/external/clang/test/PCH/ |
chain-friend-instantiation.cpp | 7 template <class T> class TClass; 10 template <class X, class Y> TClass<X> problematic(X * ptr, const TClass<Y> &src); 16 template <class X, class Y> friend TClass<X> problematic(X * ptr, const TClass<Y> &src); 21 class TClass: public NS::TBaseClass<T> 24 inline TClass() { } 30 TClass<X> problematic(X *ptr, const TClass<T> &src); 34 TClass<X> unconst(const TClass<T> &src) [all...] |
/external/selinux/libselinux/utils/ |
compute_create.c | 11 security_class_t tclass; local 15 fprintf(stderr, "usage: %s scontext tcontext tclass\n", 20 tclass = string_to_security_class(argv[3]); 21 if (!tclass) { 26 ret = security_compute_create(argv[1], argv[2], tclass, &buf);
|
compute_member.c | 11 security_class_t tclass; local 15 fprintf(stderr, "usage: %s scontext tcontext tclass\n", 20 tclass = string_to_security_class(argv[3]); 21 if (!tclass) { 26 ret = security_compute_member(argv[1], argv[2], tclass, &buf);
|
compute_relabel.c | 11 security_class_t tclass; local 15 fprintf(stderr, "usage: %s scontext tcontext tclass\n", 20 tclass = string_to_security_class(argv[3]); 21 if (!tclass) { 26 ret = security_compute_relabel(argv[1], argv[2], tclass, &buf);
|
compute_av.c | 11 security_class_t tclass; local 15 fprintf(stderr, "usage: %s scontext tcontext tclass\n", 20 tclass = string_to_security_class(argv[3]); 21 if (!tclass) { 26 ret = security_compute_av(argv[1], argv[2], tclass, 1, &avd); 33 print_access_vector(tclass, avd.allowed); 38 print_access_vector(tclass, avd.decided); 44 print_access_vector(tclass, avd.auditallow); 50 print_access_vector(tclass, avd.auditdeny);
|
/external/libselinux/src/ |
mapping.h | 16 unmap_class(security_class_t tclass); 19 unmap_perm(security_class_t tclass, access_vector_t tperm); 29 map_perm(security_class_t tclass, access_vector_t kperm); 32 map_decision(security_class_t tclass, struct av_decision *avd);
|
mapping.c | 100 unmap_class(security_class_t tclass) 102 if (tclass < current_mapping_size) 103 return current_mapping[tclass].value; 111 return tclass; 115 unmap_perm(security_class_t tclass, access_vector_t tperm) 117 if (tclass < current_mapping_size) { 121 for (i=0; i<current_mapping[tclass].num_perms; i++) 123 kperm |= current_mapping[tclass].perms[i]; 161 map_perm(security_class_t tclass, access_vector_t kperm) 163 if (tclass < current_mapping_size) [all...] |
avc.c | 22 security_class_t tclass; member in struct:avc_entry 43 security_class_t tclass, access_vector_t perms, 48 security_class_t tclass; member in struct:avc_callback_node 64 security_id_t tsid, security_class_t tclass) 66 return ((uintptr_t) ssid ^ ((uintptr_t) tsid << 2) ^ tclass) 304 security_class_t tclass) 322 hvalue = avc_hash(ssid, tsid, tclass); 327 new->ae.tclass = tclass; 337 security_class_t tclass, [all...] |
compute_av.c | 15 security_class_t tclass, 42 unmap_class(tclass), unmap_perm(tclass, requested)); 63 map_decision(tclass, avd);
|
stringrep.c | 178 access_vector_t string_to_av_perm(security_class_t tclass, const char *s) 181 security_class_t kclass = unmap_class(tclass); 188 return map_perm(tclass, 1<<i); 195 const char *security_class_to_string(security_class_t tclass) 199 tclass = unmap_class(tclass); 201 node = get_class_cache_entry_value(tclass); 207 const char *security_av_perm_to_string(security_class_t tclass, 213 av = unmap_perm(tclass, av); 214 tclass = unmap_class(tclass) [all...] |
/external/selinux/libselinux/src/ |
mapping.h | 16 unmap_class(security_class_t tclass); 19 unmap_perm(security_class_t tclass, access_vector_t tperm); 29 map_perm(security_class_t tclass, access_vector_t kperm); 32 map_decision(security_class_t tclass, struct av_decision *avd);
|
mapping.c | 100 unmap_class(security_class_t tclass) 102 if (tclass < current_mapping_size) 103 return current_mapping[tclass].value; 111 return tclass; 115 unmap_perm(security_class_t tclass, access_vector_t tperm) 117 if (tclass < current_mapping_size) { 121 for (i=0; i<current_mapping[tclass].num_perms; i++) 123 kperm |= current_mapping[tclass].perms[i]; 161 map_perm(security_class_t tclass, access_vector_t kperm) 163 if (tclass < current_mapping_size) [all...] |
avc.c | 22 security_class_t tclass; member in struct:avc_entry 43 security_class_t tclass, access_vector_t perms, 48 security_class_t tclass; member in struct:avc_callback_node 64 security_id_t tsid, security_class_t tclass) 66 return ((uintptr_t) ssid ^ ((uintptr_t) tsid << 2) ^ tclass) 344 security_class_t tclass) 362 hvalue = avc_hash(ssid, tsid, tclass); 367 new->ae.tclass = tclass; 377 security_class_t tclass, [all...] |
compute_av.c | 15 security_class_t tclass, 42 unmap_class(tclass), unmap_perm(tclass, requested)); 63 /* If tclass invalid, kernel sets avd according to deny_unknown flag */ 64 if (tclass != 0) 65 map_decision(tclass, avd); 79 security_class_t tclass, 86 ret = security_compute_av_flags_raw(scon, tcon, tclass, 106 security_class_t tclass, 120 ret = security_compute_av_flags_raw(rscon, rtcon, tclass, [all...] |
