/external/chromium_org/sandbox/win/src/ |
sid_unittest.cc | 24 ATL::CSid sid_world = ATL::Sids::World(); 47 ATL::Sids::Null().GetPSID())); 50 ATL::Sids::World().GetPSID())); 53 ATL::Sids::Dialup().GetPSID())); 56 ATL::Sids::Network().GetPSID())); 59 ATL::Sids::Admins().GetPSID())); 62 ATL::Sids::Users().GetPSID())); 65 ATL::Sids::Guests().GetPSID())); 68 ATL::Sids::Proxy().GetPSID()));
|
restricted_token_unittest.cc | 75 access_token.SetPrimaryGroup(ATL::Sids::World()); 105 token.AddRestrictingSid(ATL::Sids::World().GetPSID())); 146 token.AddRestrictingSid(ATL::Sids::World().GetPSID())); 164 if (sid == ATL::Sids::RestrictedCode() && mask == GENERIC_ALL) { 188 ATL::CSid::CSidArray sids; local 190 groups.GetSidsAndAttributes(&sids, &attributes); 192 for (unsigned int i = 0; i < sids.GetCount(); i++) { 193 if (ATL::Sids::World() == sids[i]) { 215 ATL::CSid::CSidArray sids; local 247 ATL::CSid::CSidArray sids; local 280 ATL::CSid::CSidArray sids; local 318 ATL::CSid::CSidArray sids; local 426 ATL::CSid::CSidArray sids; local 563 ATL::CSid::CSidArray sids; local [all...] |
restricted_token.h | 36 // restricted_token.AddRestrictingSid(ATL::Sids::Users().GetPSID()); 80 // Lists all sids in the token and mark them as Deny Only except for those 91 // sid_exceptions.push_back(ATL::Sids::Users().GetPSID()); 92 // sid_exceptions.push_back(ATL::Sids::World().GetPSID()); 103 // restricted_token.AddSidForDenyOnly(ATL::Sids::Admins().GetPSID()); 140 // Adds a SID to the list of restricting sids in the restricted token. 141 // Parameter: sid is the sid to add to the list restricting sids. 145 // restricted_token.AddRestrictingSid(ATL::Sids::Users().GetPSID()); 148 // and the second time using your list of restricting sids. The access has 152 // Adds the logon sid of the token in the list of restricting sids for th [all...] |
sid.h | 12 // This class is used to hold and generate SIDS.
|
restricted_token.cc | 217 // Build the list of the deny only group SIDs 456 // Build the list of restricting sids from all groups.
|
security_level.h | 30 // |Sids |Sids | |
|
/external/libsepol/include/sepol/policydb/ |
services.h | 141 * Generate the set of SIDs for legal security contexts 143 * Set `*sids' to point to a dynamically allocated 144 * array containing the set of SIDs. Set `*nel' to the 149 sepol_security_id_t ** sids, uint32_t * nel); 152 * Return the SIDs to use for an unlabeled file system 172 * Return the SIDs to use for a network interface 198 #define SECURITY_FS_USE_TRANS 2 /* use transition SIDs, e.g. devpts/tmpfs */ 199 #define SECURITY_FS_USE_TASK 3 /* use task SIDs, e.g. pipefs/sockfs */ 209 * fixed labeling behavior like transition SIDs or task SIDs [all...] |
flask_types.h | 30 * for a pair of SIDs. The bits within an access vector
|
policydb.h | 299 * initial SIDs, unlabeled file systems, TCP and UDP port numbers, 302 * (e.g. all initial SIDs) are linked together into a list. 358 #define OCON_ISID 0 /* initial SIDs */ 368 #define OCON_XEN_ISID 0 /* initial SIDs */ 537 /* security contexts of initial SIDs, unlabeled file systems,
|
