/external/selinux/sepolgen/src/sepolgen/ |
D | access.py | 87 self.perms = refpolicy.IdSet() 115 self.perms = refpolicy.IdSet(list[3:]) 126 l.extend(self.perms) 134 self.obj_class, self.perms.to_space_str()) 143 if len(self.perms) != len(other.perms): 144 return cmp(len(self.perms), len(other.perms)) 145 x = list(self.perms) 147 y = list(other.perms) 175 access.perms = avrule.perms.copy() 259 …def add(self, src_type, tgt_type, obj_class, perms, audit_msg=None, avc_type=audit2why.TERULE, dat… argument [all …]
|
D | matching.py | 118 diff = av_req.perms.difference(av_prov.perms) 124 diff = av_prov.perms.difference(av_req.perms) 183 pdist = self.perm_maps.getdefault_distance(prov.obj_class, prov.perms) 224 av_dir = self.perm_maps.getdefault_direction(av.obj_class, av.perms) 230 self.perm_maps.getdefault_direction(x.obj_class, x.perms)
|
D | objectmodel.py | 156 def getdefault_direction(self, obj, perms): argument 158 for perm in perms: 163 def getdefault_distance(self, obj, perms): argument 165 for perm in perms:
|
D | refpolicy.py | 346 self.perms = IdSet() 458 self.perms = IdSet() 481 self.perms.update(av.perms) 492 self.perms.to_space_str()) 824 for perm in x.perms: 847 def add_obj_class(self, obj_class, perms): argument 849 p.update(perms) 857 for obj_class, perms in self.obj_classes.items(): 858 s.append("\tclass %s %s;" % (obj_class, perms.to_space_str())) 877 self.perms = set() [all …]
|
D | policygen.py | 183 "write" in av.perms and 184 ( "dir" in av.obj_class or "open" in av.perms )): 189 … x: x[TCONTEXT], sesearch([ALLOW], {SCONTEXT: av.src_type, CLASS: av.obj_class, PERMS: av.perms})): 268 (av.src_type, av.tgt_type, av.obj_class, av.perms.to_space_str())) 381 r.add_obj_class(obj, avrule.perms)
|
/external/selinux/sepolgen/tests/ |
D | test_access.py | 33 self.assertTrue(isinstance(a.perms, refpolicy.IdSet)) 42 a.perms.update(["read", "write"]) 48 self.assertEqual(a.perms, l.perms) 55 a.perms.update(["read", "write"]) 62 self.assertEqual(a.perms, l.perms) 69 a.perms.update(["read", "write"]) 83 a.perms.update(["read", "write"]) 93 a.perms.update(["read", "write"]) 99 b.perms.update(["read", "write"]) 120 b.perms = refpolicy.IdSet(["read"]) [all …]
|
D | test_refpolicy.py | 78 self.assertTrue(isinstance(o.perms, set)) 87 self.assertTrue(isinstance(a.perms, set)) 94 a.perms.add("read") 101 a.perms.add("write") 132 a.perms.add("read") 148 a.perms.add("write")
|
/external/libselinux/src/ |
D | mapping.c | 20 access_vector_t perms[sizeof(access_vector_t) * 8]; member 69 while (p_in->perms[k]) { in selinux_set_mapping() 71 if (!*p_in->perms[k]) { in selinux_set_mapping() 75 p_out->perms[k] = string_to_av_perm(p_out->value, in selinux_set_mapping() 76 p_in->perms[k]); in selinux_set_mapping() 77 if (!p_out->perms[k]) in selinux_set_mapping() 123 kperm |= current_mapping[tclass].perms[i]; in unmap_perm() 168 if (kperm & current_mapping[tclass].perms[i]) { in map_perm() 170 kperm &= ~current_mapping[tclass].perms[i]; in map_perm() 191 if (avd->allowed & current_mapping[tclass].perms[i]) in map_decision() [all …]
|
D | avc.c | 43 security_class_t tclass, access_vector_t perms, 49 access_vector_t perms; member 853 access_vector_t perms, in avc_add_callback() argument 857 security_class_t tclass, access_vector_t perms) in avc_add_callback() 873 c->perms = perms; in avc_add_callback() 886 access_vector_t perms) in avc_update_node() argument 890 node->ae.avd.allowed |= perms; in avc_update_node() 894 node->ae.avd.allowed &= ~perms; in avc_update_node() 897 node->ae.avd.auditallow |= perms; in avc_update_node() 900 node->ae.avd.auditallow &= ~perms; in avc_update_node() [all …]
|
