/external/libcxx/test/std/experimental/filesystem/fs.op.funcs/fs.op.permissions/ |
H A D | permissions.pass.cpp | 14 // void permissions(const path& p, perms prms); 15 // void permissions(const path& p, perms prms, std::error_code& ec) noexcept; 27 using PR = fs::perms; 34 const perms opts{}; ((void)opts); 44 auto checkThrow = [](path const& f, fs::perms opts, const std::error_code& ec) 66 fs::permissions(dne, fs::perms{}, ec); 68 TEST_CHECK(checkThrow(dne, fs::perms{}, ec)); 72 fs::permissions(dne_sym, fs::perms{}, ec); 74 TEST_CHECK(checkThrow(dne_sym, fs::perms{}, ec)); 85 const perms A [all...] |
/external/syslinux/com32/cmenu/libmenu/ |
H A D | passwords.c | 65 if (userdb[i]->perms == NULL) 67 tmp = strstr(userdb[i]->perms, dperm); // Search for permission 84 char line[MAX_LINE], *p, *user, *pwdhash, *perms; local 124 if (p == NULL) { // No perms specified 125 perms = NULL; 128 perms = p + 1; 129 if (*perms == 0) 130 perms = NULL; 132 // At this point we have user,pwdhash and perms setup 136 if (perms [all...] |
H A D | passwords.h | 20 char *perms; // pointer to string containing ":" delimited permissions member in struct:__anon23572
|
/external/libcxx/test/std/experimental/filesystem/class.file_status/ |
H A D | file_status.mods.pass.cpp | 17 // void permissions(perms) noexcept; 42 static_assert(noexcept(st.permissions(perms::owner_read)), 44 static_assert(std::is_same<decltype(st.permissions(perms::owner_read)), void>::value, 46 assert(st.permissions() != perms::owner_read); 47 st.permissions(perms::owner_read); 48 assert(st.permissions() == perms::owner_read);
|
H A D | file_status.obs.pass.cpp | 17 // perms permissions(p) const noexcept; 28 const file_status st(file_type::regular, perms::owner_read); 42 static_assert(std::is_same<decltype(st.permissions()), perms>::value, 43 "operation must return perms"); 44 assert(st.permissions() == perms::owner_read);
|
H A D | file_status.cons.pass.cpp | 17 // explicit file_status(file_type, perms prms = perms::unknown) noexcept; 37 assert(f.permissions() == perms::unknown); 49 assert(f.permissions() == perms::unknown); 53 static_assert(std::is_nothrow_constructible<file_status, file_type, perms>::value, 55 static_assert(!test_convertible<file_status, file_type, perms>(), 57 const file_status f(file_type::regular, perms::owner_read); 59 assert(f.permissions() == perms::owner_read);
|
/external/ltp/testcases/cve/ |
H A D | cve-2016-10044.c | 45 char perms[8], line[BUFSIZ]; local 59 if (sscanf(line, "%*x-%*x %s7", perms) < 0) 61 if (strchr(perms, (int)'x')) 62 tst_res(TFAIL, "AIO mapping is executable: %s!", perms); 64 tst_res(TPASS, "AIO mapping is not executable: %s", perms);
|
/external/selinux/libselinux/src/ |
H A D | mapping.c | 20 access_vector_t perms[sizeof(access_vector_t) * 8]; member in struct:selinux_mapping 69 while (p_in->perms[k]) { 71 if (!*p_in->perms[k]) { 75 p_out->perms[k] = string_to_av_perm(p_out->value, 76 p_in->perms[k]); 77 if (!p_out->perms[k]) 123 kperm |= current_mapping[tclass].perms[i]; 168 if (kperm & current_mapping[tclass].perms[i]) { 170 kperm &= ~current_mapping[tclass].perms[i]; 191 if (avd->allowed & current_mapping[tclass].perms[ [all...] |
H A D | stringrep.c | 25 char **perms; member in struct:discover_class_node 71 /* allocate array for perms */ 72 node->perms = calloc(MAXVECTORS,sizeof(char*)); 73 if (node->perms == NULL) 97 snprintf(path, sizeof path, "%s/class/%s/perms",selinux_mnt,s); 107 snprintf(path, sizeof path, "%s/class/%s/perms/%s", selinux_mnt,s,dentry->d_name); 135 node->perms[value-1] = strdup(dentry->d_name); 136 if (node->perms[value-1] == NULL) 151 free(node->perms[i]); 155 free(node->perms); [all...] |
