Searched refs:perms (Results 1 - 25 of 69) sorted by relevance

123

/external/selinux/sepolgen/src/sepolgen/
H A Daccess.py77 .perms - The permissions allowed to the object class. [IdSet]
87 self.perms = refpolicy.IdSet()
101 All of the list elements 3 and greater are treated as perms.
115 self.perms = refpolicy.IdSet(list[3:])
126 l.extend(self.perms)
134 self.obj_class, self.perms.to_space_str())
143 if len(self.perms) != len(other.perms):
144 return cmp(len(self.perms), len(other.perms))
[all...]
H A Dobjectmodel.py156 def getdefault_direction(self, obj, perms):
158 for perm in perms:
163 def getdefault_distance(self, obj, perms):
165 for perm in perms:
H A Dmatching.py117 # First check that we have enough perms
118 diff = av_req.perms.difference(av_prov.perms)
124 diff = av_prov.perms.difference(av_req.perms)
138 target type, and object class is the same and the perms in prov is
183 pdist = self.perm_maps.getdefault_distance(prov.obj_class, prov.perms)
224 av_dir = self.perm_maps.getdefault_direction(av.obj_class, av.perms)
230 self.perm_maps.getdefault_direction(x.obj_class, x.perms)
H A Drefpolicy.py346 self.perms = IdSet()
439 The source and target types, object classes, and perms are all represented
444 consistent (e.g., perms that don't match the object classes). It is
458 self.perms = IdSet()
481 self.perms.update(av.perms)
492 self.perms.to_space_str())
498 difference is the lack of perms and only and sing destination type.
824 for perm in x.perms:
847 def add_obj_class(self, obj_class, perms)
[all...]
H A Doutput.py83 return cmp(len(a.perms), len(b.perms))
/external/libselinux/src/
H A Dmapping.c20 access_vector_t perms[sizeof(access_vector_t) * 8]; member in struct:selinux_mapping
69 while (p_in->perms[k]) {
71 if (!*p_in->perms[k]) {
75 p_out->perms[k] = string_to_av_perm(p_out->value,
76 p_in->perms[k]);
77 if (!p_out->perms[k])
123 kperm |= current_mapping[tclass].perms[i];
168 if (kperm & current_mapping[tclass].perms[i]) {
170 kperm &= ~current_mapping[tclass].perms[i];
191 if (avd->allowed & current_mapping[tclass].perms[
[all...]
H A Dstringrep.c25 char **perms; member in struct:discover_class_node
71 /* allocate array for perms */
72 node->perms = calloc(MAXVECTORS,sizeof(char*));
73 if (node->perms == NULL)
97 snprintf(path, sizeof path, "%s/class/%s/perms",selinux_mnt,s);
107 snprintf(path, sizeof path, "%s/class/%s/perms/%s", selinux_mnt,s,dentry->d_name);
135 node->perms[value-1] = strdup(dentry->d_name);
136 if (node->perms[value-1] == NULL)
151 free(node->perms[i]);
155 free(node->perms);
[all...]
H A Davc.c43 security_class_t tclass, access_vector_t perms,
49 access_vector_t perms; member in struct:avc_callback_node
853 access_vector_t perms,
857 security_class_t tclass, access_vector_t perms)
873 c->perms = perms;
886 access_vector_t perms)
890 node->ae.avd.allowed |= perms;
894 node->ae.avd.allowed &= ~perms;
897 node->ae.avd.auditallow |= perms;
850 avc_add_callback(int (*callback) (uint32_t event, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, access_vector_t * out_retained), uint32_t events, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms) argument
885 avc_update_node(uint32_t event, struct avc_node *node, access_vector_t perms) argument
911 avc_update_cache(uint32_t event, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms) argument
949 avc_control(uint32_t event, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, access_vector_t * out_retained) argument
1009 avc_ss_grant(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno) argument
1030 avc_ss_try_revoke(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, access_vector_t * out_retained) argument
1050 avc_ss_revoke(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno) argument
1085 avc_ss_set_auditallow(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, uint32_t enable) argument
1106 avc_ss_set_auditdeny(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, uint32_t enable) argument
[all...]
H A Davc_internal.h157 security_class_t tclass, access_vector_t perms,
161 access_vector_t perms, uint32_t seqno,
164 security_class_t tclass, access_vector_t perms,
168 security_class_t tclass, access_vector_t perms,
171 security_class_t tclass, access_vector_t perms,
/external/selinux/libselinux/src/
H A Dmapping.c20 access_vector_t perms[sizeof(access_vector_t) * 8]; member in struct:selinux_mapping
69 while (p_in->perms[k]) {
71 if (!*p_in->perms[k]) {
75 p_out->perms[k] = string_to_av_perm(p_out->value,
76 p_in->perms[k]);
77 if (!p_out->perms[k])
123 kperm |= current_mapping[tclass].perms[i];
168 if (kperm & current_mapping[tclass].perms[i]) {
170 kperm &= ~current_mapping[tclass].perms[i];
191 if (avd->allowed & current_mapping[tclass].perms[
[all...]
H A Dstringrep.c25 char **perms; member in struct:discover_class_node
71 /* allocate array for perms */
72 node->perms = calloc(MAXVECTORS,sizeof(char*));
73 if (node->perms == NULL)
