/external/libcxx/test/std/input.output/filesystems/fs.op.funcs/fs.op.permissions/ |
D | permissions.pass.cpp | 29 using PR = fs::perms; 36 const perms pr{}; ((void)pr); in TEST_CASE() 47 auto checkThrow = [](path const& f, fs::perms opts, in TEST_CASE() 70 fs::permissions(dne, fs::perms{}, ec); in TEST_CASE() 73 TEST_CHECK(checkThrow(dne, fs::perms{}, ec)); in TEST_CASE() 77 fs::permissions(dne_sym, fs::perms{}, ec); in TEST_CASE() 80 TEST_CHECK(checkThrow(dne_sym, fs::perms{}, ec)); in TEST_CASE() 96 perms set_perms; in TEST_CASE() 97 perms expected; in TEST_CASE() 99 TestCase(path xp, perms xperms, perms xexpect, in TEST_CASE() [all …]
|
/external/selinux/libselinux/src/ |
D | mapping.c | 23 access_vector_t perms[sizeof(access_vector_t) * 8]; member 83 while (p_in->perms[k]) { in selinux_set_mapping() 85 if (!*p_in->perms[k]) { in selinux_set_mapping() 89 p_out->perms[k] = string_to_av_perm(p_out->value, in selinux_set_mapping() 90 p_in->perms[k]); in selinux_set_mapping() 91 if (!p_out->perms[k]) { in selinux_set_mapping() 94 p_in->perms[k], p_in->name); in selinux_set_mapping() 148 kperm |= current_mapping[tclass].perms[i]; in unmap_perm() 193 if (kperm & current_mapping[tclass].perms[i]) { in map_perm() 195 kperm &= ~current_mapping[tclass].perms[i]; in map_perm() [all …]
|
D | avc.c | 43 security_class_t tclass, access_vector_t perms, 49 access_vector_t perms; member 917 access_vector_t perms, in avc_add_callback() argument 921 security_class_t tclass, access_vector_t perms) in avc_add_callback() 937 c->perms = perms; in avc_add_callback() 950 access_vector_t perms) in avc_update_node() argument 954 node->ae.avd.allowed |= perms; in avc_update_node() 958 node->ae.avd.allowed &= ~perms; in avc_update_node() 961 node->ae.avd.auditallow |= perms; in avc_update_node() 964 node->ae.avd.auditallow &= ~perms; in avc_update_node() [all …]
|
D | stringrep.c | 25 char **perms; member 72 node->perms = calloc(MAXVECTORS,sizeof(char*)); in discover_class() 73 if (node->perms == NULL) in discover_class() 135 node->perms[value-1] = strdup(dentry->d_name); in discover_class() 136 if (node->perms[value-1] == NULL) in discover_class() 151 free(node->perms[i]); in discover_class() 155 free(node->perms); in discover_class() 170 free(cur->perms[i]); in selinux_flush_class_cache() 172 free(cur->perms); in selinux_flush_class_cache() 231 for (i = 0; i < MAXVECTORS && node->perms[i] != NULL; i++) in string_to_av_perm() [all …]
|
/external/selinux/python/sepolgen/src/sepolgen/ |
D | access.py | 90 self.perms = refpolicy.IdSet() 123 self.perms = refpolicy.IdSet(list[3:]) 134 l.extend(sorted(self.perms)) 139 self.perms.update(av.perms) 151 self.obj_class, self.perms.to_space_str()) 155 x = list(self.perms) 157 y = list(other.perms) 188 access.perms = avrule.perms.copy() 272 …def add(self, src_type, tgt_type, obj_class, perms, audit_msg=None, avc_type=audit2why.TERULE, dat… argument 279 av.perms = perms [all …]
|
D | matching.py | 115 diff = av_req.perms.difference(av_prov.perms) 121 diff = av_prov.perms.difference(av_req.perms) 180 pdist = self.perm_maps.getdefault_distance(prov.obj_class, prov.perms) 221 av_dir = self.perm_maps.getdefault_direction(av.obj_class, av.perms) 227 self.perm_maps.getdefault_direction(x.obj_class, x.perms)
|
/external/selinux/python/sepolgen/tests/ |
