HomeSort by relevance Sort by last modified time
    Searched full:tclass (Results 1 - 25 of 185) sorted by null

1 2 3 4 5 6 7 8

  /external/clang/test/PCH/
chain-friend-instantiation.cpp 7 template <class T> class TClass;
10 template <class X, class Y> TClass<X> problematic(X * ptr, const TClass<Y> &src);
16 template <class X, class Y> friend TClass<X> problematic(X * ptr, const TClass<Y> &src);
21 class TClass: public NS::TBaseClass<T>
24 inline TClass() { }
30 TClass<X> problematic(X *ptr, const TClass<T> &src);
34 TClass<X> unconst(const TClass<T> &src)
    [all...]
  /external/selinux/libselinux/utils/
compute_create.c 11 security_class_t tclass; local
15 fprintf(stderr, "usage: %s scontext tcontext tclass\n",
20 tclass = string_to_security_class(argv[3]);
21 if (!tclass) {
26 ret = security_compute_create(argv[1], argv[2], tclass, &buf);
compute_member.c 11 security_class_t tclass; local
15 fprintf(stderr, "usage: %s scontext tcontext tclass\n",
20 tclass = string_to_security_class(argv[3]);
21 if (!tclass) {
26 ret = security_compute_member(argv[1], argv[2], tclass, &buf);
compute_relabel.c 11 security_class_t tclass; local
15 fprintf(stderr, "usage: %s scontext tcontext tclass\n",
20 tclass = string_to_security_class(argv[3]);
21 if (!tclass) {
26 ret = security_compute_relabel(argv[1], argv[2], tclass, &buf);
compute_av.c 11 security_class_t tclass; local
15 fprintf(stderr, "usage: %s scontext tcontext tclass\n",
20 tclass = string_to_security_class(argv[3]);
21 if (!tclass) {
26 ret = security_compute_av(argv[1], argv[2], tclass, 1, &avd);
33 print_access_vector(tclass, avd.allowed);
38 print_access_vector(tclass, avd.decided);
44 print_access_vector(tclass, avd.auditallow);
50 print_access_vector(tclass, avd.auditdeny);
  /external/libselinux/src/
mapping.h 16 unmap_class(security_class_t tclass);
19 unmap_perm(security_class_t tclass, access_vector_t tperm);
29 map_perm(security_class_t tclass, access_vector_t kperm);
32 map_decision(security_class_t tclass, struct av_decision *avd);
mapping.c 100 unmap_class(security_class_t tclass)
102 if (tclass < current_mapping_size)
103 return current_mapping[tclass].value;
111 return tclass;
115 unmap_perm(security_class_t tclass, access_vector_t tperm)
117 if (tclass < current_mapping_size) {
121 for (i=0; i<current_mapping[tclass].num_perms; i++)
123 kperm |= current_mapping[tclass].perms[i];
161 map_perm(security_class_t tclass, access_vector_t kperm)
163 if (tclass < current_mapping_size)
    [all...]
avc.c 22 security_class_t tclass; member in struct:avc_entry
43 security_class_t tclass, access_vector_t perms,
48 security_class_t tclass; member in struct:avc_callback_node
64 security_id_t tsid, security_class_t tclass)
66 return ((uintptr_t) ssid ^ ((uintptr_t) tsid << 2) ^ tclass)
304 security_class_t tclass)
322 hvalue = avc_hash(ssid, tsid, tclass);
327 new->ae.tclass = tclass;
337 security_class_t tclass,
    [all...]
compute_av.c 15 security_class_t tclass,
42 unmap_class(tclass), unmap_perm(tclass, requested));
63 map_decision(tclass, avd);
stringrep.c 178 access_vector_t string_to_av_perm(security_class_t tclass, const char *s)
181 security_class_t kclass = unmap_class(tclass);
188 return map_perm(tclass, 1<<i);
195 const char *security_class_to_string(security_class_t tclass)
199 tclass = unmap_class(tclass);
201 node = get_class_cache_entry_value(tclass);
207 const char *security_av_perm_to_string(security_class_t tclass,
213 av = unmap_perm(tclass, av);
214 tclass = unmap_class(tclass)
    [all...]
  /external/selinux/libselinux/src/
mapping.h 16 unmap_class(security_class_t tclass);
19 unmap_perm(security_class_t tclass, access_vector_t tperm);
29 map_perm(security_class_t tclass, access_vector_t kperm);
32 map_decision(security_class_t tclass, struct av_decision *avd);
mapping.c 100 unmap_class(security_class_t tclass)
102 if (tclass < current_mapping_size)
103 return current_mapping[tclass].value;
111 return tclass;
115 unmap_perm(security_class_t tclass, access_vector_t tperm)
117 if (tclass < current_mapping_size) {
121 for (i=0; i<current_mapping[tclass].num_perms; i++)
123 kperm |= current_mapping[tclass].perms[i];
161 map_perm(security_class_t tclass, access_vector_t kperm)
163 if (tclass < current_mapping_size)
    [all...]
avc.c 22 security_class_t tclass; member in struct:avc_entry
43 security_class_t tclass, access_vector_t perms,
48 security_class_t tclass; member in struct:avc_callback_node
64 security_id_t tsid, security_class_t tclass)
66 return ((uintptr_t) ssid ^ ((uintptr_t) tsid << 2) ^ tclass)
344 security_class_t tclass)
362 hvalue = avc_hash(ssid, tsid, tclass);
367 new->ae.tclass = tclass;
377 security_class_t tclass,
    [all...]
compute_av.c 15 security_class_t tclass,
42 unmap_class(tclass), unmap_perm(tclass, requested));
63 /* If tclass invalid, kernel sets avd according to deny_unknown flag */
64 if (tclass != 0)
65 map_decision(tclass, avd);
79 security_class_t tclass,
86 ret = security_compute_av_flags_raw(scon, tcon, tclass,
