/external/libcxx/test/std/experimental/filesystem/fs.op.funcs/fs.op.permissions/ |
permissions.pass.cpp | 14 // void permissions(const path& p, perms prms); 15 // void permissions(const path& p, perms prms, std::error_code& ec) noexcept; 27 using PR = fs::perms; 34 const perms opts{}; ((void)opts); 44 auto checkThrow = [](path const& f, fs::perms opts, const std::error_code& ec) 66 fs::permissions(dne, fs::perms{}, ec); 68 TEST_CHECK(checkThrow(dne, fs::perms{}, ec)); 72 fs::permissions(dne_sym, fs::perms{}, ec); 74 TEST_CHECK(checkThrow(dne_sym, fs::perms{}, ec)); 85 const perms AP = perms::add_perms [all...] |
/libcore/ojluni/src/main/java/java/nio/file/attribute/ |
PosixFilePermissions.java | 68 * @param perms 73 public static String toString(Set<PosixFilePermission> perms) { 75 writeBits(sb, perms.contains(OWNER_READ), perms.contains(OWNER_WRITE), 76 perms.contains(OWNER_EXECUTE)); 77 writeBits(sb, perms.contains(GROUP_READ), perms.contains(GROUP_WRITE), 78 perms.contains(GROUP_EXECUTE)); 79 writeBits(sb, perms.contains(OTHERS_READ), perms.contains(OTHERS_WRITE) [all...] |
AclEntry.java | 68 private final Set<AclEntryPermission> perms; field in class:AclEntry 77 Set<AclEntryPermission> perms, 82 this.perms = perms; 101 private Set<AclEntryPermission> perms; field in class:AclEntry.Builder 106 Set<AclEntryPermission> perms, 109 assert perms != null && flags != null; 112 this.perms = perms; 131 return new AclEntry(type, who, perms, flags) 268 Set<AclEntryPermission> perms = Collections.emptySet(); local [all...] |
PosixFileAttributeView.java | 118 * Set<PosixFilePermission> perms = 120 * Files.createFile(path, PosixFilePermissions.asFileAttribute(perms)); 162 * @param perms 176 void setPermissions(Set<PosixFilePermission> perms) throws IOException;
|
/external/syslinux/com32/cmenu/libmenu/ |
passwords.c | 65 if (userdb[i]->perms == NULL) 67 tmp = strstr(userdb[i]->perms, dperm); // Search for permission 84 char line[MAX_LINE], *p, *user, *pwdhash, *perms; local 124 if (p == NULL) { // No perms specified 125 perms = NULL; 128 perms = p + 1; 129 if (*perms == 0) 130 perms = NULL; 132 // At this point we have user,pwdhash and perms setup 136 if (perms == NULL [all...] |
passwords.h | 20 char *perms; // pointer to string containing ":" delimited permissions member in struct:__anon31798
|
/external/libcxx/test/std/experimental/filesystem/class.file_status/ |
file_status.mods.pass.cpp | 17 // void permissions(perms) noexcept; 42 static_assert(noexcept(st.permissions(perms::owner_read)), 44 static_assert(std::is_same<decltype(st.permissions(perms::owner_read)), void>::value, 46 assert(st.permissions() != perms::owner_read); 47 st.permissions(perms::owner_read); 48 assert(st.permissions() == perms::owner_read);
|
file_status.obs.pass.cpp | 17 // perms permissions(p) const noexcept; 28 const file_status st(file_type::regular, perms::owner_read); 42 static_assert(std::is_same<decltype(st.permissions()), perms>::value, 43 "operation must return perms"); 44 assert(st.permissions() == perms::owner_read);
|