D | stringrep.c | 25 char **perms; member 72 node->perms = calloc(MAXVECTORS,sizeof(char*)); in discover_class() 73 if (node->perms == NULL) in discover_class() 135 node->perms[value-1] = strdup(dentry->d_name); in discover_class() 136 if (node->perms[value-1] == NULL) in discover_class() 151 free(node->perms[i]); in discover_class() 155 free(node->perms); in discover_class() 186 for (i=0; i<MAXVECTORS && node->perms[i] != NULL; i++) in string_to_av_perm() 187 if (strcmp(node->perms[i],s) == 0) in string_to_av_perm() 220 return node->perms[i]; in security_av_perm_to_string()
|
D | avc_internal.h | 157 security_class_t tclass, access_vector_t perms, 161 access_vector_t perms, uint32_t seqno, 164 security_class_t tclass, access_vector_t perms, 168 security_class_t tclass, access_vector_t perms, 171 security_class_t tclass, access_vector_t perms,
|
/external/selinux/libselinux/src/ |
D | mapping.c | 20 access_vector_t perms[sizeof(access_vector_t) * 8]; member 69 while (p_in->perms[k]) { in selinux_set_mapping() 71 if (!*p_in->perms[k]) { in selinux_set_mapping() 75 p_out->perms[k] = string_to_av_perm(p_out->value, in selinux_set_mapping() 76 p_in->perms[k]); in selinux_set_mapping() 77 if (!p_out->perms[k]) in selinux_set_mapping() 123 kperm |= current_mapping[tclass].perms[i]; in unmap_perm() 168 if (kperm & current_mapping[tclass].perms[i]) { in map_perm() 170 kperm &= ~current_mapping[tclass].perms[i]; in map_perm() 191 if (avd->allowed & current_mapping[tclass].perms[i]) in map_decision() [all …]
|
D | avc.c | 43 security_class_t tclass, access_vector_t perms, 49 access_vector_t perms; member 913 access_vector_t perms, in avc_add_callback() argument 917 security_class_t tclass, access_vector_t perms) in avc_add_callback() 933 c->perms = perms; in avc_add_callback() 946 access_vector_t perms) in avc_update_node() argument 950 node->ae.avd.allowed |= perms; in avc_update_node() 954 node->ae.avd.allowed &= ~perms; in avc_update_node() 957 node->ae.avd.auditallow |= perms; in avc_update_node() 960 node->ae.avd.auditallow &= ~perms; in avc_update_node() [all …]
|
D | stringrep.c | 25 char **perms; member 72 node->perms = calloc(MAXVECTORS,sizeof(char*)); in discover_class() 73 if (node->perms == NULL) in discover_class() 135 node->perms[value-1] = strdup(dentry->d_name); in discover_class() 136 if (node->perms[value-1] == NULL) in discover_class() 151 free(node->perms[i]); in discover_class() 155 free(node->perms); in discover_class() 207 for (i=0; i<MAXVECTORS && node->perms[i] != NULL; i++) in string_to_av_perm() 208 if (strcmp(node->perms[i],s) == 0) in string_to_av_perm() 242 return node->perms[i]; in security_av_perm_to_string()
|
D | avc_internal.h | 157 security_class_t tclass, access_vector_t perms, 161 access_vector_t perms, uint32_t seqno, 164 security_class_t tclass, access_vector_t perms, 168 security_class_t tclass, access_vector_t perms, 171 security_class_t tclass, access_vector_t perms,
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
D | ProtectionDomainTest.java | 44 private PermissionCollection perms = null; field in ProtectionDomainTest 61 perms = allperm.newPermissionCollection(); in setUp() 62 perms.add(allperm); in setUp() 77 new ProtectionDomain(cs, perms); in testProtectionDomainCodeSourcePermissionCollection_00() 84 assertFalse(perms.isReadOnly()); in testProtectionDomainCodeSourcePermissionCollection_01() 85 new ProtectionDomain(null, perms); in testProtectionDomainCodeSourcePermissionCollection_01() 86 assertTrue(perms.isReadOnly()); in testProtectionDomainCodeSourcePermissionCollection_01() 96 new ProtectionDomain(null, perms, null, null); in testProtectionDomainCodeSourcePermissionCollectionClassLoaderPrincipalArray() 100 new ProtectionDomain(cs, perms, classldr, principals); in testProtectionDomainCodeSourcePermissionCollectionClassLoaderPrincipalArray() 125 assertSame(new ProtectionDomain(null, perms).getPermissions(), perms); in testGetPermissions() [all …]
