/external/libchrome/sandbox/linux/syscall_broker/ |
D | broker_file_permission_unittest.cc | 41 BrokerFilePermission perm = BrokerFilePermission::ReadOnly(kPath); in SANDBOX_TEST() local 46 BrokerFilePermission perm = BrokerFilePermission::ReadOnlyRecursive(kPath); in SANDBOX_TEST() local 54 BrokerFilePermission perm = BrokerFilePermission::ReadOnly(kPath); in SANDBOX_DEATH_TEST() local 62 BrokerFilePermission perm = BrokerFilePermission::ReadOnlyRecursive(kPath); in SANDBOX_DEATH_TEST() local 70 BrokerFilePermission perm = BrokerFilePermission::ReadOnly(kPath); in SANDBOX_DEATH_TEST() local 78 BrokerFilePermission perm = BrokerFilePermission::ReadOnly(kPath); in SANDBOX_DEATH_TEST() local 83 void CheckPerm(const BrokerFilePermission& perm, in CheckPerm() argument 89 ASSERT_FALSE(perm.CheckAccess(path, X_OK, NULL)); in CheckPerm() 90 ASSERT_TRUE(perm.CheckAccess(path, F_OK, NULL)); in CheckPerm() 94 ASSERT_TRUE(perm.CheckOpen(path, O_RDONLY, &file_to_open, NULL)); in CheckPerm() [all …]
|
/external/vboot_reference/tests/tpm_lite/ |
D | tpmtest_redefine_unowned.c | 18 uint32_t perm; in main() local 33 perm = TPM_NV_PER_PPWRITE | TPM_NV_PER_GLOBALLOCK; in main() 34 TPM_CHECK(TlclDefineSpace(INDEX0, perm, 2 * sizeof(uint32_t))); in main() 35 TPM_CHECK(TlclDefineSpace(INDEX0, perm, sizeof(uint32_t))); in main() 37 perm = TPM_NV_PER_PPWRITE; in main() 38 TPM_CHECK(TlclDefineSpace(INDEX1, perm, 2 * sizeof(uint32_t))); in main() 39 TPM_CHECK(TlclDefineSpace(INDEX1, perm, sizeof(uint32_t))); in main() 45 TPM_EXPECT(TlclDefineSpace(INDEX0, perm, sizeof(uint32_t)), in main() 49 TPM_CHECK(TlclDefineSpace(INDEX1, perm, 2 * sizeof(uint32_t))); in main() 50 TPM_CHECK(TlclDefineSpace(INDEX1, perm, sizeof(uint32_t))); in main() [all …]
|
D | readonly.c | 38 uint32_t perm = TPM_NV_PER_WRITE_STCLEAR | TPM_NV_PER_PPWRITE; in InitializeSpaces() local 43 TlclDefineSpace(INDEX0, perm, 4); in InitializeSpaces() 45 TlclDefineSpace(INDEX1, perm, 4); in InitializeSpaces() 47 TlclDefineSpace(INDEX2, perm, 4); in InitializeSpaces() 49 TlclDefineSpace(INDEX3, perm, 4); in InitializeSpaces() 52 perm = TPM_NV_PER_READ_STCLEAR | TPM_NV_PER_WRITE_STCLEAR | in InitializeSpaces() 54 TlclDefineSpace(INDEX_INITIALIZED, perm, 1); in InitializeSpaces()
|
D | tpmtest_spaceperm.c | 21 uint32_t perm; in main() local 28 TPM_CHECK(TlclGetPermissions(INDEX0, &perm)); in main() 29 VbAssert((perm & PERMPPGL) == PERMPPGL); in main() 31 TPM_CHECK(TlclGetPermissions(INDEX1, &perm)); in main() 32 VbAssert((perm & PERMPP) == PERMPP); in main()
|
D | tpmtest_testsetup.c | 18 uint32_t perm; in main() local 33 perm = TPM_NV_PER_PPWRITE | TPM_NV_PER_GLOBALLOCK; in main() 34 TPM_CHECK(TlclDefineSpace(INDEX0, perm, sizeof(uint32_t))); in main() 39 perm = TPM_NV_PER_PPWRITE; in main() 40 TPM_CHECK(TlclDefineSpace(INDEX1, perm, sizeof(uint32_t))); in main()
|
/external/mesa3d/src/mesa/program/ |
