/third_party/selinux/libselinux/src/ |
D | avc.c | 22 security_class_t tclass; member 43 security_class_t tclass, access_vector_t perms, 48 security_class_t tclass; member 63 security_id_t tsid, security_class_t tclass) in avc_hash() argument 65 return ((uintptr_t) ssid ^ ((uintptr_t) tsid << 2) ^ tclass) in avc_hash() 346 security_class_t tclass) in avc_claim_node() argument 364 hvalue = avc_hash(ssid, tsid, tclass); in avc_claim_node() 369 new->ae.tclass = tclass; in avc_claim_node() 379 security_class_t tclass, in avc_search_node() argument 386 hvalue = avc_hash(ssid, tsid, tclass); in avc_search_node() [all …]
|
D | mapping.c | 125 unmap_class(security_class_t tclass) in unmap_class() argument 127 if (tclass < current_mapping_size) in unmap_class() 128 return current_mapping[tclass].value; in unmap_class() 136 return tclass; in unmap_class() 140 unmap_perm(security_class_t tclass, access_vector_t tperm) in unmap_perm() argument 142 if (tclass < current_mapping_size) { in unmap_perm() 146 for (i = 0; i < current_mapping[tclass].num_perms; i++) in unmap_perm() 148 kperm |= current_mapping[tclass].perms[i]; in unmap_perm() 186 map_perm(security_class_t tclass, access_vector_t kperm) in map_perm() argument 188 if (tclass < current_mapping_size) { in map_perm() [all …]
|
D | stringrep.c | 222 access_vector_t string_to_av_perm(security_class_t tclass, const char *s) in string_to_av_perm() argument 225 security_class_t kclass = unmap_class(tclass); in string_to_av_perm() 232 return map_perm(tclass, UINT32_C(1)<<i); in string_to_av_perm() 239 const char *security_class_to_string(security_class_t tclass) in security_class_to_string() argument 243 tclass = unmap_class(tclass); in security_class_to_string() 245 node = get_class_cache_entry_value(tclass); in security_class_to_string() 252 const char *security_av_perm_to_string(security_class_t tclass, in security_av_perm_to_string() argument 258 av = unmap_perm(tclass, av); in security_av_perm_to_string() 259 tclass = unmap_class(tclass); in security_av_perm_to_string() 261 node = get_class_cache_entry_value(tclass); in security_av_perm_to_string() [all …]
|
D | compute_av.c | 15 security_class_t tclass, in security_compute_av_flags_raw() argument 42 kclass = unmap_class(tclass); in security_compute_av_flags_raw() 44 kclass, unmap_perm(tclass, requested)); in security_compute_av_flags_raw() 73 map_decision(tclass, avd); in security_compute_av_flags_raw() 86 security_class_t tclass, in security_compute_av_raw() argument 93 ret = security_compute_av_flags_raw(scon, tcon, tclass, in security_compute_av_raw() 112 security_class_t tclass, in security_compute_av_flags() argument 126 ret = security_compute_av_flags_raw(rscon, rtcon, tclass, in security_compute_av_flags() 138 security_class_t tclass, in security_compute_av() argument 144 ret = security_compute_av_flags(scon, tcon, tclass, in security_compute_av()
|
D | compute_create.c | 53 security_class_t tclass, in security_compute_create_name_raw() argument 79 scon, tcon, unmap_class(tclass)); in security_compute_create_name_raw() 111 security_class_t tclass, in security_compute_create_raw() argument 114 return security_compute_create_name_raw(scon, tcon, tclass, in security_compute_create_raw() 120 security_class_t tclass, in security_compute_create_name() argument 136 ret = security_compute_create_name_raw(rscon, rtcon, tclass, in security_compute_create_name() 150 security_class_t tclass, in security_compute_create() argument 153 return security_compute_create_name(scon, tcon, tclass, NULL, newcon); in security_compute_create()
|
D | mapping.h | 16 unmap_class(security_class_t tclass); 19 unmap_perm(security_class_t tclass, access_vector_t tperm); 29 map_perm(security_class_t tclass, access_vector_t kperm); 32 map_decision(security_class_t tclass, struct av_decision *avd);
|
