/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/integration/gs/ |
H A D | test_storage_uri.py | 32 from boto.gs.acl import SupportedPermissions as perms namespace
|
/external/tlsdate/src/ |
H A D | tlsdate-setter.c | 83 const mode_t perms = S_IRUSR | S_IWUSR | S_IRGRP | S_IROTH; local 87 perms)) < 0 || 88 fchmod (save_fd, perms) != 0)
|
H A D | util.c | 316 int perms = S_IRUSR | S_IWUSR; local 319 fd = open(path, oflags, perms);
|
/external/libselinux/src/ |
H A D | mapping.c | 20 access_vector_t perms[sizeof(access_vector_t) * 8]; member in struct:selinux_mapping 69 while (p_in->perms[k]) { 71 if (!*p_in->perms[k]) { 75 p_out->perms[k] = string_to_av_perm(p_out->value, 76 p_in->perms[k]); 77 if (!p_out->perms[k]) 123 kperm |= current_mapping[tclass].perms[i]; 168 if (kperm & current_mapping[tclass].perms[i]) { 170 kperm &= ~current_mapping[tclass].perms[i]; 191 if (avd->allowed & current_mapping[tclass].perms[ [all...] |
H A D | stringrep.c | 25 char **perms; member in struct:discover_class_node 71 /* allocate array for perms */ 72 node->perms = calloc(MAXVECTORS,sizeof(char*)); 73 if (node->perms == NULL) 97 snprintf(path, sizeof path, "%s/class/%s/perms",selinux_mnt,s); 107 snprintf(path, sizeof path, "%s/class/%s/perms/%s", selinux_mnt,s,dentry->d_name); 135 node->perms[value-1] = strdup(dentry->d_name); 136 if (node->perms[value-1] == NULL) 151 free(node->perms[i]); 155 free(node->perms); [all...] |
H A D | avc.c | 43 security_class_t tclass, access_vector_t perms, 49 access_vector_t perms; member in struct:avc_callback_node 858 access_vector_t perms, 862 security_class_t tclass, access_vector_t perms) 878 c->perms = perms; 891 access_vector_t perms) 895 node->ae.avd.allowed |= perms; 899 node->ae.avd.allowed &= ~perms; 902 node->ae.avd.auditallow |= perms; 855 avc_add_callback(int (*callback) (uint32_t event, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, access_vector_t * out_retained), uint32_t events, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms) argument 890 avc_update_node(uint32_t event, struct avc_node *node, access_vector_t perms) argument 916 avc_update_cache(uint32_t event, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms) argument 954 avc_control(uint32_t event, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, access_vector_t * out_retained) argument 1014 avc_ss_grant(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno) argument 1035 avc_ss_try_revoke(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, access_vector_t * out_retained) argument 1055 avc_ss_revoke(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno) argument 1090 avc_ss_set_auditallow(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, uint32_t enable) argument 1111 avc_ss_set_auditdeny(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, uint32_t enable) argument [all...] |
/external/selinux/libselinux/src/ |
H A D | mapping.c | 20 access_vector_t perms[sizeof(access_vector_t) * 8]; member in struct:selinux_mapping 69 while (p_in->perms[k]) { 71 if (!*p_in->perms[k]) { 75 p_out->perms[k] = string_to_av_perm(p_out->value, 76 p_in->perms[k]); 77 if (!p_out->perms[k]) 123 kperm |= current_mapping[tclass].perms[i]; 168 if (kperm & current_mapping[tclass].perms[i]) { 170 kperm &= ~current_mapping[tclass].perms[i]; 191 if (avd->allowed & current_mapping[tclass].perms[ [all...] |
H A D | stringrep.c | 25 char **perms; member in struct:discover_class_node 71 /* allocate array for perms */ 72 node->perms = calloc(MAXVECTORS,sizeof(char*)); 73 if (node->perms == NULL) 97 snprintf(path, sizeof path, "%s/class/%s/perms",selinux_mnt,s); 107 snprintf(path, sizeof path, "%s/class/%s/perms/%s", selinux_mnt,s,dentry->d_name); 135 node->perms[value-1] = strdup(dentry->d_name); 136 if (node->perms[value-1] == NULL) 151 free(node->perms[i]); 155 free(node->perms); [all...] |
