/external/selinux/policycoreutils/sepolicy/ |
search.c | 92 bool role_allow; member in struct:options 118 if (!opt->role_allow && !opt->all) { 887 bool role_allow, 906 cmd_opts.role_allow = role_allow; 963 if (cmd_opts.all || cmd_opts.role_allow) { 1017 int role_allow = Dict_ContainsInt(dict, "role_allow"); variable 1028 return search(allow, neverallow, auditallow, dontaudit, transition, role_allow, src_name, tgt_name, class_name, permlist);
|
/external/selinux/policycoreutils/sepolicy/sepolicy/ |
__init__.py | 42 ROLE_ALLOW = 'role_allow' 52 valid_types = [ALLOW, AUDITALLOW, NEVERALLOW, DONTAUDIT, TRANSITION, ROLE_ALLOW] 488 for r in search([ROLE_ALLOW]):
|
manpage.py | [all...] |
/external/selinux/prebuilts/bin/ |
sesearch.py | 56 rbacrtypes.add_argument("--role_allow", action="append_const",
|
sediff.py | 65 rbacrule.add_argument("--role_allow", action="store_true", help="Print role allow rule differences") 92 args.type_trans, args.type_change, args.type_member, args.role_allow, [all...] |
/external/selinux/libsepol/include/sepol/policydb/ |
policydb.h | 153 typedef struct role_allow { struct 156 struct role_allow *next; 562 role_allow_t *role_allow; member in struct:policydb
|
/external/selinux/libsepol/cil/src/ |
cil_internal.h | 978 void cil_roleallow_init(struct cil_roleallow **role_allow);
|
cil_binary.c | [all...] |
/external/selinux/sepolgen/src/sepolgen/ |
refparser.py | 508 | role_allow 777 'role_allow : ALLOW names names SEMI'
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/sepolgen/ |
refparser.py | 509 | role_allow 778 'role_allow : ALLOW names names SEMI'
|
/external/selinux/libsepol/src/ |
services.c | 841 struct role_allow *ra; 934 for (ra = policydb->role_allow; ra; ra = ra->next) { [all...] |
expand.c | 1228 for (l = state->out->role_allow; l && l->next; l = l->next) ; 1252 cur_allow = state->out->role_allow; 1273 state->out->role_allow = n; [all...] |
policydb.c | 1369 for (ra = p->role_allow; ra; ra = ra->next) { [all...] |
write.c | [all...] |