HomeSort by relevance Sort by last modified time
    Searched refs:perms (Results 1 - 25 of 190) sorted by null

1 2 3 4 5 6 7 8

  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/setools/
objclassquery.py 42 perms The permissions to match.
58 perms = CriteriaSetDescriptor("perms_regex") variable in class:ObjClassQuery
68 self.log.debug("Perms: {0.perms}, regex: {0.perms_regex}, "
85 if self.perms:
86 perms = class_.perms
90 perms |= class_.common.perms
95 perms,
    [all...]
mixins.py 75 perms = CriteriaSetDescriptor("perms_regex") variable in class:MatchPermission
85 obj An object with a permission set class attribute named "perms"
88 if not self.perms:
93 return obj.perms >= self.perms
95 return self._match_regex_or_set(obj.perms, self.perms, self.perms_equal,
  /system/core/libmemunreachable/
ProcessMappings.cpp 43 char perms[5]; local
46 &mapping.begin, &mapping.end, perms, &name_pos) == 3) {
47 if (perms[0] == 'r') {
50 if (perms[1] == 'w') {
53 if (perms[2] == 'x') {
56 if (perms[3] == 'p') {
  /libcore/ojluni/src/main/java/java/security/
UnresolvedPermissionCollection.java 57 private transient Map<String, List<UnresolvedPermission>> perms; field in class:UnresolvedPermissionCollection
64 perms = new HashMap<String, List<UnresolvedPermission>>(11);
83 v = perms.get(up.getName());
86 perms.put(up.getName(), v);
100 return perms.get(p.getClass().getName());
126 for (List<UnresolvedPermission> l : perms.values()) {
155 * Writes the contents of the perms field out as a Hashtable
162 // Copy perms into a Hashtable
164 new Hashtable<>(perms.size()*2);
168 Set<Map.Entry<String, List<UnresolvedPermission>>> set = perms.entrySet()
    [all...]
  /external/libselinux/src/
mapping.c 20 access_vector_t perms[sizeof(access_vector_t) * 8]; member in struct:selinux_mapping
69 while (p_in->perms[k]) {
71 if (!*p_in->perms[k]) {
75 p_out->perms[k] = string_to_av_perm(p_out->value,
76 p_in->perms[k]);
77 if (!p_out->perms[k])
123 kperm |= current_mapping[tclass].perms[i];
168 if (kperm & current_mapping[tclass].perms[i]) {
170 kperm &= ~current_mapping[tclass].perms[i];
191 if (avd->allowed & current_mapping[tclass].perms[i]
    [all...]
stringrep.c 25 char **perms; member in struct:discover_class_node
71 /* allocate array for perms */
72 node->perms = calloc(MAXVECTORS,sizeof(char*));
73 if (node->perms == NULL)
97 snprintf(path, sizeof path, "%s/class/%s/perms",selinux_mnt,s);
107 snprintf(path, sizeof path, "%s/class/%s/perms/%s", selinux_mnt,s,dentry->d_name);
135 node->perms[value-1] = strdup(dentry->d_name);
136 if (node->perms[value-1] == NULL)
151 free(node->perms[i]);
155 free(node->perms);
    [all...]
avc.c 43 security_class_t tclass, access_vector_t perms,
49 access_vector_t perms; member in struct:avc_callback_node
858 access_vector_t perms,
862 security_class_t tclass, access_vector_t perms)
878 c->perms = perms;
891 access_vector_t perms)
895 node->ae.avd.allowed |= perms;
899 node->ae.avd.allowed &= ~perms;
902 node->ae.avd.auditallow |= perms;
    [all...]
  /external/selinux/libselinux/src/
mapping.c 20 access_vector_t perms[sizeof(access_vector_t) * 8]; member in struct:selinux_mapping
69 while (p_in->perms[k]) {
71 if (!*p_in->perms[k]) {
75 p_out->perms[k] = string_to_av_perm(p_out->value,
76 p_in->perms[k]);
77 if (!p_out->perms[k])
123 kperm |= current_mapping[tclass].perms[i];
168 if (kperm & current_mapping[tclass].perms[i]) {
170 kperm &= ~current_mapping[tclass].perms[i];
191 if (avd->allowed & current_mapping[tclass].perms[i]
    [all...]
stringrep.c 25 char **perms; member in struct:discover_class_node
71 /* allocate array for perms */
72 node->perms = calloc(MAXVECTORS,sizeof(char*));
73 if (node->perms == NULL)
97 snprintf(path, sizeof path, "%s/class/%s/perms",selinux_mnt,s);
107 snprintf(path, sizeof path, "%s/class/%s/perms/%s", selinux_mnt,s,dentry->d_name);
135 node->perms[value-1] = strdup(dentry->d_name);
136 if (node->perms[value-1] == NULL)
151 free(node->perms[i]);
155 free(node->perms);
    [all...]
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/setools/policyrep/
objclass.py 59 return other in self.perms
62 def perms(self): member in class:Common
67 return "common {0}\n{{\n\t{1}\n}}".format(self, '\n\t'.join(self.perms))
76 if other in self.common.perms:
81 return other in self.perms
106 perms = self.perms
107 if len(perms) > 0:
108 stmt += "{{\n\t{0}\n}}".format('\n\t'.join(perms))
  /external/selinux/sepolgen/tests/
test_access.py 33 self.assertTrue(isinstance(a.perms, refpolicy.IdSet))
42 a.perms.update(["read", "write"])
48 self.assertEqual(a.perms, l.perms)
55 a.perms.update(["read", "write"])
62 self.assertEqual(a.perms, l.perms)
69 a.perms.update(["read", "write"])
