/external/selinux/sepolgen/tests/ |
D | test_access.py | 33 self.assertTrue(isinstance(a.perms, refpolicy.IdSet)) 42 a.perms.update(["read", "write"]) 48 self.assertEqual(a.perms, l.perms) 55 a.perms.update(["read", "write"]) 62 self.assertEqual(a.perms, l.perms) 69 a.perms.update(["read", "write"]) 75 perms = l[3:] 76 perms.sort() 77 self.assertEqual(perms[0], "read") 78 self.assertEqual(perms[1], "write") [all …]
|
D | test_refpolicy.py | 82 self.assertTrue(isinstance(o.perms, set)) 91 self.assertTrue(isinstance(a.perms, set)) 98 a.perms.add("read") 105 a.perms.add("write") 139 a.perms.add("read") 155 a.perms.add("write")
|
/external/selinux/sepolgen/src/sepolgen/ |
D | access.py | 89 self.perms = refpolicy.IdSet() 120 self.perms = refpolicy.IdSet(list[3:]) 131 l.extend(self.perms) 139 self.obj_class, self.perms.to_space_str()) 143 x = list(self.perms) 145 y = list(other.perms) 176 access.perms = avrule.perms.copy() 260 …def add(self, src_type, tgt_type, obj_class, perms, audit_msg=None, avc_type=audit2why.TERULE, dat… argument 277 access.perms.update(perms) 283 self.add(av.src_type, av.tgt_type, av.obj_class, av.perms) [all …]
|
D | matching.py | 115 diff = av_req.perms.difference(av_prov.perms) 121 diff = av_prov.perms.difference(av_req.perms) 180 pdist = self.perm_maps.getdefault_distance(prov.obj_class, prov.perms) 221 av_dir = self.perm_maps.getdefault_direction(av.obj_class, av.perms) 227 self.perm_maps.getdefault_direction(x.obj_class, x.perms)
|
D | objectmodel.py | 156 def getdefault_direction(self, obj, perms): argument 158 for perm in perms: 163 def getdefault_distance(self, obj, perms): argument 165 for perm in perms:
|
D | refpolicy.py | 345 self.perms = IdSet() 457 self.perms = IdSet() 480 self.perms.update(av.perms) 491 self.perms.to_space_str()) 823 for perm in x.perms: 846 def add_obj_class(self, obj_class, perms): argument 848 p.update(perms) 856 for obj_class, perms in self.obj_classes.items(): 857 s.append("\tclass %s %s;" % (obj_class, perms.to_space_str())) 876 self.perms = set() [all …]
|
D | policygen.py | 184 "write" in av.perms and 185 ( "dir" in av.obj_class or "open" in av.perms )): 190 …ONTEXT] for x in sesearch([ALLOW], {SCONTEXT: av.src_type, CLASS: av.obj_class, PERMS: av.perms})]: 269 (av.src_type, av.tgt_type, av.obj_class, av.perms.to_space_str())) 379 r.add_obj_class(obj, avrule.perms)
|
/external/selinux/libsepol/src/ |
D | assertion.c | 41 const class_perm_node_t *curperm, uint32_t perms) in report_failure() argument 49 sepol_av_to_string(p, curperm->tclass, perms)); in report_failure() 55 sepol_av_to_string(p, curperm->tclass, perms)); in report_failure() 61 sepol_av_to_string(p, curperm->tclass, perms)); in report_failure() 94 rc = extended_permissions_and(neverallow->perms, allow->perms); in check_extended_permissions() 97 rc = xperm_test(neverallow->driver, allow->perms); in check_extended_permissions() 100 rc = xperm_test(allow->driver, neverallow->perms); in check_extended_permissions() 103 rc = extended_permissions_and(neverallow->perms, allow->perms); in check_extended_permissions() 120 result->perms[i] = neverallow->perms[i] & allow->perms[i]; in extended_permissions_violated() 125 memcpy(result->perms, neverallow->perms, sizeof(result->perms)); in extended_permissions_violated() [all …]
|
D | util.c | 145 for (bit = 0; bit < sizeof(xperms->perms)*8; bit++) { in sepol_extended_perms_to_string() 146 if (!xperm_test(bit, xperms->perms)) in sepol_extended_perms_to_string() 149 if (in_range && next_bit_in_range(bit, xperms->perms)) { in sepol_extended_perms_to_string() 152 } else if (next_bit_in_range(bit, xperms->perms)) { in sepol_extended_perms_to_string()
|
/external/libselinux/src/ |
D | mapping.c | 20 access_vector_t perms[sizeof(access_vector_t) * 8]; member 69 while (p_in->perms[k]) { in selinux_set_mapping() 71 if (!*p_in->perms[k]) { in selinux_set_mapping() 75 p_out->perms[k] = string_to_av_perm(p_out->value, in selinux_set_mapping() 76 p_in->perms[k]); in selinux_set_mapping() 77 if (!p_out->perms[k]) in selinux_set_mapping() 123 kperm |= current_mapping[tclass].perms[i]; in unmap_perm() 168 if (kperm & current_mapping[tclass].perms[i]) { in map_perm() 170 kperm &= ~current_mapping[tclass].perms[i]; in map_perm() 191 if (avd->allowed & current_mapping[tclass].perms[i]) in map_decision() [all …]