D | test_access.py | 33 self.assertTrue(isinstance(a.perms, refpolicy.IdSet)) 43 a.perms.update(["read", "write"]) 49 self.assertEqual(a.perms, l.perms) 56 a.perms.update(["read", "write"]) 63 self.assertEqual(a.perms, l.perms) 74 a.perms.update(["read", "write"]) 80 perms = l[3:] 81 perms.sort() 82 self.assertEqual(perms[0], "read") 83 self.assertEqual(perms[1], "write") [all …]
|
/external/selinux/libsepol/src/ |
D | assertion.c | 41 const class_perm_node_t *curperm, uint32_t perms) in report_failure() argument 49 sepol_av_to_string(p, curperm->tclass, perms)); in report_failure() 55 sepol_av_to_string(p, curperm->tclass, perms)); in report_failure() 61 sepol_av_to_string(p, curperm->tclass, perms)); in report_failure() 94 rc = extended_permissions_and(neverallow->perms, allow->perms); in check_extended_permissions() 97 rc = xperm_test(neverallow->driver, allow->perms); in check_extended_permissions() 100 rc = xperm_test(allow->driver, neverallow->perms); in check_extended_permissions() 103 rc = extended_permissions_and(neverallow->perms, allow->perms); in check_extended_permissions() 120 result->perms[i] = neverallow->perms[i] & allow->perms[i]; in extended_permissions_violated() 125 memcpy(result->perms, neverallow->perms, sizeof(result->perms)); in extended_permissions_violated() [all …]
|
/external/u-boot/drivers/spmi/ |
D | spmi-sandbox.c | 31 u8 perms; /* Access permissions */ member 76 if (regs[off].perms & EMUL_PERM_W) in sandbox_spmi_write() 101 if (regs[off].perms & EMUL_PERM_R) in sandbox_spmi_read() 120 regs[4].perms = EMUL_PERM_R; in sandbox_spmi_probe() 122 regs[5].perms = EMUL_PERM_R; in sandbox_spmi_probe() 125 regs[8].perms = EMUL_PERM_RW; in sandbox_spmi_probe() 127 regs[0x40].perms = EMUL_PERM_RW; in sandbox_spmi_probe() 129 regs[0x41].perms = EMUL_PERM_RW; in sandbox_spmi_probe() 131 regs[0x42].perms = EMUL_PERM_RW; in sandbox_spmi_probe() 134 regs[0x45].perms = EMUL_PERM_RW; in sandbox_spmi_probe() [all …]
|
/external/libcxx/test/std/input.output/filesystems/fs.op.funcs/fs.op.symlink_status/ |
D | symlink_status.pass.cpp | 48 TEST_CHECK(st.permissions() == perms::unknown); in TEST_CASE() 53 TEST_CHECK(st.permissions() == perms::unknown); in TEST_CASE() 64 permissions(dir, perms::none); in TEST_CASE() 81 TEST_CHECK(st.permissions() == perms::unknown); in TEST_CASE() 102 TEST_CHECK(st.permissions() != perms::unknown); in TEST_CASE() 106 TEST_CHECK(st.permissions() != perms::unknown); in TEST_CASE() 136 TEST_CHECK(st.permissions() != perms::unknown); in TEST_CASE() 140 TEST_CHECK(st.permissions() != perms::unknown); in TEST_CASE() 170 TEST_CHECK(st.permissions() != perms::unknown); in TEST_CASE() 174 TEST_CHECK(st.permissions() != perms::unknown); in TEST_CASE() [all …]
|
/external/libcxx/test/std/input.output/filesystems/class.file_status/ |
D | file_status.cons.pass.cpp | 36 assert(f.permissions() == perms::unknown); in main() 48 assert(f.permissions() == perms::unknown); in main() 52 static_assert(std::is_nothrow_constructible<file_status, file_type, perms>::value, in main() 54 static_assert(!test_convertible<file_status, file_type, perms>(), in main() 56 const file_status f(file_type::regular, perms::owner_read); in main() 58 assert(f.permissions() == perms::owner_read); in main()
|