file_status.cons.pass.cpp | 17 // explicit file_status(file_type, perms prms = perms::unknown) noexcept; 37 assert(f.permissions() == perms::unknown); 49 assert(f.permissions() == perms::unknown); 53 static_assert(std::is_nothrow_constructible<file_status, file_type, perms>::value, 55 static_assert(!test_convertible<file_status, file_type, perms>(), 57 const file_status f(file_type::regular, perms::owner_read); 59 assert(f.permissions() == perms::owner_read);
|
/libcore/ojluni/src/test/java/nio/file/attribute/ |
AclEntryEmptySetTest.java | 53 Set<AclEntryPermission> perms = new HashSet<>(); local 54 AclEntry.newBuilder().setPermissions(perms);
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/setools/ |
objclassquery.py | 44 perms The permissions to match. 60 perms = CriteriaSetDescriptor("perms_regex") variable in class:ObjClassQuery 74 self.log.debug("Perms: {0.perms}, regex: {0.perms_regex}, " 91 if self.perms: 92 perms = class_.perms 96 perms |= class_.common.perms 101 perms, [all...] |
/system/core/libmemunreachable/ |
ProcessMappings.cpp | 43 char perms[5]; local 46 &mapping.begin, &mapping.end, perms, &name_pos) == 3) { 47 if (perms[0] == 'r') { 50 if (perms[1] == 'w') { 53 if (perms[2] == 'x') { 56 if (perms[3] == 'p') {
|
/libcore/ojluni/src/main/java/java/security/ |
UnresolvedPermissionCollection.java | 57 private transient Map<String, List<UnresolvedPermission>> perms; field in class:UnresolvedPermissionCollection 64 perms = new HashMap<String, List<UnresolvedPermission>>(11); 83 v = perms.get(up.getName()); 86 perms.put(up.getName(), v); 100 return perms.get(p.getClass().getName()); 126 for (List<UnresolvedPermission> l : perms.values()) { 155 * Writes the contents of the perms field out as a Hashtable 162 // Copy perms into a Hashtable 164 new Hashtable<>(perms.size()*2); 168 Set<Map.Entry<String, List<UnresolvedPermission>>> set = perms.entrySet() [all...] |
/external/selinux/libselinux/src/ |
mapping.c | 20 access_vector_t perms[sizeof(access_vector_t) * 8]; member in struct:selinux_mapping 69 while (p_in->perms[k]) { 71 if (!*p_in->perms[k]) { 75 p_out->perms[k] = string_to_av_perm(p_out->value, 76 p_in->perms[k]); 77 if (!p_out->perms[k]) 123 kperm |= current_mapping[tclass].perms[i]; 168 if (kperm & current_mapping[tclass].perms[i]) { 170 kperm &= ~current_mapping[tclass].perms[i]; 191 if (avd->allowed & current_mapping[tclass].perms[i] [all...] |
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/setools/policyrep/ |
objclass.py | 59 return other in self.perms 62 def perms(self): member in class:Common 67 return "common {0}\n{{\n\t{1}\n}}".format(self, '\n\t'.join(self.perms)) 76 if other in self.common.perms: 81 return other in self.perms 106 perms = self.perms 107 if len(perms) > 0: 108 stmt += "{{\n\t{0}\n}}".format('\n\t'.join(perms))
|
/external/selinux/python/sepolgen/tests/ |
test_access.py | 33 self.assertTrue(isinstance(a.perms, refpolicy.IdSet)) 42 a.perms.update(["read", "write"]) 48 self.assertEqual(a.perms, l.perms) 55 a.perms.update(["read", "write"]) 62 self.assertEqual(a.perms, l.perms) 69 a.perms.update(["read", "write"]) 75 perms = l[3:] 76 perms.sort( [all...] |
/external/selinux/python/sepolgen/src/sepolgen/ |
access.py | 79 .perms - The permissions allowed to the object class. [IdSet] 89 self.perms = refpolicy.IdSet() 106 All of the list elements 3 and greater are treated as perms. 120 self.perms = refpolicy.IdSet(list[3:]) 131 l.extend(sorted(self.perms)) 139 self.obj_class, self.perms.to_space_str()) 143 x = list(self.perms) 145 y = list(other.perms) 176 access.perms = avrule.perms.copy( [all...] |
