/external/selinux/sepolgen/tests/ |
test_access.py | 32 self.assertEqual(a.obj_class, None) 41 a.obj_class = "file" 47 self.assertEqual(a.obj_class, l.obj_class) 54 a.obj_class = "file" 61 self.assertEqual(a.obj_class, l.obj_class) 68 a.obj_class = "file" 84 a.obj_class = "file" 107 a.obj_class = "file [all...] |
test_interfaces.py | 54 av.obj_class = "process" 64 av.obj_class = "dir" 74 av.obj_class = "dir"
|
/external/selinux/sepolgen/src/sepolgen/ |
access.py | 78 .obj_class - The object class to which access is allowed. [String or None] 88 self.obj_class = None 119 self.obj_class = list[2] 130 l = [self.src_type, self.tgt_type, self.obj_class] 139 self.obj_class, self.perms.to_space_str()) 144 a = (self.src_type, self.tgt_type, self.obj_class, x) 148 b = (other.src_type, other.tgt_type, other.obj_class, y) 171 for obj_class in avrule.obj_classes: 175 access.obj_class = obj_class [all...] |
matching.py | 118 total = self.perm_maps.getdefault_distance(av_req.obj_class, diff) 122 return self.perm_maps.getdefault_distance(av_req.obj_class, diff) 171 if req.obj_class != prov.obj_class and not access.is_idparam(prov.obj_class): 180 pdist = self.perm_maps.getdefault_distance(prov.obj_class, prov.perms) 221 av_dir = self.perm_maps.getdefault_direction(av.obj_class, av.perms) 227 self.perm_maps.getdefault_direction(x.obj_class, x.perms)
|
interfaces.py | 77 avobjs = [av.obj_class] 101 p.obj_classes.add(av.obj_class) 152 if access.is_idparam(av.obj_class): 153 if __param_insert(av.obj_class, refpolicy.OBJ_CLASS, av, params) == 1: 183 if extract_from_set(rule.obj_classes, refpolicy.OBJ_CLASS): 442 obj_classes = self.map_param(av.obj_class, ifcall) 458 for obj_class in obj_classes: 459 ifv.access.add(src_type, tgt_type, obj_class, new_perms)
|
policygen.py | 185 ( "dir" in av.obj_class or "open" in av.perms )): 190 for i in [x[TCONTEXT] for x in sesearch([ALLOW], {SCONTEXT: av.src_type, CLASS: av.obj_class, PERMS: av.perms})]: 194 rule.comment += "\n#!!!! The source type '%s' can write to a '%s' of the following type:\n# %s\n" % ( av.src_type, av.obj_class, ", ".join(types)) 196 rule.comment += "\n#!!!! The source type '%s' can write to a '%s' of the following types:\n# %s\n" % ( av.src_type, av.obj_class, ", ".join(types)) 269 (av.src_type, av.tgt_type, av.obj_class, av.perms.to_space_str())) 294 elif params[i].type == refpolicy.OBJ_CLASS: 295 ifcall.args.append(av.obj_class) 330 refpolicy.OBJ_CLASS]:
|
refpolicy.py | 40 OBJ_CLASS = 2 47 str_to_field = { "source" : SRC_TYPE, "target" : TGT_TYPE, "object" : OBJ_CLASS, 479 self.obj_classes.add(av.obj_class) 846 def add_obj_class(self, obj_class, perms): 847 p = self.obj_classes.setdefault(obj_class, IdSet()) 856 for obj_class, perms in self.obj_classes.items(): 857 s.append("\tclass %s %s;" % (obj_class, perms.to_space_str())) 882 def __init__(self, obj_class, perms): 883 self.obj_class = obj_class [all...] |
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/sepolgen/ |
access.py | 78 .obj_class - The object class to which access is allowed. [String or None] 88 self.obj_class = None 119 self.obj_class = list[2] 130 l = [self.src_type, self.tgt_type, self.obj_class] 139 self.obj_class, self.perms.to_space_str()) 144 a = (self.src_type, self.tgt_type, self.obj_class, x) 148 b = (other.src_type, other.tgt_type, other.obj_class, y) 171 for obj_class in avrule.obj_classes: 175 access.obj_class = obj_class [all...] |
matching.py | 118 total = self.perm_maps.getdefault_distance(av_req.obj_class, diff) 122 return self.perm_maps.getdefault_distance(av_req.obj_class, diff) 171 if req.obj_class != prov.obj_class and not access.is_idparam(prov.obj_class): 180 pdist = self.perm_maps.getdefault_distance(prov.obj_class, prov.perms) 221 av_dir = self.perm_maps.getdefault_direction(av.obj_class, av.perms) 227 self.perm_maps.getdefault_direction(x.obj_class, x.perms)
