/development/host/windows/usb/api/ |
adb_object_handle.h | 194 template<class obj_class>
195 obj_class* LookupObject(ADBAPIHANDLE adb_handle) {
200 if (!adb_object->IsObjectOfType(obj_class::Type())) {
208 return (adb_object != NULL) ? reinterpret_cast<obj_class*>(adb_object) :
|
/external/selinux/sepolgen/src/sepolgen/ |
access.py | 76 .obj_class - The object class to which access is allowed. [String or None] 86 self.obj_class = None 114 self.obj_class = list[2] 125 l = [self.src_type, self.tgt_type, self.obj_class] 134 self.obj_class, self.perms.to_space_str()) 141 if self.obj_class != self.obj_class: 142 return cmp(self.obj_class, other.obj_class) 170 for obj_class in avrule.obj_classes [all...] |
matching.py | 121 total = self.perm_maps.getdefault_distance(av_req.obj_class, diff) 125 return self.perm_maps.getdefault_distance(av_req.obj_class, diff) 174 if req.obj_class != prov.obj_class and not access.is_idparam(prov.obj_class): 183 pdist = self.perm_maps.getdefault_distance(prov.obj_class, prov.perms) 224 av_dir = self.perm_maps.getdefault_direction(av.obj_class, av.perms) 230 self.perm_maps.getdefault_direction(x.obj_class, x.perms)
|
policygen.py | 184 ( "dir" in av.obj_class or "open" in av.perms )): 189 for i in map(lambda x: x[TCONTEXT], sesearch([ALLOW], {SCONTEXT: av.src_type, CLASS: av.obj_class, PERMS: av.perms})): 193 rule.comment += "\n#!!!! The source type '%s' can write to a '%s' of the following type:\n# %s\n" % ( av.src_type, av.obj_class, ", ".join(types)) 195 rule.comment += "\n#!!!! The source type '%s' can write to a '%s' of the following types:\n# %s\n" % ( av.src_type, av.obj_class, ", ".join(types)) 268 (av.src_type, av.tgt_type, av.obj_class, av.perms.to_space_str())) 296 elif params[i].type == refpolicy.OBJ_CLASS: 297 ifcall.args.append(av.obj_class) 332 refpolicy.OBJ_CLASS]:
|
interfaces.py | 77 avobjs = [av.obj_class] 101 p.obj_classes.add(av.obj_class) 152 if access.is_idparam(av.obj_class): 153 if __param_insert(av.obj_class, refpolicy.OBJ_CLASS, av, params) == 1: 183 if extract_from_set(rule.obj_classes, refpolicy.OBJ_CLASS): 442 obj_classes = self.map_param(av.obj_class, ifcall) 458 for obj_class in obj_classes: 459 ifv.access.add(src_type, tgt_type, obj_class, new_perms)
|
refpolicy.py | 41 OBJ_CLASS = 2 48 str_to_field = { "source" : SRC_TYPE, "target" : TGT_TYPE, "object" : OBJ_CLASS, 480 self.obj_classes.add(av.obj_class) 847 def add_obj_class(self, obj_class, perms): 848 p = self.obj_classes.setdefault(obj_class, IdSet()) 857 for obj_class, perms in self.obj_classes.items(): 858 s.append("\tclass %s %s;" % (obj_class, perms.to_space_str())) 883 def __init__(self, obj_class, perms): 884 self.obj_class = obj_class [all...] |
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/sepolgen/ |
access.py | 76 .obj_class - The object class to which access is allowed. [String or None] 86 self.obj_class = None 114 self.obj_class = list[2] 125 l = [self.src_type, self.tgt_type, self.obj_class] 134 self.obj_class, self.perms.to_space_str()) 141 if self.obj_class != self.obj_class: 142 return cmp(self.obj_class, other.obj_class) 170 for obj_class in avrule.obj_classes [all...] |
