/prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/setools/ |
objclassquery.py | 42 perms The permissions to match. 58 perms = CriteriaSetDescriptor("perms_regex") variable in class:ObjClassQuery 68 self.log.debug("Perms: {0.perms}, regex: {0.perms_regex}, " 85 if self.perms: 86 perms = class_.perms 90 perms |= class_.common.perms 95 perms, [all...] |
mixins.py | 75 perms = CriteriaSetDescriptor("perms_regex") variable in class:MatchPermission 85 obj An object with a permission set class attribute named "perms" 88 if not self.perms: 93 return obj.perms >= self.perms 95 return self._match_regex_or_set(obj.perms, self.perms, self.perms_equal,
|
/system/core/libmemunreachable/ |
ProcessMappings.cpp | 43 char perms[5]; local 46 &mapping.begin, &mapping.end, perms, &name_pos) == 3) { 47 if (perms[0] == 'r') { 50 if (perms[1] == 'w') { 53 if (perms[2] == 'x') { 56 if (perms[3] == 'p') {
|
/libcore/ojluni/src/main/java/java/security/ |
UnresolvedPermissionCollection.java | 57 private transient Map<String, List<UnresolvedPermission>> perms; field in class:UnresolvedPermissionCollection 64 perms = new HashMap<String, List<UnresolvedPermission>>(11); 83 v = perms.get(up.getName()); 86 perms.put(up.getName(), v); 100 return perms.get(p.getClass().getName()); 126 for (List<UnresolvedPermission> l : perms.values()) { 155 * Writes the contents of the perms field out as a Hashtable 162 // Copy perms into a Hashtable 164 new Hashtable<>(perms.size()*2); 168 Set<Map.Entry<String, List<UnresolvedPermission>>> set = perms.entrySet() [all...] |
/external/libselinux/src/ |
mapping.c | 20 access_vector_t perms[sizeof(access_vector_t) * 8]; member in struct:selinux_mapping 69 while (p_in->perms[k]) { 71 if (!*p_in->perms[k]) { 75 p_out->perms[k] = string_to_av_perm(p_out->value, 76 p_in->perms[k]); 77 if (!p_out->perms[k]) 123 kperm |= current_mapping[tclass].perms[i]; 168 if (kperm & current_mapping[tclass].perms[i]) { 170 kperm &= ~current_mapping[tclass].perms[i]; 191 if (avd->allowed & current_mapping[tclass].perms[i] [all...] |
stringrep.c | 25 char **perms; member in struct:discover_class_node 71 /* allocate array for perms */ 72 node->perms = calloc(MAXVECTORS,sizeof(char*)); 73 if (node->perms == NULL) 97 snprintf(path, sizeof path, "%s/class/%s/perms",selinux_mnt,s); 107 snprintf(path, sizeof path, "%s/class/%s/perms/%s", selinux_mnt,s,dentry->d_name); 135 node->perms[value-1] = strdup(dentry->d_name); 136 if (node->perms[value-1] == NULL) 151 free(node->perms[i]); 155 free(node->perms); [all...] |
avc.c | 43 security_class_t tclass, access_vector_t perms, 49 access_vector_t perms; member in struct:avc_callback_node 858 access_vector_t perms, 862 security_class_t tclass, access_vector_t perms) 878 c->perms = perms; 891 access_vector_t perms) 895 node->ae.avd.allowed |= perms; 899 node->ae.avd.allowed &= ~perms; 902 node->ae.avd.auditallow |= perms; [all...] |
/external/selinux/libselinux/src/ |
mapping.c | 20 access_vector_t perms[sizeof(access_vector_t) * 8]; member in struct:selinux_mapping 69 while (p_in->perms[k]) { 71 if (!*p_in->perms[k]) { 75 p_out->perms[k] = string_to_av_perm(p_out->value, 76 p_in->perms[k]); 77 if (!p_out->perms[k]) 123 kperm |= current_mapping[tclass].perms[i]; 168 if (kperm & current_mapping[tclass].perms[i]) { 170 kperm &= ~current_mapping[tclass].perms[i]; 191 if (avd->allowed & current_mapping[tclass].perms[i] [all...] |
stringrep.c | 25 char **perms; member in struct:discover_class_node 71 /* allocate array for perms */ 72 node->perms = calloc(MAXVECTORS,sizeof(char*)); 73 if (node->perms == NULL) 97 snprintf(path, sizeof path, "%s/class/%s/perms",selinux_mnt,s); 107 snprintf(path, sizeof path, "%s/class/%s/perms/%s", selinux_mnt,s,dentry->d_name); 135 node->perms[value-1] = strdup(dentry->d_name); 136 if (node->perms[value-1] == NULL) 151 free(node->perms[i]); 155 free(node->perms); [all...] |
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/setools/policyrep/ |
objclass.py | 59 return other in self.perms 62 def perms(self): member in class:Common 67 return "common {0}\n{{\n\t{1}\n}}".format(self, '\n\t'.join(self.perms)) 76 if other in self.common.perms: 81 return other in self.perms 106 perms = self.perms 107 if len(perms) > 0: 108 stmt += "{{\n\t{0}\n}}".format('\n\t'.join(perms))
|
/external/selinux/sepolgen/tests/ |
test_access.py | 33 self.assertTrue(isinstance(a.perms, refpolicy.IdSet)) 42 a.perms.update(["read", "write"]) 48 self.assertEqual(a.perms, l.perms) 55 a.perms.update(["read", "write"]) 62 self.assertEqual(a.perms, l.perms) 69 a.perms.update(["read", "write"]) 75 perms = l[3:] 76 perms.sort( [all...] |