106 security_class_t tclass,
120 ret = security_compute_av_flags_raw(rscon, rtcon, tclass,
    [all...]
stringrep.c 221 access_vector_t string_to_av_perm(security_class_t tclass, const char *s)
224 security_class_t kclass = unmap_class(tclass);
231 return map_perm(tclass, 1<<i);
238 const char *security_class_to_string(security_class_t tclass)
242 tclass = unmap_class(tclass);
244 node = get_class_cache_entry_value(tclass);
251 const char *security_av_perm_to_string(security_class_t tclass,
257 av = unmap_perm(tclass, av);
258 tclass = unmap_class(tclass)
    [all...]
compute_member.c 15 security_class_t tclass,
39 snprintf(buf, size, "%s %s %hu", scon, tcon, unmap_class(tclass));
67 security_class_t tclass,
82 ret = security_compute_member_raw(rscon, rtcon, tclass, &rnewcon);
compute_relabel.c 15 security_class_t tclass,
39 snprintf(buf, size, "%s %s %hu", scon, tcon, unmap_class(tclass));
67 security_class_t tclass,
82 ret = security_compute_relabel_raw(rscon, rtcon, tclass, &rnewcon);
compute_create.c 53 security_class_t tclass,
79 scon, tcon, unmap_class(tclass));
112 security_class_t tclass,
115 return security_compute_create_name_raw(scon, tcon, tclass,
122 security_class_t tclass,
138 ret = security_compute_create_name_raw(rscon, rtcon, tclass,
153 security_class_t tclass,
156 return security_compute_create_name(scon, tcon, tclass, NULL, newcon);
  /external/selinux/libselinux/man/man3/
security_compute_av.3 10 .BI "int security_compute_av(char * "scon ", char * "tcon ", security_class_t "tclass ", access_vector_t "requested ", struct av_decision *" avd );
12 .BI "int security_compute_av_raw(char * "scon ", char * "tcon ", security_class_t "tclass ", access_vector_t "requested ", struct av_decision *" avd );
14 .BI "int security_compute_av_flags(char * "scon ", char * "tcon ", security_class_t "tclass ", access_vector_t "requested ", struct av_decision *" avd );
16 .BI "int security_compute_av_flags_raw(char * "scon ", char * "tcon ", security_class_t "tclass ", access_vector_t "requested ", struct av_decision *" avd );
18 .BI "int security_compute_create(char * "scon ", char * "tcon ", security_class_t "tclass ", char **" newcon );
20 .BI "int security_compute_create_raw(char * "scon ", char * "tcon ", security_class_t "tclass ", char **" newcon );
22 .BI "int security_compute_create_name(char * "scon ", char * "tcon ", security_class_t "tclass ", const char *"objname ", char **" newcon );
24 .BI "int security_compute_create_name_raw(char * "scon ", char * "tcon ", security_class_t "tclass ", const char *"objname ", char **" newcon );
26 .BI "int security_compute_relabel(char * "scon ", char * "tcon ", security_class_t "tclass ", char **" newcon );
28 .BI "int security_compute_relabel_raw(char * "scon ", char * "tcon ", security_class_t "tclass ", char **" newcon )
    [all...]
security_class_to_string.3 14 .BI "const char *security_class_to_string(security_class_t " tclass ");"
16 .BI "const char *security_av_perm_to_string(security_class_t " tclass ", access_vector_t " av ");"
18 .BI "int security_av_string(security_class_t " tclass ", access_vector_t " av ", char **" result ");"
24 .BI "access_vector_t string_to_av_perm(security_class_t " tclass ", const char *" name ");"
26 .BI "void print_access_vector(security_class_t " tclass ", access_vector_t " av ");"
31 .IR tclass ,
38 .IR tclass ,
43 .I tclass
65 .IR tclass ,
avc_compute_create.3 15 .BI "security_class_t " tclass ", security_id_t *" newsid ");"
20 .BI "security_class_t " tclass ", security_id_t *" newsid ");"
47 .I tclass
avc_add_callback.3 19 .BI "security_class_t " tclass ,
28 .BI "security_id_t " tsid ", security_class_t " tclass ,
46 .IR tclass ,
85 .IR tclass .
94 .IR tclass .
109 .IR tclass .
123 .IR tclass .
132 .IR tclass .
141 .IR tclass .
150 .IR tclass
    [all...]
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/setools/
mixins.py 51 tclass = CriteriaSetDescriptor("tclass_regex", "lookup_class") variable in class:MatchObjClass
59 obj An object with an object class attribute named "tclass"
62 if not self.tclass:
66 return bool(self.tclass.search(str(obj.tclass)))
68 return obj.tclass in self.tclass
  /external/selinux/libsepol/include/sepol/policydb/
services.h 48 sepol_security_class_t tclass, /* IN */
59 sepol_security_class_t tclass,
75 sepol_security_class_t tclass,
91 sepol_security_class_t tclass,
100 sepol_security_class_t *tclass);
103 * Return a permission av bit associated with tclass and the string
106 extern int sepol_string_to_av_perm(sepol_security_class_t tclass,
112 * class `tclass' based on a SID pair.
116 sepol_security_class_t tclass, /* IN */
121 * polyinstantiated object of class `tclass' based on
    [all...]
  /external/selinux/prebuilts/bin/
sesearch.py 73 expr.add_argument("-c", "--class", dest="tclass",
136 if args.tclass:
138 q.tclass = args.tclass
140 q.tclass = args.tclass.split(",")
169 if args.tclass:
171 q.tclass = args.tclass
173 q.tclass = args.tclass.split(","
    [all...]

Completed in 738 milliseconds

1 2 3 4 5 6 7 8