/external/libcxx/test/std/experimental/filesystem/fs.op.funcs/fs.op.permissions/ |
D | permissions.pass.cpp | 27 using PR = fs::perms; 34 const perms opts{}; ((void)opts); in TEST_CASE() 44 auto checkThrow = [](path const& f, fs::perms opts, const std::error_code& ec) in TEST_CASE() 66 fs::permissions(dne, fs::perms{}, ec); in TEST_CASE() 68 TEST_CHECK(checkThrow(dne, fs::perms{}, ec)); in TEST_CASE() 72 fs::permissions(dne_sym, fs::perms{}, ec); in TEST_CASE() 74 TEST_CHECK(checkThrow(dne_sym, fs::perms{}, ec)); in TEST_CASE() 85 const perms AP = perms::add_perms; in TEST_CASE() 86 const perms RP = perms::remove_perms; in TEST_CASE() 87 const perms NF = perms::symlink_nofollow; in TEST_CASE() [all …]
|
/external/syslinux/com32/cmenu/libmenu/ |
D | passwords.c | 65 if (userdb[i]->perms == NULL) in isallowed() 67 tmp = strstr(userdb[i]->perms, dperm); // Search for permission in isallowed() 84 char line[MAX_LINE], *p, *user, *pwdhash, *perms; in init_passwords() local 125 perms = NULL; in init_passwords() 128 perms = p + 1; in init_passwords() 129 if (*perms == 0) in init_passwords() 130 perms = NULL; in init_passwords() 136 if (perms == NULL) in init_passwords() 137 userdb[numusers]->perms = NULL; in init_passwords() 139 userdb[numusers]->perms = (char *)malloc(strlen(perms) + 3); in init_passwords() [all …]
|
/external/selinux/python/sepolgen/tests/ |
D | test_access.py | 33 self.assertTrue(isinstance(a.perms, refpolicy.IdSet)) 42 a.perms.update(["read", "write"]) 48 self.assertEqual(a.perms, l.perms) 55 a.perms.update(["read", "write"]) 62 self.assertEqual(a.perms, l.perms) 69 a.perms.update(["read", "write"]) 75 perms = l[3:] 76 perms.sort() 77 self.assertEqual(perms[0], "read") 78 self.assertEqual(perms[1], "write") [all …]
|
/external/selinux/python/sepolgen/src/sepolgen/ |
D | access.py | 89 self.perms = refpolicy.IdSet() 120 self.perms = refpolicy.IdSet(list[3:]) 131 l.extend(sorted(self.perms)) 139 self.obj_class, self.perms.to_space_str()) 143 x = list(self.perms) 145 y = list(other.perms) 176 access.perms = avrule.perms.copy() 260 …def add(self, src_type, tgt_type, obj_class, perms, audit_msg=None, avc_type=audit2why.TERULE, dat… argument 277 access.perms.update(perms) 283 self.add(av.src_type, av.tgt_type, av.obj_class, av.perms) [all …]
|
/external/selinux/libsepol/src/ |
D | assertion.c | 41 const class_perm_node_t *curperm, uint32_t perms) in report_failure() argument 49 sepol_av_to_string(p, curperm->tclass, perms)); in report_failure() 55 sepol_av_to_string(p, curperm->tclass, perms)); in report_failure() 61 sepol_av_to_string(p, curperm->tclass, perms)); in report_failure() 94 rc = extended_permissions_and(neverallow->perms, allow->perms); in check_extended_permissions() 97 rc = xperm_test(neverallow->driver, allow->perms); in check_extended_permissions() 100 rc = xperm_test(allow->driver, neverallow->perms); in check_extended_permissions() 103 rc = extended_permissions_and(neverallow->perms, allow->perms); in check_extended_permissions() 120 result->perms[i] = neverallow->perms[i] & allow->perms[i]; in extended_permissions_violated() 125 memcpy(result->perms, neverallow->perms, sizeof(result->perms)); in extended_permissions_violated() [all …]
|
/external/selinux/libselinux/src/ |
D | mapping.c | 20 access_vector_t perms[sizeof(access_vector_t) * 8]; member 69 while (p_in->perms[k]) { in selinux_set_mapping() 71 if (!*p_in->perms[k]) { in selinux_set_mapping() 75 p_out->perms[k] = string_to_av_perm(p_out->value, in selinux_set_mapping() 76 p_in->perms[k]); in selinux_set_mapping() 77 if (!p_out->perms[k]) in selinux_set_mapping() 123 kperm |= current_mapping[tclass].perms[i]; in unmap_perm() 168 if (kperm & current_mapping[tclass].perms[i]) { in map_perm() 170 kperm &= ~current_mapping[tclass].perms[i]; in map_perm() 191 if (avd->allowed & current_mapping[tclass].perms[i]) in map_decision() [all …]
