/external/libcxx/test/std/experimental/filesystem/fs.op.funcs/fs.op.permissions/ |
permissions.pass.cpp | 14 // void permissions(const path& p, perms prms); 15 // void permissions(const path& p, perms prms, std::error_code& ec) noexcept; 27 using PR = fs::perms; 34 const perms opts{}; ((void)opts); 44 auto checkThrow = [](path const& f, fs::perms opts, const std::error_code& ec) 66 fs::permissions(dne, fs::perms{}, ec); 68 TEST_CHECK(checkThrow(dne, fs::perms{}, ec)); 72 fs::permissions(dne_sym, fs::perms{}, ec); 74 TEST_CHECK(checkThrow(dne_sym, fs::perms{}, ec)); 85 const perms AP = perms::add_perms [all...] |
/prebuilts/ndk/r16/sources/cxx-stl/llvm-libc++/test/std/experimental/filesystem/fs.op.funcs/fs.op.permissions/ |
permissions.pass.cpp | 14 // void permissions(const path& p, perms prms); 15 // void permissions(const path& p, perms prms, std::error_code& ec) noexcept; 27 using PR = fs::perms; 34 const perms opts{}; ((void)opts); 44 auto checkThrow = [](path const& f, fs::perms opts, const std::error_code& ec) 66 fs::permissions(dne, fs::perms{}, ec); 68 TEST_CHECK(checkThrow(dne, fs::perms{}, ec)); 72 fs::permissions(dne_sym, fs::perms{}, ec); 74 TEST_CHECK(checkThrow(dne_sym, fs::perms{}, ec)); 85 const perms AP = perms::add_perms [all...] |
/libcore/ojluni/src/main/java/java/nio/file/attribute/ |
PosixFilePermissions.java | 68 * @param perms 73 public static String toString(Set<PosixFilePermission> perms) { 75 writeBits(sb, perms.contains(OWNER_READ), perms.contains(OWNER_WRITE), 76 perms.contains(OWNER_EXECUTE)); 77 writeBits(sb, perms.contains(GROUP_READ), perms.contains(GROUP_WRITE), 78 perms.contains(GROUP_EXECUTE)); 79 writeBits(sb, perms.contains(OTHERS_READ), perms.contains(OTHERS_WRITE) [all...] |
AclEntry.java | 68 private final Set<AclEntryPermission> perms; field in class:AclEntry 77 Set<AclEntryPermission> perms, 82 this.perms = perms; 101 private Set<AclEntryPermission> perms; field in class:AclEntry.Builder 106 Set<AclEntryPermission> perms, 109 assert perms != null && flags != null; 112 this.perms = perms; 131 return new AclEntry(type, who, perms, flags) 268 Set<AclEntryPermission> perms = Collections.emptySet(); local [all...] |
/external/syslinux/com32/cmenu/libmenu/ |
passwords.c | 65 if (userdb[i]->perms == NULL) 67 tmp = strstr(userdb[i]->perms, dperm); // Search for permission 84 char line[MAX_LINE], *p, *user, *pwdhash, *perms; local 124 if (p == NULL) { // No perms specified 125 perms = NULL; 128 perms = p + 1; 129 if (*perms == 0) 130 perms = NULL; 132 // At this point we have user,pwdhash and perms setup 136 if (perms == NULL [all...] |
/frameworks/ml/nn/runtime/test/specs/V1_1/ |
transpose.mod.py | 3 perms = Parameter("perms", "TENSOR_INT32", "{4}", [0, 2, 1, 3]) variable 6 model = model.Operation("TRANSPOSE", i1, perms).To(output)
|
transpose_float_1.mod.py | 3 perms = Parameter("perms", "TENSOR_INT32", "{4}", [2, 0, 1, 3]) variable 6 model = model.Operation("TRANSPOSE", i1, perms).To(output)
|
transpose_float_1_relaxed.mod.py | 19 perms = Parameter("perms", "TENSOR_INT32", "{4}", [2, 0, 1, 3]) variable 22 model = model.Operation("TRANSPOSE", i1, perms).To(output)
|
transpose_quant8_1.mod.py | 3 perms = Parameter("perms", "TENSOR_INT32", "{4}", [2, 0, 1, 3]) variable 6 model = model.Operation("TRANSPOSE", i1, perms).To(output)
|
transpose_relaxed.mod.py | 19 perms = Parameter("perms", "TENSOR_INT32", "{4}", [0, 2, 1, 3]) variable 22 model = model.Operation("TRANSPOSE", i1, perms).To(output)
|
/external/libcxx/test/std/experimental/filesystem/class.file_status/ |
file_status.mods.pass.cpp | 17 // void permissions(perms) noexcept; 42 static_assert(noexcept(st.permissions(perms::owner_read)), 44 static_assert(std::is_same<decltype(st.permissions(perms::owner_read)), void>::value, 46 assert(st.permissions() != perms::owner_read); 47 st.permissions(perms::owner_read); 48 assert(st.permissions() == perms::owner_read);
|
file_status.obs.pass.cpp | 17 // perms permissions(p) const noexcept; 28 const file_status st(file_type::regular, perms::owner_read); 42 static_assert(std::is_same<decltype(st.permissions()), perms>::value, 43 "operation must return perms"); 44 assert(st.permissions() == perms::owner_read);
|
file_status.cons.pass.cpp | 17 // explicit file_status(file_type, perms prms = perms::unknown) noexcept; 37 assert(f.permissions() == perms::unknown); 49 assert(f.permissions() == perms::unknown); 53 static_assert(std::is_nothrow_constructible<file_status, file_type, perms>::value, 55 static_assert(!test_convertible<file_status, file_type, perms>(), 57 const file_status f(file_type::regular, perms::owner_read); 59 assert(f.permissions() == perms::owner_read);
