"]) 93 a.perms [all...] |
H A D | test_refpolicy.py | 78 self.assertTrue(isinstance(o.perms, set)) 87 self.assertTrue(isinstance(a.perms, set)) 94 a.perms.add("read") 101 a.perms.add("write") 132 a.perms.add("read") 148 a.perms.add("write")
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
H A D | ProtectionDomainTest.java | 44 private PermissionCollection perms = null; field in class:ProtectionDomainTest 61 perms = allperm.newPermissionCollection(); 62 perms.add(allperm); 77 new ProtectionDomain(cs, perms); 84 assertFalse(perms.isReadOnly()); 85 new ProtectionDomain(null, perms); 86 assertTrue(perms.isReadOnly()); 96 new ProtectionDomain(null, perms, null, null); 100 new ProtectionDomain(cs, perms, classldr, principals); 125 assertSame(new ProtectionDomain(null, perms) [all...] |
/external/llvm/include/llvm/Support/ |
H A D | FileSystem.h | 73 enum perms { enum in namespace:llvm::sys::fs 97 // Helper functions so that you can use & and | to manipulate perms bits: 98 inline perms operator|(perms l , perms r) { 99 return static_cast<perms>( 102 inline perms operator&(perms l , perms r) { 103 return static_cast<perms>( [all...] |
/external/libselinux/include/selinux/ |
H A D | avc.h | 364 * @perms: permissions 368 * and the permissions @perms, interpreting 369 * @perms based on @tclass. Returns %0 on success or 375 access_vector_t perms, 379 access_vector_t perms);
|
/external/selinux/libselinux/include/selinux/ |
H A D | avc.h | 368 * @perms: permissions 372 * and the permissions @perms, interpreting 373 * @perms based on @tclass. Returns %0 on success or 379 access_vector_t perms, 383 access_vector_t perms);
|
/external/clang/include/clang/Basic/ |
H A D | VirtualFileSystem.h | 40 llvm::sys::fs::perms Perms; 51 llvm::sys::fs::perms Perms); 60 llvm::sys::fs::perms getPermissions() const { return Perms; } 67 void setPermissions(llvm::sys::fs::perms p) { Perms = p; }
|
/external/libselinux/ |
H A D | Android.mk | 55 # mapping.c has redundant check of array p_in->perms. 85 # mapping.c has redundant check of array p_in->perms.
|
/external/llvm/include/llvm/Object/ |
H A D | Archive.h | 42 sys::fs::perms getAccessMode() const; 89 sys::fs::perms getAccessMode() const {
|