H A D | avc.c | 43 security_class_t tclass, access_vector_t perms, 49 access_vector_t perms; member in struct:avc_callback_node 913 access_vector_t perms, 917 security_class_t tclass, access_vector_t perms) 933 c->perms = perms; 946 access_vector_t perms) 950 node->ae.avd.allowed |= perms; 954 node->ae.avd.allowed &= ~perms; 957 node->ae.avd.auditallow |= perms; 910 avc_add_callback(int (*callback) (uint32_t event, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, access_vector_t * out_retained), uint32_t events, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms) argument 945 avc_update_node(uint32_t event, struct avc_node *node, access_vector_t perms) argument 971 avc_update_cache(uint32_t event, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms) argument 1009 avc_control(uint32_t event, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, access_vector_t * out_retained) argument 1069 avc_ss_grant(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno) argument 1090 avc_ss_try_revoke(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, access_vector_t * out_retained) argument 1110 avc_ss_revoke(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno) argument 1145 avc_ss_set_auditallow(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, uint32_t enable) argument 1166 avc_ss_set_auditdeny(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, uint32_t enable) argument [all...] |
/external/libselinux/include/selinux/ |
H A D | selinux.h | 254 const char *perms[sizeof(access_vector_t) * 8 + 1]; member in struct:security_class_mapping
|
/external/selinux/libselinux/include/selinux/ |
H A D | selinux.h | 358 const char *perms[sizeof(access_vector_t) * 8 + 1]; member in struct:security_class_mapping
|
/external/selinux/prebuilts/bin/ |
H A D | sediff.py | 465 perms = " ".join(chain((p for p in matched_perms), variable 469 rule, perms) 501 perms = " ".join(chain((p for p in matched_perms), variable 505 rule, perms) 537 perms = " ".join(chain((p for p in matched_perms), variable 541 rule, perms) 573 perms = " ".join(chain((p for p in matched_perms), variable 577 rule, perms)
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
H A D | ProtectionDomainTest.java | 44 private PermissionCollection perms = null; field in class:ProtectionDomainTest 61 perms = allperm.newPermissionCollection(); 62 perms.add(allperm); 77 new ProtectionDomain(cs, perms); 84 assertFalse(perms.isReadOnly()); 85 new ProtectionDomain(null, perms); 86 assertTrue(perms.isReadOnly()); 96 new ProtectionDomain(null, perms, null, null); 100 new ProtectionDomain(cs, perms, classldr, principals); 125 assertSame(new ProtectionDomain(null, perms) [all...] |
/external/selinux/libsepol/include/sepol/policydb/ |
H A D | avtab.h | 79 uint32_t perms[8]; member in struct:avtab_extended_perms
|
/external/selinux/libsepol/src/ |
H A D | assertion.c | 41 const class_perm_node_t *curperm, uint32_t perms) 49 sepol_av_to_string(p, curperm->tclass, perms)); 55 sepol_av_to_string(p, curperm->tclass, perms)); 61 sepol_av_to_string(p, curperm->tclass, perms)); 94 rc = extended_permissions_and(neverallow->perms, allow->perms); 97 rc = xperm_test(neverallow->driver, allow->perms); 100 rc = xperm_test(allow->driver, neverallow->perms); 103 rc = extended_permissions_and(neverallow->perms, allow->perms); 39 report_failure(sepol_handle_t *handle, policydb_t *p, const avrule_t *avrule, unsigned int stype, unsigned int ttype, const class_perm_node_t *curperm, uint32_t perms) argument 140 report_assertion_extended_permissions(sepol_handle_t *handle, policydb_t *p, const avrule_t *avrule, unsigned int stype, unsigned int ttype, const class_perm_node_t *curperm, uint32_t perms, avtab_key_t *k, avtab_t *avtab) argument 220 uint32_t perms; local [all...] |
H A D | expand.c | 1674 uint32_t ttype, class_perm_node_t * perms, 1694 cur = perms; 1783 class_perm_node_t * perms, avtab_t * avtab, 1820 cur = perms; 1870 for (i = 0; i < ARRAY_SIZE(xperms->perms); i++) 1871 node->datum.xperms->perms[i] |= extended_perms->perms[i]; 1898 cond, i, i, source_rule->perms, 1905 other, i, i, source_rule->perms, 1916 cond, i, j, source_rule->perms, 1670 expand_terule_helper(sepol_handle_t * handle, policydb_t * p, uint32_t * typemap, uint32_t specified, cond_av_list_t ** cond, cond_av_list_t ** other, uint32_t stype, uint32_t ttype, class_perm_node_t * perms, avtab_t * avtab, int enabled) argument 1779 expand_avrule_helper(sepol_handle_t * handle, uint32_t specified, cond_av_list_t ** cond, uint32_t stype, uint32_t ttype, class_perm_node_t * perms, avtab_t * avtab, int enabled, av_extended_perms_t *extended_perms) argument [all...] |