|
D | avc.c | 43 security_class_t tclass, access_vector_t perms, 49 access_vector_t perms; member 917 access_vector_t perms, in avc_add_callback() argument 921 security_class_t tclass, access_vector_t perms) in avc_add_callback() 937 c->perms = perms; in avc_add_callback() 950 access_vector_t perms) in avc_update_node() argument 954 node->ae.avd.allowed |= perms; in avc_update_node() 958 node->ae.avd.allowed &= ~perms; in avc_update_node() 961 node->ae.avd.auditallow |= perms; in avc_update_node() 964 node->ae.avd.auditallow &= ~perms; in avc_update_node() [all …]
|
D | stringrep.c | 25 char **perms; member 72 node->perms = calloc(MAXVECTORS,sizeof(char*)); in discover_class() 73 if (node->perms == NULL) in discover_class() 135 node->perms[value-1] = strdup(dentry->d_name); in discover_class() 136 if (node->perms[value-1] == NULL) in discover_class() 151 free(node->perms[i]); in discover_class() 155 free(node->perms); in discover_class() 170 free(cur->perms[i]); in flush_class_cache() 172 free(cur->perms); in flush_class_cache() 229 for (i=0; i<MAXVECTORS && node->perms[i] != NULL; i++) in string_to_av_perm() [all …]
|
/external/libcxx/test/std/experimental/filesystem/fs.op.funcs/fs.op.symlink_status/ |
D | symlink_status.pass.cpp | 48 TEST_CHECK(st.permissions() == perms::unknown); in TEST_CASE() 53 TEST_CHECK(st.permissions() == perms::unknown); in TEST_CASE() 64 permissions(dir, perms::none); in TEST_CASE() 81 TEST_CHECK(st.permissions() == perms::unknown); in TEST_CASE() 102 TEST_CHECK(st.permissions() != perms::unknown); in TEST_CASE() 106 TEST_CHECK(st.permissions() != perms::unknown); in TEST_CASE() 136 TEST_CHECK(st.permissions() != perms::unknown); in TEST_CASE() 140 TEST_CHECK(st.permissions() != perms::unknown); in TEST_CASE() 170 TEST_CHECK(st.permissions() != perms::unknown); in TEST_CASE() 174 TEST_CHECK(st.permissions() != perms::unknown); in TEST_CASE() [all …]
|
/external/libcxx/test/std/experimental/filesystem/class.file_status/ |
D | file_status.cons.pass.cpp | 37 assert(f.permissions() == perms::unknown); in main() 49 assert(f.permissions() == perms::unknown); in main() 53 static_assert(std::is_nothrow_constructible<file_status, file_type, perms>::value, in main() 55 static_assert(!test_convertible<file_status, file_type, perms>(), in main() 57 const file_status f(file_type::regular, perms::owner_read); in main() 59 assert(f.permissions() == perms::owner_read); in main()
|
D | file_status.mods.pass.cpp | 42 static_assert(noexcept(st.permissions(perms::owner_read)), in main() 44 static_assert(std::is_same<decltype(st.permissions(perms::owner_read)), void>::value, in main() 46 assert(st.permissions() != perms::owner_read); in main() 47 st.permissions(perms::owner_read); in main() 48 assert(st.permissions() == perms::owner_read); in main()
|
/external/swiftshader/third_party/llvm-subzero/include/llvm/Support/ |
D | FileSystem.h | 75 enum perms { enum 100 inline perms operator|(perms l, perms r) { 101 return static_cast<perms>(static_cast<unsigned short>(l) | 104 inline perms operator&(perms l, perms r) { 105 return static_cast<perms>(static_cast<unsigned short>(l) & 108 inline perms &operator|=(perms &l, perms r) { 112 inline perms &operator&=(perms &l, perms r) { 116 inline perms operator~(perms x) { 117 return static_cast<perms>(~static_cast<unsigned short>(x)); 165 perms Perms; [all …]
|
/external/llvm/include/llvm/Support/ |
D | FileSystem.h | 76 enum perms { enum 101 inline perms operator|(perms l, perms r) { 102 return static_cast<perms>(static_cast<unsigned short>(l) | 105 inline perms operator&(perms l, perms r) { 106 return static_cast<perms>(static_cast<unsigned short>(l) & 109 inline perms &operator|=(perms &l, perms r) { 113 inline perms &operator&=(perms &l, perms r) { 117 inline perms operator~(perms x) { 118 return static_cast<perms>(~static_cast<unsigned short>(x)); 164 perms Perms; [all …]