|
/external/llvm/include/llvm/Support/ |
D | FileSystem.h | 73 enum perms { enum 98 inline perms operator|(perms l , perms r) { 99 return static_cast<perms>( 102 inline perms operator&(perms l , perms r) { 103 return static_cast<perms>( 106 inline perms &operator|=(perms &l, perms r) { 110 inline perms &operator&=(perms &l, perms r) { 114 inline perms operator~(perms x) { 115 return static_cast<perms>(~static_cast<unsigned short>(x)); 158 perms Perms; [all …]
|
/external/sepolicy/tools/sepolicy-analyze/ |
D | dups.c | 59 uint32_t perms = node->datum.data & d->data; in find_dups_helper() local 60 if ((attrib1 && perms == node->datum.data) || in find_dups_helper() 61 (attrib2 && perms == d->data)) { in find_dups_helper()
|
D | utils.c | 12 void display_allow(policydb_t *policydb, avtab_key_t *key, int idx, uint32_t perms) in display_allow() argument 22 (policydb, key->target_class, perms)); in display_allow()
|
/external/clang/include/clang/Basic/ |
D | VirtualFileSystem.h | 40 llvm::sys::fs::perms Perms; 51 llvm::sys::fs::perms Perms); 60 llvm::sys::fs::perms getPermissions() const { return Perms; } in getPermissions() 67 void setPermissions(llvm::sys::fs::perms p) { Perms = p; } in setPermissions()
|
/external/guava/guava-tests/test/com/google/common/util/concurrent/ |
D | JSR166TestCase.java | 669 Permissions perms = new Permissions(); field in JSR166TestCase.AdjustablePolicy 672 perms.add(permission); in AdjustablePolicy() 674 void addPermission(Permission perm) { perms.add(perm); } in addPermission() 675 void clearPermissions() { perms = new Permissions(); } in clearPermissions() 677 return perms; in getPermissions() 680 return perms; in getPermissions() 683 return perms.implies(p); in implies()
|
/external/selinux/prebuilts/bin/ |
D | sesearch.py | 142 if args.perms: 143 q.perms = args.perms.split(",")
|
/external/selinux/checkpolicy/ |
D | policy_define.c | 1582 perm->next = avrule->perms; in define_compute_type_helper() 1583 avrule->perms = perm; in define_compute_type_helper() 1944 class_perm_node_t *perms, *tail = NULL, *cur_perms = NULL; in define_te_avtab_operation_helper() local 1996 perms = NULL; in define_te_avtab_operation_helper() 2009 if (!perms) in define_te_avtab_operation_helper() 2010 perms = cur_perms; in define_te_avtab_operation_helper() 2018 avrule->perms = perms; in define_te_avtab_operation_helper() 2041 ops->perms[i] |= ~0U; in avrule_operation_setrangebits() 2044 ops->perms[i] |= OP_SETBITS(h); in avrule_operation_setrangebits() 2047 ops->perms[i] |= ~0U - OP_SETBITS(low); in avrule_operation_setrangebits() [all …]
|
/external/libselinux/include/selinux/ |
D | avc.h | 375 access_vector_t perms, 379 access_vector_t perms);
|
/external/selinux/libsepol/cil/src/ |
D | cil_post.c | 1361 ebitmap_t *perms; member 1368 ebitmap_t *perms = perm_args->perms; in __perm_bits_to_list() local 1373 if (!ebitmap_get_bit(perms, value)) { in __perm_bits_to_list() 1382 static int __evaluate_perm_expression(struct cil_list *perms, enum cil_flavor flavor, symtab_t *cla… in __evaluate_perm_expression() argument 1388 if (cil_verify_is_list(perms, CIL_PERM)) { in __evaluate_perm_expression() 1393 rc = __cil_expr_to_bitmap(perms, &bitmap, num_perms, db); in __evaluate_perm_expression() 1402 args.perms = &bitmap; in __evaluate_perm_expression() 1427 common_symtab = &common->perms; in __evaluate_classperms() 1430 …rc = __evaluate_perm_expression(cp->perms, CIL_PERM, &class->perms, common_symtab, class->num_perm… in __evaluate_classperms() 1439 cil_list_destroy(&cp->perms, CIL_FALSE); in __evaluate_classperms() [all …]
|