/external/vboot_reference/firmware/lib/ |
H A D | rollback_index.c | 612 uint32_t perms, uid; local 623 RETURN_ON_FAILURE(TlclGetPermissions(KERNEL_NV_INDEX, &perms)); 625 if (TPM_NV_PER_PPWRITE != perms || ROLLBACK_SPACE_KERNEL_UID != uid)
|
/external/dbus/bus/ |
H A D | selinux.c | 178 access_vector_t perms, access_vector_t *out_retained) 176 policy_reload_callback(u_int32_t event, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, access_vector_t *out_retained) argument
|
/external/guava/guava-tests/test/com/google/common/util/concurrent/ |
H A D | JSR166TestCase.java | 669 Permissions perms = new Permissions(); field in class:JSR166TestCase.AdjustablePolicy 672 perms.add(permission); 674 void addPermission(Permission perm) { perms.add(perm); } 675 void clearPermissions() { perms = new Permissions(); } 677 return perms; 680 return perms; 683 return perms.implies(p);
|
/external/pdfium/core/src/fpdfapi/fpdf_parser/ |
H A D | fpdf_parser_encrypt.cpp | 361 CFX_ByteString perms = m_pEncryptDict->GetString("Perms"); local 362 if (perms.IsEmpty()) { 368 if (copy_len > (FX_DWORD)perms.GetLength()) { 369 copy_len = perms.GetLength(); 371 FXSYS_memcpy(perms_buf, (const uint8_t*)perms, copy_len);
|
/external/llvm/include/llvm/Support/ |
H A D | FileSystem.h | 73 enum perms { enum in namespace:llvm::sys::fs 97 // Helper functions so that you can use & and | to manipulate perms bits: 98 inline perms operator|(perms l, perms r) { 99 return static_cast<perms>(static_cast<unsigned short>(l) | 102 inline perms operator&(perms l, perms r) { 103 return static_cast<perms>(static_cas [all...] |
/external/selinux/libsepol/cil/src/ |
H A D | cil_post.c | 756 permx->perms = cil_malloc(sizeof(*permx->perms)); 757 ebitmap_init(permx->perms); 759 rc = __cil_expr_to_bitmap(permx->expr_str, permx->perms, 0x10000, db); // max is one more than 0xFFFF 762 ebitmap_destroy(permx->perms); 763 free(permx->perms); 764 permx->perms = NULL; 1224 if (rule->perms.x.permx_str == NULL) { 1225 rc = __evaluate_permissionx_expression(rule->perms.x.permx, db); 1675 ebitmap_t *perms; member in struct:perm_to_list 1682 ebitmap_t *perms = perm_args->perms; local 1696 __evaluate_perm_expression(struct cil_list *perms, enum cil_flavor flavor, symtab_t *class_symtab, symtab_t *common_symtab, unsigned int num_perms, struct cil_list **new_list, struct cil_db *db) argument [all...] |
H A D | cil_binary.c | 1245 int __cil_perms_to_datum(struct cil_list *perms, class_datum_t *sepol_class, uint32_t *datum) argument 1253 cil_list_for_each(curr_perm, perms) { 1329 rc = __cil_perms_to_datum(cp->perms, sepol_class, &data); 1374 cil_list_for_each(i, cp->perms) { 1404 struct cil_list *classperms = cil_avrule->perms.classperms; 1468 xperms->perms[i] |= ~0U; 1471 xperms->perms[i] |= XPERM_SETBITS(h); 1474 xperms->perms[i] |= ~0U - XPERM_SETBITS(low); 1477 xperms->perms[i] |= XPERM_SETBITS(h) - XPERM_SETBITS(low); 1688 rc = __cil_avrulex_ioctl_to_hashtable(args->avrulex_ioctl_table, kind, sepol_src->s.value, sepol_tgt->s.value, sepol_obj->s.value, permx->perms); 2588 cil_constrain_to_policydb_helper(policydb_t *pdb, const struct cil_db *db, struct cil_symtab_datum *class, struct cil_list *perms, struct cil_list *expr) argument [all...] |
H A D | cil_build_ast.c | 357 struct cil_tree_node *perms = NULL; local 380 perms = parse_current->next->next->cl_head; 381 rc = cil_gen_perm_nodes(db, perms, ast_node, CIL_PERM, &class->num_perms); 404 cil_symtab_destroy(&class->perms); 554 int cil_fill_perms(struct cil_tree_node *start_perm, struct cil_list **perms) argument 568 rc = cil_gen_expr(start_perm, CIL_PERM, perms); 620 cil_list_destroy(&cp->perms, CIL_FALSE); 663 /* Class-perms form: SET1 */ 668 /* Class-perms form: (CLASS1 (PERM1 ...)) */ 2034 rc = cil_fill_classperms_list(parse_current->next->next->next, &rule->perms [all...] |
/external/selinux/checkpolicy/ |
H A D | policy_define.c | 1583 perm->next = avrule->perms; 1584 avrule->perms = perm; 1940 class_perm_node_t *perms, *tail = NULL, *cur_perms = NULL; local 1994 perms = NULL; 2008 if (!perms) 2009 perms = cur_perms; 2040 avrule->perms = perms; 2064 xperms->perms[i] |= ~0U; 2067 xperms->perms[ 2399 class_perm_node_t *perms, *tail = NULL, *cur_perms = NULL; local [all...] |