|
D | avc.c | 43 security_class_t tclass, access_vector_t perms, 49 access_vector_t perms; member 858 access_vector_t perms, in avc_add_callback() argument 862 security_class_t tclass, access_vector_t perms) in avc_add_callback() 878 c->perms = perms; in avc_add_callback() 891 access_vector_t perms) in avc_update_node() argument 895 node->ae.avd.allowed |= perms; in avc_update_node() 899 node->ae.avd.allowed &= ~perms; in avc_update_node() 902 node->ae.avd.auditallow |= perms; in avc_update_node() 905 node->ae.avd.auditallow &= ~perms; in avc_update_node() [all …]
|
D | stringrep.c | 25 char **perms; member 72 node->perms = calloc(MAXVECTORS,sizeof(char*)); in discover_class() 73 if (node->perms == NULL) in discover_class() 135 node->perms[value-1] = strdup(dentry->d_name); in discover_class() 136 if (node->perms[value-1] == NULL) in discover_class() 151 free(node->perms[i]); in discover_class() 155 free(node->perms); in discover_class() 186 for (i=0; i<MAXVECTORS && node->perms[i] != NULL; i++) in string_to_av_perm() 187 if (strcmp(node->perms[i],s) == 0) in string_to_av_perm() 220 return node->perms[i]; in security_av_perm_to_string()
|
D | avc_internal.h | 157 security_class_t tclass, access_vector_t perms, 161 access_vector_t perms, uint32_t seqno, 164 security_class_t tclass, access_vector_t perms, 168 security_class_t tclass, access_vector_t perms, 171 security_class_t tclass, access_vector_t perms,
|
/external/selinux/libselinux/src/ |
D | mapping.c | 20 access_vector_t perms[sizeof(access_vector_t) * 8]; member 69 while (p_in->perms[k]) { in selinux_set_mapping() 71 if (!*p_in->perms[k]) { in selinux_set_mapping() 75 p_out->perms[k] = string_to_av_perm(p_out->value, in selinux_set_mapping() 76 p_in->perms[k]); in selinux_set_mapping() 77 if (!p_out->perms[k]) in selinux_set_mapping() 123 kperm |= current_mapping[tclass].perms[i]; in unmap_perm() 168 if (kperm & current_mapping[tclass].perms[i]) { in map_perm() 170 kperm &= ~current_mapping[tclass].perms[i]; in map_perm() 191 if (avd->allowed & current_mapping[tclass].perms[i]) in map_decision() [all …]
|
D | avc.c | 43 security_class_t tclass, access_vector_t perms, 49 access_vector_t perms; member 913 access_vector_t perms, in avc_add_callback() argument 917 security_class_t tclass, access_vector_t perms) in avc_add_callback() 933 c->perms = perms; in avc_add_callback() 946 access_vector_t perms) in avc_update_node() argument 950 node->ae.avd.allowed |= perms; in avc_update_node() 954 node->ae.avd.allowed &= ~perms; in avc_update_node() 957 node->ae.avd.auditallow |= perms; in avc_update_node() 960 node->ae.avd.auditallow &= ~perms; in avc_update_node() [all …]
|
D | stringrep.c | 25 char **perms; member 72 node->perms = calloc(MAXVECTORS,sizeof(char*)); in discover_class() 73 if (node->perms == NULL) in discover_class() 135 node->perms[value-1] = strdup(dentry->d_name); in discover_class() 136 if (node->perms[value-1] == NULL) in discover_class() 151 free(node->perms[i]); in discover_class() 155 free(node->perms); in discover_class() 170 free(cur->perms[i]); in flush_class_cache() 172 free(cur->perms); in flush_class_cache() 229 for (i=0; i<MAXVECTORS && node->perms[i] != NULL; i++) in string_to_av_perm() [all …]
|
D | avc_internal.h | 157 security_class_t tclass, access_vector_t perms, 161 access_vector_t perms, uint32_t seqno, 164 security_class_t tclass, access_vector_t perms, 168 security_class_t tclass, access_vector_t perms, 171 security_class_t tclass, access_vector_t perms,
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
