/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
H A D | AccessControlExceptionTest.java | 46 Permission perm = new AllPermission(); 47 new AccessControlException("001", perm); 54 Permission perm = new UnresolvedPermission("unresolvedType", 56 AccessControlException ex = new AccessControlException("001", perm); 57 assertSame(ex.getPermission(), perm);
|
/external/vboot_reference/tests/tpm_lite/ |
H A D | tpmtest_spaceperm.c | 21 uint32_t perm; local 28 TPM_CHECK(TlclGetPermissions(INDEX0, &perm)); 29 VbAssert((perm & PERMPPGL) == PERMPPGL); 31 TPM_CHECK(TlclGetPermissions(INDEX1, &perm)); 32 VbAssert((perm & PERMPP) == PERMPP);
|
H A D | tpmtest_redefine_unowned.c | 18 uint32_t perm; local 33 perm = TPM_NV_PER_PPWRITE | TPM_NV_PER_GLOBALLOCK; 34 TPM_CHECK(TlclDefineSpace(INDEX0, perm, 2 * sizeof(uint32_t))); 35 TPM_CHECK(TlclDefineSpace(INDEX0, perm, sizeof(uint32_t))); 37 perm = TPM_NV_PER_PPWRITE; 38 TPM_CHECK(TlclDefineSpace(INDEX1, perm, 2 * sizeof(uint32_t))); 39 TPM_CHECK(TlclDefineSpace(INDEX1, perm, sizeof(uint32_t))); 45 TPM_EXPECT(TlclDefineSpace(INDEX0, perm, sizeof(uint32_t)), 49 TPM_CHECK(TlclDefineSpace(INDEX1, perm, 2 * sizeof(uint32_t))); 50 TPM_CHECK(TlclDefineSpace(INDEX1, perm, sizeo [all...] |
H A D | tpmtest_testsetup.c | 18 uint32_t perm; local 33 perm = TPM_NV_PER_PPWRITE | TPM_NV_PER_GLOBALLOCK; 34 TPM_CHECK(TlclDefineSpace(INDEX0, perm, sizeof(uint32_t))); 39 perm = TPM_NV_PER_PPWRITE; 40 TPM_CHECK(TlclDefineSpace(INDEX1, perm, sizeof(uint32_t)));
|
H A D | readonly.c | 38 uint32_t perm = TPM_NV_PER_WRITE_STCLEAR | TPM_NV_PER_PPWRITE; local 43 TlclDefineSpace(INDEX0, perm, 4); 45 TlclDefineSpace(INDEX1, perm, 4); 47 TlclDefineSpace(INDEX2, perm, 4); 49 TlclDefineSpace(INDEX3, perm, 4); 52 perm = TPM_NV_PER_READ_STCLEAR | TPM_NV_PER_WRITE_STCLEAR | 54 TlclDefineSpace(INDEX_INITIALIZED, perm, 1);
|
/external/selinux/policycoreutils/sepolicy/sepolicy/ |
H A D | network.py | 28 def get_types(src, tclass, perm): 29 allows = search([sepolicy.ALLOW], {sepolicy.SOURCE: src, sepolicy.CLASS: tclass, sepolicy.PERMS: perm}) 32 for i in map(lambda y: y[sepolicy.TARGET], filter(lambda x: set(perm).issubset(x[sepolicy.PERMS]), allows)): 38 def get_network_connect(src, protocol, perm): 41 tlist = get_types(src, "%s_socket" % protocol, [perm]) 43 d[(src, protocol, perm)] = [] 55 d[(src, protocol, perm)].append((i, ["all ports with out defined types"])) 57 d[(src, protocol, perm)].append((i, ["all ports"])) 59 d[(src, protocol, perm)].append((i, ["all ports > 1024"])) 61 d[(src, protocol, perm)] [all...] |
H A D | booleans.py | 36 def get_types(src, tclass, perm): 37 allows = search([sepolicy.ALLOW], {sepolicy.SOURCE: src, sepolicy.CLASS: tclass, sepolicy.PERMS: perm}) 39 raise TypeError("The %s type is not allowed to %s any types" % (src, ",".join(perm))) 42 for l in map(lambda y: y[sepolicy.TARGET], filter(lambda x: set(perm).issubset(x[sepolicy.PERMS]), allows)):
|
H A D | communicate.py | 44 def get_types(src, tclass, perm): 45 allows = search([sepolicy.ALLOW], {sepolicy.SOURCE: src, sepolicy.CLASS: tclass, sepolicy.PERMS: perm}) 47 raise ValueError("The %s type is not allowed to %s any types" % (src, ",".join(perm))) 50 for l in map(lambda y: y[sepolicy.TARGET], filter(lambda x: set(perm).issubset(x[sepolicy.PERMS]), allows)):
|
/external/libchrome/sandbox/linux/syscall_broker/ |
