/system/sepolicy/tools/sepolicy-analyze/ |
typecmp.c | 2 #include <sepol/policydb/expand.h> 120 static int find_match(policydb_t *policydb, struct avtab_node *l1, 146 display_allow(policydb, &l1->key, idx1, perms1); 148 display_allow(policydb, &c->key, idx2, perms2); 157 static int analyze_types(policydb_t * policydb, char diff, char equiv) 168 type_rules = malloc(sizeof(struct avtab_node) * policydb->p_types.nprim); 173 memset(type_rules, 0, sizeof(struct avtab_node) * policydb->p_types.nprim); 180 if (expand_avtab(policydb, &policydb->te_avtab, &exp_avtab)) { 186 if (expand_avtab(policydb, &policydb->te_cond_avtab, &exp_cond_avtab)) [all...] |
sepolicy-analyze.c | 20 int (*func) (int argc, char **argv, policydb_t *policydb); 46 policydb_t policydb; local 53 if(load_policy(policy, &policydb, &pf)) 57 rc = analyze_components[i].func(argc - 2, argv + 2, &policydb);
|
neverallow.c | 20 static int read_typeset(policydb_t *policydb, char **ptr, char *end, 113 type = hashtab_search(policydb->p_types.table, id); 124 rc = ebitmap_union(&typeset->negset, &policydb->attr_type_map[type->s.value - 1]); 126 rc = ebitmap_union(&typeset->types, &policydb->attr_type_map[type->s.value - 1]); 144 for (bit = 0; bit < policydb->p_types.nprim; bit++) { 147 if (policydb->type_val_to_struct[bit] && 148 policydb->type_val_to_struct[bit]->flavor == TYPE_ATTRIB) 163 for (bit = 0; bit < policydb->p_types.nprim; bit++) { 164 if (policydb->type_val_to_struct[bit] && 165 policydb->type_val_to_struct[bit]->flavor == TYPE_ATTRIB [all...] |
/external/selinux/libsemanage/src/ |
fcontexts_local.c | 10 #include <sepol/policydb.h> 84 const sepol_policydb_t *policydb; member in struct:validate_handler_arg 95 const sepol_policydb_t *policydb = arg->policydb; local 104 && sepol_context_check(handle->sepolh, policydb, 122 const sepol_policydb_t * policydb) 127 arg.policydb = policydb;
|
database_policydb.c | 18 #include <sepol/policydb.h> 25 /* POLICYDB dbase */ 37 sepol_policydb_t *policydb; member in struct:dbase_policydb 48 sepol_policydb_free(dbase->policydb); 94 sepol_policydb_t *policydb = NULL; local 107 if (sepol_policydb_create(&policydb) < 0) { 108 ERR(handle, "could not create policydb object"); 113 * ENOENT is not fatal - we just create an empty policydb */ 121 /* If the file was opened successfully, read a policydb */ 132 if (sepol_policydb_read(policydb, pf) < 0 [all...] |
fcontext_internal.h | 7 #include <sepol/policydb.h> 41 policydb);
|
seuser_internal.h | 7 #include <sepol/policydb.h> 41 policydb);
|
/external/selinux/libsepol/cil/test/unit/ |
test_cil_symtab.c | 30 #include <sepol/policydb/policydb.h>
|
test_cil_fqn.c | 30 #include <sepol/policydb/policydb.h>
|
/external/selinux/libsepol/include/sepol/policydb/ |
avrule_block.h | 23 #include <sepol/policydb/policydb.h>
|
symtab.h | 16 #include <sepol/policydb/hashtab.h>
|
conditional.h | 24 #include <sepol/policydb/flask_types.h> 25 #include <sepol/policydb/avtab.h> 26 #include <sepol/policydb/symtab.h> 27 #include <sepol/policydb/policydb.h>
|
services.h | 15 #include <sepol/policydb/flask_types.h> 16 #include <sepol/policydb/policydb.h> 22 /* Set the policydb and sidtab structures to be used by 32 /* Modify a policydb for boolean settings. */ 33 int sepol_genbools_policydb(policydb_t * policydb, const char *booleans); 35 /* Modify a policydb for user settings. */ 36 int sepol_genusers_policydb(policydb_t * policydb, const char *usersdir); 38 /* Load the security policy. This initializes the policydb
|