matching.py | 121 total = self.perm_maps.getdefault_distance(av_req.obj_class, diff) 125 return self.perm_maps.getdefault_distance(av_req.obj_class, diff) 174 if req.obj_class != prov.obj_class and not access.is_idparam(prov.obj_class): 183 pdist = self.perm_maps.getdefault_distance(prov.obj_class, prov.perms) 224 av_dir = self.perm_maps.getdefault_direction(av.obj_class, av.perms) 230 self.perm_maps.getdefault_direction(x.obj_class, x.perms)
|
policygen.py | 184 ( "dir" in av.obj_class or "open" in av.perms )): 189 for i in map(lambda x: x[TCONTEXT], sesearch([ALLOW], {SCONTEXT: av.src_type, CLASS: av.obj_class, PERMS: av.perms})): 193 rule.comment += "\n#!!!! The source type '%s' can write to a '%s' of the following type:\n# %s\n" % ( av.src_type, av.obj_class, ", ".join(types)) 195 rule.comment += "\n#!!!! The source type '%s' can write to a '%s' of the following types:\n# %s\n" % ( av.src_type, av.obj_class, ", ".join(types)) 268 (av.src_type, av.tgt_type, av.obj_class, av.perms.to_space_str())) 296 elif params[i].type == refpolicy.OBJ_CLASS: 297 ifcall.args.append(av.obj_class) 332 refpolicy.OBJ_CLASS]:
|
interfaces.py | 77 avobjs = [av.obj_class] 101 p.obj_classes.add(av.obj_class) 152 if access.is_idparam(av.obj_class): 153 if __param_insert(av.obj_class, refpolicy.OBJ_CLASS, av, params) == 1: 183 if extract_from_set(rule.obj_classes, refpolicy.OBJ_CLASS): 442 obj_classes = self.map_param(av.obj_class, ifcall) 458 for obj_class in obj_classes: 459 ifv.access.add(src_type, tgt_type, obj_class, new_perms)
|
refpolicy.py | 41 OBJ_CLASS = 2 48 str_to_field = { "source" : SRC_TYPE, "target" : TGT_TYPE, "object" : OBJ_CLASS, 480 self.obj_classes.add(av.obj_class) 847 def add_obj_class(self, obj_class, perms): 848 p = self.obj_classes.setdefault(obj_class, IdSet()) 857 for obj_class, perms in self.obj_classes.items(): 858 s.append("\tclass %s %s;" % (obj_class, perms.to_space_str())) 883 def __init__(self, obj_class, perms): 884 self.obj_class = obj_class [all...] |
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/setoolsgui/sepolgen/ |
access.py | 76 .obj_class - The object class to which access is allowed. [String or None] 86 self.obj_class = None 114 self.obj_class = list[2] 125 l = [self.src_type, self.tgt_type, self.obj_class] 134 self.obj_class, self.perms.to_space_str()) 141 if self.obj_class != self.obj_class: 142 return cmp(self.obj_class, other.obj_class) 170 for obj_class in avrule.obj_classes [all...] |
matching.py | 121 total = self.perm_maps.getdefault_distance(av_req.obj_class, diff) 125 return self.perm_maps.getdefault_distance(av_req.obj_class, diff) 174 if req.obj_class != prov.obj_class and not access.is_idparam(prov.obj_class): 183 pdist = self.perm_maps.getdefault_distance(prov.obj_class, prov.perms) 224 av_dir = self.perm_maps.getdefault_direction(av.obj_class, av.perms) 230 self.perm_maps.getdefault_direction(x.obj_class, x.perms)
|
