Home | History | Annotate | Download | only in src

Lines Matching refs:tclass

101 unmap_class(security_class_t tclass)
103 if (tclass < current_mapping_size)
104 return current_mapping[tclass].value;
107 return tclass;
111 unmap_perm(security_class_t tclass, access_vector_t tperm)
113 if (tclass < current_mapping_size) {
117 for (i=0; i<current_mapping[tclass].num_perms; i++)
119 assert(current_mapping[tclass].perms[i]);
120 kperm |= current_mapping[tclass].perms[i];
149 map_perm(security_class_t tclass, access_vector_t kperm)
151 if (tclass < current_mapping_size) {
155 for (i=0; i<current_mapping[tclass].num_perms; i++)
156 if (kperm & current_mapping[tclass].perms[i]) {
158 kperm &= ~current_mapping[tclass].perms[i];
169 map_decision(security_class_t tclass, struct av_decision *avd)
171 if (tclass < current_mapping_size) {
175 for (i=0, result=0; i<current_mapping[tclass].num_perms; i++)
176 if (avd->allowed & current_mapping[tclass].perms[i])
180 for (i=0, result=0; i<current_mapping[tclass].num_perms; i++)
181 if (avd->decided & current_mapping[tclass].perms[i])
185 for (i=0, result=0; i<current_mapping[tclass].num_perms; i++)
186 if (avd->auditallow & current_mapping[tclass].perms[i])
190 for (i=0, result=0; i<current_mapping[tclass].num_perms; i++)
191 if (avd->auditdeny & current_mapping[tclass].perms[i])