Searched defs:avd (Results 1 - 18 of 18) sorted by relevance

/external/selinux/libselinux/utils/
H A Dcompute_av.c10 struct av_decision avd; local
26 ret = security_compute_av(argv[1], argv[2], tclass, 1, &avd);
33 print_access_vector(tclass, avd.allowed);
36 if (avd.decided != ~0U) {
38 print_access_vector(tclass, avd.decided);
42 if (avd.auditallow) {
44 print_access_vector(tclass, avd.auditallow);
48 if (avd.auditdeny != ~0U) {
50 print_access_vector(tclass, avd.auditdeny);
/external/libselinux/src/
H A Dcompute_av.c17 struct av_decision *avd)
54 &avd->allowed, &avd->decided,
55 &avd->auditallow, &avd->auditdeny,
56 &avd->seqno, &avd->flags);
61 avd->flags = 0;
63 map_decision(tclass, avd);
13 security_compute_av(const char * scon, const char * tcon, security_class_t tclass, access_vector_t requested, struct av_decision *avd) argument
H A Dmapping.c184 map_decision(security_class_t tclass, struct av_decision *avd) argument
191 if (avd->allowed & current_mapping[tclass].perms[i])
193 avd->allowed = result;
196 if (avd->decided & current_mapping[tclass].perms[i])
198 avd->decided = result;
201 if (avd->auditallow & current_mapping[tclass].perms[i])
203 avd->auditallow = result;
206 if (avd->auditdeny & current_mapping[tclass].perms[i])
208 avd->auditdeny = result;
H A Davc.c23 struct av_decision avd; member in struct:avc_entry
393 if (node && ((node->ae.avd.decided & requested) == requested)) {
419 * sequence number @ae->avd.seqno is not less than the latest
432 if (ae->avd.seqno < avc_cache.latest_notif) {
435 ae->avd.seqno, avc_cache.latest_notif);
447 memcpy(&node->ae.avd, &ae->avd, sizeof(ae->avd));
656 struct av_decision *avd, int result, void *a)
660 denied = requested & ~avd
654 avc_audit(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t requested, struct av_decision *avd, int result, void *a) argument
700 avd_init(struct av_decision *avd) argument
709 avc_has_perm_noaudit(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t requested, struct avc_entry_ref *aeref, struct av_decision *avd) argument
795 struct av_decision avd; local
[all...]
/external/selinux/libselinux/src/
H A Dcompute_av.c17 struct av_decision *avd)
54 &avd->allowed, &avd->decided,
55 &avd->auditallow, &avd->auditdeny,
56 &avd->seqno, &avd->flags);
61 avd->flags = 0;
63 /* If tclass invalid, kernel sets avd according to deny_unknown flag */
65 map_decision(tclass, avd);
13 security_compute_av_flags_raw(const char * scon, const char * tcon, security_class_t tclass, access_vector_t requested, struct av_decision *avd) argument
[all...]
H A DcheckAccess.c88 struct av_decision avd; local
99 &avd);
101 if ((retval == 0) && ((requested & avd.allowed) == requested)) {
H A Dmapping.c184 map_decision(security_class_t tclass, struct av_decision *avd) argument
191 if (avd->allowed & current_mapping[tclass].perms[i])
193 avd->allowed = result;
196 if (avd->decided & current_mapping[tclass].perms[i])
198 avd->decided = result;
201 if (avd->auditallow & current_mapping[tclass].perms[i])
203 avd->auditallow = result;
206 if (avd->auditdeny & current_mapping[tclass].perms[i])
208 avd->auditdeny = result;
H A Daudit2why.c66 struct sepol_av_decision avd; local
112 avc->av, &avd, &reason);
322 struct sepol_av_decision avd; local
376 rc = sepol_compute_av_reason_buffer(ssid, tsid, tclass, av, &avd, &reason, &reason_buf, 0);
389 if (av & ~avd.auditdeny) {
H A Davc.c23 struct av_decision avd; member in struct:avc_entry
433 if (node && ((node->ae.avd.decided & requested) == requested)) {
459 * sequence number @ae->avd.seqno is not less than the latest
472 if (ae->avd.seqno < avc_cache.latest_notif) {
475 ae->avd.seqno, avc_cache.latest_notif);
487 memcpy(&node->ae.avd, &ae->avd, sizeof(ae->avd));
696 struct av_decision *avd, int result, void *a)
700 denied = requested & ~avd
694 avc_audit(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t requested, struct av_decision *avd, int result, void *a) argument
735 avd_init(struct av_decision *avd) argument
744 avc_has_perm_noaudit(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t requested, struct avc_entry_ref *aeref, struct av_decision *avd) argument
830 struct av_decision avd; local
[all...]
