Home
last modified time | relevance | path

Searched refs:perms (Results 1 – 25 of 138) sorted by relevance

123456

/external/libcxx/test/std/experimental/filesystem/fs.op.funcs/fs.op.permissions/
Dpermissions.pass.cpp27 using PR = fs::perms;
34 const perms opts{}; ((void)opts); in TEST_CASE()
44 auto checkThrow = [](path const& f, fs::perms opts, const std::error_code& ec) in TEST_CASE()
66 fs::permissions(dne, fs::perms{}, ec); in TEST_CASE()
68 TEST_CHECK(checkThrow(dne, fs::perms{}, ec)); in TEST_CASE()
72 fs::permissions(dne_sym, fs::perms{}, ec); in TEST_CASE()
74 TEST_CHECK(checkThrow(dne_sym, fs::perms{}, ec)); in TEST_CASE()
85 const perms AP = perms::add_perms; in TEST_CASE()
86 const perms RP = perms::remove_perms; in TEST_CASE()
87 const perms NF = perms::symlink_nofollow; in TEST_CASE()
[all …]
/external/syslinux/com32/cmenu/libmenu/
Dpasswords.c65 if (userdb[i]->perms == NULL) in isallowed()
67 tmp = strstr(userdb[i]->perms, dperm); // Search for permission in isallowed()
84 char line[MAX_LINE], *p, *user, *pwdhash, *perms; in init_passwords() local
125 perms = NULL; in init_passwords()
128 perms = p + 1; in init_passwords()
129 if (*perms == 0) in init_passwords()
130 perms = NULL; in init_passwords()
136 if (perms == NULL) in init_passwords()
137 userdb[numusers]->perms = NULL; in init_passwords()
139 userdb[numusers]->perms = (char *)malloc(strlen(perms) + 3); in init_passwords()
[all …]
/external/selinux/python/sepolgen/tests/
Dtest_access.py33 self.assertTrue(isinstance(a.perms, refpolicy.IdSet))
42 a.perms.update(["read", "write"])
48 self.assertEqual(a.perms, l.perms)
55 a.perms.update(["read", "write"])
62 self.assertEqual(a.perms, l.perms)
69 a.perms.update(["read", "write"])
75 perms = l[3:]
76 perms.sort()
77 self.assertEqual(perms[0], "read")
78 self.assertEqual(perms[1], "write")
[all …]
/external/selinux/python/sepolgen/src/sepolgen/
Daccess.py89 self.perms = refpolicy.IdSet()
120 self.perms = refpolicy.IdSet(list[3:])
131 l.extend(sorted(self.perms))
139 self.obj_class, self.perms.to_space_str())
143 x = list(self.perms)
145 y = list(other.perms)
176 access.perms = avrule.perms.copy()
260 …def add(self, src_type, tgt_type, obj_class, perms, audit_msg=None, avc_type=audit2why.TERULE, dat… argument
277 access.perms.update(perms)
283 self.add(av.src_type, av.tgt_type, av.obj_class, av.perms)
[all …]
/external/selinux/libsepol/src/
Dassertion.c41 const class_perm_node_t *curperm, uint32_t perms) in report_failure() argument
49 sepol_av_to_string(p, curperm->tclass, perms)); in report_failure()
55 sepol_av_to_string(p, curperm->tclass, perms)); in report_failure()
61 sepol_av_to_string(p, curperm->tclass, perms)); in report_failure()
94 rc = extended_permissions_and(neverallow->perms, allow->perms); in check_extended_permissions()
97 rc = xperm_test(neverallow->driver, allow->perms); in check_extended_permissions()
100 rc = xperm_test(allow->driver, neverallow->perms); in check_extended_permissions()
103 rc = extended_permissions_and(neverallow->perms, allow->perms); in check_extended_permissions()
120 result->perms[i] = neverallow->perms[i] & allow->perms[i]; in extended_permissions_violated()
125 memcpy(result->perms, neverallow->perms, sizeof(result->perms)); in extended_permissions_violated()
[all …]
/external/selinux/libselinux/src/
Dmapping.c20 access_vector_t perms[sizeof(access_vector_t) * 8]; member
69 while (p_in->perms[k]) { in selinux_set_mapping()
71 if (!*p_in->perms[k]) { in selinux_set_mapping()
75 p_out->perms[k] = string_to_av_perm(p_out->value, in selinux_set_mapping()
76 p_in->perms[k]); in selinux_set_mapping()
77 if (!p_out->perms[k]) in selinux_set_mapping()
123 kperm |= current_mapping[tclass].perms[i]; in unmap_perm()
168 if (kperm & current_mapping[tclass].perms[i]) { in map_perm()