/external/selinux/python/sepolgen/tests/ |
H A D | test_access.py | 33 self.assertTrue(isinstance(a.perms, refpolicy.IdSet)) 42 a.perms.update(["read", "write"]) 48 self.assertEqual(a.perms, l.perms) 55 a.perms.update(["read", "write"]) 62 self.assertEqual(a.perms, l.perms) 69 a.perms.update(["read", "write"]) 75 perms = l[3:] 76 perms [all...] |
/external/selinux/python/sepolgen/src/sepolgen/ |
H A D | access.py | 79 .perms - The permissions allowed to the object class. [IdSet] 89 self.perms = refpolicy.IdSet() 106 All of the list elements 3 and greater are treated as perms. 120 self.perms = refpolicy.IdSet(list[3:]) 131 l.extend(sorted(self.perms)) 139 self.obj_class, self.perms.to_space_str()) 143 x = list(self.perms) 145 y = list(other.perms) 176 access.perms = avrule.perms [all...] |
H A D | objectmodel.py | 156 def getdefault_direction(self, obj, perms): 158 for perm in perms: 163 def getdefault_distance(self, obj, perms): 165 for perm in perms:
|
/external/autotest/client/site_tests/security_SysVIPC/ |
H A D | security_SysVIPC.py | 14 ShmRecord = namedtuple('ShmRecord', ['owner', 'perms', 'attached']) 15 SemaphoreRecord = namedtuple('SemaphoreRecord', ['owner', 'perms']) 20 expected_shm = set([ShmRecord(owner='cras', perms='640', 22 expected_sem = set([SemaphoreRecord(owner='root', perms='600')]) 57 perms = fields[3] 59 seen.add(ShmRecord(owner=owner, perms=perms, attached=attached)) 69 seen.add(SemaphoreRecord(owner=fields[2], perms=fields[3]))
|
/external/libcxx/test/std/experimental/filesystem/fs.op.funcs/fs.op.create_directory/ |
H A D | create_directory_with_attributes.pass.cpp | 46 const perms orig_p = status(dir).permissions(); 47 permissions(dir2, perms::none); 64 permissions(env.test_root, perms::remove_perms | perms::set_gid); 68 permissions(attr_dir, perms::none); 77 TEST_CHECK(st.permissions() == perms::none);
|
H A D | create_directory.pass.cpp | 33 fs::perms read_umask() { 36 return static_cast<fs::perms>(old_mask); 78 const perms expect_perms = perms::all & ~(read_umask()); 79 TEST_CHECK((st.permissions() & perms::all) == expect_perms);
|
/external/selinux/libsepol/src/ |
H A D | assertion.c | 41 const class_perm_node_t *curperm, uint32_t perms) 49 sepol_av_to_string(p, curperm->tclass, perms)); 55 sepol_av_to_string(p, curperm->tclass, perms)); 61 sepol_av_to_string(p, curperm->tclass, perms)); 94 rc = extended_permissions_and(neverallow->perms, allow->perms); 97 rc = xperm_test(neverallow->driver, allow->perms); 100 rc = xperm_test(allow->driver, neverallow->perms); 103 rc = extended_permissions_and(neverallow->perms, allow->perms); 39 report_failure(sepol_handle_t *handle, policydb_t *p, const avrule_t *avrule, unsigned int stype, unsigned int ttype, const class_perm_node_t *curperm, uint32_t perms) argument 140 report_assertion_extended_permissions(sepol_handle_t *handle, policydb_t *p, const avrule_t *avrule, unsigned int stype, unsigned int ttype, const class_perm_node_t *curperm, uint32_t perms, avtab_key_t *k, avtab_t *avtab) argument 220 uint32_t perms; local [all...] |
/external/linux-kselftest/tools/testing/selftests/vm/ |
H A D | mlock2.h | 31 char perms[5]; local 45 &start, &end, perms, &offset, dev, &inode, path) < 6)
|
/external/autotest/client/site_tests/security_RuntimeExecStack/ |