stringrep.c | 221 access_vector_t string_to_av_perm(security_class_t tclass, const char *s) 224 security_class_t kclass = unmap_class(tclass); 231 return map_perm(tclass, 1<<i); 238 const char *security_class_to_string(security_class_t tclass) 242 tclass = unmap_class(tclass); 244 node = get_class_cache_entry_value(tclass); 251 const char *security_av_perm_to_string(security_class_t tclass, 257 av = unmap_perm(tclass, av); 258 tclass = unmap_class(tclass) [all...] |
compute_member.c | 15 security_class_t tclass, 39 snprintf(buf, size, "%s %s %hu", scon, tcon, unmap_class(tclass)); 67 security_class_t tclass, 82 ret = security_compute_member_raw(rscon, rtcon, tclass, &rnewcon);
|
compute_relabel.c | 15 security_class_t tclass, 39 snprintf(buf, size, "%s %s %hu", scon, tcon, unmap_class(tclass)); 67 security_class_t tclass, 82 ret = security_compute_relabel_raw(rscon, rtcon, tclass, &rnewcon);
|
compute_create.c | 53 security_class_t tclass, 79 scon, tcon, unmap_class(tclass)); 112 security_class_t tclass, 115 return security_compute_create_name_raw(scon, tcon, tclass, 122 security_class_t tclass, 138 ret = security_compute_create_name_raw(rscon, rtcon, tclass, 153 security_class_t tclass, 156 return security_compute_create_name(scon, tcon, tclass, NULL, newcon);
|
/external/selinux/libselinux/man/man3/ |
security_compute_av.3 | 10 .BI "int security_compute_av(char * "scon ", char * "tcon ", security_class_t "tclass ", access_vector_t "requested ", struct av_decision *" avd ); 12 .BI "int security_compute_av_raw(char * "scon ", char * "tcon ", security_class_t "tclass ", access_vector_t "requested ", struct av_decision *" avd ); 14 .BI "int security_compute_av_flags(char * "scon ", char * "tcon ", security_class_t "tclass ", access_vector_t "requested ", struct av_decision *" avd ); 16 .BI "int security_compute_av_flags_raw(char * "scon ", char * "tcon ", security_class_t "tclass ", access_vector_t "requested ", struct av_decision *" avd ); 18 .BI "int security_compute_create(char * "scon ", char * "tcon ", security_class_t "tclass ", char **" newcon ); 20 .BI "int security_compute_create_raw(char * "scon ", char * "tcon ", security_class_t "tclass ", char **" newcon ); 22 .BI "int security_compute_create_name(char * "scon ", char * "tcon ", security_class_t "tclass ", const char *"objname ", char **" newcon ); 24 .BI "int security_compute_create_name_raw(char * "scon ", char * "tcon ", security_class_t "tclass ", const char *"objname ", char **" newcon ); 26 .BI "int security_compute_relabel(char * "scon ", char * "tcon ", security_class_t "tclass ", char **" newcon ); 28 .BI "int security_compute_relabel_raw(char * "scon ", char * "tcon ", security_class_t "tclass ", char **" newcon ) [all...] |
security_class_to_string.3 | 14 .BI "const char *security_class_to_string(security_class_t " tclass ");" 16 .BI "const char *security_av_perm_to_string(security_class_t " tclass ", access_vector_t " av ");" 18 .BI "int security_av_string(security_class_t " tclass ", access_vector_t " av ", char **" result ");" 24 .BI "access_vector_t string_to_av_perm(security_class_t " tclass ", const char *" name ");" 26 .BI "void print_access_vector(security_class_t " tclass ", access_vector_t " av ");" 31 .IR tclass , 38 .IR tclass , 43 .I tclass 65 .IR tclass ,
|
avc_compute_create.3 | 15 .BI "security_class_t " tclass ", security_id_t *" newsid ");" 20 .BI "security_class_t " tclass ", security_id_t *" newsid ");" 47 .I tclass
|
avc_add_callback.3 | 19 .BI "security_class_t " tclass , 28 .BI "security_id_t " tsid ", security_class_t " tclass , 46 .IR tclass , 85 .IR tclass . 94 .IR tclass . 109 .IR tclass . 123 .IR tclass . 132 .IR tclass . 141 .IR tclass . 150 .IR tclass [all...] |
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/setools/ |
mixins.py | 51 tclass = CriteriaSetDescriptor("tclass_regex", "lookup_class") variable in class:MatchObjClass 59 obj An object with an object class attribute named "tclass" 62 if not self.tclass: 66 return bool(self.tclass.search(str(obj.tclass))) 68 return obj.tclass in self.tclass
|
/external/selinux/libsepol/include/sepol/policydb/ |
services.h | 48 sepol_security_class_t tclass, /* IN */ 59 sepol_security_class_t tclass, 75 sepol_security_class_t tclass, 91 sepol_security_class_t tclass, 100 sepol_security_class_t *tclass); 103 * Return a permission av bit associated with tclass and the string 106 extern int sepol_string_to_av_perm(sepol_security_class_t tclass, 112 * class `tclass' based on a SID pair. 116 sepol_security_class_t tclass, /* IN */ 121 * polyinstantiated object of class `tclass' based on [all...] |
/external/selinux/prebuilts/bin/ |
sesearch.py | 73 expr.add_argument("-c", "--class", dest="tclass", 136 if args.tclass: 138 q.tclass = args.tclass 140 q.tclass = args.tclass.split(",") 169 if args.tclass: 171 q.tclass = args.tclass 173 q.tclass = args.tclass.split("," [all...] |