HomeSort by relevance Sort by last modified time
    Searched refs:sepolh (Results 1 - 16 of 16) sorted by null

  /external/selinux/libsemanage/src/
context_record.c 22 return sepol_context_set_user(handle->sepolh, con, user);
36 return sepol_context_set_role(handle->sepolh, con, role);
50 return sepol_context_set_type(handle->sepolh, con, type);
64 return sepol_context_set_mls(handle->sepolh, con, mls_range);
72 return sepol_context_create(handle->sepolh, con_ptr);
80 return sepol_context_clone(handle->sepolh, con, con_ptr);
98 return sepol_context_from_string(handle->sepolh, str, con);
107 return sepol_context_to_string(handle->sepolh, con, str_ptr);
node_record.c 59 return sepol_node_key_create(handle->sepolh, addr, mask, proto,
68 return sepol_node_key_extract(handle->sepolh, node, key_ptr);
86 return sepol_node_get_addr(handle->sepolh, node, addr_ptr);
96 return sepol_node_get_addr_bytes(handle->sepolh, node, addr, addr_sz);
105 return sepol_node_set_addr(handle->sepolh, node, proto, addr);
115 return sepol_node_set_addr_bytes(handle->sepolh, node, addr, addr_sz);
125 return sepol_node_get_mask(handle->sepolh, node, mask_ptr);
135 return sepol_node_get_mask_bytes(handle->sepolh, node, mask, mask_sz);
144 return sepol_node_set_mask(handle->sepolh, node, proto, mask);
154 return sepol_node_set_mask_bytes(handle->sepolh, node, mask, mask_sz)
    [all...]
user_base_record.c 33 return sepol_user_key_extract(handle->sepolh, user, key);
71 return sepol_user_set_name(handle->sepolh, user, name);
87 return sepol_user_set_mlslevel(handle->sepolh, user, mls_level);
102 return sepol_user_set_mlsrange(handle->sepolh, user, mls_range);
117 return sepol_user_add_role(handle->sepolh, user, role);
140 return sepol_user_get_roles(handle->sepolh, user, roles_arr, num_roles);
149 return sepol_user_set_roles(handle->sepolh, user, roles_arr, num_roles);
157 return sepol_user_create(handle->sepolh, user_ptr);
165 return sepol_user_clone(handle->sepolh, user, user_ptr);
iface_record.c 56 return sepol_iface_key_create(handle->sepolh, name, key_ptr);
64 return sepol_iface_key_extract(handle->sepolh, iface, key_ptr);
90 return sepol_iface_set_name(handle->sepolh, iface, name);
108 return sepol_iface_set_ifcon(handle->sepolh, iface, con);
126 return sepol_iface_set_msgcon(handle->sepolh, iface, con);
136 return sepol_iface_create(handle->sepolh, iface_ptr);
146 return sepol_iface_clone(handle->sepolh, iface, iface_ptr);
debug.c 97 sepol_handle_t * sepolh,
111 sh->msg_fname = sepol_msg_get_fname(sepolh);
112 sh->msg_channel = sepol_msg_get_channel(sepolh);
113 sh->msg_level = sepol_msg_get_level(sepolh); /* XXX should map values */
boolean_record.c 30 return sepol_bool_key_create(handle->sepolh, name, key);
38 return sepol_bool_key_extract(handle->sepolh, boolean, key);
89 rc = sepol_bool_set_name(handle->sepolh, boolean, subname);
118 return sepol_bool_create(handle->sepolh, bool_ptr);
128 return sepol_bool_clone(handle->sepolh, boolean, bool_ptr);
port_record.c 57 return sepol_port_key_create(handle->sepolh, low, high, proto, key_ptr);
65 return sepol_port_key_extract(handle->sepolh, port, key_ptr);
149 return sepol_port_set_con(handle->sepolh, port, con);
159 return sepol_port_create(handle->sepolh, port_ptr);
169 return sepol_port_clone(handle->sepolh, port, port_ptr);
database_policydb.c 130 sepol_policy_file_set_handle(pf, handle->sepolh);
247 if (dbase->rptable->add(handle->sepolh, dbase->policydb, key, data) < 0)
263 if (dbase->rptable->set(handle->sepolh, dbase->policydb, key, data) < 0)
280 if (dbase->rptable->modify(handle->sepolh,
324 if (dbase->rptable->query(handle->sepolh,
340 if (dbase->rptable->exists(handle->sepolh,
356 if (dbase->rptable->count(handle->sepolh,
373 if (dbase->rptable->iterate(handle->sepolh,
415 if (dbase->rptable->count(handle->sepolh,
428 if (dbase->rptable->iterate(handle->sepolh,
    [all...]
handle.c 77 sh->sepolh = sepol_handle_create();
78 if (!sh->sepolh)
80 sepol_msg_set_callback(sh->sepolh, semanage_msg_relay_handler, sh);
199 return sepol_get_disable_dontaudit(sh->sepolh);
206 sepol_set_disable_dontaudit(sh->sepolh, disable_dontaudit);
213 return sepol_get_preserve_tunables(sh->sepolh);
220 sepol_set_preserve_tunables(sh->sepolh, preserve_tunables);
389 sepol_handle_destroy(sh->sepolh);
fcontexts_local.c 104 && sepol_context_check(handle->sepolh, policydb,
handle.h 56 sepol_handle_t *sepolh; member in struct:semanage_handle
seusers_local.c 273 if (sepol_mls_check(handle->sepolh, policydb, mls_range) < 0)
275 if (sepol_mls_contains(handle->sepolh, policydb,
genhomedircon.c 538 result = sepol_context_from_string(s->h_semanage->sepolh,
541 sepol_msg_set_callback(s->h_semanage->sepolh, NULL, NULL);
542 result = sepol_context_check(s->h_semanage->sepolh,
544 sepol_msg_set_callback(s->h_semanage->sepolh,
direct_api.c 279 sepol_set_disable_dontaudit(sh->sepolh, 1);
281 sepol_set_disable_dontaudit(sh->sepolh, 0);
1100 dontaudit_modified = !(sepol_get_disable_dontaudit(sh->sepolh) == 1);
1102 dontaudit_modified = (sepol_get_disable_dontaudit(sh->sepolh) == 1);
1103 if (sepol_get_disable_dontaudit(sh->sepolh) == 1) {
1125 preserve_tunables_modified = !(sepol_get_preserve_tunables(sh->sepolh) == 1);
1127 preserve_tunables_modified = (sepol_get_preserve_tunables(sh->sepolh) == 1);
1128 if (sepol_get_preserve_tunables(sh->sepolh) == 1) {
    [all...]
user_record.c 37 return sepol_user_key_create(handle->sepolh, name, key);
modules.c 68 sepol_policy_file_set_handle(pf, sh->sepolh);

Completed in 167 milliseconds