/external/selinux/libselinux/utils/ |
H A D | compute_av.c | 10 struct av_decision avd; local 26 ret = security_compute_av(argv[1], argv[2], tclass, 1, &avd); 33 print_access_vector(tclass, avd.allowed); 36 if (avd.decided != ~0U) { 38 print_access_vector(tclass, avd.decided); 42 if (avd.auditallow) { 44 print_access_vector(tclass, avd.auditallow); 48 if (avd.auditdeny != ~0U) { 50 print_access_vector(tclass, avd.auditdeny);
|
/external/libselinux/src/ |
H A D | compute_av.c | 17 struct av_decision *avd) 54 &avd->allowed, &avd->decided, 55 &avd->auditallow, &avd->auditdeny, 56 &avd->seqno, &avd->flags); 61 avd->flags = 0; 63 map_decision(tclass, avd); 13 security_compute_av(const char * scon, const char * tcon, security_class_t tclass, access_vector_t requested, struct av_decision *avd) argument
|
H A D | mapping.c | 184 map_decision(security_class_t tclass, struct av_decision *avd) argument 191 if (avd->allowed & current_mapping[tclass].perms[i]) 193 avd->allowed = result; 196 if (avd->decided & current_mapping[tclass].perms[i]) 198 avd->decided = result; 201 if (avd->auditallow & current_mapping[tclass].perms[i]) 203 avd->auditallow = result; 206 if (avd->auditdeny & current_mapping[tclass].perms[i]) 208 avd->auditdeny = result;
|
H A D | avc.c | 23 struct av_decision avd; member in struct:avc_entry 393 if (node && ((node->ae.avd.decided & requested) == requested)) { 419 * sequence number @ae->avd.seqno is not less than the latest 432 if (ae->avd.seqno < avc_cache.latest_notif) { 435 ae->avd.seqno, avc_cache.latest_notif); 447 memcpy(&node->ae.avd, &ae->avd, sizeof(ae->avd)); 656 struct av_decision *avd, int result, void *a) 660 denied = requested & ~avd 654 avc_audit(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t requested, struct av_decision *avd, int result, void *a) argument 700 avd_init(struct av_decision *avd) argument 709 avc_has_perm_noaudit(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t requested, struct avc_entry_ref *aeref, struct av_decision *avd) argument 795 struct av_decision avd; local [all...] |
/external/selinux/libselinux/src/ |
H A D | compute_av.c | 17 struct av_decision *avd) 54 &avd->allowed, &avd->decided, 55 &avd->auditallow, &avd->auditdeny, 56 &avd->seqno, &avd->flags); 61 avd->flags = 0; 63 /* If tclass invalid, kernel sets avd according to deny_unknown flag */ 65 map_decision(tclass, avd); 13 security_compute_av_flags_raw(const char * scon, const char * tcon, security_class_t tclass, access_vector_t requested, struct av_decision *avd) argument [all...] |
H A D | checkAccess.c | 88 struct av_decision avd; local 99 &avd); 101 if ((retval == 0) && ((requested & avd.allowed) == requested)) {
|
H A D | mapping.c | 184 map_decision(security_class_t tclass, struct av_decision *avd) argument 191 if (avd->allowed & current_mapping[tclass].perms[i]) 193 avd->allowed = result; 196 if (avd->decided & current_mapping[tclass].perms[i]) 198 avd->decided = result; 201 if (avd->auditallow & current_mapping[tclass].perms[i]) 203 avd->auditallow = result; 206 if (avd->auditdeny & current_mapping[tclass].perms[i]) 208 avd->auditdeny = result;
|
H A D | audit2why.c | 66 struct sepol_av_decision avd; local 112 avc->av, &avd, &reason); 322 struct sepol_av_decision avd; local 376 rc = sepol_compute_av_reason_buffer(ssid, tsid, tclass, av, &avd, &reason, &reason_buf, 0); 389 if (av & ~avd.auditdeny) {
|