D | file_status.mods.pass.cpp | 41 static_assert(noexcept(st.permissions(perms::owner_read)), in main() 43 static_assert(std::is_same<decltype(st.permissions(perms::owner_read)), void>::value, in main() 45 assert(st.permissions() != perms::owner_read); in main() 46 st.permissions(perms::owner_read); in main() 47 assert(st.permissions() == perms::owner_read); in main()
|
D | file_status.obs.pass.cpp | 27 const file_status st(file_type::regular, perms::owner_read); in main() 41 static_assert(std::is_same<decltype(st.permissions()), perms>::value, in main() 43 assert(st.permissions() == perms::owner_read); in main()
|
/external/swiftshader/third_party/llvm-7.0/llvm/include/llvm/Support/ |
D | FileSystem.h | 87 enum perms { enum 113 inline perms operator|(perms l, perms r) { 114 return static_cast<perms>(static_cast<unsigned short>(l) | 117 inline perms operator&(perms l, perms r) { 118 return static_cast<perms>(static_cast<unsigned short>(l) & 121 inline perms &operator|=(perms &l, perms r) { 125 inline perms &operator&=(perms &l, perms r) { 129 inline perms operator~(perms x) { 131 return static_cast<perms>( 175 perms Perms = perms_not_known; [all …]
|
/external/swiftshader/third_party/llvm-subzero/include/llvm/Support/ |
D | FileSystem.h | 75 enum perms { enum 100 inline perms operator|(perms l, perms r) { 101 return static_cast<perms>(static_cast<unsigned short>(l) | 104 inline perms operator&(perms l, perms r) { 105 return static_cast<perms>(static_cast<unsigned short>(l) & 108 inline perms &operator|=(perms &l, perms r) { 112 inline perms &operator&=(perms &l, perms r) { 116 inline perms operator~(perms x) { 117 return static_cast<perms>(~static_cast<unsigned short>(x)); 165 perms Perms; [all …]
|
/external/llvm/include/llvm/Support/ |
D | FileSystem.h | 76 enum perms { enum 101 inline perms operator|(perms l, perms r) { 102 return static_cast<perms>(static_cast<unsigned short>(l) | 105 inline perms operator&(perms l, perms r) { 106 return static_cast<perms>(static_cast<unsigned short>(l) & 109 inline perms &operator|=(perms &l, perms r) { 113 inline perms &operator&=(perms &l, perms r) { 117 inline perms operator~(perms x) { 118 return static_cast<perms>(~static_cast<unsigned short>(x)); 164 perms Perms; [all …]
|
/external/libcxx/test/std/input.output/filesystems/class.directory_entry/directory_entry.mods/ |
D | refresh.pass.cpp | 70 const perms old_perms = status(dir).permissions(); in TEST_CASE() 80 permissions(dir, perms::none); in TEST_CASE() 94 permissions(dir, perms::none); in TEST_CASE() 111 const perms old_perms = status(dir).permissions(); in TEST_CASE() 124 LIBCPP_ONLY(permissions(dir, perms::none)); in TEST_CASE() 144 LIBCPP_ONLY(permissions(dir, perms::none)); in TEST_CASE() 157 perms old_perms = status(dir).permissions(); in TEST_CASE() 161 permissions(dir, perms::none); in TEST_CASE() 178 permissions(dir, perms::none); in TEST_CASE() 193 permissions(dir, perms::none); in TEST_CASE() [all …]
|
/external/ltp/testcases/cve/ |
D | cve-2016-10044.c | 33 char perms[8], line[BUFSIZ]; in run() local 47 if (sscanf(line, "%*x-%*x %s7", perms) < 0) in run() 49 if (strchr(perms, (int)'x')) in run() 50 tst_res(TFAIL, "AIO mapping is executable: %s!", perms); in run() 52 tst_res(TPASS, "AIO mapping is not executable: %s", perms); in run()
|
/external/tensorflow/tensorflow/lite/experimental/delegates/hexagon/builders/tests/ |