|
/external/syslinux/efi32/com32/cmenu/ |
D | test.c | 30 char *perms; // stores the permissions required to activate the item member 256 char *perms; in check_perms() local 262 perms = ( x ? x->perms : NULL); in check_perms() 263 if (!perms) return ACTION_VALID; in check_perms() 265 if (isallowed(username,"root") || isallowed(username,perms)) // If allowed in check_perms() 300 void set_xtra(pt_menuitem mi, const char *argsmenu, const char *perms, unsigned int helpid, long ip… in set_xtra() argument 312 if ( (perms==NULL) || (strlen(perms)==0)) bad_perms = 1; in set_xtra() 319 xtra->argsmenu = xtra->perms = NULL; in set_xtra() 326 xtra->perms = (char *) malloc(sizeof(char)*(strlen(perms)+1)); in set_xtra() 327 strcpy(xtra->perms,perms); in set_xtra()
|
D | test2.c | 30 char *perms; // stores the permissions required to activate the item member 256 char *perms; in check_perms() local 262 perms = ( x ? x->perms : NULL); in check_perms() 263 if (!perms) return ACTION_VALID; in check_perms() 265 if (isallowed(username,"root") || isallowed(username,perms)) // If allowed in check_perms() 300 void set_xtra(pt_menuitem mi, const char *argsmenu, const char *perms, unsigned int helpid, long ip… in set_xtra() argument 312 if ( (perms==NULL) || (strlen(perms)==0)) bad_perms = 1; in set_xtra() 319 xtra->argsmenu = xtra->perms = NULL; in set_xtra() 326 xtra->perms = (char *) malloc(sizeof(char)*(strlen(perms)+1)); in set_xtra() 327 strcpy(xtra->perms,perms); in set_xtra()
|
/external/syslinux/bios/com32/cmenu/ |
D | test.c | 30 char *perms; // stores the permissions required to activate the item member 256 char *perms; in check_perms() local 262 perms = ( x ? x->perms : NULL); in check_perms() 263 if (!perms) return ACTION_VALID; in check_perms() 265 if (isallowed(username,"root") || isallowed(username,perms)) // If allowed in check_perms() 300 void set_xtra(pt_menuitem mi, const char *argsmenu, const char *perms, unsigned int helpid, long ip… in set_xtra() argument 312 if ( (perms==NULL) || (strlen(perms)==0)) bad_perms = 1; in set_xtra() 319 xtra->argsmenu = xtra->perms = NULL; in set_xtra() 326 xtra->perms = (char *) malloc(sizeof(char)*(strlen(perms)+1)); in set_xtra() 327 strcpy(xtra->perms,perms); in set_xtra()
|
D | test2.c | 30 char *perms; // stores the permissions required to activate the item member 256 char *perms; in check_perms() local 262 perms = ( x ? x->perms : NULL); in check_perms() 263 if (!perms) return ACTION_VALID; in check_perms() 265 if (isallowed(username,"root") || isallowed(username,perms)) // If allowed in check_perms() 300 void set_xtra(pt_menuitem mi, const char *argsmenu, const char *perms, unsigned int helpid, long ip… in set_xtra() argument 312 if ( (perms==NULL) || (strlen(perms)==0)) bad_perms = 1; in set_xtra() 319 xtra->argsmenu = xtra->perms = NULL; in set_xtra() 326 xtra->perms = (char *) malloc(sizeof(char)*(strlen(perms)+1)); in set_xtra() 327 strcpy(xtra->perms,perms); in set_xtra()
|
/external/syslinux/efi64/com32/cmenu/ |
D | test.c | 30 char *perms; // stores the permissions required to activate the item member 256 char *perms; in check_perms() local 262 perms = ( x ? x->perms : NULL); in check_perms() 263 if (!perms) return ACTION_VALID; in check_perms() 265 if (isallowed(username,"root") || isallowed(username,perms)) // If allowed in check_perms() 300 void set_xtra(pt_menuitem mi, const char *argsmenu, const char *perms, unsigned int helpid, long ip… in set_xtra() argument 312 if ( (perms==NULL) || (strlen(perms)==0)) bad_perms = 1; in set_xtra() 319 xtra->argsmenu = xtra->perms = NULL; in set_xtra() 326 xtra->perms = (char *) malloc(sizeof(char)*(strlen(perms)+1)); in set_xtra() 327 strcpy(xtra->perms,perms); in set_xtra()
|