D | prog_noise.c | 79 unsigned char perm[512] = { 151, 160, 137, 91, 90, 15, variable 225 n0 = t0 * t0 * grad1(perm[i0 & 0xff], x0); in _mesa_noise1() 229 n1 = t1 * t1 * grad1(perm[i1 & 0xff], x1); in _mesa_noise1() 294 n0 = t0 * t0 * grad2(perm[ii + perm[jj]], x0, y0); in _mesa_noise2() 302 n1 = t1 * t1 * grad2(perm[ii + i1 + perm[jj + j1]], x1, y1); in _mesa_noise2() 310 n2 = t2 * t2 * grad2(perm[ii + 1 + perm[jj + 1]], x2, y2); in _mesa_noise2() 436 n0 = t0 * t0 * grad3(perm[ii + perm[jj + perm[kk]]], x0, y0, z0); in _mesa_noise3() 445 t1 * t1 * grad3(perm[ii + i1 + perm[jj + j1 + perm[kk + k1]]], x1, in _mesa_noise3() 455 t2 * t2 * grad3(perm[ii + i2 + perm[jj + j2 + perm[kk + k2]]], x2, in _mesa_noise3() 465 t3 * t3 * grad3(perm[ii + 1 + perm[jj + 1 + perm[kk + 1]]], x3, y3, in _mesa_noise3() [all …]
|
/external/selinux/sepolgen/src/sepolgen/ |
D | objectmodel.py | 84 def __init__(self, perm, dir, weight): argument 85 self.perm = perm 90 return "<sepolgen.objectmodel.PermMap %s %s %d>" % (self.perm, 131 cur[pm.perm] = pm 133 def get(self, obj, perm): argument 141 return self.classes[obj][perm] 143 def getdefault(self, obj, perm): argument 151 pm = self.classes[obj][perm] 153 return PermMap(perm, self.default_dir, self.default_weight) 158 for perm in perms: [all …]
|
/external/selinux/policycoreutils/sepolicy/sepolicy/ |
D | network.py | 28 def get_types(src, tclass, perm): argument 29 …ws = search([sepolicy.ALLOW], {sepolicy.SOURCE: src, sepolicy.CLASS: tclass, sepolicy.PERMS: perm}) 32 …for i in map(lambda y: y[sepolicy.TARGET], filter(lambda x: set(perm).issubset(x[sepolicy.PERMS]),… 38 def get_network_connect(src, protocol, perm): argument 41 tlist = get_types(src, "%s_socket" % protocol, [perm]) 43 d[(src, protocol, perm)] = [] 55 d[(src, protocol, perm)].append((i, ["all ports with out defined types"])) 57 d[(src, protocol, perm)].append((i, ["all ports"])) 59 d[(src, protocol, perm)].append((i, ["all ports > 1024"])) 61 d[(src, protocol, perm)].append((i, ["all ports < 1024"])) [all …]
|
D | booleans.py | 36 def get_types(src, tclass, perm): argument 37 …ws = search([sepolicy.ALLOW], {sepolicy.SOURCE: src, sepolicy.CLASS: tclass, sepolicy.PERMS: perm}) 39 raise TypeError("The %s type is not allowed to %s any types" % (src, ",".join(perm))) 42 …for l in map(lambda y: y[sepolicy.TARGET], filter(lambda x: set(perm).issubset(x[sepolicy.PERMS]),…
|
D | communicate.py | 44 def get_types(src, tclass, perm): argument 45 …ws = search([sepolicy.ALLOW], {sepolicy.SOURCE: src, sepolicy.CLASS: tclass, sepolicy.PERMS: perm}) 47 raise ValueError("The %s type is not allowed to %s any types" % (src, ",".join(perm))) 50 …for l in map(lambda y: y[sepolicy.TARGET], filter(lambda x: set(perm).issubset(x[sepolicy.PERMS]),…
|
/external/jetty/src/java/org/eclipse/jetty/util/security/ |
D | UnixCrypt.java | 129 byte[] perm = new byte[64]; 138 perm[i] = (byte) 0; 153 perm[i] = (byte) k; 155 init_perm(PC1ROT, perm, 8); in init_perm() argument 162 perm[i] = temp[i] = 0; 173 perm[i] = temp[k]; 176 init_perm(PC2ROT[j], perm, 8); in init_perm() argument 194 perm[i * 8 + j] = (byte) k; 198 init_perm(IE3264, perm, 8); in init_perm() argument 210 perm[k - 1] = (byte) (i + 1); [all …]
|
/external/chromium-trace/catapult/third_party/gsutil/gslib/ |