H A D | security_RuntimeExecStack.py | 44 perms = line.split(' ', 2)[1] 47 if 'x' in perms: 50 # Sanity check we have stack segment perms. 51 if not 'w' in perms:
|
/external/libcxx/test/std/experimental/filesystem/fs.enum/ |
H A D | enum.perms.pass.cpp | 14 // enum class perms; 26 constexpr fs::perms ME(int val) { return static_cast<fs::perms>(val); } 29 typedef fs::perms E;
|
/external/libcxx/test/std/experimental/filesystem/fs.op.funcs/fs.op.symlink_status/ |
H A D | symlink_status.pass.cpp | 48 TEST_CHECK(st.permissions() == perms::unknown); 53 TEST_CHECK(st.permissions() == perms::unknown); 64 permissions(dir, perms::none); 81 TEST_CHECK(st.permissions() == perms::unknown); 95 // Test that a symlink that points into a directory without read perms 102 TEST_CHECK(st.permissions() != perms::unknown); 106 TEST_CHECK(st.permissions() != perms::unknown); 136 TEST_CHECK(st.permissions() != perms::unknown); 140 TEST_CHECK(st.permissions() != perms::unknown); 170 TEST_CHECK(st.permissions() != perms [all...] |
/external/syslinux/bios/com32/cmenu/ |
H A D | test.c | 30 char *perms; // stores the permissions required to activate the item member in struct:s_xtra 256 char *perms; local 262 perms = ( x ? x->perms : NULL); 263 if (!perms) return ACTION_VALID; 265 if (isallowed(username,"root") || isallowed(username,perms)) // If allowed 300 void set_xtra(pt_menuitem mi, const char *argsmenu, const char *perms, unsigned int helpid, long ipappend) argument 312 if ( (perms==NULL) || (strlen(perms)==0)) bad_perms = 1; 319 xtra->argsmenu = xtra->perms [all...] |
/external/syslinux/efi32/com32/cmenu/ |
H A D | test.c | 30 char *perms; // stores the permissions required to activate the item member in struct:s_xtra 256 char *perms; local 262 perms = ( x ? x->perms : NULL); 263 if (!perms) return ACTION_VALID; 265 if (isallowed(username,"root") || isallowed(username,perms)) // If allowed 300 void set_xtra(pt_menuitem mi, const char *argsmenu, const char *perms, unsigned int helpid, long ipappend) argument 312 if ( (perms==NULL) || (strlen(perms)==0)) bad_perms = 1; 319 xtra->argsmenu = xtra->perms [all...] |
/external/syslinux/efi64/com32/cmenu/ |
H A D | test.c | 30 char *perms; // stores the permissions required to activate the item member in struct:s_xtra 256 char *perms; local 262 perms = ( x ? x->perms : NULL); 263 if (!perms) return ACTION_VALID; 265 if (isallowed(username,"root") || isallowed(username,perms)) // If allowed 300 void set_xtra(pt_menuitem mi, const char *argsmenu, const char *perms, unsigned int helpid, long ipappend) argument 312 if ( (perms==NULL) || (strlen(perms)==0)) bad_perms = 1; 319 xtra->argsmenu = xtra->perms [all...] |
/external/llvm/include/llvm/Support/ |
H A D | FileSystem.h | 76 enum perms { enum in namespace:llvm::sys::fs 100 // Helper functions so that you can use & and | to manipulate perms bits: 101 inline perms operator|(perms l, perms r) { 102 return static_cast<perms>(static_cast<unsigned short>(l) | 105 inline perms operator&(perms l, perms r) { 106 return static_cast<perms>(static_cas [all...] |
/external/swiftshader/third_party/llvm-subzero/include/llvm/Support/ |
H A D | FileSystem.h | 75 enum perms { enum in namespace:llvm::sys::fs 99 // Helper functions so that you can use & and | to manipulate perms bits: 100 inline perms operator|(perms l, perms r) { 101 return static_cast<perms>(static_cast<unsigned short>(l) | 104 inline perms operator&(perms l, perms r) { 105 return static_cast<perms>(static_cas [all...] |