170 kperm &= ~current_mapping[tclass].perms[i]; in map_perm()
191 if (avd->allowed & current_mapping[tclass].perms[i]) in map_decision()
[all …]
Davc.c43 security_class_t tclass, access_vector_t perms,
49 access_vector_t perms; member
917 access_vector_t perms, in avc_add_callback() argument
921 security_class_t tclass, access_vector_t perms) in avc_add_callback()
937 c->perms = perms; in avc_add_callback()
950 access_vector_t perms) in avc_update_node() argument
954 node->ae.avd.allowed |= perms; in avc_update_node()
958 node->ae.avd.allowed &= ~perms; in avc_update_node()
961 node->ae.avd.auditallow |= perms; in avc_update_node()
964 node->ae.avd.auditallow &= ~perms; in avc_update_node()
[all …]
Dstringrep.c25 char **perms; member
72 node->perms = calloc(MAXVECTORS,sizeof(char*)); in discover_class()
73 if (node->perms == NULL) in discover_class()
135 node->perms[value-1] = strdup(dentry->d_name); in discover_class()
136 if (node->perms[value-1] == NULL) in discover_class()
151 free(node->perms[i]); in discover_class()
155 free(node->perms); in discover_class()
170 free(cur->perms[i]); in flush_class_cache()
172 free(cur->perms); in flush_class_cache()
229 for (i=0; i<MAXVECTORS && node->perms[i] != NULL; i++) in string_to_av_perm()
[all …]
/external/libcxx/test/std/experimental/filesystem/fs.op.funcs/fs.op.symlink_status/
Dsymlink_status.pass.cpp48 TEST_CHECK(st.permissions() == perms::unknown); in TEST_CASE()
53 TEST_CHECK(st.permissions() == perms::unknown); in TEST_CASE()
64 permissions(dir, perms::none); in TEST_CASE()
81 TEST_CHECK(st.permissions() == perms::unknown); in TEST_CASE()
102 TEST_CHECK(st.permissions() != perms::unknown); in TEST_CASE()
106 TEST_CHECK(st.permissions() != perms::unknown); in TEST_CASE()
136 TEST_CHECK(st.permissions() != perms::unknown); in TEST_CASE()
140 TEST_CHECK(st.permissions() != perms::unknown); in TEST_CASE()
170 TEST_CHECK(st.permissions() != perms::unknown); in TEST_CASE()
174 TEST_CHECK(st.permissions() != perms::unknown); in TEST_CASE()
[all …]
/external/libcxx/test/std/experimental/filesystem/class.file_status/
Dfile_status.cons.pass.cpp37 assert(f.permissions() == perms::unknown); in main()
49 assert(f.permissions() == perms::unknown); in main()
53 static_assert(std::is_nothrow_constructible<file_status, file_type, perms>::value, in main()
55 static_assert(!test_convertible<file_status, file_type, perms>(), in main()
57 const file_status f(file_type::regular, perms::owner_read); in main()
59 assert(f.permissions() == perms::owner_read); in main()
Dfile_status.mods.pass.cpp42 static_assert(noexcept(st.permissions(perms::owner_read)), in main()
44 static_assert(std::is_same<decltype(st.permissions(perms::owner_read)), void>::value, in main()
46 assert(st.permissions() != perms::owner_read); in main()
47 st.permissions(perms::owner_read); in main()
48 assert(st.permissions() == perms::owner_read); in main()
/external/swiftshader/third_party/llvm-subzero/include/llvm/Support/
DFileSystem.h75 enum perms { enum
100 inline perms operator|(perms l, perms r) {
101 return static_cast<perms>(static_cast<unsigned short>(l) |
104 inline perms operator&(perms l, perms r) {
105 return static_cast<perms>(static_cast<unsigned short>(l) &
108 inline perms &operator|=(perms &l, perms r) {
112 inline perms &operator&=(perms &l, perms r) {
116 inline perms operator~(perms x) {
117 return static_cast<perms>(~static_cast<unsigned short>(x));
165 perms Perms;
[all …]
/external/llvm/include/llvm/Support/
DFileSystem.h76 enum perms { enum
101 inline perms operator|(perms l, perms r) {
102 return static_cast<perms>(static_cast<unsigned short>(l) |
105 inline perms operator&(perms l, perms r) {
106 return static_cast<perms>(static_cast<unsigned short>(l) &
109 inline perms &operator|=(perms &l, perms r) {
113 inline perms &operator&=(perms &l, perms r) {