D | aclhelpers.py | 78 self.scope_type, self.perm, self.identifier) 104 self.perm = self.permission_shorthand_mapping[perm_token] 106 self.perm = perm_token 151 if self.perm not in self.permission_shorthand_mapping.values(): 189 entry = entry_class(entityId=self.identifier, role=self.perm, 192 entry = entry_class(entityId=self.identifier, role=self.perm, 195 entry = entry_class(entityId=self.identifier, role=self.perm, 198 entry = entry_class(email=self.identifier, role=self.perm, 201 entry = entry_class(email=self.identifier, role=self.perm, 204 entry = entry_class(domain=self.identifier, role=self.perm, [all …]
|
/external/eigen/Eigen/src/OrderingMethods/ |
D | Ordering.h | 60 void operator()(const MatrixType& mat, PermutationType& perm) in operator() 68 internal::minimum_degree_ordering(symm, perm); in operator() 73 void operator()(const SparseSelfAdjointView<SrcType, SrcUpLo>& mat, PermutationType& perm) in operator() 79 internal::minimum_degree_ordering(C, perm); in operator() 101 void operator()(const MatrixType& /*mat*/, PermutationType& perm) in operator() 103 perm.resize(0); in operator() 125 void operator() (const MatrixType& mat, PermutationType& perm) in operator() 147 perm.resize(n); in operator() 148 for (Index i = 0; i < n; i++) perm.indices()(p(i)) = i; in operator()
|
/external/mksh/src/ |
D | check.pl | 477 local($type, $perm, $rest, $c, $len, $name); 483 ($type, $perm, $rest) = 489 $perm = oct($perm) if $perm =~ /^\d+$/; 492 if (!chmod($perm, $name)) { 494 "$prog:$test{':long-name'}: can't chmod $perm $name - $!\n"; 498 if (!mkdir($name, $perm)) { 500 "$prog:$test{':long-name'}: can't mkdir $perm $name - $!\n"; 504 local($oumask) = umask($perm); 998 local($type, $perm, $rest, $c, $len, $name); 1006 ($type, $perm, $rest) = ($1, $2, $3); [all …]
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
D | AccessControlExceptionTest.java | 46 Permission perm = new AllPermission(); in testAccessControlExceptionStringPermission() local 47 new AccessControlException("001", perm); in testAccessControlExceptionStringPermission() 54 Permission perm = new UnresolvedPermission("unresolvedType", in testGetPermission() local 56 AccessControlException ex = new AccessControlException("001", perm); in testGetPermission() 57 assertSame(ex.getPermission(), perm); in testGetPermission() local
|
/external/eigen/Eigen/src/SparseCore/ |
D | SparseSelfAdjointView.h | 42 …::Scalar,DestOrder,typename MatrixType::Index>& _dest, const typename MatrixType::Index* perm = 0); 45 …::Scalar,DestOrder,typename MatrixType::Index>& _dest, const typename MatrixType::Index* perm = 0); 138 …oduct<_MatrixTypeNested,UpLo> twistedBy(const PermutationMatrix<Dynamic,Dynamic,Index>& perm) const 140 return SparseSymmetricPermutationProduct<_MatrixTypeNested,UpLo>(m_matrix, perm); 314 …xType::Scalar,DestOrder,typename MatrixType::Index>& _dest, const typename MatrixType::Index* perm) 333 Index jp = perm ? perm[j] : j; 339 Index ip = perm ? perm[i] : i; 370 Index jp = perm ? perm[j] : j; 371 Index ip = perm ? perm[i] : i; 401 …ixType::Scalar,DstOrder,typename MatrixType::Index>& _dest, const typename MatrixType::Index* perm) [all …]
|
