Searched refs:perm (Results 1 - 25 of 139) sorted by relevance

123456

/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/
H A DAccessControlExceptionTest.java46 Permission perm = new AllPermission();
47 new AccessControlException("001", perm);
54 Permission perm = new UnresolvedPermission("unresolvedType",
56 AccessControlException ex = new AccessControlException("001", perm);
57 assertSame(ex.getPermission(), perm);
/external/vboot_reference/tests/tpm_lite/
H A Dtpmtest_spaceperm.c21 uint32_t perm; local
28 TPM_CHECK(TlclGetPermissions(INDEX0, &perm));
29 VbAssert((perm & PERMPPGL) == PERMPPGL);
31 TPM_CHECK(TlclGetPermissions(INDEX1, &perm));
32 VbAssert((perm & PERMPP) == PERMPP);
H A Dtpmtest_redefine_unowned.c18 uint32_t perm; local
33 perm = TPM_NV_PER_PPWRITE | TPM_NV_PER_GLOBALLOCK;
34 TPM_CHECK(TlclDefineSpace(INDEX0, perm, 2 * sizeof(uint32_t)));
35 TPM_CHECK(TlclDefineSpace(INDEX0, perm, sizeof(uint32_t)));
37 perm = TPM_NV_PER_PPWRITE;
38 TPM_CHECK(TlclDefineSpace(INDEX1, perm, 2 * sizeof(uint32_t)));
39 TPM_CHECK(TlclDefineSpace(INDEX1, perm, sizeof(uint32_t)));
45 TPM_EXPECT(TlclDefineSpace(INDEX0, perm, sizeof(uint32_t)),
49 TPM_CHECK(TlclDefineSpace(INDEX1, perm, 2 * sizeof(uint32_t)));
50 TPM_CHECK(TlclDefineSpace(INDEX1, perm, sizeo
[all...]
H A Dtpmtest_testsetup.c18 uint32_t perm; local
33 perm = TPM_NV_PER_PPWRITE | TPM_NV_PER_GLOBALLOCK;
34 TPM_CHECK(TlclDefineSpace(INDEX0, perm, sizeof(uint32_t)));
39 perm = TPM_NV_PER_PPWRITE;
40 TPM_CHECK(TlclDefineSpace(INDEX1, perm, sizeof(uint32_t)));
H A Dreadonly.c38 uint32_t perm = TPM_NV_PER_WRITE_STCLEAR | TPM_NV_PER_PPWRITE; local
43 TlclDefineSpace(INDEX0, perm, 4);
45 TlclDefineSpace(INDEX1, perm, 4);
47 TlclDefineSpace(INDEX2, perm, 4);
49 TlclDefineSpace(INDEX3, perm, 4);
52 perm = TPM_NV_PER_READ_STCLEAR | TPM_NV_PER_WRITE_STCLEAR |
54 TlclDefineSpace(INDEX_INITIALIZED, perm, 1);
/external/selinux/policycoreutils/sepolicy/sepolicy/
H A Dnetwork.py28 def get_types(src, tclass, perm):
29 allows = search([sepolicy.ALLOW], {sepolicy.SOURCE: src, sepolicy.CLASS: tclass, sepolicy.PERMS: perm})
32 for i in map(lambda y: y[sepolicy.TARGET], filter(lambda x: set(perm).issubset(x[sepolicy.PERMS]), allows)):
38 def get_network_connect(src, protocol, perm):
41 tlist = get_types(src, "%s_socket" % protocol, [perm])
43 d[(src, protocol, perm)] = []
55 d[(src, protocol, perm)].append((i, ["all ports with out defined types"]))
57 d[(src, protocol, perm)].append((i, ["all ports"]))
59 d[(src, protocol, perm)].append((i, ["all ports > 1024"]))
61 d[(src, protocol, perm)]
[all...]
H A Dbooleans.py36 def get_types(src, tclass, perm):
37 allows = search([sepolicy.ALLOW], {sepolicy.SOURCE: src, sepolicy.CLASS: tclass, sepolicy.PERMS: perm})
39 raise TypeError("The %s type is not allowed to %s any types" % (src, ",".join(perm)))
42 for l in map(lambda y: y[sepolicy.TARGET], filter(lambda x: set(perm).issubset(x[sepolicy.PERMS]), allows)):
H A Dcommunicate.py44 def get_types(src, tclass, perm):
45 allows = search([sepolicy.ALLOW], {sepolicy.SOURCE: src, sepolicy.CLASS: tclass, sepolicy.PERMS: perm})
47 raise ValueError("The %s type is not allowed to %s any types" % (src, ",".join(perm)))
50 for l in map(lambda y: y[sepolicy.TARGET], filter(lambda x: set(perm).issubset(x[sepolicy.PERMS]), allows)):
/external/libchrome/sandbox/linux/syscall_broker/
H A Dbroker_file_permission_unittest.cc41 BrokerFilePermission perm = BrokerFilePermission::ReadOnly(kPath); local
46 BrokerFilePermission perm = BrokerFilePermission::ReadOnlyRecursive(kPath); local
54 BrokerFilePermission perm = BrokerFilePermission::ReadOnly(kPath); local
62 BrokerFilePermission perm = BrokerFilePermission::ReadOnlyRecursive(kPath); local
70 BrokerFilePermission perm = BrokerFilePermission::ReadOnly(kPath); local
78 BrokerFilePermission perm = BrokerFilePermission::ReadOnly(kPath); local
81 // CheckPerm tests |path| against |perm| given |access_flags|.