H A D | broker_file_permission_unittest.cc | 41 BrokerFilePermission perm = BrokerFilePermission::ReadOnly(kPath); local 46 BrokerFilePermission perm = BrokerFilePermission::ReadOnlyRecursive(kPath); local 54 BrokerFilePermission perm = BrokerFilePermission::ReadOnly(kPath); local 62 BrokerFilePermission perm = BrokerFilePermission::ReadOnlyRecursive(kPath); local 70 BrokerFilePermission perm = BrokerFilePermission::ReadOnly(kPath); local 78 BrokerFilePermission perm = BrokerFilePermission::ReadOnly(kPath); local 81 // CheckPerm tests |path| against |perm| given |access_flags|. 83 void CheckPerm(const BrokerFilePermission& perm, argument 89 ASSERT_FALSE(perm.CheckAccess(path, X_OK, NULL)); 90 ASSERT_TRUE(perm 175 BrokerFilePermission perm = BrokerFilePermission::ReadOnly(kPath); local 184 BrokerFilePermission perm = BrokerFilePermission::ReadOnlyRecursive(kPath); local 192 BrokerFilePermission perm = BrokerFilePermission::WriteOnly(kPath); local 200 BrokerFilePermission perm = BrokerFilePermission::ReadWrite(kPath); local 208 BrokerFilePermission perm = BrokerFilePermission::ReadWriteCreate(kPath); local 214 CheckUnlink(BrokerFilePermission& perm, const char* path, int access_flags) argument 227 BrokerFilePermission perm = local 237 BrokerFilePermission perm = local [all...] |
/external/selinux/sepolgen/src/sepolgen/ |
H A D | objectmodel.py | 84 def __init__(self, perm, dir, weight): 85 self.perm = perm 90 return "<sepolgen.objectmodel.PermMap %s %s %d>" % (self.perm, 122 raise ValueError("duplicate class in perm map") 131 cur[pm.perm] = pm 133 def get(self, obj, perm): 141 return self.classes[obj][perm] 143 def getdefault(self, obj, perm): 151 pm = self.classes[obj][perm] [all...] |
/external/toybox/tests/ |
H A D | find.test | 13 mkdir perm 14 touch perm/all-read-only 15 chmod a=r perm/all-read-only 57 testing "find -perm (exact success)" \ 58 "find perm -type f -perm 0444" "perm/all-read-only\n" "" "" 59 testing "find -perm (exact failure)" \ 60 "find perm -type f -perm 040 [all...] |
/external/eigen/Eigen/src/OrderingMethods/ |
H A D | Ordering.h | 60 void operator()(const MatrixType& mat, PermutationType& perm) argument 68 internal::minimum_degree_ordering(symm, perm); 73 void operator()(const SparseSelfAdjointView<SrcType, SrcUpLo>& mat, PermutationType& perm) argument 79 internal::minimum_degree_ordering(C, perm); 101 void operator()(const MatrixType& /*mat*/, PermutationType& perm) argument 103 perm.resize(0); 121 /** Compute the permutation vector \a perm form the sparse matrix \a mat 125 void operator() (const MatrixType& mat, PermutationType& perm) argument 147 perm.resize(n); 148 for (Index i = 0; i < n; i++) perm [all...] |
/external/apache-harmony/security/src/test/api/java/tests/api/java/security/ |
H A D | AccessControlContextTest.java | 37 final Permission perm = new PropertyPermission("java.class.path", 39 PermissionCollection col = perm.newPermissionCollection(); 40 col.add(perm); 45 acc.checkPermission(perm); 56 acc.checkPermission(perm);
|
/external/selinux/sepolgen/tests/ |
H A D | test_objectmodel.py | 31 self.assertEqual(pm.perm, "mount") 38 self.assertEqual(pm.perm, "foo") 43 self.assertEqual(pm.perm, "bar")
|
/external/mesa3d/src/mesa/program/ |
H A D | prog_noise.c | 79 unsigned char perm[512] = { 151, 160, 137, 91, 90, 15, variable 225 n0 = t0 * t0 * grad1(perm[i0 & 0xff], x0); 229 n1 = t1 * t1 * grad1(perm[i1 & 0xff], x1); 284 /* Wrap the integer indices at 256, to avoid indexing perm[] out of bounds */ 294 n0 = t0 * t0 * grad2(perm[ii + perm[jj]], x0, y0); 302 n1 = t1 * t1 * grad2(perm[ii + i1 + perm[jj + j1]], x1, y1); 310 n2 = t2 * t2 * grad2(perm[ii + 1 + perm[j [all...] |
/external/skia/src/ports/ |
H A D | SkOSFile_stdio.cpp | 23 static FILE* ios_open_from_bundle(const char path[], const char* perm) { argument 43 return fopen(finalPath, perm); 49 char perm[4]; local 50 char* p = perm; 67 file = ios_open_from_bundle(path, perm); 72 file = fopen(path, perm); 78 path, perm, errno, strerror(errno)));
|
/external/chromium-trace/catapult/third_party/gsutil/gslib/ |