|
interfaces.py | 77 avobjs = [av.obj_class] 101 p.obj_classes.add(av.obj_class) 152 if access.is_idparam(av.obj_class): 153 if __param_insert(av.obj_class, refpolicy.OBJ_CLASS, av, params) == 1: 183 if extract_from_set(rule.obj_classes, refpolicy.OBJ_CLASS): 442 obj_classes = self.map_param(av.obj_class, ifcall) 458 for obj_class in obj_classes: 459 ifv.access.add(src_type, tgt_type, obj_class, new_perms)
|
policygen.py | 185 ( "dir" in av.obj_class or "open" in av.perms )): 190 for i in [x[TCONTEXT] for x in sesearch([ALLOW], {SCONTEXT: av.src_type, CLASS: av.obj_class, PERMS: av.perms})]: 194 rule.comment += "\n#!!!! The source type '%s' can write to a '%s' of the following type:\n# %s\n" % ( av.src_type, av.obj_class, ", ".join(types)) 196 rule.comment += "\n#!!!! The source type '%s' can write to a '%s' of the following types:\n# %s\n" % ( av.src_type, av.obj_class, ", ".join(types)) 269 (av.src_type, av.tgt_type, av.obj_class, av.perms.to_space_str())) 294 elif params[i].type == refpolicy.OBJ_CLASS: 295 ifcall.args.append(av.obj_class) 330 refpolicy.OBJ_CLASS]:
|
refpolicy.py | 40 OBJ_CLASS = 2 47 str_to_field = { "source" : SRC_TYPE, "target" : TGT_TYPE, "object" : OBJ_CLASS, 479 self.obj_classes.add(av.obj_class) 846 def add_obj_class(self, obj_class, perms): 847 p = self.obj_classes.setdefault(obj_class, IdSet()) 856 for obj_class, perms in self.obj_classes.items(): 857 s.append("\tclass %s %s;" % (obj_class, perms.to_space_str())) 882 def __init__(self, obj_class, perms): 883 self.obj_class = obj_class [all...] |
/development/host/windows/usb/api/ |
adb_object_handle.h | 194 template<class obj_class>
195 obj_class* LookupObject(ADBAPIHANDLE adb_handle) {
200 if (!adb_object->IsObjectOfType(obj_class::Type())) {
208 return (adb_object != NULL) ? reinterpret_cast<obj_class*>(adb_object) :
|
/external/mesa3d/src/gallium/drivers/nvc0/ |
nvc0_screen.c | 307 nvc0_magic_3d_init(struct nouveau_pushbuf *push, uint16_t obj_class) 359 if (obj_class >= NVE4_3D_CLASS) { 406 uint32_t obj_class; local 461 obj_class = NVE4_P2MF_CLASS; 464 obj_class = NVC0_M2MF_CLASS; 467 ret = nouveau_object_new(chan, 0xbeef323f, obj_class, NULL, 0, 503 obj_class = NVE4_3D_CLASS; 511 obj_class = NVC8_3D_CLASS; 514 obj_class = NVC1_3D_CLASS; 517 obj_class = NVC0_3D_CLASS [all...] |
/external/selinux/policycoreutils/sepolicy/ |
search.c | 383 const qpol_class_t *obj_class = NULL; local 443 if (qpol_terule_get_object_class(q, rule, &obj_class)) 445 if (qpol_class_get_name(q, obj_class, &tmp_name)) 556 const qpol_class_t *obj_class = NULL; local 601 if (qpol_filename_trans_get_object_class(q, filename_trans, &obj_class)) 604 if (qpol_class_get_name(q, obj_class, &tmp_name)) 761 const qpol_class_t *obj_class = NULL; local 813 if (qpol_avrule_get_object_class(q, rule, &obj_class)) { 816 if (qpol_class_get_name(q, obj_class, &tmp_name)) {
|
/prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/x86_64-w64-mingw32/include/ |
lpmapi.h | 27 UCHAR obj_class; member in struct:__anon42010 33 #define ObjClass(x) ((RsvpObjHdr *)x)->obj_class
|
/external/curl/lib/vtls/ |
nss.c | 337 /* Call PK11_CreateGenericObject() with the given obj_class and filename. If 341 CK_OBJECT_CLASS obj_class, 364 PK11_SETATTRS(attrs, attr_cnt, CKA_CLASS, &obj_class, sizeof(obj_class)); 369 if(CKO_CERTIFICATE == obj_class) { 384 if(!cacert && CKO_CERTIFICATE == obj_class) [all...] |
/art/oatdump/ |
oatdump.cc | 1669 mirror::Class* obj_class = obj->GetClass(); local [all...] |