83 void CheckPerm(const BrokerFilePermission& perm, argument
89 ASSERT_FALSE(perm.CheckAccess(path, X_OK, NULL));
90 ASSERT_TRUE(perm
175 BrokerFilePermission perm = BrokerFilePermission::ReadOnly(kPath); local
184 BrokerFilePermission perm = BrokerFilePermission::ReadOnlyRecursive(kPath); local
192 BrokerFilePermission perm = BrokerFilePermission::WriteOnly(kPath); local
200 BrokerFilePermission perm = BrokerFilePermission::ReadWrite(kPath); local
208 BrokerFilePermission perm = BrokerFilePermission::ReadWriteCreate(kPath); local
214 CheckUnlink(BrokerFilePermission& perm, const char* path, int access_flags) argument
227 BrokerFilePermission perm = local
237 BrokerFilePermission perm = local
[all...]
/external/selinux/sepolgen/src/sepolgen/
H A Dobjectmodel.py84 def __init__(self, perm, dir, weight):
85 self.perm = perm
90 return "<sepolgen.objectmodel.PermMap %s %s %d>" % (self.perm,
122 raise ValueError("duplicate class in perm map")
131 cur[pm.perm] = pm
133 def get(self, obj, perm):
141 return self.classes[obj][perm]
143 def getdefault(self, obj, perm):
151 pm = self.classes[obj][perm]
[all...]
/external/toybox/tests/
H A Dfind.test13 mkdir perm
14 touch perm/all-read-only
15 chmod a=r perm/all-read-only
57 testing "find -perm (exact success)" \
58 "find perm -type f -perm 0444" "perm/all-read-only\n" "" ""
59 testing "find -perm (exact failure)" \
60 "find perm -type f -perm 040
[all...]
/external/eigen/Eigen/src/OrderingMethods/
H A DOrdering.h60 void operator()(const MatrixType& mat, PermutationType& perm) argument
68 internal::minimum_degree_ordering(symm, perm);
73 void operator()(const SparseSelfAdjointView<SrcType, SrcUpLo>& mat, PermutationType& perm) argument
79 internal::minimum_degree_ordering(C, perm);
101 void operator()(const MatrixType& /*mat*/, PermutationType& perm) argument
103 perm.resize(0);
121 /** Compute the permutation vector \a perm form the sparse matrix \a mat
125 void operator() (const MatrixType& mat, PermutationType& perm) argument
147 perm.resize(n);
148 for (Index i = 0; i < n; i++) perm
[all...]
/external/apache-harmony/security/src/test/api/java/tests/api/java/security/
H A DAccessControlContextTest.java37 final Permission perm = new PropertyPermission("java.class.path",
39 PermissionCollection col = perm.newPermissionCollection();
40 col.add(perm);
45 acc.checkPermission(perm);
56 acc.checkPermission(perm);
/external/selinux/sepolgen/tests/
H A Dtest_objectmodel.py31 self.assertEqual(pm.perm, "mount")
38 self.assertEqual(pm.perm, "foo")
43 self.assertEqual(pm.perm, "bar")
/external/mesa3d/src/mesa/program/
H A Dprog_noise.c79 unsigned char perm[512] = { 151, 160, 137, 91, 90, 15, variable
225 n0 = t0 * t0 * grad1(perm[i0 & 0xff], x0);
229 n1 = t1 * t1 * grad1(perm[i1 & 0xff], x1);
284 /* Wrap the integer indices at 256, to avoid indexing perm[] out of bounds */
294 n0 = t0 * t0 * grad2(perm[ii + perm[jj]], x0, y0);
302 n1 = t1 * t1 * grad2(perm[ii + i1 + perm[jj + j1]], x1, y1);
310 n2 = t2 * t2 * grad2(perm[ii + 1 + perm[j
[all...]
/external/chromium-trace/catapult/third_party/gsutil/gslib/
H A Daclhelpers.py78 self.scope_type, self.perm, self.identifier)
104 self.perm = self.permission_shorthand_mapping[perm_token]
106 self.perm = perm_token
151 if self.perm not in self.permission_shorthand_mapping.values():
189 entry = entry_class(entityId=self.identifier, role=self.perm,
192 entry = entry_class(entityId=self.identifier, role=self.perm,
195 entry = entry_class(entityId=self.identifier, role=self.perm,
198 entry = entry_class(email=self.identifier, role=self.perm,
201 entry = entry_class(email=self.identifier, role=self.perm,
204 entry = entry_class(domain=self.identifier, role=self.perm,
[all...]