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/sepolgen/ |
access.py | 79 .perms - The permissions allowed to the object class. [IdSet] 89 self.perms = refpolicy.IdSet() 106 All of the list elements 3 and greater are treated as perms. 120 self.perms = refpolicy.IdSet(list[3:]) 131 l.extend(sorted(self.perms)) 139 self.obj_class, self.perms.to_space_str()) 143 x = list(self.perms) 145 y = list(other.perms) 176 access.perms = avrule.perms.copy( [all...] |
/build/make/tools/fs_get_stats/ |
fs_get_stats.c | 42 unsigned perms = 0; local 52 perms = (unsigned)strtoul(argv[1], &endptr, 0); 62 fs_config(argv[3], is_dir, argv[4], &uid, &gid, &perms, &capabilities); 63 fprintf(stdout, "%d %d 0%o\n", uid, gid, perms);
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/setools/diff/ |
objclass.py | 59 left_perms = left_class.perms 61 left_perms |= left_class.common.perms 65 right_perms = right_class.perms 67 right_perms |= right_class.common.perms
|
/system/sepolicy/tools/sepolicy-analyze/ |
utils.h | 12 void display_allow(policydb_t *policydb, avtab_key_t *key, int idx, uint32_t perms);
|
/tools/tradefederation/core/tests/src/com/android/tradefed/util/ |
FileUtilTest.java | 300 Set<PosixFilePermission> perms = null; local 302 perms = FileUtil.unixModeToPosix(0777); 304 perms.remove(PosixFilePermission.OWNER_READ) && 305 perms.remove(PosixFilePermission.OWNER_WRITE) && 306 perms.remove(PosixFilePermission.OWNER_EXECUTE) && 307 perms.remove(PosixFilePermission.GROUP_READ) && 308 perms.remove(PosixFilePermission.GROUP_WRITE) && 309 perms.remove(PosixFilePermission.GROUP_EXECUTE) && 310 perms.remove(PosixFilePermission.OTHERS_READ) && 311 perms.remove(PosixFilePermission.OTHERS_WRITE) & [all...] |
/external/autotest/client/site_tests/security_SysVIPC/ |
security_SysVIPC.py | 14 ShmRecord = namedtuple('ShmRecord', ['owner', 'perms', 'attached']) 15 SemaphoreRecord = namedtuple('SemaphoreRecord', ['owner', 'perms']) 20 expected_shm = set([ShmRecord(owner='cras', perms='640', 22 expected_sem = set([SemaphoreRecord(owner='root', perms='600')]) 57 perms = fields[3] 59 seen.add(ShmRecord(owner=owner, perms=perms, attached=attached)) 69 seen.add(SemaphoreRecord(owner=fields[2], perms=fields[3]))
|
/external/libcxx/test/std/experimental/filesystem/fs.op.funcs/fs.op.create_directory/ |
create_directory_with_attributes.pass.cpp | 46 const perms orig_p = status(dir).permissions(); 47 permissions(dir2, perms::none); 64 permissions(env.test_root, perms::remove_perms | perms::set_gid); 68 permissions(attr_dir, perms::none); 77 TEST_CHECK(st.permissions() == perms::none);
|
/external/selinux/libsepol/src/ |
assertion.c | 41 const class_perm_node_t *curperm, uint32_t perms) 49 sepol_av_to_string(p, curperm->tclass, perms)); 55 sepol_av_to_string(p, curperm->tclass, perms)); 61 sepol_av_to_string(p, curperm->tclass, perms)); 94 rc = extended_permissions_and(neverallow->perms, allow->perms); 97 rc = xperm_test(neverallow->driver, allow->perms); 100 rc = xperm_test(allow->driver, neverallow->perms); 103 rc = extended_permissions_and(neverallow->perms, allow->perms); 220 uint32_t perms; local [all...] |