D | ProtectionDomainTest.java | 44 private PermissionCollection perms = null; field in ProtectionDomainTest 61 perms = allperm.newPermissionCollection(); in setUp() 62 perms.add(allperm); in setUp() 77 new ProtectionDomain(cs, perms); in testProtectionDomainCodeSourcePermissionCollection_00() 84 assertFalse(perms.isReadOnly()); in testProtectionDomainCodeSourcePermissionCollection_01() 85 new ProtectionDomain(null, perms); in testProtectionDomainCodeSourcePermissionCollection_01() 86 assertTrue(perms.isReadOnly()); in testProtectionDomainCodeSourcePermissionCollection_01() 96 new ProtectionDomain(null, perms, null, null); in testProtectionDomainCodeSourcePermissionCollectionClassLoaderPrincipalArray() 100 new ProtectionDomain(cs, perms, classldr, principals); in testProtectionDomainCodeSourcePermissionCollectionClassLoaderPrincipalArray() 125 assertSame(new ProtectionDomain(null, perms).getPermissions(), perms); in testGetPermissions() [all …]
|
/external/llvm/include/llvm/Support/ |
D | FileSystem.h | 73 enum perms { enum 98 inline perms operator|(perms l, perms r) { 99 return static_cast<perms>(static_cast<unsigned short>(l) | 102 inline perms operator&(perms l, perms r) { 103 return static_cast<perms>(static_cast<unsigned short>(l) & 106 inline perms &operator|=(perms &l, perms r) { 110 inline perms &operator&=(perms &l, perms r) { 114 inline perms operator~(perms x) { 115 return static_cast<perms>(~static_cast<unsigned short>(x)); 158 perms Perms; [all …]
|
/external/autotest/client/site_tests/security_SysVIPC/ |
D | security_SysVIPC.py | 20 expected_shm = set([ShmRecord(owner='cras', perms='640', 22 expected_sem = set([SemaphoreRecord(owner='root', perms='600')]) 57 perms = fields[3] 59 seen.add(ShmRecord(owner=owner, perms=perms, attached=attached)) 69 seen.add(SemaphoreRecord(owner=fields[2], perms=fields[3]))
|
/external/selinux/libsepol/cil/src/ |
D | cil_find.c | 149 cil_list_for_each(i1, cp1->perms) { in cil_classperms_match_any() 151 cil_list_for_each(i2, cp2->perms) { in cil_classperms_match_any() 172 cil_list_for_each(i, cp->perms) { in __cil_classperms_list_match_any() 201 cil_list_for_each(i, cp->perms) { in cil_classperms_list_match_any() 228 cil_list_for_each(i, cp->perms) { in __add_classes_from_classperms_list() 260 cil_symtab_map(&class->perms, __add_classes_from_map_perms, class_list); in cil_expand_class() 274 if (!ebitmap_match_any(px1->perms, px2->perms)) goto exit; in cil_permissionx_match_any() 331 if (cil_classperms_list_match_any(avrule->perms.classperms, target->perms.classperms)) { in cil_find_matching_avrule() 335 if (cil_permissionx_match_any(avrule->perms.x.permx, target->perms.x.permx)) { in cil_find_matching_avrule()
|
D | cil_post.c | 756 permx->perms = cil_malloc(sizeof(*permx->perms)); in __evaluate_permissionx_expression() 757 ebitmap_init(permx->perms); in __evaluate_permissionx_expression() 759 …rc = __cil_expr_to_bitmap(permx->expr_str, permx->perms, 0x10000, db); // max is one more than 0xF… in __evaluate_permissionx_expression() 762 ebitmap_destroy(permx->perms); in __evaluate_permissionx_expression() 763 free(permx->perms); in __evaluate_permissionx_expression() 764 permx->perms = NULL; in __evaluate_permissionx_expression() 1224 if (rule->perms.x.permx_str == NULL) { in __cil_post_db_attr_helper() 1225 rc = __evaluate_permissionx_expression(rule->perms.x.permx, db); in __cil_post_db_attr_helper() 1675 ebitmap_t *perms; member 1682 ebitmap_t *perms = perm_args->perms; in __perm_bits_to_list() local [all …]
|
/external/autotest/client/site_tests/security_RuntimeExecStack/ |
D | security_RuntimeExecStack.py | 44 perms = line.split(' ', 2)[1] 47 if 'x' in perms: 51 if not 'w' in perms:
|
/external/tlsdate/src/ |
D | tlsdate-setter.c | 83 const mode_t perms = S_IRUSR | S_IWUSR | S_IRGRP | S_IROTH; in time_setter_coprocess() local 87 perms)) < 0 || in time_setter_coprocess() 88 fchmod (save_fd, perms) != 0) in time_setter_coprocess()
|
/external/autotest/client/site_tests/security_ASLR/ |
D | security_ASLR.py | 262 perms = result['perms'] 264 is_useful = re.search('x', perms) is not None or is_memory 293 perms = r'(?P<perms>(r|-)(w|-)(x|-)(s|p))' 298 regex = r'%s +%s +%s +%s +%s +%s' % (memory, perms, something,
|