/external/selinux/libselinux/src/ |
D | compute_av.c | 17 struct av_decision *avd) in security_compute_av_flags_raw() argument 54 &avd->allowed, &avd->decided, in security_compute_av_flags_raw() 55 &avd->auditallow, &avd->auditdeny, in security_compute_av_flags_raw() 56 &avd->seqno, &avd->flags); in security_compute_av_flags_raw() 61 avd->flags = 0; in security_compute_av_flags_raw() 65 map_decision(tclass, avd); in security_compute_av_flags_raw() 81 struct av_decision *avd) in hidden_def() 89 avd->allowed = lavd.allowed; in hidden_def() 90 avd->decided = lavd.decided; in hidden_def() 91 avd->auditallow = lavd.auditallow; in hidden_def() [all …]
|
D | avc.c | 23 struct av_decision avd; member 433 if (node && ((node->ae.avd.decided & requested) == requested)) { in avc_lookup() 472 if (ae->avd.seqno < avc_cache.latest_notif) { in avc_insert() 475 ae->avd.seqno, avc_cache.latest_notif); in avc_insert() 487 memcpy(&node->ae.avd, &ae->avd, sizeof(ae->avd)); in avc_insert() 696 struct av_decision *avd, int result, void *a) in avc_audit() argument 700 denied = requested & ~avd->allowed; in avc_audit() 702 audited = denied & avd->auditdeny; in avc_audit() 706 audited = requested & avd->auditallow; in avc_audit() 735 static void avd_init(struct av_decision *avd) in hidden_def() [all …]
|
D | mapping.c | 184 map_decision(security_class_t tclass, struct av_decision *avd) in map_decision() argument 191 if (avd->allowed & current_mapping[tclass].perms[i]) in map_decision() 193 avd->allowed = result; in map_decision() 196 if (avd->decided & current_mapping[tclass].perms[i]) in map_decision() 198 avd->decided = result; in map_decision() 201 if (avd->auditallow & current_mapping[tclass].perms[i]) in map_decision() 203 avd->auditallow = result; in map_decision() 206 if (avd->auditdeny & current_mapping[tclass].perms[i]) in map_decision() 208 avd->auditdeny = result; in map_decision()
|
D | checkAccess.c | 88 struct av_decision avd; in selinux_check_passwd_access() local 99 &avd); in selinux_check_passwd_access() 101 if ((retval == 0) && ((requested & avd.allowed) == requested)) { in selinux_check_passwd_access()
|
D | audit2why.c | 66 struct sepol_av_decision avd; in check_booleans() local 112 avc->av, &avd, &reason); in check_booleans() 322 struct sepol_av_decision avd; in analyze() local 376 rc = sepol_compute_av_reason_buffer(ssid, tsid, tclass, av, &avd, &reason, &reason_buf, 0); in analyze() 389 if (av & ~avd.auditdeny) { in analyze()
|
D | mapping.h | 32 map_decision(security_class_t tclass, struct av_decision *avd);
|
/external/selinux/libselinux/utils/ |
D | compute_av.c | 10 struct av_decision avd; in main() local 26 ret = security_compute_av(argv[1], argv[2], tclass, 1, &avd); in main() 33 print_access_vector(tclass, avd.allowed); in main() 36 if (avd.decided != ~0U) { in main() 38 print_access_vector(tclass, avd.decided); in main() 42 if (avd.auditallow) { in main() 44 print_access_vector(tclass, avd.auditallow); in main() 48 if (avd.auditdeny != ~0U) { in main() 50 print_access_vector(tclass, avd.auditdeny); in main()
|
/external/libselinux/src/ |
D | compute_av.c | 17 struct av_decision *avd) in security_compute_av() argument 54 &avd->allowed, &avd->decided, in security_compute_av() 55 &avd->auditallow, &avd->auditdeny, in security_compute_av() 56 &avd->seqno, &avd->flags); in security_compute_av() 61 avd->flags = 0; in security_compute_av() 63 map_decision(tclass, avd); in security_compute_av()
|
D | avc.c | 23 struct av_decision avd; member 393 if (node && ((node->ae.avd.decided & requested) == requested)) { in avc_lookup() 432 if (ae->avd.seqno < avc_cache.latest_notif) { in avc_insert() 435 ae->avd.seqno, avc_cache.latest_notif); in avc_insert() 447 memcpy(&node->ae.avd, &ae->avd, sizeof(ae->avd)); in avc_insert() 656 struct av_decision *avd, int result, void *a) in avc_audit() argument 660 denied = requested & ~avd->allowed; in avc_audit() 662 audited = denied & avd->auditdeny; in avc_audit() 666 audited = requested & avd->auditallow; in avc_audit() 700 static void avd_init(struct av_decision *avd) in hidden_def() [all …]
