HomeSort by relevance Sort by last modified time
    Searched refs:policydb (Results 51 - 75 of 153) sorted by null

1 23 4 5 6 7

  /system/sepolicy/tools/sepolicy-analyze/
typecmp.c 2 #include <sepol/policydb/expand.h>
120 static int find_match(policydb_t *policydb, struct avtab_node *l1,
146 display_allow(policydb, &l1->key, idx1, perms1);
148 display_allow(policydb, &c->key, idx2, perms2);
157 static int analyze_types(policydb_t * policydb, char diff, char equiv)
168 type_rules = malloc(sizeof(struct avtab_node) * policydb->p_types.nprim);
173 memset(type_rules, 0, sizeof(struct avtab_node) * policydb->p_types.nprim);
180 if (expand_avtab(policydb, &policydb->te_avtab, &exp_avtab)) {
186 if (expand_avtab(policydb, &policydb->te_cond_avtab, &exp_cond_avtab))
    [all...]
sepolicy-analyze.c 20 int (*func) (int argc, char **argv, policydb_t *policydb);
46 policydb_t policydb; local
53 if(load_policy(policy, &policydb, &pf))
57 rc = analyze_components[i].func(argc - 2, argv + 2, &policydb);
neverallow.c 20 static int read_typeset(policydb_t *policydb, char **ptr, char *end,
113 type = hashtab_search(policydb->p_types.table, id);
124 rc = ebitmap_union(&typeset->negset, &policydb->attr_type_map[type->s.value - 1]);
126 rc = ebitmap_union(&typeset->types, &policydb->attr_type_map[type->s.value - 1]);
144 for (bit = 0; bit < policydb->p_types.nprim; bit++) {
147 if (policydb->type_val_to_struct[bit] &&
148 policydb->type_val_to_struct[bit]->flavor == TYPE_ATTRIB)
163 for (bit = 0; bit < policydb->p_types.nprim; bit++) {
164 if (policydb->type_val_to_struct[bit] &&
165 policydb->type_val_to_struct[bit]->flavor == TYPE_ATTRIB
    [all...]
  /external/selinux/libsemanage/src/
fcontexts_local.c 10 #include <sepol/policydb.h>
84 const sepol_policydb_t *policydb; member in struct:validate_handler_arg
95 const sepol_policydb_t *policydb = arg->policydb; local
104 && sepol_context_check(handle->sepolh, policydb,
122 const sepol_policydb_t * policydb)
127 arg.policydb = policydb;
database_policydb.c 18 #include <sepol/policydb.h>
25 /* POLICYDB dbase */
37 sepol_policydb_t *policydb; member in struct:dbase_policydb
48 sepol_policydb_free(dbase->policydb);
94 sepol_policydb_t *policydb = NULL; local
107 if (sepol_policydb_create(&policydb) < 0) {
108 ERR(handle, "could not create policydb object");
113 * ENOENT is not fatal - we just create an empty policydb */
121 /* If the file was opened successfully, read a policydb */
132 if (sepol_policydb_read(policydb, pf) < 0
    [all...]
fcontext_internal.h 7 #include <sepol/policydb.h>
41 policydb);
seuser_internal.h 7 #include <sepol/policydb.h>
41 policydb);
  /external/selinux/libsepol/cil/test/unit/
test_cil_symtab.c 30 #include <sepol/policydb/policydb.h>
test_cil_fqn.c 30 #include <sepol/policydb/policydb.h>
  /external/selinux/libsepol/include/sepol/policydb/
avrule_block.h 23 #include <sepol/policydb/policydb.h>
symtab.h 16 #include <sepol/policydb/hashtab.h>
conditional.h 24 #include <sepol/policydb/flask_types.h>
25 #include <sepol/policydb/avtab.h>
26 #include <sepol/policydb/symtab.h>
27 #include <sepol/policydb/policydb.h>
services.h 15 #include <sepol/policydb/flask_types.h>
16 #include <sepol/policydb/policydb.h>
22 /* Set the policydb and sidtab structures to be used by
32 /* Modify a policydb for boolean settings. */
33 int sepol_genbools_policydb(policydb_t * policydb, const char *booleans);
35 /* Modify a policydb for user settings. */
36 int sepol_genusers_policydb(policydb_t * policydb, const char *usersdir);
38 /* Load the security policy. This initializes the policydb
  /external/selinux/libsepol/tests/
test-common.h 25 #include <sepol/policydb/policydb.h>
39 /* Test the indexes in the policydb to ensure their correctness. These include