D | SparsePermutation.h | 48 permut_sparsematrix_product_retval(const PermutationType& perm, const MatrixType& matrix) 49 : m_permutation(perm), m_matrix(matrix) 82 PermutationMatrix<Dynamic,Dynamic,Index> perm; 84 perm = m_permutation; 86 perm = m_permutation.transpose(); 90 sizes[perm.indices().coeff(it.index())]++; 94 tmp.insertByOuterInner(perm.indices().coeff(it.index()),j) = it.value(); 112 operator*(const SparseMatrixBase<SparseDerived>& matrix, const PermutationBase<PermDerived>& perm) 114 …uct_retval<PermutationBase<PermDerived>, SparseDerived, OnTheRight, false>(perm, matrix.derived()); 121 operator*( const PermutationBase<PermDerived>& perm, const SparseMatrixBase<SparseDerived>& matrix) [all …]
|
D | SparseColEtree.h | 61 …MatrixType& mat, IndexVector& parent, IndexVector& firstRowElt, typename MatrixType::Index *perm=0) 81 if(perm) pcol = perm[col]; 103 if(perm) pcol = perm[col];
|
/external/apache-harmony/security/src/test/api/java/tests/api/java/security/ |
D | AccessControlContextTest.java | 37 final Permission perm = new PropertyPermission("java.class.path", in test_Constructor$Ljava_security_ProtectionDomain() local 39 PermissionCollection col = perm.newPermissionCollection(); in test_Constructor$Ljava_security_ProtectionDomain() 40 col.add(perm); in test_Constructor$Ljava_security_ProtectionDomain() 45 acc.checkPermission(perm); in test_Constructor$Ljava_security_ProtectionDomain() 56 acc.checkPermission(perm); in test_Constructor$Ljava_security_ProtectionDomain()
|
/external/skia/src/ports/ |
D | SkOSFile_stdio.cpp | 23 static FILE* ios_open_from_bundle(const char path[], const char* perm) { in ios_open_from_bundle() argument 43 return fopen(finalPath, perm); in ios_open_from_bundle() 49 char perm[4]; in sk_fopen() local 50 char* p = perm; in sk_fopen() 67 file = ios_open_from_bundle(path, perm); in sk_fopen() 72 file = fopen(path, perm); in sk_fopen() 78 path, perm, errno, strerror(errno))); in sk_fopen()
|
/external/selinux/libsepol/src/ |
D | avrule_block.c | 180 perm_datum_t *perm; in is_perm_enabled() local 189 perm = hashtab_search(cladatum->permissions.table, perm_id); in is_perm_enabled() 190 if (perm == NULL && cladatum->comdatum != 0) { in is_perm_enabled() 193 perm = in is_perm_enabled() 197 if (perm == NULL) { in is_perm_enabled()
|
/external/toybox/tests/ |
D | find.test | 13 mkdir perm 14 touch perm/all-read-only 15 chmod a=r perm/all-read-only
|
/external/libunwind/src/ |
D | os-linux.h | 209 char perm[16], dash = 0, colon = 0, *cp; in maps_next() local 269 cp = scan_string (cp, perm, sizeof (perm)); in maps_next() 284 if (perm[0] == 'r') in maps_next() 288 if (perm[1] == 'w') in maps_next() 292 if (perm[2] == 'x') in maps_next()
|
/external/libselinux/src/ |
D | checkAccess.c | 20 int selinux_check_access(const char * scon, const char * tcon, const char *class, const char *perm,… in selinux_check_access() argument 50 av = string_to_av_perm(sclass, perm); in selinux_check_access() 53 avc_log(SELINUX_ERROR, "Unknown permission %s for class %s", perm, class); in selinux_check_access()
|
/external/selinux/sepolgen/tests/ |
D | test_objectmodel.py | 31 self.assertEqual(pm.perm, "mount") 38 self.assertEqual(pm.perm, "foo") 43 self.assertEqual(pm.perm, "bar")
|