|
/external/ltp/testcases/cve/ |
cve-2016-10044.c | 45 char perms[8], line[BUFSIZ]; local 59 if (sscanf(line, "%*x-%*x %s7", perms) < 0) 61 if (strchr(perms, (int)'x')) 62 tst_res(TFAIL, "AIO mapping is executable: %s!", perms); 64 tst_res(TPASS, "AIO mapping is not executable: %s", perms);
|
/prebuilts/ndk/r16/sources/cxx-stl/llvm-libc++/test/std/experimental/filesystem/class.file_status/ |
file_status.mods.pass.cpp | 17 // void permissions(perms) noexcept; 42 static_assert(noexcept(st.permissions(perms::owner_read)), 44 static_assert(std::is_same<decltype(st.permissions(perms::owner_read)), void>::value, 46 assert(st.permissions() != perms::owner_read); 47 st.permissions(perms::owner_read); 48 assert(st.permissions() == perms::owner_read);
|
file_status.obs.pass.cpp | 17 // perms permissions(p) const noexcept; 28 const file_status st(file_type::regular, perms::owner_read); 42 static_assert(std::is_same<decltype(st.permissions()), perms>::value, 43 "operation must return perms"); 44 assert(st.permissions() == perms::owner_read);
|
file_status.cons.pass.cpp | 17 // explicit file_status(file_type, perms prms = perms::unknown) noexcept; 37 assert(f.permissions() == perms::unknown); 49 assert(f.permissions() == perms::unknown); 53 static_assert(std::is_nothrow_constructible<file_status, file_type, perms>::value, 55 static_assert(!test_convertible<file_status, file_type, perms>(), 57 const file_status f(file_type::regular, perms::owner_read); 59 assert(f.permissions() == perms::owner_read);
|
/system/sepolicy/tests/ |
searchpolicy.py | 22 expr.add_argument("-p", "--perms", metavar="PERMS", 35 if not (args.source or args.target or args.tclass or args.perms): 52 if args.perms: 53 perms = set(args.perms.split(",")) variable 55 perms = set() variable 60 perms=perms) variable 65 if len(r.perms) > 1 [all...] |
/frameworks/ml/nn/runtime/test/generated/models/ |
transpose.model.cpp | 7 auto perms = model->addOperand(&type1); local 11 model->setOperandValue(perms, perms_init, sizeof(int32_t) * 4); 12 model->addOperation(ANEURALNETWORKS_TRANSPOSE, {input, perms}, {output});
|
transpose_relaxed.model.cpp | 7 auto perms = model->addOperand(&type1); local 11 model->setOperandValue(perms, perms_init, sizeof(int32_t) * 4); 12 model->addOperation(ANEURALNETWORKS_TRANSPOSE, {input, perms}, {output});
|
/libcore/ojluni/src/test/java/nio/file/attribute/ |
AclEntryEmptySetTest.java | 53 Set<AclEntryPermission> perms = new HashSet<>(); local 54 AclEntry.newBuilder().setPermissions(perms);
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/setools/ |
objclassquery.py | 44 perms The permissions to match. 60 perms = CriteriaSetDescriptor("perms_regex") variable in class:ObjClassQuery 74 self.log.debug("Perms: {0.perms}, regex: {0.perms_regex}, " 91 if self.perms: 92 perms = class_.perms 96 perms |= class_.common.perms 101 perms, [all...] |
/system/core/libmemunreachable/ |
ProcessMappings.cpp | 45 char perms[5]; local 48 &mapping.end, perms, &name_pos) == 3) { 49 if (perms[0] == 'r') { 52 if (perms[1] == 'w') { 55 if (perms[2] == 'x') { 58 if (perms[3] == 'p') {
|
/libcore/ojluni/src/main/java/java/security/ |
UnresolvedPermissionCollection.java | 57 private transient Map<String, List<UnresolvedPermission>> perms; field in class:UnresolvedPermissionCollection 64 perms = new HashMap<String, List<UnresolvedPermission>>(11); 83 v = perms.get(up.getName()); 86 perms.put(up.getName(), v); 100 return perms.get(p.getClass().getName()); 126 for (List<UnresolvedPermission> l : perms.values()) { 155 * Writes the contents of the perms field out as a Hashtable 162 // Copy perms into a Hashtable 164 new Hashtable<>(perms.size()*2); 168 Set<Map.Entry<String, List<UnresolvedPermission>>> set = perms.entrySet() [all...] |
/external/selinux/libselinux/src/ |
mapping.c | 20 access_vector_t perms[sizeof(access_vector_t) * 8]; member in struct:selinux_mapping 69 while (p_in->perms[k]) { 71 if (!*p_in->perms[k]) { 75 p_out->perms[k] = string_to_av_perm(p_out->value, 76 p_in->perms[k]); 77 if (!p_out->perms[k]) 123 kperm |= current_mapping[tclass].perms[i]; 168 if (kperm & current_mapping[tclass].perms[i]) { 170 kperm &= ~current_mapping[tclass].perms[i]; 191 if (avd->allowed & current_mapping[tclass].perms[i] [all...] |