|
D | mapping.c | 184 map_decision(security_class_t tclass, struct av_decision *avd) in map_decision() argument 191 if (avd->allowed & current_mapping[tclass].perms[i]) in map_decision() 193 avd->allowed = result; in map_decision() 196 if (avd->decided & current_mapping[tclass].perms[i]) in map_decision() 198 avd->decided = result; in map_decision() 201 if (avd->auditallow & current_mapping[tclass].perms[i]) in map_decision() 203 avd->auditallow = result; in map_decision() 206 if (avd->auditdeny & current_mapping[tclass].perms[i]) in map_decision() 208 avd->auditdeny = result; in map_decision()
|
D | mapping.h | 32 map_decision(security_class_t tclass, struct av_decision *avd);
|
/external/selinux/libsepol/src/ |
D | services.c | 835 struct sepol_av_decision *avd, in context_struct_compute_av() argument 858 avd->allowed = 0; in context_struct_compute_av() 859 avd->decided = 0xffffffff; in context_struct_compute_av() 860 avd->auditallow = 0; in context_struct_compute_av() 861 avd->auditdeny = 0xffffffff; in context_struct_compute_av() 862 avd->seqno = latest_granting; in context_struct_compute_av() 887 avd->allowed |= node->datum.data; in context_struct_compute_av() 890 avd->auditallow |= node->datum.data; in context_struct_compute_av() 892 avd->auditdeny &= node->datum.data; in context_struct_compute_av() 896 cond_compute_av(&policydb->te_cond_avtab, &avkey, avd); in context_struct_compute_av() [all …]
|
D | conditional.c | 879 struct sepol_av_decision *avd) in cond_compute_av() argument 883 if (!ctab || !key || !avd) in cond_compute_av() 890 avd->allowed |= node->datum.data; in cond_compute_av() 898 avd->auditdeny &= node->datum.data; in cond_compute_av() 901 avd->auditallow |= node->datum.data; in cond_compute_av()
|
D | expand.c | 3174 avtab_datum_t *avd; in expand_avtab_insert() local 3209 avd = &node->datum; in expand_avtab_insert() 3214 avd->data |= d->data; in expand_avtab_insert() 3217 avd->data &= d->data; in expand_avtab_insert() 3326 avtab_datum_t *avd; in expand_cond_insert() local 3351 avd = &node->datum; in expand_cond_insert() 3355 avd->data |= d->data; in expand_cond_insert() 3358 avd->data &= d->data; in expand_cond_insert()
|
/external/selinux/libsepol/include/sepol/policydb/ |
D | services.h | 50 struct sepol_av_decision *avd); /* OUT */ 61 struct sepol_av_decision *avd, 77 struct sepol_av_decision *avd,
|
D | conditional.h | 137 struct sepol_av_decision *avd);
|
/external/selinux/libselinux/include/selinux/ |
D | selinux.h | 188 struct av_decision *avd); 193 struct av_decision *avd); 199 struct av_decision *avd); 204 struct av_decision *avd);
|
D | avc.h | 264 struct avc_entry_ref *aeref, struct av_decision *avd); 309 struct av_decision *avd, int result, void *auditdata);
|
/external/libselinux/include/selinux/ |
D | avc.h | 260 struct avc_entry_ref *aeref, struct av_decision *avd); 305 struct av_decision *avd, int result, void *auditdata);
|
D | selinux.h | 168 struct av_decision *avd);
|
/external/selinux/policycoreutils/mcstrans/src/ |
D | mcscolor.c | 81 struct av_decision avd; in check_dominance() local 112 … security_compute_av_raw(ctx, (security_context_t)raw, context_class, context_contains_perm, &avd); in check_dominance() 116 rc = (context_contains_perm & avd.allowed) != context_contains_perm; in check_dominance()
|
/external/ipsec-tools/src/racoon/ |
D | security.c | 220 struct av_decision avd; in within_range() local 254 rtn = avc_has_perm(slsid, rangesid, tclass, av, NULL, &avd); in within_range()
|
/external/selinux/checkpolicy/ |
D | checkpolicy.c | 384 struct sepol_av_decision avd; in main() local 730 ret = sepol_compute_av(ssid, tsid, tclass, 0, &avd); in main() 734 for (i = 1; i <= sizeof(avd.allowed) * 8; i++) { in main() 735 if (avd.allowed & (1 << (i - 1))) { in main() 1134 tclass, 0, &avd, &reason, in main()
|
/external/icu/icu4c/source/data/misc/ |
D | supplementalData.txt | 4561 "avd",
|
/external/hyphenation-patterns/nn/ |
D | hyph-nn.pat.txt | 3229 1avd
|