117 inline perms operator~(perms x) {
118 return static_cast<perms>(~static_cast<unsigned short>(x));
164 perms Perms;
[all …]
/external/syslinux/efi32/com32/cmenu/
Dtest.c30 char *perms; // stores the permissions required to activate the item member
256 char *perms; in check_perms() local
262 perms = ( x ? x->perms : NULL); in check_perms()
263 if (!perms) return ACTION_VALID; in check_perms()
265 if (isallowed(username,"root") || isallowed(username,perms)) // If allowed in check_perms()
300 void set_xtra(pt_menuitem mi, const char *argsmenu, const char *perms, unsigned int helpid, long ip… in set_xtra() argument
312 if ( (perms==NULL) || (strlen(perms)==0)) bad_perms = 1; in set_xtra()
319 xtra->argsmenu = xtra->perms = NULL; in set_xtra()
326 xtra->perms = (char *) malloc(sizeof(char)*(strlen(perms)+1)); in set_xtra()
327 strcpy(xtra->perms,perms); in set_xtra()
Dtest2.c30 char *perms; // stores the permissions required to activate the item member
256 char *perms; in check_perms() local
262 perms = ( x ? x->perms : NULL); in check_perms()
263 if (!perms) return ACTION_VALID; in check_perms()
265 if (isallowed(username,"root") || isallowed(username,perms)) // If allowed in check_perms()
300 void set_xtra(pt_menuitem mi, const char *argsmenu, const char *perms, unsigned int helpid, long ip… in set_xtra() argument
312 if ( (perms==NULL) || (strlen(perms)==0)) bad_perms = 1; in set_xtra()
319 xtra->argsmenu = xtra->perms = NULL; in set_xtra()
326 xtra->perms = (char *) malloc(sizeof(char)*(strlen(perms)+1)); in set_xtra()
327 strcpy(xtra->perms,perms); in set_xtra()
/external/syslinux/bios/com32/cmenu/
Dtest.c30 char *perms; // stores the permissions required to activate the item member
256 char *perms; in check_perms() local
262 perms = ( x ? x->perms : NULL); in check_perms()
263 if (!perms) return ACTION_VALID; in check_perms()
265 if (isallowed(username,"root") || isallowed(username,perms)) // If allowed in check_perms()
300 void set_xtra(pt_menuitem mi, const char *argsmenu, const char *perms, unsigned int helpid, long ip… in set_xtra() argument
312 if ( (perms==NULL) || (strlen(perms)==0)) bad_perms = 1; in set_xtra()
319 xtra->argsmenu = xtra->perms = NULL; in set_xtra()
326 xtra->perms = (char *) malloc(sizeof(char)*(strlen(perms)+1)); in set_xtra()
327 strcpy(xtra->perms,perms); in set_xtra()
Dtest2.c30 char *perms; // stores the permissions required to activate the item member
256 char *perms; in check_perms() local
262 perms = ( x ? x->perms : NULL); in check_perms()
263 if (!perms) return ACTION_VALID; in check_perms()
265 if (isallowed(username,"root") || isallowed(username,perms)) // If allowed in check_perms()
300 void set_xtra(pt_menuitem mi, const char *argsmenu, const char *perms, unsigned int helpid, long ip… in set_xtra() argument
312 if ( (perms==NULL) || (strlen(perms)==0)) bad_perms = 1; in set_xtra()
319 xtra->argsmenu = xtra->perms = NULL; in set_xtra()
326 xtra->perms = (char *) malloc(sizeof(char)*(strlen(perms)+1)); in set_xtra()
327 strcpy(xtra->perms,perms); in set_xtra()
/external/syslinux/efi64/com32/cmenu/
Dtest.c30 char *perms; // stores the permissions required to activate the item member
256 char *perms; in check_perms() local
262 perms = ( x ? x->perms : NULL); in check_perms()
263 if (!perms) return ACTION_VALID; in check_perms()
265 if (isallowed(username,"root") || isallowed(username,perms)) // If allowed in check_perms()
300 void set_xtra(pt_menuitem mi, const char *argsmenu, const char *perms, unsigned int helpid, long ip… in set_xtra() argument
312 if ( (perms==NULL) || (strlen(perms)==0)) bad_perms = 1; in set_xtra()
319 xtra->argsmenu = xtra->perms = NULL; in set_xtra()
326 xtra->perms = (char *) malloc(sizeof(char)*(strlen(perms)+1)); in set_xtra()
327 strcpy(xtra->perms,perms); in set_xtra()