75 perms = l[3:]
76 perms.sort(
    [all...]
  /external/selinux/sepolgen/src/sepolgen/
access.py 79 .perms - The permissions allowed to the object class. [IdSet]
89 self.perms = refpolicy.IdSet()
106 All of the list elements 3 and greater are treated as perms.
120 self.perms = refpolicy.IdSet(list[3:])
131 l.extend(self.perms)
139 self.obj_class, self.perms.to_space_str())
143 x = list(self.perms)
145 y = list(other.perms)
176 access.perms = avrule.perms.copy(
    [all...]
objectmodel.py 156 def getdefault_direction(self, obj, perms):
158 for perm in perms:
163 def getdefault_distance(self, obj, perms):
165 for perm in perms:
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/sepolgen/
access.py 79 .perms - The permissions allowed to the object class. [IdSet]
89 self.perms = refpolicy.IdSet()
106 All of the list elements 3 and greater are treated as perms.
120 self.perms = refpolicy.IdSet(list[3:])
131 l.extend(sorted(self.perms))
139 self.obj_class, self.perms.to_space_str())
143 x = list(self.perms)
145 y = list(other.perms)
176 access.perms = avrule.perms.copy(
    [all...]
objectmodel.py 156 def getdefault_direction(self, obj, perms):
158 for perm in perms:
163 def getdefault_distance(self, obj, perms):
165 for perm in perms:
  /build/tools/fs_get_stats/
fs_get_stats.c 42 unsigned perms = 0; local
52 perms = (unsigned)strtoul(argv[1], &endptr, 0);
62 fs_config(argv[3], is_dir, argv[4], &uid, &gid, &perms, &capabilities);
63 fprintf(stdout, "%d %d 0%o\n", uid, gid, perms);
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/setools/diff/
objclass.py 59 left_perms = left_class.perms
61 left_perms |= left_class.common.perms
65 right_perms = right_class.perms
67 right_perms |= right_class.common.perms
  /system/sepolicy/tools/sepolicy-analyze/
utils.h 12 void display_allow(policydb_t *policydb, avtab_key_t *key, int idx, uint32_t perms);
  /external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/
ProtectionDomainTest.java 44 private PermissionCollection perms = null; field in class:ProtectionDomainTest
61 perms = allperm.newPermissionCollection();
62 perms.add(allperm);
77 new ProtectionDomain(cs, perms);
84 assertFalse(perms.isReadOnly());
85 new ProtectionDomain(null, perms);
86 assertTrue(perms.isReadOnly());
96 new ProtectionDomain(null, perms, null, null);
100 new ProtectionDomain(cs, perms, classldr, principals);
125 assertSame(new ProtectionDomain(null, perms).getPermissions(), perms)
    [all...]
  /external/autotest/client/site_tests/security_SysVIPC/
security_SysVIPC.py 14 ShmRecord = namedtuple('ShmRecord', ['owner', 'perms', 'attached'])
15 SemaphoreRecord = namedtuple('SemaphoreRecord', ['owner', 'perms'])
20 expected_shm = set([ShmRecord(owner='cras', perms='640',
22 expected_sem = set([SemaphoreRecord(owner='root', perms='600')])
57 perms = fields[3]
59 seen.add(ShmRecord(owner=owner, perms=perms, attached=attached))
69 seen.add(SemaphoreRecord(owner=fields[2], perms=fields[3]))
  /external/selinux/libsepol/src/
assertion.c 41 const class_perm_node_t *curperm, uint32_t perms)
49 sepol_av_to_string(p, curperm->tclass, perms));
55 sepol_av_to_string(p, curperm->tclass, perms));
61 sepol_av_to_string(p, curperm->tclass, perms));
94 rc = extended_permissions_and(neverallow->perms, allow->perms);
97 rc = xperm_test(neverallow->driver, allow->perms);
100 rc = xperm_test(allow->driver, neverallow->perms);
103 rc = extended_permissions_and(neverallow->perms, allow->perms);
220 uint32_t perms; local
    [all...]
  /bionic/tests/
utils.h 39 int perms; member in struct:map_record
70 record.perms = 0;
72 record.perms |= PROT_READ;
75 record.perms |= PROT_WRITE;
78 record.perms |= PROT_EXEC;
  /external/llvm/include/llvm/Support/
FileSystem.h 73 enum perms { enum in namespace:llvm::sys::fs
97 // Helper functions so that you can use & and | to manipulate perms bits:
98 inline perms operator|(perms l, perms r) {
99 return static_cast<perms>(static_cast<unsigned short>(l) |
102 inline perms operator&(perms l, perms r) {
103 return static_cast<perms>(static_cast<unsigned short>(l)
    [all...]
  /external/autotest/client/site_tests/security_RuntimeExecStack/
security_RuntimeExecStack.py 44 perms = line.split(' ', 2)[1]
47 if 'x' in perms:
50 # Sanity check we have stack segment perms.
51 if not 'w' in perms:
  /cts/hostsidetests/appsecurity/test-apps/PermissionDeclareApp/src/com/android/cts/permissiondeclareapp/
GrantUriPermission.java 82 final List<UriPermission> perms = context.getContentResolver() local
86 if (perms.size() != 1) {
89 final UriPermission perm = perms.get(0);
95 // Should have zero persisted perms
96 if (perms.size() != 0) {

Completed in 397 milliseconds

1 2 3 4 5 6 7 8