D | validatetrans.c | 15 security_class_t tclass, in security_validatetrans_raw() argument 41 bufsz = snprintf(buf, size, "%s %s %hu %s", scon, tcon, unmap_class(tclass), newcon); in security_validatetrans_raw() 63 security_class_t tclass, in security_validatetrans() argument 83 ret = security_validatetrans_raw(rscon, rtcon, tclass, rnewcon); in security_validatetrans()
|
D | compute_relabel.c | 15 security_class_t tclass, in security_compute_relabel_raw() argument 39 snprintf(buf, size, "%s %s %hu", scon, tcon, unmap_class(tclass)); in security_compute_relabel_raw() 66 security_class_t tclass, in security_compute_relabel() argument 81 ret = security_compute_relabel_raw(rscon, rtcon, tclass, &rnewcon); in security_compute_relabel()
|
D | compute_member.c | 15 security_class_t tclass, in security_compute_member_raw() argument 39 snprintf(buf, size, "%s %s %hu", scon, tcon, unmap_class(tclass)); in security_compute_member_raw() 66 security_class_t tclass, in security_compute_member() argument 81 ret = security_compute_member_raw(rscon, rtcon, tclass, &rnewcon); in security_compute_member()
|
D | avc_internal.h | 166 security_class_t tclass, access_vector_t perms, 169 security_class_t tclass, 173 security_class_t tclass, access_vector_t perms, 177 security_class_t tclass, access_vector_t perms, 180 security_class_t tclass, access_vector_t perms,
|
D | audit2why.c | 46 sepol_security_class_t tclass; member 112 rc = sepol_compute_av_reason(avc->ssid, avc->tsid, avc->tclass, in check_booleans() 320 sepol_security_class_t tclass; in analyze() local 346 rc = sepol_string_to_security_class(tclassstr, &tclass); in analyze() 368 rc = sepol_string_to_av_perm(tclass, permstr, &perm); in analyze() 376 rc = sepol_compute_av_reason_buffer(ssid, tsid, tclass, av, &avd, &reason, &reason_buf, 0); in analyze() 386 avc->tclass = tclass; in analyze()
|
/third_party/selinux/libselinux/include/selinux/ |
D | selinux.h | 192 security_class_t tclass, 197 security_class_t tclass, 203 security_class_t tclass, 208 security_class_t tclass, 216 security_class_t tclass, 220 security_class_t tclass, 224 security_class_t tclass, 229 security_class_t tclass, 237 security_class_t tclass, 241 security_class_t tclass, [all …]
|
D | avc.h | 274 security_class_t tclass, 297 security_class_t tclass, access_vector_t requested, 320 security_class_t tclass, access_vector_t requested, 339 security_class_t tclass, security_id_t * newsid); 357 security_class_t tclass, security_id_t * newsid); 390 security_id_t tsid, security_class_t tclass, 394 security_id_t tsid, security_class_t tclass,
|
/third_party/selinux/libselinux/utils/ |
D | compute_av.c | 12 security_class_t tclass; in main() local 31 tclass = string_to_security_class(argv[3]); in main() 32 if (!tclass) { in main() 37 ret = security_compute_av(argv[1], argv[2], tclass, 1, &avd); in main() 44 print_access_vector(tclass, avd.allowed); in main() 49 print_access_vector(tclass, avd.decided); in main() 55 print_access_vector(tclass, avd.auditallow); in main() 61 print_access_vector(tclass, avd.auditdeny); in main()
|
D | validatetrans.c | 11 security_class_t tclass; in main() local 30 tclass = string_to_security_class(argv[3]); in main() 31 if (!tclass) { in main() 41 ret = security_validatetrans(argv[1], argv[2], tclass, argv[4]); in main()
|
D | compute_create.c | 12 security_class_t tclass; in main() local 31 tclass = string_to_security_class(argv[3]); in main() 32 if (!tclass) { in main() 37 ret = security_compute_create(argv[1], argv[2], tclass, &buf); in main()
|
D | compute_relabel.c | 12 security_class_t tclass; in main() local 31 tclass = string_to_security_class(argv[3]); in main() 32 if (!tclass) { in main() 37 ret = security_compute_relabel(argv[1], argv[2], tclass, &buf); in main()
|
D | compute_member.c | 12 security_class_t tclass; in main() local 31 tclass = string_to_security_class(argv[3]); in main() 32 if (!tclass) { in main() 37 ret = security_compute_member(argv[1], argv[2], tclass, &buf); in main()