H A D | avc.c | 23 struct av_decision avd; member in struct:avc_entry 433 if (node && ((node->ae.avd.decided & requested) == requested)) { 459 * sequence number @ae->avd.seqno is not less than the latest 472 if (ae->avd.seqno < avc_cache.latest_notif) { 475 ae->avd.seqno, avc_cache.latest_notif); 487 memcpy(&node->ae.avd, &ae->avd, sizeof(ae->avd)); 696 struct av_decision *avd, int result, void *a) 700 denied = requested & ~avd 694 avc_audit(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t requested, struct av_decision *avd, int result, void *a) argument 735 avd_init(struct av_decision *avd) argument 744 avc_has_perm_noaudit(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t requested, struct avc_entry_ref *aeref, struct av_decision *avd) argument 830 struct av_decision avd; local [all...] |
/external/ipsec-tools/src/racoon/ |
H A D | security.c | 220 struct av_decision avd; local 254 rtn = avc_has_perm(slsid, rangesid, tclass, av, NULL, &avd);
|
/external/selinux/policycoreutils/mcstrans/src/ |
H A D | mcscolor.c | 81 struct av_decision avd; local 112 rc = security_compute_av_raw(ctx, (security_context_t)raw, context_class, context_contains_perm, &avd); 116 rc = (context_contains_perm & avd.allowed) != context_contains_perm;
|
/external/selinux/checkpolicy/ |
H A D | checkpolicy.c | 384 struct sepol_av_decision avd; local 730 ret = sepol_compute_av(ssid, tsid, tclass, 0, &avd); 734 for (i = 1; i <= sizeof(avd.allowed) * 8; i++) { 735 if (avd.allowed & (1 << (i - 1))) { 1134 tclass, 0, &avd, &reason,
|
/external/selinux/libsepol/src/ |
H A D | conditional.c | 879 struct sepol_av_decision *avd) 883 if (!ctab || !key || !avd) 890 avd->allowed |= node->datum.data; 898 avd->auditdeny &= node->datum.data; 901 avd->auditallow |= node->datum.data; 878 cond_compute_av(avtab_t * ctab, avtab_key_t * key, struct sepol_av_decision *avd) argument
|
H A D | expand.c | 3174 avtab_datum_t *avd; local 3209 avd = &node->datum; 3214 avd->data |= d->data; 3217 avd->data &= d->data; 3326 avtab_datum_t *avd; local 3351 avd = &node->datum; 3355 avd->data |= d->data; 3358 avd->data &= d->data;
|
H A D | services.c | 835 struct sepol_av_decision *avd, 858 avd->allowed = 0; 859 avd->decided = 0xffffffff; 860 avd->auditallow = 0; 861 avd->auditdeny = 0xffffffff; 862 avd->seqno = latest_granting; 887 avd->allowed |= node->datum.data; 890 avd->auditallow |= node->datum.data; 892 avd->auditdeny &= node->datum.data; 896 cond_compute_av(&policydb->te_cond_avtab, &avkey, avd); 831 context_struct_compute_av(context_struct_t * scontext, context_struct_t * tcontext, sepol_security_class_t tclass, sepol_access_vector_t requested, struct sepol_av_decision *avd, unsigned int *reason, char **r_buf, unsigned int flags) argument 1061 sepol_compute_av_reason(sepol_security_id_t ssid, sepol_security_id_t tsid, sepol_security_class_t tclass, sepol_access_vector_t requested, struct sepol_av_decision *avd, unsigned int *reason) argument 1095 sepol_compute_av_reason_buffer(sepol_security_id_t ssid, sepol_security_id_t tsid, sepol_security_class_t tclass, sepol_access_vector_t requested, struct sepol_av_decision *avd, unsigned int *reason, char **reason_buf, unsigned int flags) argument 1137 sepol_compute_av(sepol_security_id_t ssid, sepol_security_id_t tsid, sepol_security_class_t tclass, sepol_access_vector_t requested, struct sepol_av_decision *avd) argument 1997 struct sepol_av_decision avd; local [all...] |
/external/robolectric/v3/runtime/ |
H A D | android-all-4.4_r1-robolectric-1.jar | META-INF/ META-INF/MANIFEST.MF com/ com/google/ com/google/android/ com/google/android/collect/ ... |
H A D | android-all-5.0.0_r2-robolectric-1.jar | META-INF/ META-INF/MANIFEST.MF com/ com/google/ com/google/android/ com/google/android/collect/ ... |
H A D | android-all-5.1.1_r9-robolectric-1.jar | META-INF/ META-INF/MANIFEST.MF com/ com/google/ com/google/android/ com/google/android/collect/ ... |