H A D | aclhelpers.py | 78 self.scope_type, self.perm, self.identifier) 104 self.perm = self.permission_shorthand_mapping[perm_token] 106 self.perm = perm_token 151 if self.perm not in self.permission_shorthand_mapping.values(): 189 entry = entry_class(entityId=self.identifier, role=self.perm, 192 entry = entry_class(entityId=self.identifier, role=self.perm, 195 entry = entry_class(entityId=self.identifier, role=self.perm, 198 entry = entry_class(email=self.identifier, role=self.perm, 201 entry = entry_class(email=self.identifier, role=self.perm, 204 entry = entry_class(domain=self.identifier, role=self.perm, [all...] |
/external/jetty/src/java/org/eclipse/jetty/util/security/ |
H A D | UnixCrypt.java | 129 byte[] perm = new byte[64]; 138 perm[i] = (byte) 0; 153 perm[i] = (byte) k; 155 init_perm(PC1ROT, perm, 8); 162 perm[i] = temp[i] = 0; 173 perm[i] = temp[k]; 176 init_perm(PC2ROT[j], perm, 8); 194 perm[i * 8 + j] = (byte) k; 198 init_perm(IE3264, perm, 8); 210 perm[ 387 init_perm(long[][] perm, byte[] p, int chars_out) argument [all...] |
/external/openssh/ |
H A D | sftp-common.h | 40 u_int32_t perm; member in struct:Attrib
|
/external/libselinux/src/ |
H A D | checkAccess.c | 20 int selinux_check_access(const char * scon, const char * tcon, const char *class, const char *perm, void *aux) { argument 50 av = string_to_av_perm(sclass, perm); 53 avc_log(SELINUX_ERROR, "Unknown permission %s for class %s", perm, class);
|
/external/eigen/Eigen/src/SparseCore/ |
H A D | SparsePermutation.h | 48 permut_sparsematrix_product_retval(const PermutationType& perm, const MatrixType& matrix) argument 49 : m_permutation(perm), m_matrix(matrix) 82 PermutationMatrix<Dynamic,Dynamic,Index> perm; local 84 perm = m_permutation; 86 perm = m_permutation.transpose(); 90 sizes[perm.indices().coeff(it.index())]++; 94 tmp.insertByOuterInner(perm.indices().coeff(it.index()),j) = it.value(); 112 operator*(const SparseMatrixBase<SparseDerived>& matrix, const PermutationBase<PermDerived>& perm) argument 114 return internal::permut_sparsematrix_product_retval<PermutationBase<PermDerived>, SparseDerived, OnTheRight, false>(perm, matrix.derived()); 121 operator*( const PermutationBase<PermDerived>& perm, cons argument [all...] |
H A D | SparseSelfAdjointView.h | 42 void permute_symm_to_symm(const MatrixType& mat, SparseMatrix<typename MatrixType::Scalar,DestOrder,typename MatrixType::Index>& _dest, const typename MatrixType::Index* perm = 0); 45 void permute_symm_to_fullsymm(const MatrixType& mat, SparseMatrix<typename MatrixType::Scalar,DestOrder,typename MatrixType::Index>& _dest, const typename MatrixType::Index* perm = 0); 138 SparseSymmetricPermutationProduct<_MatrixTypeNested,UpLo> twistedBy(const PermutationMatrix<Dynamic,Dynamic,Index>& perm) const 140 return SparseSymmetricPermutationProduct<_MatrixTypeNested,UpLo>(m_matrix, perm); 314 void permute_symm_to_fullsymm(const MatrixType& mat, SparseMatrix<typename MatrixType::Scalar,DestOrder,typename MatrixType::Index>& _dest, const typename MatrixType::Index* perm) argument 333 Index jp = perm ? perm[j] : j; 339 Index ip = perm ? perm[i] : i; 370 Index jp = perm 401 permute_symm_to_symm(const MatrixType& mat, SparseMatrix<typename MatrixType::Scalar,DstOrder,typename MatrixType::Index>& _dest, const typename MatrixType::Index* perm) argument 478 SparseSymmetricPermutationProduct(const MatrixType& mat, const Perm& perm) argument [all...] |
/external/autotest/server/site_tests/platform_Vpd/ |
H A D | platform_Vpd.py | 94 for (path, user, group, perm) in self._VPD_FILES: 110 if perm != stats[2]: 112 ' for %s' % (stats[2], perm, path))
|
/external/curl/tests/libtest/ |
H A D | lib576.c | 46 if(finfo->strings.perm) { 47 printf("Permissions: %s", finfo->strings.perm); 49 printf(" (parsed => %o)", finfo->perm);
|
/external/selinux/libselinux/src/ |
H A D | checkAccess.c | 35 int selinux_check_access(const char *scon, const char *tcon, const char *class, const char *perm, void *aux) { argument 67 av = string_to_av_perm(sclass, perm); 70 avc_log(SELINUX_ERROR, "Unknown permission %s for class %s", perm, class);
|