/external/selinux/policycoreutils/mcstrans/utils/ |
transcon.c | 17 security_context_t scon; local 20 if(trans_context(argv[1],&scon) == 0) { 21 printf("%s\n", scon); 22 freecon(scon);
|
untranscon.c | 16 security_context_t scon; local 19 if(untrans_context(argv[1],&scon) == 0) { 20 printf("%s\n", scon); 21 freecon(scon);
|
/external/selinux/libselinux/src/ |
compute_create.c | 51 int security_compute_create_name_raw(const char * scon, 79 scon, tcon, unmap_class(tclass)); 110 int security_compute_create_raw(const char * scon, 115 return security_compute_create_name_raw(scon, tcon, tclass, 120 int security_compute_create_name(const char * scon, 131 if (selinux_trans_to_raw_context(scon, &rscon)) 151 int security_compute_create(const char * scon, 156 return security_compute_create_name(scon, tcon, tclass, NULL, newcon);
|
compute_relabel.c | 13 int security_compute_relabel_raw(const char * scon, 39 snprintf(buf, size, "%s %s %hu", scon, tcon, unmap_class(tclass)); 65 int security_compute_relabel(const char * scon, 75 if (selinux_trans_to_raw_context(scon, &rscon))
|
compute_av.c | 13 int security_compute_av_flags_raw(const char * scon, 41 snprintf(buf, len, "%s %s %hu %x", scon, tcon, 77 int security_compute_av_raw(const char * scon, 86 ret = security_compute_av_flags_raw(scon, tcon, tclass, 104 int security_compute_av_flags(const char * scon, 114 if (selinux_trans_to_raw_context(scon, &rscon)) 131 int security_compute_av(const char * scon, 139 ret = security_compute_av_flags(scon, tcon, tclass,
|
compute_member.c | 13 int security_compute_member_raw(const char * scon, 39 snprintf(buf, size, "%s %s %hu", scon, tcon, unmap_class(tclass)); 65 int security_compute_member(const char * scon, 75 if (selinux_trans_to_raw_context(scon, &rscon))
|
compute_user.c | 12 int security_compute_user_raw(const char * scon, 38 snprintf(buf, size, "%s %s", scon, user); 82 int security_compute_user(const char * scon, 88 if (selinux_trans_to_raw_context(scon, &rscon))
|
checkAccess.c | 20 int selinux_check_access(const char *scon, const char *tcon, const char *class, const char *perm, void *aux) { 32 rc = avc_context_to_sid(scon, &scon_id);
|
audit2why.c | 311 char * scon; local 326 if (!PyArg_ParseTuple(args,(char *)"sssO!:audit2why",&scon,&tcon,&tclassstr,&PyList_Type, &listObj)) 338 rc = sepol_context_to_sid(scon, strlen(scon) + 1, &ssid);
|
/external/selinux/libselinux/include/selinux/ |
selinux.h | 184 extern int security_compute_av(const char * scon, 189 extern int security_compute_av_raw(const char * scon, 195 extern int security_compute_av_flags(const char * scon, 200 extern int security_compute_av_flags_raw(const char * scon, 208 extern int security_compute_create(const char * scon, 212 extern int security_compute_create_raw(const char * scon, 216 extern int security_compute_create_name(const char * scon, 221 extern int security_compute_create_name_raw(const char * scon, 229 extern int security_compute_relabel(const char * scon, 233 extern int security_compute_relabel_raw(const char * scon, [all...] |
/external/libselinux/include/selinux/ |
selinux.h | 164 extern int security_compute_av(const char * scon, 172 extern int security_compute_create(const char * scon, 179 extern int security_compute_relabel(const char * scon, 186 extern int security_compute_member(const char * scon, 193 extern int security_compute_user(const char * scon, 277 extern int selinux_check_access(const char * scon,
|
/external/libselinux/src/ |
checkAccess.c | 20 int selinux_check_access(const char * scon, const char * tcon, const char *class, const char *perm, void *aux) { 32 rc = avc_context_to_sid(scon, &scon_id);
|
compute_av.c | 13 int security_compute_av(const char * scon, 41 snprintf(buf, len, "%s %s %hu %x", scon, tcon,
|
compute_create.c | 13 int security_compute_create(const char * scon, 39 snprintf(buf, size, "%s %s %hu", scon, tcon, unmap_class(tclass));
|
/frameworks/base/core/java/android/os/ |
SELinux.java | 96 * @param scon The source or subject security context. 102 public static final native boolean checkSELinuxAccess(String scon, String tcon, String tclass, String perm);
|
/external/selinux/policycoreutils/secon/ |
secon.c | 626 security_context_t scon_trans, scon; local 633 scon = scon_raw; 635 scon = scon_trans; 637 if (!*scon) { /* --self-exec and --self-fs etc. */ 656 scon); 687 if (!(con = context_new(scon))) 688 errx(EXIT_FAILURE, "Couldn't create context from: %s", scon); 711 scon); 731 scon);
|
/external/selinux/policycoreutils/gui/ |
fcontextPage.py | 152 scon=context(scontext) 153 self.fcontextTypeEntry.set_text(scon.type) 154 self.fcontextMLSEntry.set_text(scon.mls)
|
/cts/tests/tests/security/src/android/security/cts/ |
SELinuxTest.java | 113 private static native boolean checkSELinuxAccess(String scon, String tcon, String tclass, String perm, String extra);
|
/system/core/debuggerd/ |
debuggerd.cpp | 151 char *scon = NULL, *tcon = NULL; local 166 if (getpeercon(s, &scon) < 0) { 176 allowed = (selinux_check_access(scon, tcon, tclass, perm, NULL) == 0); 179 freecon(scon);
|
/system/core/init/ |
init.cpp | 222 char* scon = NULL; local 225 scon = strdup(svc->seclabel); 226 if (!scon) { 247 rc = security_compute_create(mycon, fcon, string_to_security_class("process"), &scon); 248 if (rc == 0 && !strcmp(scon, mycon)) { 284 si->perm, si->uid, si->gid, si->socketcon ?: scon); 290 freecon(scon); 291 scon = NULL; 379 freecon(scon); [all...] |
/external/selinux/policycoreutils/sandbox/ |
seunshare.c | 555 security_context_t scon; local 598 if (getpidcon(id, &scon) == 0) { 600 context_t pidcon = context_new(scon); 606 freecon(scon);
|