/external/libselinux/src/ |
mapping.c | 21 access_vector_t perms[sizeof(access_vector_t) * 8]; member in struct:selinux_mapping 70 while (p_in->perms && p_in->perms[k]) { 72 if (!*p_in->perms[k]) { 76 p_out->perms[k] = string_to_av_perm(p_out->value, 77 p_in->perms[k]); 78 if (!p_out->perms[k]) 119 assert(current_mapping[tclass].perms[i]); 120 kperm |= current_mapping[tclass].perms[i]; 156 if (kperm & current_mapping[tclass].perms[i]) [all...] |
stringrep.c | 29 char **perms; member in struct:discover_class_node 75 /* allocate array for perms */ 76 node->perms = calloc(MAXVECTORS,sizeof(char*)); 77 if (node->perms == NULL) 101 snprintf(path, sizeof path, "%s/class/%s/perms",selinux_mnt,s); 111 snprintf(path, sizeof path, "%s/class/%s/perms/%s", selinux_mnt,s,dentry->d_name); 133 node->perms[value-1] = strdup(dentry->d_name); 134 if (node->perms[value-1] == NULL) 149 free(node->perms[i]); 153 free(node->perms); [all...] |
avc.c | 42 security_class_t tclass, access_vector_t perms, 48 access_vector_t perms; member in struct:avc_callback_node 835 access_vector_t perms, 839 security_class_t tclass, access_vector_t perms) 855 c->perms = perms; 868 access_vector_t perms) 872 node->ae.avd.allowed |= perms; 876 node->ae.avd.allowed &= ~perms; 879 node->ae.avd.auditallow |= perms; [all...] |
avc_internal.h | 157 security_class_t tclass, access_vector_t perms, 161 access_vector_t perms, uint32_t seqno, 164 security_class_t tclass, access_vector_t perms, 168 security_class_t tclass, access_vector_t perms, 171 security_class_t tclass, access_vector_t perms,
|
/build/tools/fs_get_stats/ |
fs_get_stats.c | 41 unsigned perms = 0; local 51 perms = (unsigned)strtoul(argv[1], &endptr, 0); 60 fs_config(argv[3], is_dir, &uid, &gid, &perms); 61 fprintf(stdout, "%d %d 0%o\n", uid, gid, perms);
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
ProtectionDomainTest.java | 44 private PermissionCollection perms = null; field in class:ProtectionDomainTest 61 perms = allperm.newPermissionCollection(); 62 perms.add(allperm); 77 new ProtectionDomain(cs, perms); 84 assertFalse(perms.isReadOnly()); 85 new ProtectionDomain(null, perms); 86 assertTrue(perms.isReadOnly()); 96 new ProtectionDomain(null, perms, null, null); 100 new ProtectionDomain(cs, perms, classldr, principals); 125 assertSame(new ProtectionDomain(null, perms).getPermissions(), perms) [all...] |
/libcore/luni/src/main/java/java/security/ |
PermissionsHash.java | 36 private final Hashtable perms = new Hashtable(); field in class:PermissionsHash 45 perms.put(permission, permission); 54 return perms.elements();
|
/external/kernel-headers/original/asm-arm/ |
shmbuf.h | 15 struct ipc64_perm shm_perm; /* operation perms */
|
/external/kernel-headers/original/asm-mips/ |
shmbuf.h | 14 struct ipc64_perm shm_perm; /* operation perms */
|
/system/extras/libpagemap/ |
pm_process.c | 225 char line[MAX_LINE], name[MAX_LINE], perms[MAX_PERMS]; local 265 &map->start, &map->end, perms, &map->offset, name); 276 if (perms[0] == 'r') map->flags |= PM_MAP_READ; 277 if (perms[1] == 'w') map->flags |= PM_MAP_WRITE; 278 if (perms[2] == 'x') map->flags |= PM_MAP_EXEC;
|
/external/kernel-headers/original/asm-x86/ |
shmbuf.h | 18 struct ipc64_perm shm_perm; /* operation perms */
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/asm/ |
shmbuf.h | 18 struct ipc64_perm shm_perm; /* operation perms */
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/asm/ |
shmbuf.h | 18 struct ipc64_perm shm_perm; /* operation perms */
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/asm/ |
shmbuf.h | 18 struct ipc64_perm shm_perm; /* operation perms */
|
/external/libsepol/src/ |
assertion.c | 124 a->perms, a->line)) { 134 a->perms, a->line)) {
|
/build/tools/ |
mktarball.sh | 36 # "perms: $new_perms"
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/ |
keyctl.h | 40 #define KEYCTL_SETPERM 5 /* set perms on a key */
|
shm.h | 22 struct ipc_perm shm_perm; /* operation perms */
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/linux/ |
keyctl.h | 40 #define KEYCTL_SETPERM 5 /* set perms on a key */
|
shm.h | 22 struct ipc_perm shm_perm; /* operation perms */
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/linux/ |
keyctl.h | 40 #define KEYCTL_SETPERM 5 /* set perms on a key */
|
shm.h | 22 struct ipc_perm shm_perm; /* operation perms */
|
/external/checkpolicy/test/ |
dismod.c | 258 cur = avrule->perms; 270 cur = avrule->perms; 281 render_access_mask(avrule->perms->data, avrule->perms->class, 284 display_id(policy, fp, SYM_TYPES, avrule->perms->data - 1, ""); 535 "<no perms known>"); 692 fprintf(out_fp, "Allow unknown classes and perms\n"); 694 fprintf(out_fp, "Deny unknown classes and perms\n"); 696 fprintf(out_fp, "Reject unknown classes and perms\n");
|
/external/chromium/chrome/browser/extensions/ |
extension_management_api.cc | 94 const std::set<std::string> perms = extension.api_permissions(); local 96 if (!perms.empty()) { 98 for (perms_iter = perms.begin(); perms_iter != perms.end(); ++perms_iter) {
|
/external/kernel-headers/original/linux/ |
shm.h | 23 struct ipc_perm shm_perm; /* operation perms */
|