97 snprintf(path, sizeof path, "%s/class/%s/perms",selinux_mnt,s);
107 snprintf(path, sizeof path, "%s/class/%s/perms/%s", selinux_mnt,s,dentry->d_name);
135 node->perms[value-1] = strdup(dentry->d_name);
136 if (node->perms[value-1] == NULL)
151 free(node->perms[i]);
155 free(node->perms);
[all...]
H A Davc.c43 security_class_t tclass, access_vector_t perms,
49 access_vector_t perms; member in struct:avc_callback_node
913 access_vector_t perms,
917 security_class_t tclass, access_vector_t perms)
933 c->perms = perms;
946 access_vector_t perms)
950 node->ae.avd.allowed |= perms;
954 node->ae.avd.allowed &= ~perms;
957 node->ae.avd.auditallow |= perms;
910 avc_add_callback(int (*callback) (uint32_t event, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, access_vector_t * out_retained), uint32_t events, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms) argument
945 avc_update_node(uint32_t event, struct avc_node *node, access_vector_t perms) argument
971 avc_update_cache(uint32_t event, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms) argument
1009 avc_control(uint32_t event, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, access_vector_t * out_retained) argument
1069 avc_ss_grant(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno) argument
1090 avc_ss_try_revoke(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, access_vector_t * out_retained) argument
1110 avc_ss_revoke(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno) argument
1145 avc_ss_set_auditallow(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, uint32_t enable) argument
1166 avc_ss_set_auditdeny(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, uint32_t enable) argument
[all...]
H A Davc_internal.h157 security_class_t tclass, access_vector_t perms,
161 access_vector_t perms, uint32_t seqno,
164 security_class_t tclass, access_vector_t perms,
168 security_class_t tclass, access_vector_t perms,
171 security_class_t tclass, access_vector_t perms,
/external/sepolicy/tools/sepolicy-analyze/
H A Dutils.h12 void display_allow(policydb_t *policydb, avtab_key_t *key, int idx, uint32_t perms);
H A Ddups.c59 uint32_t perms = node->datum.data & d->data; local
60 if ((attrib1 && perms == node->datum.data) ||
61 (attrib2 && perms == d->data)) {
H A Dutils.c12 void display_allow(policydb_t *policydb, avtab_key_t *key, int idx, uint32_t perms) argument
22 (policydb, key->target_class, perms));
/external/selinux/sepolgen/tests/
H A Dtest_access.py33 self.assertTrue(isinstance(a.perms, refpolicy.IdSet))
42 a.perms.update(["read", "write"])
48 self.assertEqual(a.perms, l.perms)
55 a.perms.update(["read", "write"])
62 self.assertEqual(a.perms, l.perms)
69 a.perms.update(["read", "write"])
83 a.perms.update(["read", "write"])
93 a.perms
[all...]
H A Dtest_refpolicy.py78 self.assertTrue(isinstance(o.perms, set))
87 self.assertTrue(isinstance(a.perms, set))
94 a.perms.add("read")
101 a.perms.add("write")
132 a.perms.add("read")
148 a.perms.add("write")
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/
H A DProtectionDomainTest.java44 private PermissionCollection perms = null; field in class:ProtectionDomainTest
61 perms = allperm.newPermissionCollection();
62 perms.add(allperm);
77 new ProtectionDomain(cs, perms);
84 assertFalse(perms.isReadOnly());
85 new ProtectionDomain(null, perms);
86 assertTrue(perms.isReadOnly());
96 new ProtectionDomain(null, perms, null, null);
100 new ProtectionDomain(cs, perms, classldr, principals);
125 assertSame(new ProtectionDomain(null, perms)
[all...]
/external/llvm/include/llvm/Support/
H A DFileSystem.h73 enum perms { enum in namespace:llvm::sys::fs
97 // Helper functions so that you can use & and | to manipulate perms bits:
98 inline perms operator|(perms l , perms r) {
99 return static_cast<perms>(
102 inline perms operator&(perms l , perms r) {
103 return static_cast<perms>(
[all...]
/external/libselinux/include/selinux/
H A Davc.h364 * @perms: permissions
368 * and the permissions @perms, interpreting
369 * @perms based on @tclass. Returns %0 on success or
375 access_vector_t perms,
379 access_vector_t perms);
/external/selinux/libselinux/include/selinux/
H A Davc.h368 * @perms: permissions
372 * and the permissions @perms, interpreting
373 * @perms based on @tclass. Returns %0 on success or
379 access_vector_t perms,
383 access_vector_t perms);
/external/clang/include/clang/Basic/
H A DVirtualFileSystem.h40 llvm::sys::fs::perms Perms;
51 llvm::sys::fs::perms Perms);
60 llvm::sys::fs::perms getPermissions() const { return Perms; }
67 void setPermissions(llvm::sys::fs::perms p) { Perms = p; }
/external/libselinux/
H A DAndroid.mk55 # mapping.c has redundant check of array p_in->perms.
85 # mapping.c has redundant check of array p_in->perms.
/external/llvm/include/llvm/Object/
H A DArchive.h42 sys::fs::perms getAccessMode() const;
89 sys::fs::perms getAccessMode() const {

Completed in 1184 milliseconds

123