/external/libsepol/src/ |
mls.h | 4 * Support for enhanced MLS infrastructure. 32 const char *str, context_struct_t * mls); 36 const context_struct_t * mls, char **str); 65 context_struct_t * usercon, int mls);
|
context_record.c | 20 /* MLS */ 21 char *mls; member in struct:sepol_context 103 /* MLS */ 107 return con->mls; 113 sepol_context_t * con, const char *mls) 116 char *tmp_mls = strdup(mls); 119 "MLS fields to %s", mls); 122 free(con->mls); 123 con->mls = tmp_mls [all...] |
context.c | 12 #include "mls.h" 158 const char *mls = sepol_context_get_mls(record); local 194 /* MLS */ 195 if (mls && !policydb->mls) { 196 ERR(handle, "MLS is disabled, but MLS context \"%s\" found", 197 mls); 199 } else if (!mls && policydb->mls) { 249 char *mls = NULL; local [all...] |
mls.c | 5 * Support for enhanced MLS infrastructure. 27 * Implementation of the multi-level security (MLS) policy. 40 #include "mls.h" 44 const context_struct_t * mls, char **str) 50 int len = mls_compute_context_len(policydb, mls) + 1; 61 mls_sid_to_context(policydb, mls, &ptr); 70 ERR(handle, "out of memory, could not convert mls context to string"); 80 const char *str, context_struct_t * mls) 88 if (mls_context_to_sid(policydb, '$', &tmp_cp, mls) < 0) { 89 ERR(handle, "invalid MLS context %s", str) [all...] |
policydb_public.c | 181 return p->p.mls;
|
users.c | 13 #include "mls.h" 43 /* Extract MLS info */ 44 if (policydb->mls) { 51 ERR(handle, "could not copy MLS level"); 57 ERR(handle, "could not copy MLS level"); 75 ERR(handle, "could not copy MLS range"); 179 /* For MLS systems */ 180 if (policydb->mls) { 182 /* MLS level */ 184 ERR(handle, "MLS is enabled, but no MLS [all...] |
genusers.c | 19 #include "mls.h" 175 if (policydb->mls) {
|
link.c | 513 /* new_users's roles and MLS fields will be copied during 997 if (!mod->policy->mls) [all...] |
/external/libsepol/tests/ |
helpers.c | 35 int test_load_policy(policydb_t * p, int policy_type, int mls, const char *test_name, const char *policy_name) 39 if (mls) { 40 if (snprintf(filename, PATH_MAX, "policies/%s/%s.mls", test_name, policy_name) < 0) { 55 p->mls = mls;
|
helpers.h | 33 * policy "policies/foo/mls/base.conf" into p. 39 * mls Boolean value indicating whether an mls policy is expected. 48 extern int test_load_policy(policydb_t * p, int policy_type, int mls, const char *test_name, const char *policy_name);
|
test-downgrade.h | 68 * Description: Tests the backward compatability of MLS and Non-MLS binary 76 * Input: int that represents a 0 for Non-MLS policy and a 77 * 1 for MLS policy downgrade testing 87 int do_downgrade_test(int mls);
|
test-downgrade.c | 100 * Tests the backward compatability of MLS and Non-MLS binary policy versions. 106 "\nError during downgrade testing of Non-MLS policy\n"); 111 "\nError during downgrade testing of MLS policy\n"); 117 * Input: 0 for Non-MLS policy and 1 for MLS policy downgrade testing 127 int do_downgrade_test(int mls) 138 fprintf(stderr, "error reading %spolicy binary\n", mls ? "mls " : ""); 143 /* Change MLS value based on parameter * [all...] |
test-linker.c | 57 extern int mls; 63 if (test_load_policy(&linkedbase, POLICY_BASE, mls, "test-linker", policies[BASEMOD])) 66 if (test_load_policy(&basenomods, POLICY_BASE, mls, "test-linker", policies[BASEMOD])) 77 if (test_load_policy(modules[i], POLICY_MOD, mls, "test-linker", policies[i]))
|
libsepol-tests.c | 35 int mls; variable 107 /* first do the non-mls tests */ 108 mls = 0; 112 /* then with mls */ 113 mls = 1;
|
test-expander.c | 65 extern int mls; 77 if (snprintf(filename[i], PATH_MAX, "policies/test-expander/%s%s", myfiles[i], mls ? ".mls" : ".std") < 0) 99 mybase->mls = mls; 108 mymodules[i - 1]->mls = mls; 158 mls and non-mls tests since users can't be used in mls module * [all...] |
test-deps.c | 86 extern int mls; 98 if (test_load_policy(&bases_met[i], POLICY_BASE, mls, "test-deps", "base-metreq.conf")) 103 if (test_load_policy(&bases_notmet[i], POLICY_BASE, mls, "test-deps", "base-notmetreq.conf")) 162 CU_ASSERT_FATAL(test_load_policy(&mod, POLICY_MOD, mls, "test-deps", policy) == 0); 242 CU_ASSERT_FATAL(test_load_policy(&mod, POLICY_MOD, mls, "test-deps", policy) == 0);
|
Makefile | 28 mlspol := $(addsuffix .mls,$(policysrc)) 40 %.conf.mls: $(m4support) %.conf
|
/external/libsepol/include/sepol/ |
context.h | 24 const sepol_policydb_t * policydb, const char *mls);
|
/external/checkpolicy/ |
parse_util.c | 51 mlspol = p->mls;
|
checkmodule.c | 93 if (p->mls) { 95 fprintf(stderr, "%s: MLS policy, but non-MLS" 101 fprintf(stderr, "%s: non-MLS policy, but MLS" 155 printf(" -M enable MLS policy\n"); 173 {"mls", no_argument, NULL, 'M'}, 254 modpolicydb.mls = mlspol;
|
checkpolicy.c | 9 * Support for enhanced MLS infrastructure. 406 {"mls", no_argument, NULL, 'M'}, 540 if (policydbp->mls) { 542 fprintf(stderr, "%s: MLS policy, but non-MLS" 548 fprintf(stderr, "%s: non-MLS policy, but MLS" 562 /* Let sepol know if we are dealing with MLS support */ 563 parse_policy.mls = mlspol;
|
policy_parse.y | 9 * Support for enhanced MLS infrastructure. 198 opt_mls : mls 201 mls : sensitivities dominance opt_categories levels mlspolicy label
|
/external/libsepol/ |
Android.mk | 24 src/mls.c \
|
/external/sepolicy/ |
Android.mk | 42 POLICY_DEPENDS := $(wildcard $(addprefix $(LOCAL_PATH)/,security_classes initial_sids access_vectors global_macros mls_macros mls policy_capabilities te_macros attributes *.te))
|
/external/libsepol/include/sepol/policydb/ |
policydb.h | 13 * Support for enhanced MLS infrastructure. 180 mls_semantic_range_t range; /* MLS range (min. - max.) for user */ 181 mls_semantic_level_t dfltlevel; /* default login MLS level for user */ 458 /* Whether this policydb is mls, should always be set */ 459 int mls; member in struct:policydb
|