/external/chromium_org/third_party/freetype/src/cff/ |
cffload.c | 795 if ( charset->sids[i] > max_cid ) 796 max_cid = charset->sids[i]; 806 charset->cids[charset->sids[j]] = (FT_UShort)j; 848 FT_FREE( charset->sids ); 881 /* Allocate memory for sids. */ 882 if ( FT_NEW_ARRAY( charset->sids, num_glyphs ) ) 886 charset->sids[0] = 0; 897 charset->sids[j] = FT_GET_USHORT(); 930 /* try to rescue some of the SIDs if `nleft' is too large */ 938 /* Fill in the range of sids -- `nleft + 1' glyphs. * [all...] |
cfftypes.h | 84 FT_UShort sids [256]; /* avoid dynamic allocations */ member in struct:CFF_EncodingRec_ 96 FT_UShort* sids; member in struct:CFF_CharsetRec_ 97 FT_UShort* cids; /* the inverse mapping of `sids'; only needed */
|
cffcmap.c | 128 FT_UInt sid = charset->sids[idx]; 147 if ( !charset->sids )
|
cffdrivr.c | 248 sid = font->charset.sids[glyph_index]; 284 sid = charset->sids[i]; 550 c = cff->charset.sids[glyph_index];
|
/external/freetype/src/cff/ |
cffload.c | 795 if ( charset->sids[i] > max_cid ) 796 max_cid = charset->sids[i]; 806 charset->cids[charset->sids[j]] = (FT_UShort)j; 848 FT_FREE( charset->sids ); 881 /* Allocate memory for sids. */ 882 if ( FT_NEW_ARRAY( charset->sids, num_glyphs ) ) 886 charset->sids[0] = 0; 897 charset->sids[j] = FT_GET_USHORT(); 930 /* try to rescue some of the SIDs if `nleft' is too large */ 938 /* Fill in the range of sids -- `nleft + 1' glyphs. * [all...] |
cfftypes.h | 84 FT_UShort sids [256]; /* avoid dynamic allocations */ member in struct:CFF_EncodingRec_ 96 FT_UShort* sids; member in struct:CFF_CharsetRec_ 97 FT_UShort* cids; /* the inverse mapping of `sids'; only needed */
|
cffcmap.c | 130 FT_UInt sid = charset->sids[idx]; 149 if ( !charset->sids )
|
cffdrivr.c | 249 sid = font->charset.sids[glyph_index]; 285 sid = charset->sids[i]; 557 c = cff->charset.sids[glyph_index];
|
/external/chromium_org/net/third_party/nss/ssl/ |
sslnonce.c | 27 /* sids can be in one of 4 states: 161 /* BEWARE: This function gets called for both client and server SIDs !! 207 /* BEWARE: This function gets called for both client and server SIDs !! 223 /* BEWARE: This function gets called for both client and server SIDs !!
|
/external/checkpolicy/ |
checkpolicy.c | 380 sepol_security_id_t ssid, tsid, *sids; local 953 printf("use transition SIDs\n"); 956 printf("use task SIDs\n"); 1013 ret = sepol_get_user_sids(ssid, ans, &sids, &nel); 1019 print_sid(sids[i], NULL, NULL); 1020 free(sids);
|
/external/libsepol/src/ |
sidtab.c | 132 /* Remap invalid SIDs to the unlabeled SID. */
|
services.c | [all...] |
/external/ipsec-tools/src/racoon/ |
security.c | 231 * Get the sids for the sl and range contexts
|
/external/checkpolicy/test/ |
dismod.c | 418 fprintf(fp, "Initial SIDs:\n"); 427 fprintf(fp, "Policy Initial SIDs:\n"); 822 printf("0) Display initial SIDs\n");
|
dispol.c | 334 fprintf(fp, "permissive sids:\n");
|
/external/chromium_org/third_party/libjingle/source/talk/session/media/ |
mediasession.cc | 255 // Returns false if we exhaust the range of SIDs. 273 std::vector<uint32>* sids) { 279 sids->push_back(sid); [all...] |