D | test2.c | 30 char *perms; // stores the permissions required to activate the item member 256 char *perms; in check_perms() local 262 perms = ( x ? x->perms : NULL); in check_perms() 263 if (!perms) return ACTION_VALID; in check_perms() 265 if (isallowed(username,"root") || isallowed(username,perms)) // If allowed in check_perms() 300 void set_xtra(pt_menuitem mi, const char *argsmenu, const char *perms, unsigned int helpid, long ip… in set_xtra() argument 312 if ( (perms==NULL) || (strlen(perms)==0)) bad_perms = 1; in set_xtra() 319 xtra->argsmenu = xtra->perms = NULL; in set_xtra() 326 xtra->perms = (char *) malloc(sizeof(char)*(strlen(perms)+1)); in set_xtra() 327 strcpy(xtra->perms,perms); in set_xtra()
|
/external/ltp/testcases/cve/ |
D | cve-2016-10044.c | 45 char perms[8], line[BUFSIZ]; in run() local 59 if (sscanf(line, "%*x-%*x %s7", perms) < 0) in run() 61 if (strchr(perms, (int)'x')) in run() 62 tst_res(TFAIL, "AIO mapping is executable: %s!", perms); in run() 64 tst_res(TPASS, "AIO mapping is not executable: %s", perms); in run()
|
/external/libcxx/test/std/experimental/filesystem/fs.op.funcs/fs.op.status/ |
D | status.pass.cpp | 49 TEST_CHECK(st.permissions() == perms::unknown); in TEST_CASE() 54 TEST_CHECK(st.permissions() == perms::unknown); in TEST_CASE() 64 permissions(dir, perms::none); in TEST_CASE() 88 TEST_CHECK(st.permissions() == perms::unknown); in TEST_CASE() 128 TEST_CHECK(st.permissions() != perms::unknown); in TEST_CASE() 132 TEST_CHECK(st.permissions() != perms::unknown); in TEST_CASE() 159 TEST_CHECK(st.permissions() != perms::unknown); in TEST_CASE() 163 TEST_CHECK(st.permissions() != perms::unknown); in TEST_CASE()
|
/external/libcxx/test/std/experimental/filesystem/fs.op.funcs/fs.op.create_directory/ |
D | create_directory_with_attributes.pass.cpp | 46 const perms orig_p = status(dir).permissions(); in TEST_CASE() 47 permissions(dir2, perms::none); in TEST_CASE() 64 permissions(env.test_root, perms::remove_perms | perms::set_gid); in TEST_CASE() 68 permissions(attr_dir, perms::none); in TEST_CASE() 77 TEST_CHECK(st.permissions() == perms::none); in TEST_CASE()
|
/external/autotest/client/site_tests/security_SysVIPC/ |
D | security_SysVIPC.py | 20 expected_shm = set([ShmRecord(owner='cras', perms='640', 22 expected_sem = set([SemaphoreRecord(owner='root', perms='600')]) 57 perms = fields[3] 59 seen.add(ShmRecord(owner=owner, perms=perms, attached=attached)) 69 seen.add(SemaphoreRecord(owner=fields[2], perms=fields[3]))
|
/external/selinux/libsepol/cil/src/ |
D | cil_find.c | 153 cil_list_for_each(i1, cp1->perms) { in cil_classperms_match_any() 155 cil_list_for_each(i2, cp2->perms) { in cil_classperms_match_any() 176 cil_list_for_each(i, cp->perms) { in __cil_classperms_list_match_any() 205 cil_list_for_each(i, cp->perms) { in cil_classperms_list_match_any() 232 cil_list_for_each(i, cp->perms) { in __add_classes_from_classperms_list() 264 cil_symtab_map(&class->perms, __add_classes_from_map_perms, class_list); in cil_expand_class() 278 if (!ebitmap_match_any(px1->perms, px2->perms)) goto exit; in cil_permissionx_match_any() 335 if (cil_classperms_list_match_any(avrule->perms.classperms, target->perms.classperms)) { in cil_find_matching_avrule() 339 if (cil_permissionx_match_any(avrule->perms.x.permx, target->perms.x.permx)) { in cil_find_matching_avrule()
|
/external/libcxx/test/std/experimental/filesystem/class.rec.dir.itr/rec.dir.itr.members/ |
D | increment.pass.cpp | 157 permissions(permDeniedDir, perms::none); in TEST_CASE() 258 perms::remove_perms|perms::group_exec in TEST_CASE() 259 |perms::owner_exec|perms::others_exec); in TEST_CASE() 332 perms::remove_perms|perms::group_exec in TEST_CASE() 333 |perms::owner_exec|perms::others_exec); in TEST_CASE() 416 perms::remove_perms|perms::group_exec in TEST_CASE() 417 |perms::owner_exec|perms::others_exec); in TEST_CASE()
|