/external/selinux/libsemanage/src/ |
context_record.c | 22 return sepol_context_set_user(handle->sepolh, con, user); 36 return sepol_context_set_role(handle->sepolh, con, role); 50 return sepol_context_set_type(handle->sepolh, con, type); 64 return sepol_context_set_mls(handle->sepolh, con, mls_range); 72 return sepol_context_create(handle->sepolh, con_ptr); 80 return sepol_context_clone(handle->sepolh, con, con_ptr); 98 return sepol_context_from_string(handle->sepolh, str, con); 107 return sepol_context_to_string(handle->sepolh, con, str_ptr);
|
node_record.c | 59 return sepol_node_key_create(handle->sepolh, addr, mask, proto, 68 return sepol_node_key_extract(handle->sepolh, node, key_ptr); 86 return sepol_node_get_addr(handle->sepolh, node, addr_ptr); 96 return sepol_node_get_addr_bytes(handle->sepolh, node, addr, addr_sz); 105 return sepol_node_set_addr(handle->sepolh, node, proto, addr); 115 return sepol_node_set_addr_bytes(handle->sepolh, node, addr, addr_sz); 125 return sepol_node_get_mask(handle->sepolh, node, mask_ptr); 135 return sepol_node_get_mask_bytes(handle->sepolh, node, mask, mask_sz); 144 return sepol_node_set_mask(handle->sepolh, node, proto, mask); 154 return sepol_node_set_mask_bytes(handle->sepolh, node, mask, mask_sz) [all...] |
user_base_record.c | 33 return sepol_user_key_extract(handle->sepolh, user, key); 71 return sepol_user_set_name(handle->sepolh, user, name); 87 return sepol_user_set_mlslevel(handle->sepolh, user, mls_level); 102 return sepol_user_set_mlsrange(handle->sepolh, user, mls_range); 117 return sepol_user_add_role(handle->sepolh, user, role); 140 return sepol_user_get_roles(handle->sepolh, user, roles_arr, num_roles); 149 return sepol_user_set_roles(handle->sepolh, user, roles_arr, num_roles); 157 return sepol_user_create(handle->sepolh, user_ptr); 165 return sepol_user_clone(handle->sepolh, user, user_ptr);
|
iface_record.c | 56 return sepol_iface_key_create(handle->sepolh, name, key_ptr); 64 return sepol_iface_key_extract(handle->sepolh, iface, key_ptr); 90 return sepol_iface_set_name(handle->sepolh, iface, name); 108 return sepol_iface_set_ifcon(handle->sepolh, iface, con); 126 return sepol_iface_set_msgcon(handle->sepolh, iface, con); 136 return sepol_iface_create(handle->sepolh, iface_ptr); 146 return sepol_iface_clone(handle->sepolh, iface, iface_ptr);
|
debug.c | 97 sepol_handle_t * sepolh, 111 sh->msg_fname = sepol_msg_get_fname(sepolh); 112 sh->msg_channel = sepol_msg_get_channel(sepolh); 113 sh->msg_level = sepol_msg_get_level(sepolh); /* XXX should map values */
|
boolean_record.c | 30 return sepol_bool_key_create(handle->sepolh, name, key); 38 return sepol_bool_key_extract(handle->sepolh, boolean, key); 89 rc = sepol_bool_set_name(handle->sepolh, boolean, subname); 118 return sepol_bool_create(handle->sepolh, bool_ptr); 128 return sepol_bool_clone(handle->sepolh, boolean, bool_ptr);
|
port_record.c | 57 return sepol_port_key_create(handle->sepolh, low, high, proto, key_ptr); 65 return sepol_port_key_extract(handle->sepolh, port, key_ptr); 149 return sepol_port_set_con(handle->sepolh, port, con); 159 return sepol_port_create(handle->sepolh, port_ptr); 169 return sepol_port_clone(handle->sepolh, port, port_ptr);
|
database_policydb.c | 130 sepol_policy_file_set_handle(pf, handle->sepolh); 247 if (dbase->rptable->add(handle->sepolh, dbase->policydb, key, data) < 0) 263 if (dbase->rptable->set(handle->sepolh, dbase->policydb, key, data) < 0) 280 if (dbase->rptable->modify(handle->sepolh, 324 if (dbase->rptable->query(handle->sepolh, 340 if (dbase->rptable->exists(handle->sepolh, 356 if (dbase->rptable->count(handle->sepolh, 373 if (dbase->rptable->iterate(handle->sepolh, 415 if (dbase->rptable->count(handle->sepolh, 428 if (dbase->rptable->iterate(handle->sepolh, [all...] |
handle.c | 77 sh->sepolh = sepol_handle_create(); 78 if (!sh->sepolh) 80 sepol_msg_set_callback(sh->sepolh, semanage_msg_relay_handler, sh); 199 return sepol_get_disable_dontaudit(sh->sepolh); 206 sepol_set_disable_dontaudit(sh->sepolh, disable_dontaudit); 213 return sepol_get_preserve_tunables(sh->sepolh); 220 sepol_set_preserve_tunables(sh->sepolh, preserve_tunables); 389 sepol_handle_destroy(sh->sepolh);
|
fcontexts_local.c | 104 && sepol_context_check(handle->sepolh, policydb,
|
handle.h | 56 sepol_handle_t *sepolh; member in struct:semanage_handle
|
seusers_local.c | 273 if (sepol_mls_check(handle->sepolh, policydb, mls_range) < 0) 275 if (sepol_mls_contains(handle->sepolh, policydb,
|
genhomedircon.c | 538 result = sepol_context_from_string(s->h_semanage->sepolh, 541 sepol_msg_set_callback(s->h_semanage->sepolh, NULL, NULL); 542 result = sepol_context_check(s->h_semanage->sepolh, 544 sepol_msg_set_callback(s->h_semanage->sepolh,
|
direct_api.c | 279 sepol_set_disable_dontaudit(sh->sepolh, 1); 281 sepol_set_disable_dontaudit(sh->sepolh, 0); 1100 dontaudit_modified = !(sepol_get_disable_dontaudit(sh->sepolh) == 1); 1102 dontaudit_modified = (sepol_get_disable_dontaudit(sh->sepolh) == 1); 1103 if (sepol_get_disable_dontaudit(sh->sepolh) == 1) { 1125 preserve_tunables_modified = !(sepol_get_preserve_tunables(sh->sepolh) == 1); 1127 preserve_tunables_modified = (sepol_get_preserve_tunables(sh->sepolh) == 1); 1128 if (sepol_get_preserve_tunables(sh->sepolh) == 1) { [all...] |
user_record.c | 37 return sepol_user_key_create(handle->sepolh, name, key);
|
modules.c | 68 sepol_policy_file_set_handle(pf, sh->sepolh);
|