D | transpose_test.cc | 55 const std::vector<int>& perms, in ComputeExpectedTransposeResult() argument 71 RuntimeShape output_shape(perms.size()); in ComputeExpectedTransposeResult() 72 for (int i = 0; i < perms.size(); i++) { in ComputeExpectedTransposeResult() 73 output_shape.SetDim(i, input_shape.Dims(perms[i])); in ComputeExpectedTransposeResult() 77 params.perm_count = perms.size(); in ComputeExpectedTransposeResult() 78 for (int i = 0; i < perms.size(); ++i) { in ComputeExpectedTransposeResult() 79 params.perm[i] = perms[i]; in ComputeExpectedTransposeResult()
|
/external/libcxx/test/std/input.output/filesystems/fs.op.funcs/fs.op.status/ |
D | status.pass.cpp | 49 TEST_CHECK(st.permissions() == perms::unknown); in TEST_CASE() 54 TEST_CHECK(st.permissions() == perms::unknown); in TEST_CASE() 64 permissions(dir, perms::none); in TEST_CASE() 88 TEST_CHECK(st.permissions() == perms::unknown); in TEST_CASE() 128 TEST_CHECK(st.permissions() != perms::unknown); in TEST_CASE() 132 TEST_CHECK(st.permissions() != perms::unknown); in TEST_CASE() 159 TEST_CHECK(st.permissions() != perms::unknown); in TEST_CASE() 163 TEST_CHECK(st.permissions() != perms::unknown); in TEST_CASE()
|
/external/autotest/client/site_tests/security_SysVIPC/ |
D | security_SysVIPC.py | 20 expected_shm = set([ShmRecord(owner='cras', perms='640', 22 expected_sem = set([SemaphoreRecord(owner='root', perms='600')]) 57 perms = fields[3] 59 seen.add(ShmRecord(owner=owner, perms=perms, attached=attached)) 69 seen.add(SemaphoreRecord(owner=fields[2], perms=fields[3]))
|
/external/selinux/libsepol/cil/src/ |
D | cil_find.c | 153 cil_list_for_each(i1, cp1->perms) { in cil_classperms_match_any() 155 cil_list_for_each(i2, cp2->perms) { in cil_classperms_match_any() 176 cil_list_for_each(i, cp->perms) { in __cil_classperms_list_match_any() 205 cil_list_for_each(i, cp->perms) { in cil_classperms_list_match_any() 232 cil_list_for_each(i, cp->perms) { in __add_classes_from_classperms_list() 264 cil_symtab_map(&class->perms, __add_classes_from_map_perms, class_list); in cil_expand_class() 278 if (!ebitmap_match_any(px1->perms, px2->perms)) goto exit; in cil_permissionx_match_any() 335 if (cil_classperms_list_match_any(avrule->perms.classperms, target->perms.classperms)) { in cil_find_matching_avrule() 339 if (cil_permissionx_match_any(avrule->perms.x.permx, target->perms.x.permx)) { in cil_find_matching_avrule()
|
/external/libcxx/test/std/input.output/filesystems/fs.op.funcs/fs.op.create_directory/ |
D | create_directory.pass.cpp | 32 fs::perms read_umask() { in read_umask() 35 return static_cast<fs::perms>(old_mask); in read_umask() 77 const perms expect_perms = perms::all & ~(read_umask()); in TEST_CASE() 78 TEST_CHECK((st.permissions() & perms::all) == expect_perms); in TEST_CASE()
|
D | create_directory_with_attributes.pass.cpp | 45 const perms orig_p = status(dir).permissions(); in TEST_CASE() 46 permissions(dir2, perms::none); in TEST_CASE() 63 permissions(env.test_root, perms::set_gid, perm_options::remove); in TEST_CASE() 67 permissions(attr_dir, perms::none); in TEST_CASE() 76 TEST_CHECK(st.permissions() == perms::none); in TEST_CASE()
|
/external/selinux/prebuilts/bin/ |
D | sediff.py | 489 perms = " ".join(chain((p for p in matched_perms), variable 493 rule, perms) 533 perms = [] variable 536 perms.append(p) 540 perms.append("+[{0}]".format(p)) 542 perms.append("+{0}".format(p)) 546 perms.append("-[{0}]".format(p)) 548 perms.append("-{0}".format(p)) 552 format(rule, perms) 555 "{{ {1} }};".format(rule, " ".join(perms))) [all …]
|