test-linker.c 37 #include <sepol/policydb/policydb.h>
38 #include <sepol/policydb/link.h>
39 #include <sepol/policydb/conditional.h>
40 #include <sepol/policydb/expand.h>
  /external/selinux/checkpolicy/
checkpolicy.h 4 #include <sepol/policydb/ebitmap.h>
  /external/selinux/libsepol/src/
polcaps.c 6 #include <sepol/policydb/polcaps.h>
ports.c 8 #include <sepol/policydb/policydb.h>
42 const policydb_t * policydb,
74 if (context_from_record(handle, policydb, &tmp_con,
101 const policydb_t * policydb,
124 if (context_to_record(handle, policydb, con, &tmp_con) < 0)
149 const policydb_t *policydb = &p->p; local
151 head = policydb->ocontexts[OCON_PORT];
167 const policydb_t *policydb = &p->p; local
178 head = policydb->ocontexts[OCON_PORT]
205 const policydb_t *policydb = &p->p; local
245 policydb_t *policydb = &p->p; local
282 const policydb_t *policydb = &p->p; local
    [all...]
mls.c 30 #include <sepol/policydb/policydb.h>
31 #include <sepol/policydb/services.h>
32 #include <sepol/policydb/flask.h>
33 #include <sepol/policydb/context.h>
43 const policydb_t * policydb,
50 int len = mls_compute_context_len(policydb, mls) + 1;
61 mls_sid_to_context(policydb, mls, &ptr);
79 const policydb_t * policydb,
88 if (mls_context_to_sid(policydb, '$', &tmp_cp, mls) < 0)
    [all...]
symtab.c 11 #include <sepol/policydb/hashtab.h>
12 #include <sepol/policydb/symtab.h>
  /external/selinux/policycoreutils/sepolicy/
info.c 89 * @param policydb Reference to a policy
93 static PyObject* get_sens(const char *name, const apol_policy_t * policydb)
105 qpol_policy_t *q = apol_policy_get_qpol(policydb);
110 if (apol_level_query_set_sens(policydb, query, name))
112 if (apol_level_get_by_query(policydb, query, &v))
121 ap_mls_lvl = (apol_mls_level_t *) apol_mls_level_create_from_qpol_level_datum(policydb, level);
122 tmp = apol_mls_level_render(policydb, ap_mls_lvl);
164 apol_policy_t *policydb = NULL; local
168 policydb = (apol_policy_t *) data;
169 q = apol_policy_get_qpol(policydb);
204 apol_policy_t *policydb = NULL; local
    [all...]
  /external/selinux/policycoreutils/sepolgen-ifgen/
sepolgen-ifgen-attr-helper.c 25 #include <sepol/policydb/policydb.h>
26 #include <sepol/policydb/avtab.h>
27 #include <sepol/policydb/util.h>
147 policydb_t *policydb; local
163 policydb = malloc(sizeof(policydb_t));
164 if (policydb == NULL) {
169 if (policydb_init(policydb)) {
171 free(policydb);
175 ret = policydb_read(policydb, &pf, 1)
    [all...]
  /system/sepolicy/tools/
sepolicy-check.c 9 #include <sepol/policydb/policydb.h>
10 #include <sepol/policydb/services.h>
11 #include <sepol/policydb/expand.h>
188 int load_policy(char *filename, policydb_t *policydb, struct policy_file *pf) {
215 if (policydb_init(policydb)) {
216 fprintf(stderr, "Could not initialize policydb!\n");
221 ret = policydb_read(policydb, pf, 0);
236 policydb_t policydb; local
276 sepol_set_policydb(&policydb);
    [all...]
  /external/selinux/checkpolicy/test/
dismod.c 30 #include <sepol/policydb/policydb.h>
31 #include <sepol/policydb/services.h>
32 #include <sepol/policydb/conditional.h>
33 #include <sepol/policydb/flask.h>
34 #include <sepol/policydb/link.h>
35 #include <sepol/policydb/module.h>
36 #include <sepol/policydb/util.h>
37 #include <sepol/policydb/polcaps.h>
57 static policydb_t policydb; variable
    [all...]
dispol.c 20 #include <sepol/policydb/policydb.h>
21 #include <sepol/policydb/avtab.h>
22 #include <sepol/policydb/services.h>
23 #include <sepol/policydb/conditional.h>
24 #include <sepol/policydb/util.h>
25 #include <sepol/policydb/polcaps.h>
37 static policydb_t policydb; variable
409 if (policydb_init(&policydb)) {
413 ret = policydb_read(&policydb, &pf, 1)
    [all...]

Completed in 488 milliseconds

1 23 4 5 6 7