policygen.py | 184 ( "dir" in av.obj_class or "open" in av.perms )): 189 for i in map(lambda x: x[TCONTEXT], sesearch([ALLOW], {SCONTEXT: av.src_type, CLASS: av.obj_class, PERMS: av.perms})): 193 rule.comment += "\n#!!!! The source type '%s' can write to a '%s' of the following type:\n# %s\n" % ( av.src_type, av.obj_class, ", ".join(types)) 195 rule.comment += "\n#!!!! The source type '%s' can write to a '%s' of the following types:\n# %s\n" % ( av.src_type, av.obj_class, ", ".join(types)) 268 (av.src_type, av.tgt_type, av.obj_class, av.perms.to_space_str())) 296 elif params[i].type == refpolicy.OBJ_CLASS: 297 ifcall.args.append(av.obj_class) 332 refpolicy.OBJ_CLASS]:
|
interfaces.py | 77 avobjs = [av.obj_class] 101 p.obj_classes.add(av.obj_class) 152 if access.is_idparam(av.obj_class): 153 if __param_insert(av.obj_class, refpolicy.OBJ_CLASS, av, params) == 1: 183 if extract_from_set(rule.obj_classes, refpolicy.OBJ_CLASS): 442 obj_classes = self.map_param(av.obj_class, ifcall) 458 for obj_class in obj_classes: 459 ifv.access.add(src_type, tgt_type, obj_class, new_perms)
|
refpolicy.py | 41 OBJ_CLASS = 2 48 str_to_field = { "source" : SRC_TYPE, "target" : TGT_TYPE, "object" : OBJ_CLASS, 480 self.obj_classes.add(av.obj_class) 847 def add_obj_class(self, obj_class, perms): 848 p = self.obj_classes.setdefault(obj_class, IdSet()) 857 for obj_class, perms in self.obj_classes.items(): 858 s.append("\tclass %s %s;" % (obj_class, perms.to_space_str())) 883 def __init__(self, obj_class, perms): 884 self.obj_class = obj_class [all...] |
/external/selinux/sepolgen/tests/ |
test_access.py | 32 self.assertEqual(a.obj_class, None) 41 a.obj_class = "file" 47 self.assertEqual(a.obj_class, l.obj_class) 54 a.obj_class = "file" 61 self.assertEqual(a.obj_class, l.obj_class) 68 a.obj_class = "file" 82 a.obj_class = "file" 92 a.obj_class = "file [all...] |
test_interfaces.py | 54 av.obj_class = "process" 64 av.obj_class = "dir" 74 av.obj_class = "dir"
|
/external/mesa3d/src/gallium/drivers/nvc0/ |
nvc0_screen.c | 307 nvc0_magic_3d_init(struct nouveau_pushbuf *push, uint16_t obj_class) 359 if (obj_class >= NVE4_3D_CLASS) { 406 uint32_t obj_class; local 461 obj_class = NVE4_P2MF_CLASS; 464 obj_class = NVC0_M2MF_CLASS; 467 ret = nouveau_object_new(chan, 0xbeef323f, obj_class, NULL, 0, 503 obj_class = NVE4_3D_CLASS; 511 obj_class = NVC8_3D_CLASS; 514 obj_class = NVC1_3D_CLASS; 517 obj_class = NVC0_3D_CLASS [all...] |
/external/selinux/policycoreutils/sepolicy/ |
search.c | 383 const qpol_class_t *obj_class = NULL; local 443 if (qpol_terule_get_object_class(q, rule, &obj_class)) 445 if (qpol_class_get_name(q, obj_class, &tmp_name)) 556 const qpol_class_t *obj_class = NULL; local 601 if (qpol_filename_trans_get_object_class(q, filename_trans, &obj_class)) 604 if (qpol_class_get_name(q, obj_class, &tmp_name)) 761 const qpol_class_t *obj_class = NULL; local 813 if (qpol_avrule_get_object_class(q, rule, &obj_class)) { 816 if (qpol_class_get_name(q, obj_class, &tmp_name)) {
|
/art/oatdump/ |
oatdump.cc | 1710 mirror::Class* obj_class = obj->GetClass(); local [all...] |
/prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/x86_64-w64-mingw32/include/ |
lpmapi.h | 27 UCHAR obj_class; member in struct:__anon35326 33 #define ObjClass(x) ((RsvpObjHdr *)x)->obj_class
|