/external/jetty/src/java/org/eclipse/jetty/util/security/
H A DUnixCrypt.java129 byte[] perm = new byte[64];
138 perm[i] = (byte) 0;
153 perm[i] = (byte) k;
155 init_perm(PC1ROT, perm, 8);
162 perm[i] = temp[i] = 0;
173 perm[i] = temp[k];
176 init_perm(PC2ROT[j], perm, 8);
194 perm[i * 8 + j] = (byte) k;
198 init_perm(IE3264, perm, 8);
210 perm[
387 init_perm(long[][] perm, byte[] p, int chars_out) argument
[all...]
/external/libselinux/src/
H A DcheckAccess.c20 int selinux_check_access(const char * scon, const char * tcon, const char *class, const char *perm, void *aux) { argument
50 av = string_to_av_perm(sclass, perm);
53 avc_log(SELINUX_ERROR, "Unknown permission %s for class %s", perm, class);
/external/eigen/Eigen/src/SparseCore/
H A DSparsePermutation.h48 permut_sparsematrix_product_retval(const PermutationType& perm, const MatrixType& matrix) argument
49 : m_permutation(perm), m_matrix(matrix)
82 PermutationMatrix<Dynamic,Dynamic,Index> perm; local
84 perm = m_permutation;
86 perm = m_permutation.transpose();
90 sizes[perm.indices().coeff(it.index())]++;
94 tmp.insertByOuterInner(perm.indices().coeff(it.index()),j) = it.value();
112 operator*(const SparseMatrixBase<SparseDerived>& matrix, const PermutationBase<PermDerived>& perm) argument
114 return internal::permut_sparsematrix_product_retval<PermutationBase<PermDerived>, SparseDerived, OnTheRight, false>(perm, matrix.derived());
121 operator*( const PermutationBase<PermDerived>& perm, cons argument
[all...]
H A DSparseSelfAdjointView.h42 void permute_symm_to_symm(const MatrixType& mat, SparseMatrix<typename MatrixType::Scalar,DestOrder,typename MatrixType::Index>& _dest, const typename MatrixType::Index* perm = 0);
45 void permute_symm_to_fullsymm(const MatrixType& mat, SparseMatrix<typename MatrixType::Scalar,DestOrder,typename MatrixType::Index>& _dest, const typename MatrixType::Index* perm = 0);
138 SparseSymmetricPermutationProduct<_MatrixTypeNested,UpLo> twistedBy(const PermutationMatrix<Dynamic,Dynamic,Index>& perm) const
140 return SparseSymmetricPermutationProduct<_MatrixTypeNested,UpLo>(m_matrix, perm);
314 void permute_symm_to_fullsymm(const MatrixType& mat, SparseMatrix<typename MatrixType::Scalar,DestOrder,typename MatrixType::Index>& _dest, const typename MatrixType::Index* perm) argument
333 Index jp = perm ? perm[j] : j;
339 Index ip = perm ? perm[i] : i;
370 Index jp = perm
401 permute_symm_to_symm(const MatrixType& mat, SparseMatrix<typename MatrixType::Scalar,DstOrder,typename MatrixType::Index>& _dest, const typename MatrixType::Index* perm) argument
478 SparseSymmetricPermutationProduct(const MatrixType& mat, const Perm& perm) argument
[all...]
/external/skia/src/ports/
H A DSkOSFile_stdio.cpp23 static FILE* ios_open_from_bundle(const char path[], const char* perm) { argument
43 return fopen(finalPath, perm);
49 char perm[4]; local
50 char* p = perm;
67 file = ios_open_from_bundle(path, perm);
72 file = fopen(path, perm);
78 path, perm, errno, strerror(errno)));
/external/autotest/server/site_tests/platform_Vpd/
H A Dplatform_Vpd.py94 for (path, user, group, perm) in self._VPD_FILES:
110 if perm != stats[2]:
112 ' for %s' % (stats[2], perm, path))
/external/curl/tests/libtest/
H A Dlib576.c46 if(finfo->strings.perm) {
47 printf("Permissions: %s", finfo->strings.perm);
49 printf(" (parsed => %o)", finfo->perm);
/external/selinux/libselinux/src/
H A DcheckAccess.c35 int selinux_check_access(const char *scon, const char *tcon, const char *class, const char *perm, void *aux) { argument
67 av = string_to_av_perm(sclass, perm);
70 avc_log(SELINUX_ERROR, "Unknown permission %s for class %s", perm, class);
/external/mksh/src/
H A Dcheck.pl477 local($type, $perm, $rest, $c, $len, $name);
482 # format is: type perm "name"
483 ($type, $perm, $rest) =
489 $perm = oct($perm) if $perm =~ /^\d+$/;
492 if (!chmod($perm, $name)) {
494 "$prog:$test{':long-name'}: can't chmod $perm $name - $!\n";
498 if (!mkdir($name, $perm)) {
500 "$prog:$test{':long-name'}: can't mkdir $perm
[all...]

Completed in 2316 milliseconds

123456