/prebuilts/ndk/current/platforms/android-24/arch-x86/usr/include/linux/ |
xattr.h | 46 #define XATTR_SELINUX_SUFFIX "selinux"
|
/prebuilts/ndk/current/platforms/android-24/arch-x86_64/usr/include/linux/ |
xattr.h | 46 #define XATTR_SELINUX_SUFFIX "selinux"
|
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/ |
test_commands.py | 55 # . = has a SELinux security context
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/setools/ |
boolquery.py | 27 """Query SELinux policy Booleans.
|
rolequery.py | 29 Query SELinux policy roles.
|
typeattrquery.py | 29 Query SELinux policy type attributes.
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/setools/policyrep/ |
context.py | 39 """A SELinux security context/security attribute."""
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/ |
test_commands.py | 55 # . = has a SELinux security context
|
/system/core/init/ |
devices.cpp | 34 #include <selinux/selinux.h> 35 #include <selinux/label.h> 36 #include <selinux/android.h> 37 #include <selinux/avc.h> 162 // Now fixup SELinux file labels 246 ERROR("Device '%s' not created; cannot find SELinux label (%s)\n", 259 /* If the node already exists update its SELinux label to handle cases when 263 ERROR("Cannot set '%s' SELinux label on '%s' device (%s)\n",
|
/system/sepolicy/ |
domain_deprecated.te | 63 # Get SELinux enforcing status.
|
/external/selinux/policycoreutils/ |
ChangeLog | 23 * org.selinux.policy: Require auth_admin_keep for all actions, from Stephen Smalley. 45 installed in /var/libexec/selinux/hll/ by default, from Steve Lawrence 59 * selinux_current_policy_path will return none on a disabled SELinux system from Dan Walsh. 111 * Add org.selinux.config.policy from Dan Walsh. 155 * gui: system-config-selinux: Catch no DISPLAY= error 159 * gui: system-config-selinux: do not use lokkit 190 * gui: system-config-selinux gui 198 * gui: polgen: sort selinux types of user controls 262 * Added SELinux config file man page. 305 * semanage: Catch RuntimeErrors, that can be generated when SELinux is disable [all...] |
/external/dbus/cmake/bus/ |
dbus-daemon.xml | 625 <term><emphasis remap='I'><selinux></emphasis></term> 633 <para>The <selinux> element contains settings related to Security Enhanced Linux. 646 <para>An <associate> element appears below an <selinux> element and 656 short discussion of SELinux below.</para> 677 <refsect1 id='selinux'><title>SELinux</title> 678 <para>See <ulink url='http://www.nsa.gov/selinux/'>http://www.nsa.gov/selinux/</ulink> for full details on SELinux. Some useful excerpts:</para> 689 greater efficiency, the policy enforcement code of SELinux typicall [all...] |
CMakeLists.txt | 63 ${BUS_DIR}/selinux.h 64 ${BUS_DIR}/selinux.c
|
/external/selinux/policycoreutils/newrole/ |
newrole.c | 7 * This program allows a user to change their SELinux RBAC role and/or 8 * SELinux TE type (domain) in a manner similar to the way the traditional 68 #include <selinux/selinux.h> /* for is_selinux_enabled() */ 69 #include <selinux/context.h> /* for context-mangling functions */ 70 #include <selinux/get_default_type.h> 71 #include <selinux/get_context_list.h> /* for SELINUX_DEFAULTUSER */ 99 #define PAM_SERVICE_CONFIG "/etc/selinux/newrole_pam.conf"; 696 * This function will not fail if it can not relabel the tty when selinux is 877 "SELinux MLS support.\n")) [all...] |
/external/selinux/sepolgen/src/sepolgen/ |
refpolicy.py | 21 import selinux namespace 221 formatted to match SELinux space separated list conventions. 243 # Basic SELinux types 260 """An SELinux security context with optional MCS / MLS fields.""" 326 if selinux.is_selinux_mls_enabled() == 1: 335 """SELinux object class and permissions. 337 This class is a basic representation of an SELinux object 350 """SElinux typeattribute statement. 363 """SElinux roleattribute statement. 432 """SELinux access vector (AV) rule [all...] |
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/sepolgen/ |
refpolicy.py | 21 import selinux namespace 221 formatted to match SELinux space separated list conventions. 243 # Basic SELinux types 260 """An SELinux security context with optional MCS / MLS fields.""" 326 if selinux.is_selinux_mls_enabled() == 1: 335 """SELinux object class and permissions. 337 This class is a basic representation of an SELinux object 350 """SElinux typeattribute statement. 363 """SElinux roleattribute statement. 432 """SELinux access vector (AV) rule [all...] |
/external/selinux/policycoreutils/sepolicy/sepolicy/ |
sepolicy.glade | 413 <!-- column-name SELinux --> 511 <property name="tooltip_text" translatable="yes">Specify a new SELinux user name. By convention SELinux User names usually end in an _u.</property> [all...] |
gui.py | 6 # selinux gui is a tool for the examining and modifying SELinux policy 35 import selinux namespace 36 from selinux import DISABLED, PERMISSIVE, ENFORCING 139 self.initialtype = selinux.selinux_getpolicytype()[1] 343 self.writable_files_liststore = builder.get_object("writable_files_treestore") # Contains the tree with File Path, SELinux File Label, Class 452 self.context_id = self.status_bar.get_context_id("SELinux status") [all...] |
/external/ipsec-tools/src/racoon/ |
policy.h | 156 #include <selinux/selinux.h>
|
/external/libselinux/include/selinux/ |
label.h | 11 #include <selinux/selinux.h>
|
/external/selinux/libselinux/include/selinux/ |
label.h | 11 #include <selinux/selinux.h>
|
/external/selinux/libselinux/utils/ |
avcstat.c | 2 * avcstat - Display SELinux avc statistics. 67 ("Display SELinux AVC statistics. If the interval parameter is specified, the\n");
|
/external/selinux/libsemanage/src/ |
user_record.c | 3 /* Object: semanage_user_t (SELinux User/Class) 4 * Object: semanage_user_key_t (SELinux User/Class Key)
|
/external/selinux/policycoreutils/gui/ |
domainsPage.py | 1 ## domainsPage.py - show selinux domains 27 import selinux namespace
|
/external/selinux/policycoreutils/po/ |
Makefile | 59 ../gui/system-config-selinux.glade \ 60 ../gui/system-config-selinux.py \
|