/external/selinux/sepolgen/src/sepolgen/ |
access.py | 79 .perms - The permissions allowed to the object class. [IdSet] 89 self.perms = refpolicy.IdSet() 106 All of the list elements 3 and greater are treated as perms. 120 self.perms = refpolicy.IdSet(list[3:]) 131 l.extend(self.perms) 139 self.obj_class, self.perms.to_space_str()) 143 x = list(self.perms) 145 y = list(other.perms) 176 access.perms = avrule.perms.copy( [all...] |
objectmodel.py | 156 def getdefault_direction(self, obj, perms): 158 for perm in perms: 163 def getdefault_distance(self, obj, perms): 165 for perm in perms:
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/sepolgen/ |
access.py | 79 .perms - The permissions allowed to the object class. [IdSet] 89 self.perms = refpolicy.IdSet() 106 All of the list elements 3 and greater are treated as perms. 120 self.perms = refpolicy.IdSet(list[3:]) 131 l.extend(sorted(self.perms)) 139 self.obj_class, self.perms.to_space_str()) 143 x = list(self.perms) 145 y = list(other.perms) 176 access.perms = avrule.perms.copy( [all...] |
objectmodel.py | 156 def getdefault_direction(self, obj, perms): 158 for perm in perms: 163 def getdefault_distance(self, obj, perms): 165 for perm in perms:
|
/build/tools/fs_get_stats/ |
fs_get_stats.c | 42 unsigned perms = 0; local 52 perms = (unsigned)strtoul(argv[1], &endptr, 0); 62 fs_config(argv[3], is_dir, argv[4], &uid, &gid, &perms, &capabilities); 63 fprintf(stdout, "%d %d 0%o\n", uid, gid, perms);
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/setools/diff/ |
objclass.py | 59 left_perms = left_class.perms 61 left_perms |= left_class.common.perms 65 right_perms = right_class.perms 67 right_perms |= right_class.common.perms
|
/system/sepolicy/tools/sepolicy-analyze/ |
utils.h | 12 void display_allow(policydb_t *policydb, avtab_key_t *key, int idx, uint32_t perms);
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
ProtectionDomainTest.java | 44 private PermissionCollection perms = null; field in class:ProtectionDomainTest 61 perms = allperm.newPermissionCollection(); 62 perms.add(allperm); 77 new ProtectionDomain(cs, perms); 84 assertFalse(perms.isReadOnly()); 85 new ProtectionDomain(null, perms); 86 assertTrue(perms.isReadOnly()); 96 new ProtectionDomain(null, perms, null, null); 100 new ProtectionDomain(cs, perms, classldr, principals); 125 assertSame(new ProtectionDomain(null, perms).getPermissions(), perms) [all...] |
/external/autotest/client/site_tests/security_SysVIPC/ |
security_SysVIPC.py | 14 ShmRecord = namedtuple('ShmRecord', ['owner', 'perms', 'attached']) 15 SemaphoreRecord = namedtuple('SemaphoreRecord', ['owner', 'perms']) 20 expected_shm = set([ShmRecord(owner='cras', perms='640', 22 expected_sem = set([SemaphoreRecord(owner='root', perms='600')]) 57 perms = fields[3] 59 seen.add(ShmRecord(owner=owner, perms=perms, attached=attached)) 69 seen.add(SemaphoreRecord(owner=fields[2], perms=fields[3]))
|
/external/selinux/libsepol/src/ |
assertion.c | 41 const class_perm_node_t *curperm, uint32_t perms) 49 sepol_av_to_string(p, curperm->tclass, perms)); 55 sepol_av_to_string(p, curperm->tclass, perms)); 61 sepol_av_to_string(p, curperm->tclass, perms)); 94 rc = extended_permissions_and(neverallow->perms, allow->perms); 97 rc = xperm_test(neverallow->driver, allow->perms); 100 rc = xperm_test(allow->driver, neverallow->perms); 103 rc = extended_permissions_and(neverallow->perms, allow->perms); 220 uint32_t perms; local [all...] |
/bionic/tests/ |
utils.h | 39 int perms; member in struct:map_record 70 record.perms = 0; 72 record.perms |= PROT_READ; 75 record.perms |= PROT_WRITE; 78 record.perms |= PROT_EXEC;
|
/external/llvm/include/llvm/Support/ |
FileSystem.h | 73 enum perms { enum in namespace:llvm::sys::fs 97 // Helper functions so that you can use & and | to manipulate perms bits: 98 inline perms operator|(perms l, perms r) { 99 return static_cast<perms>(static_cast<unsigned short>(l) | 102 inline perms operator&(perms l, perms r) { 103 return static_cast<perms>(static_cast<unsigned short>(l) [all...] |
/external/autotest/client/site_tests/security_RuntimeExecStack/ |
security_RuntimeExecStack.py | 44 perms = line.split(' ', 2)[1] 47 if 'x' in perms: 50 # Sanity check we have stack segment perms. 51 if not 'w' in perms:
|
/cts/hostsidetests/appsecurity/test-apps/PermissionDeclareApp/src/com/android/cts/permissiondeclareapp/ |
GrantUriPermission.java | 82 final List<UriPermission> perms = context.getContentResolver() local 86 if (perms.size() != 1) { 89 final UriPermission perm = perms.get(0); 95 // Should have zero persisted perms 96 if (perms.size() != 0) {
|