|
/third_party/selinux/libsepol/include/sepol/policydb/ |
D | services.h | 43 sepol_security_class_t tclass, /* IN */ 55 sepol_security_class_t tclass, 71 sepol_security_class_t tclass, 87 sepol_security_class_t tclass, 96 sepol_security_class_t *tclass); 102 extern int sepol_string_to_av_perm(sepol_security_class_t tclass, 112 extern const char *sepol_av_perm_to_string(sepol_security_class_t tclass, 121 sepol_security_class_t tclass, /* IN */ 131 sepol_security_class_t tclass, /* IN */ 140 sepol_security_class_t tclass, /* IN */
|
/third_party/selinux/libsepol/utils/ |
D | sepol_compute_av.c | 14 sepol_security_class_t tclass; in main() local 45 if (sepol_string_to_security_class(argv[4], &tclass) < 0) { in main() 50 rc = sepol_compute_av(ssid, tsid, tclass, 0, &avd); in main() 53 printf("allowed: %s\n", sepol_av_perm_to_string(tclass, avd.allowed)); in main() 54 printf("decided: %s\n", sepol_av_perm_to_string(tclass, avd.decided)); in main() 55 printf("auditallow: %s\n", sepol_av_perm_to_string(tclass, avd.auditallow)); in main() 56 printf("auditdeny: %s\n", sepol_av_perm_to_string(tclass, avd.auditdeny)); in main()
|
D | sepol_check_access.c | 14 sepol_security_class_t tclass; in main() local 49 if (sepol_string_to_security_class(argv[4], &tclass) < 0) { in main() 70 if (sepol_string_to_av_perm(tclass, perm, &av) < 0) { in main() 86 if (sepol_compute_av_reason_buffer(ssid, tsid, tclass, av, &avd, &reason, &reason_buf, 0) < 0) { in main()
|
/third_party/selinux/libsepol/src/ |
D | services.c | 287 static char *get_class_info(sepol_security_class_t tclass, in get_class_info() argument 342 policydb->p_class_val_to_name[tclass - 1]); in get_class_info() 351 sepol_av_to_string(policydb, tclass, in get_class_info() 387 sepol_security_class_t tclass, in constraint_expr_eval_reason() argument 432 class_buf = get_class_info(tclass, constraint, xcontext); in constraint_expr_eval_reason() 842 sepol_security_class_t tclass, 851 sepol_security_class_t tclass, in type_attribute_bounds_av() argument 882 tclass, in type_attribute_bounds_av() 906 sepol_security_class_t tclass, in context_struct_compute_av() argument 922 if (!tclass || tclass > policydb->p_classes.nprim) { in context_struct_compute_av() [all …]
|
D | assertion.c | 56 p->p_class_val_to_name[curperm->tclass - 1], in report_failure() 57 sepol_av_to_string(p, curperm->tclass, perms)); in report_failure() 62 p->p_class_val_to_name[curperm->tclass - 1], in report_failure() 63 sepol_av_to_string(p, curperm->tclass, perms)); in report_failure() 68 p->p_class_val_to_name[curperm->tclass - 1], in report_failure() 69 sepol_av_to_string(p, curperm->tclass, perms)); in report_failure() 76 if ((cp->tclass == class) && (cp->data & data)) in match_any_class_permissions() 187 p->p_class_val_to_name[curperm->tclass - 1], in report_assertion_extended_permissions() 203 p->p_class_val_to_name[curperm->tclass - 1], in report_assertion_extended_permissions() 204 sepol_av_to_string(p, curperm->tclass, perms)); in report_assertion_extended_permissions() [all …]
|
/third_party/selinux/checkpolicy/ |
D | checkpolicy.c | 385 sepol_security_class_t tclass; in main() local 765 tclass = atoi(ans); in main() 766 if (!tclass in main() 767 || tclass > policydb.p_classes.nprim) { in main() 772 policydb.class_val_to_struct[tclass - 1]; in main() 784 tclass = cladatum->s.value; in main() 792 ret = sepol_compute_av(ssid, tsid, tclass, 0, &avd); in main() 881 tclass = atoi(ans); in main() 882 if (!tclass in main() 883 || tclass > policydb.p_classes.nprim) { in main() [all …]
|
/third_party/gstreamer/gstreamer/gst/ |
D | gsttask.h | 44 #define GST_TASK_CLASS(tclass) (G_TYPE_CHECK_CLASS_CAST ((tclass), GST_TYPE_TASK, GstTaskC… argument 45 #define GST_IS_TASK_CLASS(tclass) (G_TYPE_CHECK_CLASS_TYPE ((tclass), GST_TYPE_TASK)) argument
|