/external/selinux/policycoreutils/sepolicy/sepolicy/ |
booleans.py | 34 allows=search([sepolicy.ALLOW],{sepolicy.SOURCE:src,sepolicy.CLASS:tclass, sepolicy.PERMS:perm}) 39 for l in map(lambda y: y[sepolicy.TARGET], filter(lambda x: set(perm).issubset(x[sepolicy.PERMS]), allows)):
|
communicate.py | 41 allows=search([sepolicy.ALLOW],{sepolicy.SOURCE:src,sepolicy.CLASS:tclass, sepolicy.PERMS:perm}) 46 for l in map(lambda y: y[sepolicy.TARGET], filter(lambda x: set(perm).issubset(x[sepolicy.PERMS]), allows)):
|
network.py | 28 allows=search([sepolicy.ALLOW],{sepolicy.SOURCE:src,sepolicy.CLASS:tclass, sepolicy.PERMS:perm}) 31 for i in map(lambda y: y[sepolicy.TARGET], filter(lambda x: set(perm).issubset(x[sepolicy.PERMS]), allows)):
|
__init__.py | 38 PERMS = 'permlist' 55 perms = [] 56 if PERMS in seinfo: 57 perms = info[PERMS] 58 seinfo[PERMS] = ",".join(seinfo[PERMS]) 61 if dict_list and len(perms) != 0: 62 dict_list = filter(lambda x: _dict_has_perms(x, perms), dict_list) 69 allows=search([ALLOW],{SOURCE:src,TARGET:dest,CLASS:tclass,PERMS:perm} [all...] |
transition.py | 30 return map(lambda y: y[sepolicy.TARGET], filter(lambda x: "entrypoint" in x[sepolicy.PERMS], trans))
|
/external/selinux/sepolgen/src/sepolgen/ |
policygen.py | 183 "write" in av.perms and 184 ( "dir" in av.obj_class or "open" in av.perms )): 189 for i in map(lambda x: x[TCONTEXT], sesearch([ALLOW], {SCONTEXT: av.src_type, CLASS: av.obj_class, PERMS: av.perms})): 260 s.append(' class="%s" perms="%s"' % 267 s.append(' src="%s" tgt="%s" class="%s", perms="%s"' % 268 (av.src_type, av.tgt_type, av.obj_class, av.perms.to_space_str())) 381 r.add_obj_class(obj, avrule.perms)
|
refpolicy.py | 42 PERMS = 3 49 "permission" : PERMS, "role" : ROLE, "destination" : DEST_TYPE } 346 self.perms = IdSet() 439 The source and target types, object classes, and perms are all represented 444 consistent (e.g., perms that don't match the object classes). It is 458 self.perms = IdSet() 481 self.perms.update(av.perms) 492 self.perms.to_space_str()) 498 difference is the lack of perms and only and sing destination type [all...] |
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/sepolgen/ |
policygen.py | 183 "write" in av.perms and 184 ( "dir" in av.obj_class or "open" in av.perms )): 189 for i in map(lambda x: x[TCONTEXT], sesearch([ALLOW], {SCONTEXT: av.src_type, CLASS: av.obj_class, PERMS: av.perms})): 260 s.append(' class="%s" perms="%s"' % 267 s.append(' src="%s" tgt="%s" class="%s", perms="%s"' % 268 (av.src_type, av.tgt_type, av.obj_class, av.perms.to_space_str())) 381 r.add_obj_class(obj, avrule.perms)
|
refpolicy.py | 42 PERMS = 3 49 "permission" : PERMS, "role" : ROLE, "destination" : DEST_TYPE } 346 self.perms = IdSet() 439 The source and target types, object classes, and perms are all represented 444 consistent (e.g., perms that don't match the object classes). It is 458 self.perms = IdSet() 481 self.perms.update(av.perms) 492 self.perms.to_space_str()) 498 difference is the lack of perms and only and sing destination type [all...] |
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/setoolsgui/sepolgen/ |
policygen.py | 183 "write" in av.perms and 184 ( "dir" in av.obj_class or "open" in av.perms )): 189 for i in map(lambda x: x[TCONTEXT], sesearch([ALLOW], {SCONTEXT: av.src_type, CLASS: av.obj_class, PERMS: av.perms})): 260 s.append(' class="%s" perms="%s"' % 267 s.append(' src="%s" tgt="%s" class="%s", perms="%s"' % 268 (av.src_type, av.tgt_type, av.obj_class, av.perms.to_space_str())) 381 r.add_obj_class(obj, avrule.perms)
|
refpolicy.py | 42 PERMS = 3 49 "permission" : PERMS, "role" : ROLE, "destination" : DEST_TYPE } 346 self.perms = IdSet() 439 The source and target types, object classes, and perms are all represented 444 consistent (e.g., perms that don't match the object classes). It is 458 self.perms = IdSet() 481 self.perms.update(av.perms) 492 self.perms.to_space_str()) 498 difference is the lack of perms and only and sing destination type [all...] |
/hardware/ti/omap3/omx/audio/src/openmax_il/g711_dec/src/ |
OMX_G711Decoder.c | 181 * @def PERMS Define Read and Write Permisions. 184 #define PERMS 0666 [all...] |
/hardware/ti/omap3/omx/audio/src/openmax_il/g711_enc/src/ |
OMX_G711Encoder.c | 162 #define PERMS 0666 [all...] |
/hardware/ti/omap3/omx/audio/src/openmax_il/g722_dec/src/ |
OMX_G722Decoder.c | 86 #define PERMS 0666 [all...] |
/hardware/ti/omap3/omx/audio/src/openmax_il/g726_dec/src/ |
OMX_G726Decoder.c | 90 #define PERMS 0666 [all...] |
/hardware/ti/omap3/omx/audio/src/openmax_il/g726_enc/src/ |
OMX_G726Encoder.c | 170 #define PERMS 0666 [all...] |
/hardware/ti/omap3/omx/audio/src/openmax_il/g729_dec/src/ |
OMX_G729Decoder.c | 184 * @def PERMS Define Read and Write Permisions. 187 #define PERMS 0666 [all...] |
/hardware/ti/omap3/omx/audio/src/openmax_il/g729_enc/src/ |
OMX_G729Encoder.c | 172 #define PERMS 0666 [all...] |
/hardware/ti/omap3/omx/audio/src/openmax_il/wbamr_dec/src/ |
OMX_WbAmrDecoder.c | 177 #define PERMS 0666 [all...] |
/hardware/ti/omap3/omx/audio/src/openmax_il/aac_dec/src/ |
OMX_AacDecoder.c | 93 #define PERMS 0666 [all...] |
/hardware/ti/omap3/omx/audio/src/openmax_il/aac_enc/src/ |
OMX_AacEncoder.c | 144 #define PERMS 0666 [all...] |
/hardware/ti/omap3/omx/audio/src/openmax_il/mp3_dec/src/ |
OMX_Mp3Decoder.c | 93 #define PERMS 0666 [all...] |
/hardware/ti/omap3/omx/audio/src/openmax_il/nbamr_dec/src/ |
OMX_AmrDecoder.c | 179 * @def PERMS Define Read and Write Permisions. 182 #define PERMS 0666 [all...] |
/hardware/ti/omap3/omx/audio/src/openmax_il/nbamr_enc/src/ |
OMX_AmrEncoder.c | 188 #define PERMS 0666 [all...] |
/hardware/ti/omap3/omx/audio/src/openmax_il/wbamr_enc/src/ |
OMX_WbAmrEncoder.c | 174 #define PERMS 0666 [all...] |