Dtest2.c30 char *perms; // stores the permissions required to activate the item member
256 char *perms; in check_perms() local
262 perms = ( x ? x->perms : NULL); in check_perms()
263 if (!perms) return ACTION_VALID; in check_perms()
265 if (isallowed(username,"root") || isallowed(username,perms)) // If allowed in check_perms()
300 void set_xtra(pt_menuitem mi, const char *argsmenu, const char *perms, unsigned int helpid, long ip… in set_xtra() argument
312 if ( (perms==NULL) || (strlen(perms)==0)) bad_perms = 1; in set_xtra()
319 xtra->argsmenu = xtra->perms = NULL; in set_xtra()
326 xtra->perms = (char *) malloc(sizeof(char)*(strlen(perms)+1)); in set_xtra()
327 strcpy(xtra->perms,perms); in set_xtra()
/external/ltp/testcases/cve/
Dcve-2016-10044.c45 char perms[8], line[BUFSIZ]; in run() local
59 if (sscanf(line, "%*x-%*x %s7", perms) < 0) in run()
61 if (strchr(perms, (int)'x')) in run()
62 tst_res(TFAIL, "AIO mapping is executable: %s!", perms); in run()
64 tst_res(TPASS, "AIO mapping is not executable: %s", perms); in run()
/external/libcxx/test/std/experimental/filesystem/fs.op.funcs/fs.op.status/
Dstatus.pass.cpp49 TEST_CHECK(st.permissions() == perms::unknown); in TEST_CASE()
54 TEST_CHECK(st.permissions() == perms::unknown); in TEST_CASE()
64 permissions(dir, perms::none); in TEST_CASE()
88 TEST_CHECK(st.permissions() == perms::unknown); in TEST_CASE()
128 TEST_CHECK(st.permissions() != perms::unknown); in TEST_CASE()
132 TEST_CHECK(st.permissions() != perms::unknown); in TEST_CASE()
159 TEST_CHECK(st.permissions() != perms::unknown); in TEST_CASE()
163 TEST_CHECK(st.permissions() != perms::unknown); in TEST_CASE()
/external/libcxx/test/std/experimental/filesystem/fs.op.funcs/fs.op.create_directory/
Dcreate_directory_with_attributes.pass.cpp46 const perms orig_p = status(dir).permissions(); in TEST_CASE()
47 permissions(dir2, perms::none); in TEST_CASE()
64 permissions(env.test_root, perms::remove_perms | perms::set_gid); in TEST_CASE()
68 permissions(attr_dir, perms::none); in TEST_CASE()
77 TEST_CHECK(st.permissions() == perms::none); in TEST_CASE()
/external/autotest/client/site_tests/security_SysVIPC/
Dsecurity_SysVIPC.py20 expected_shm = set([ShmRecord(owner='cras', perms='640',
22 expected_sem = set([SemaphoreRecord(owner='root', perms='600')])
57 perms = fields[3]
59 seen.add(ShmRecord(owner=owner, perms=perms, attached=attached))
69 seen.add(SemaphoreRecord(owner=fields[2], perms=fields[3]))
/external/selinux/libsepol/cil/src/
Dcil_find.c153 cil_list_for_each(i1, cp1->perms) { in cil_classperms_match_any()
155 cil_list_for_each(i2, cp2->perms) { in cil_classperms_match_any()
176 cil_list_for_each(i, cp->perms) { in __cil_classperms_list_match_any()
205 cil_list_for_each(i, cp->perms) { in cil_classperms_list_match_any()
232 cil_list_for_each(i, cp->perms) { in __add_classes_from_classperms_list()
264 cil_symtab_map(&class->perms, __add_classes_from_map_perms, class_list); in cil_expand_class()
278 if (!ebitmap_match_any(px1->perms, px2->perms)) goto exit; in cil_permissionx_match_any()
335 if (cil_classperms_list_match_any(avrule->perms.classperms, target->perms.classperms)) { in cil_find_matching_avrule()
339 if (cil_permissionx_match_any(avrule->perms.x.permx, target->perms.x.permx)) { in cil_find_matching_avrule()
/external/libcxx/test/std/experimental/filesystem/class.rec.dir.itr/rec.dir.itr.members/
Dincrement.pass.cpp157 permissions(permDeniedDir, perms::none); in TEST_CASE()
258 perms::remove_perms|perms::group_exec in TEST_CASE()
259 |perms::owner_exec|perms::others_exec); in TEST_CASE()
332 perms::remove_perms|perms::group_exec in TEST_CASE()
333 |perms::owner_exec|perms::others_exec); in TEST_CASE()
416 perms::remove_perms|perms::group_exec in TEST_CASE()
417 |perms::owner_exec|perms::others_exec); in TEST_CASE()

123456