/external/selinux/libsemanage/src/ |
seuser_record.c | 27 * seuser ("role set") */ 48 ERR(handle, "out of memory, could not create seuser key"); 60 const semanage_seuser_t * seuser, 64 if (semanage_seuser_key_create(handle, seuser->name, key_ptr) < 0) 70 ERR(handle, "could not extract seuser key from record"); 84 int semanage_seuser_compare(const semanage_seuser_t * seuser, 88 return strcmp(seuser->name, key->name); 93 int semanage_seuser_compare2(const semanage_seuser_t * seuser, 97 return strcmp(seuser->name, seuser2->name); 102 static int semanage_seuser_compare2_qsort(const semanage_seuser_t ** seuser, 191 semanage_seuser_t *seuser = local [all...] |
seusers_file.c | 23 semanage_seuser_t * seuser, FILE * str) 26 const char *name = semanage_seuser_get_name(seuser); 27 const char *sename = semanage_seuser_get_sename(seuser); 28 const char *mls = semanage_seuser_get_mlsrange(seuser); 40 ERR(handle, "could not print seuser %s to stream", name); 45 parse_info_t * info, semanage_seuser_t * seuser) 58 if (semanage_seuser_set_name(handle, seuser, str) < 0) 73 if (semanage_seuser_set_sename(handle, seuser, str) < 0) 89 if (semanage_seuser_set_mlsrange(handle, seuser, str) < 0) 105 ERR(handle, "could not parse seuser record") [all...] |
seusers_local.c | 55 const semanage_seuser_t * seuser, 70 if (seuser) { 71 name = semanage_seuser_get_name(seuser); 72 sename = semanage_seuser_get_sename(seuser); 73 mls = semanage_seuser_get_mlsrange(seuser); 174 semanage_seuser_t *seuser = NULL; local 177 semanage_seuser_query(handle, key, &seuser); 178 if (semanage_seuser_audit(handle, NULL, seuser, AUDIT_ROLE_REMOVE, rc == 0) < 0) 180 if (seuser) 181 semanage_seuser_free(seuser); [all...] |
seuser_internal.h | 29 /* SEUSER RECORD: method table */
|
pywrap-test.py | 12 -S for add seuser (warning this will write!)\n\ 153 for seuser in slist: 154 if self.verbose: print "seseuser reference: ", seuser 155 print "seuser name: ", semanage.semanage_seuser_get_name(seuser) 156 print " seuser mls range: ", semanage.semanage_seuser_get_mlsrange(seuser) 157 print " seuser sename: ", semanage.semanage_seuser_get_sename(seuser) 158 semanage.semanage_seuser_free(seuser) [all...] |
genhomedircon.c | 553 const char *seuser, const char *home, 557 {.search_for = TEMPLATE_SEUSER,.replace_with = seuser}, 613 const char *seuser, const char *role_prefix) 618 {.search_for = TEMPLATE_SEUSER,.replace_with = seuser},
|
semanageswig_ruby.i | 128 /** seuser typemaps **/
|
/external/selinux/libsemanage/include/semanage/ |
seuser_record.h | 19 const semanage_seuser_t * seuser, 24 extern int semanage_seuser_compare(const semanage_seuser_t * seuser, 27 extern int semanage_seuser_compare2(const semanage_seuser_t * seuser, 31 extern const char *semanage_seuser_get_name(const semanage_seuser_t * seuser); 34 semanage_seuser_t * seuser, 38 extern const char *semanage_seuser_get_sename(const semanage_seuser_t * seuser); 41 semanage_seuser_t * seuser, 46 seuser); 49 semanage_seuser_t * seuser, 57 const semanage_seuser_t * seuser, [all...] |
/external/selinux/libsemanage/man/man3/ |