/external/ipsec-tools/src/racoon/
H A Dsecurity.c220 struct av_decision avd; local
254 rtn = avc_has_perm(slsid, rangesid, tclass, av, NULL, &avd);
/external/selinux/policycoreutils/mcstrans/src/
H A Dmcscolor.c81 struct av_decision avd; local
112 rc = security_compute_av_raw(ctx, (security_context_t)raw, context_class, context_contains_perm, &avd);
116 rc = (context_contains_perm & avd.allowed) != context_contains_perm;
/external/selinux/checkpolicy/
H A Dcheckpolicy.c384 struct sepol_av_decision avd; local
730 ret = sepol_compute_av(ssid, tsid, tclass, 0, &avd);
734 for (i = 1; i <= sizeof(avd.allowed) * 8; i++) {
735 if (avd.allowed & (1 << (i - 1))) {
1134 tclass, 0, &avd, &reason,
/external/selinux/libsepol/src/
H A Dconditional.c879 struct sepol_av_decision *avd)
883 if (!ctab || !key || !avd)
890 avd->allowed |= node->datum.data;
898 avd->auditdeny &= node->datum.data;
901 avd->auditallow |= node->datum.data;
878 cond_compute_av(avtab_t * ctab, avtab_key_t * key, struct sepol_av_decision *avd) argument
H A Dexpand.c3174 avtab_datum_t *avd; local
3209 avd = &node->datum;
3214 avd->data |= d->data;
3217 avd->data &= d->data;
3326 avtab_datum_t *avd; local
3351 avd = &node->datum;
3355 avd->data |= d->data;
3358 avd->data &= d->data;
H A Dservices.c835 struct sepol_av_decision *avd,
858 avd->allowed = 0;
859 avd->decided = 0xffffffff;
860 avd->auditallow = 0;
861 avd->auditdeny = 0xffffffff;
862 avd->seqno = latest_granting;
887 avd->allowed |= node->datum.data;
890 avd->auditallow |= node->datum.data;
892 avd->auditdeny &= node->datum.data;
896 cond_compute_av(&policydb->te_cond_avtab, &avkey, avd);
831 context_struct_compute_av(context_struct_t * scontext, context_struct_t * tcontext, sepol_security_class_t tclass, sepol_access_vector_t requested, struct sepol_av_decision *avd, unsigned int *reason, char **r_buf, unsigned int flags) argument
1061 sepol_compute_av_reason(sepol_security_id_t ssid, sepol_security_id_t tsid, sepol_security_class_t tclass, sepol_access_vector_t requested, struct sepol_av_decision *avd, unsigned int *reason) argument
1095 sepol_compute_av_reason_buffer(sepol_security_id_t ssid, sepol_security_id_t tsid, sepol_security_class_t tclass, sepol_access_vector_t requested, struct sepol_av_decision *avd, unsigned int *reason, char **reason_buf, unsigned int flags) argument
1137 sepol_compute_av(sepol_security_id_t ssid, sepol_security_id_t tsid, sepol_security_class_t tclass, sepol_access_vector_t requested, struct sepol_av_decision *avd) argument
1997 struct sepol_av_decision avd; local
[all...]
/external/robolectric/v3/runtime/
H A Dandroid-all-4.4_r1-robolectric-1.jarMETA-INF/ META-INF/MANIFEST.MF com/ com/google/ com/google/android/ com/google/android/collect/ ...
H A Dandroid-all-5.0.0_r2-robolectric-1.jarMETA-INF/ META-INF/MANIFEST.MF com/ com/google/ com/google/android/ com/google/android/collect/ ...
H A Dandroid-all-5.1.1_r9-robolectric-1.jarMETA-INF/ META-INF/MANIFEST.MF com/ com/google/ com/google/android/ com/google/android/collect/ ...

Completed in 208 milliseconds