Searched defs:state (Results 1 - 4 of 4) sorted by relevance

/security/apparmor/
H A Dmatch.c285 * aa_dfa_match_len - traverse @dfa to find state @str stops at
287 * @start: the state of the dfa to start matching in
291 * aa_dfa_match_len will match @str against the dfa and return the state it
292 * finished matching in. The final state can be used to look up the accepting
293 * label, or as the start state of a continuing match.
298 * Returns: final state reached after input is consumed
307 unsigned int state = start, pos; local
309 if (state == 0)
312 /* current state is <state>, matchin
357 unsigned int state = start, pos; local
398 aa_dfa_next(struct aa_dfa *dfa, unsigned int state, const char c) argument
[all...]
H A Dfile.c186 * @state: state in dfa
189 * TODO: convert from dfa + state to permission entry, do computation conversion
194 static struct file_perms compute_perms(struct aa_dfa *dfa, unsigned int state, argument
207 perms.allow = map_old_perms(dfa_user_allow(dfa, state));
208 perms.audit = map_old_perms(dfa_user_audit(dfa, state));
209 perms.quiet = map_old_perms(dfa_user_quiet(dfa, state));
210 perms.xindex = dfa_user_xindex(dfa, state);
212 perms.allow = map_old_perms(dfa_other_allow(dfa, state));
213 perms.audit = map_old_perms(dfa_other_audit(dfa, state));
242 unsigned int state; local
361 unsigned int state; local
[all...]
H A Ddomain.c91 * @start: state to start matching in
102 unsigned int state; local
118 state = aa_dfa_match(profile->file.dfa, start, ns->base.name);
119 state = aa_dfa_match_len(profile->file.dfa, state, ":", 1);
120 aa_str_perms(profile->file.dfa, state, name, &cond, &perms);
149 unsigned int state = aa_dfa_match(profile->xmatch, local
151 u32 perm = dfa_user_allow(profile->xmatch, state);
152 /* any accepting state means a valid match. */
343 unsigned int state; local
[all...]
/security/selinux/ss/
H A Dpolicydb.h151 int state; member in struct:cond_bool_datum

Completed in 178 milliseconds