semanage_seuser.3 | 26 create a seuser 31 release resources for this seuser 36 create a key, which can be used to identify a seuser 41 release resources for this seuser key 46 create a key matching this seuser 51 create an identical seuser (deep-copy clone) 56 compare this seuser to the provided key 61 compare this seuser to another 68 return the name of this seuser 73 set the name of this seuser [all...] |
/external/selinux/libselinux/utils/ |
getseuser.c | 10 char *seuser = NULL, *level = NULL; local 19 rc = getseuserbyname(argv[1], &seuser, &level); 25 printf("seuser: %s, level %s\n", seuser, level); 26 n = get_ordered_context_list_with_level(seuser, level, argv[2], 34 free(seuser);
|
getdefaultcon.c | 23 char *user = NULL, *level = NULL, *role=NULL, *seuser=NULL, *dlevel=NULL; local 68 if ((ret = getseuser(user, service, &seuser, &dlevel)) == 0) { 71 ret=get_default_context_with_rolelevel(seuser, role, level,cur_context,&usercon); 73 ret=get_default_context_with_level(seuser, level, cur_context,&usercon); 79 printf("%s: %s from %s %s %s %s -> %s\n", argv[0], user, cur_context, seuser, role, level, usercon); 86 free(seuser);
|
/external/selinux/libselinux/src/ |
seusers.c | 20 char *luser = NULL, *seuser = NULL, *level = NULL; local 54 seuser = strdup(start); 55 if (!seuser) 58 if (!strcmp(seuser, "")) 80 *seuserp = seuser; 86 free(seuser); 179 char *seuser = NULL; local 195 rc = process_seusers(buffer, &username, &seuser, &level, 211 groupseuser = seuser; 216 defaultseuser = seuser; 272 char *seuser = NULL; local [all...] |
/external/selinux/policycoreutils/semanage/ |
semanage-login.8 | 5 .B semanage login [\-h] [\-n] [\-N] [\-s STORE] [ \-\-add \-s SEUSER \-r RANGE LOGIN | \-\-delete LOGIN | \-\-deleteall | \-\-extract | \-\-list [\-C] | \-\-modify \-s SEUSER \-r RANGE LOGIN ] 47 .I \-s SEUSER, \-\-seuser SEUSER
|
semanage-fcontext.8 | 6 .B semanage fcontext [\-h] [\-n] [\-N] [\-s STORE] [ \-\-add ( \-t TYPE \-f FTYPE \-r RANGE \-s SEUSER | \-e EQUAL ) FILE_SPEC ) | \-\-delete ( \-t TYPE \-f FTYPE | \-e EQUAL ) FILE_SPEC ) | \-\-deleteall | \-\-extract | \-\-list [\-C] | \-\-modify ( \-t TYPE \-f FTYPE \-r RANGE \-s SEUSER | \-e EQUAL ) FILE_SPEC ) ] 56 .I \-s SEUSER, \-\-seuser SEUSER
|
semanage-user.8 | 5 .B semanage user [\-h] [\-n] [\-N] [\-s STORE] [ \-\-add ( \-L LEVEL \-R ROLES \-r RANGE \-s SEUSER selinux_name) | \-\-delete selinux_name | \-\-deleteall | \-\-extract | \-\-list [\-C] | \-\-modify ( \-L LEVEL \-R ROLES \-r RANGE \-s SEUSER selinux_name ) ]
|
semanage | 49 usage_login_dict = {' --add': ('-s SEUSER', '-r RANGE', 'LOGIN',), ' --modify': ('-s SEUSER', '-r RANGE', 'LOGIN',), ' --delete': ('LOGIN',), ' --list': ('-C',), ' --extract': ('',), ' --deleteall': ('',)} 52 usage_fcontext_dict = {' --add': ('(', '-t TYPE', '-f FTYPE', '-r RANGE', '-s SEUSER', '|', '-e EQUAL', ')', 'FILE_SPEC', ')',), ' --delete': ('(', '-t TYPE', '-f FTYPE', '|', '-e EQUAL', ')', 'FILE_SPEC', ')',), ' --modify': ('(', '-t TYPE', '-f FTYPE', '-r RANGE', '-s SEUSER', '|', '-e EQUAL', ')', 'FILE_SPEC )',), ' --list': ('-C',), ' --extract': ('',), ' --deleteall': ('',)} 55 usage_user_dict = {' --add': ('(', '-L LEVEL', '-R ROLES', '-r RANGE', '-s SEUSER', 'selinux_name'')'), ' --delete': ('selinux_name',), ' --modify': ('(', '-L LEVEL', '-R ROLES', '-r RANGE', '-s SEUSER', 'selinux_name', ')'), ' --list': ('-C',), ' --extract': ('',), ' --deleteall': ('',)} 224 login_args = {'list': [('login', 'seuser'), ('')], 'add': [('locallist'), ('seuser', 'login')], 'modify': [('locallist'), ('login')], 'delete': [('locallist'), ('login')], 'extract': [('locallist', 'login', 'seuser'), ('')], 'deleteall': [('locallist'), ('')]} 232 OBJECT.add(args.login, args.seuser, args.range [all...] |
semanage-bash-completion.sh | 61 __get_login_opts () { echo '$ALL_OPTS $MANAGED_OPTS -s --seuser -r --range'; } 107 elif [ "$verb" = "" -a "$prev" = "-s" -o "$prev" = "--seuser" ]; then
|
seobject.py | 574 raise ValueError(_("Requires seuser or serange")) 601 raise ValueError(_("Could not query seuser for %s") % name) 834 self.mylog.log("seuser", sename=name, serole=",".join(roles), serange=serange) 900 self.mylog.log("seuser", sename=name, oldsename=name, serole=role, serange=serange, oldserole=oldserole, oldserange=oldserange) [all...] |
/external/selinux/policycoreutils/semodule_package/ |
semodule_package.8 | 31 .B \-s \-\-seuser <seuser file> 32 seuser file to be included in the package.
|
semodule_package.c | 33 printf(" -s --seuser Seusers file (only valid in base)\n"); 105 {"seuser", required_argument, NULL, 's'}, 151 "May not specify more than one seuser file\n");
|
/external/selinux/libselinux/man/man5/ |
service_seusers.5 | 26 .IB service : seuser \fR[\fB:\fIrange\fR] 35 .I seuser
|
/external/selinux/policycoreutils/gui/ |
loginsPage.py | 115 seuser = store.get_value(iter, 1) 118 while iter != None and liststore.get_value(iter, 0) != seuser: 154 seuser = list_model.get_value(iter, 0) 156 (rc, out) = commands.getstatusoutput("semanage login -a -s %s -r %s %s" % (seuser, serange, target)) 164 self.store.set_value(iter, 1, seuser) 174 seuser = list_model.get_value(iter, 0) 176 (rc, out) = commands.getstatusoutput("semanage login -m -s %s -r %s %s" % (seuser, serange, target)) 184 self.store.set_value(iter, 1, seuser)
|
/external/selinux/policycoreutils/sepolicy/ |
selinux_client.py | 20 cust_dict["login"][rec[-1]] = {"seuser": rec[3], "range": rec[5]}
|
/external/selinux/libsepol/src/ |
module.c | 533 "found multiple seuser sections in module package (at section %u)", 546 "invalid seuser section at section %u", i); 704 /* skip seuser */ 707 "found seuser sections in module package (at section %u)", 902 "seuser and user_extra sections only supported in base");
|
/external/selinux/libsemanage/ |
ChangeLog | 200 * allow fcontext and seuser changes without rebuilding the policy from Dan Walsh 440 * Merged seuser/user_extra support patch from Joshua Brindle. 453 * Merged seuser -> seuser_local rename patch from Ivan Gyurdiev. 596 * Merged move seuser validation patch from Ivan Gyurdiev. 642 * Merged seuser parser resync, dbase tracking and cleanup, strtol 753 * Merged seuser database patch from Ivan Gyurdiev. 758 Merged seuser record patch from Ivan Gyurdiev.
|