/external/selinux/libsepol/tests/ |
test-common.h | 25 #include <sepol/policydb/policydb.h> 39 /* Test the indexes in the policydb to ensure their correctness. These include
|
test-linker.c | 37 #include <sepol/policydb/policydb.h> 38 #include <sepol/policydb/link.h> 39 #include <sepol/policydb/conditional.h> 40 #include <sepol/policydb/expand.h>
|
/external/selinux/checkpolicy/ |
checkpolicy.h | 4 #include <sepol/policydb/ebitmap.h>
|
/external/selinux/libsepol/src/ |
polcaps.c | 6 #include <sepol/policydb/polcaps.h>
|
ports.c | 8 #include <sepol/policydb/policydb.h> 42 const policydb_t * policydb, 74 if (context_from_record(handle, policydb, &tmp_con, 101 const policydb_t * policydb, 124 if (context_to_record(handle, policydb, con, &tmp_con) < 0) 149 const policydb_t *policydb = &p->p; local 151 head = policydb->ocontexts[OCON_PORT]; 167 const policydb_t *policydb = &p->p; local 178 head = policydb->ocontexts[OCON_PORT] 205 const policydb_t *policydb = &p->p; local 245 policydb_t *policydb = &p->p; local 282 const policydb_t *policydb = &p->p; local [all...] |
mls.c | 30 #include <sepol/policydb/policydb.h> 31 #include <sepol/policydb/services.h> 32 #include <sepol/policydb/flask.h> 33 #include <sepol/policydb/context.h> 43 const policydb_t * policydb, 50 int len = mls_compute_context_len(policydb, mls) + 1; 61 mls_sid_to_context(policydb, mls, &ptr); 79 const policydb_t * policydb, 88 if (mls_context_to_sid(policydb, '$', &tmp_cp, mls) < 0) [all...] |
symtab.c | 11 #include <sepol/policydb/hashtab.h> 12 #include <sepol/policydb/symtab.h>
|
/external/selinux/policycoreutils/sepolicy/ |
info.c | 89 * @param policydb Reference to a policy 93 static PyObject* get_sens(const char *name, const apol_policy_t * policydb) 105 qpol_policy_t *q = apol_policy_get_qpol(policydb); 110 if (apol_level_query_set_sens(policydb, query, name)) 112 if (apol_level_get_by_query(policydb, query, &v)) 121 ap_mls_lvl = (apol_mls_level_t *) apol_mls_level_create_from_qpol_level_datum(policydb, level); 122 tmp = apol_mls_level_render(policydb, ap_mls_lvl); 164 apol_policy_t *policydb = NULL; local 168 policydb = (apol_policy_t *) data; 169 q = apol_policy_get_qpol(policydb); 204 apol_policy_t *policydb = NULL; local [all...] |
/external/selinux/policycoreutils/sepolgen-ifgen/ |
sepolgen-ifgen-attr-helper.c | 25 #include <sepol/policydb/policydb.h> 26 #include <sepol/policydb/avtab.h> 27 #include <sepol/policydb/util.h> 147 policydb_t *policydb; local 163 policydb = malloc(sizeof(policydb_t)); 164 if (policydb == NULL) { 169 if (policydb_init(policydb)) { 171 free(policydb); 175 ret = policydb_read(policydb, &pf, 1) [all...] |
/system/sepolicy/tools/ |
sepolicy-check.c | 9 #include <sepol/policydb/policydb.h> 10 #include <sepol/policydb/services.h> 11 #include <sepol/policydb/expand.h> 188 int load_policy(char *filename, policydb_t *policydb, struct policy_file *pf) { 215 if (policydb_init(policydb)) { 216 fprintf(stderr, "Could not initialize policydb!\n"); 221 ret = policydb_read(policydb, pf, 0); 236 policydb_t policydb; local 276 sepol_set_policydb(&policydb); [all...] |
/external/selinux/checkpolicy/test/ |
dismod.c | 30 #include <sepol/policydb/policydb.h> 31 #include <sepol/policydb/services.h> 32 #include <sepol/policydb/conditional.h> 33 #include <sepol/policydb/flask.h> 34 #include <sepol/policydb/link.h> 35 #include <sepol/policydb/module.h> 36 #include <sepol/policydb/util.h> 37 #include <sepol/policydb/polcaps.h> 57 static policydb_t policydb; variable [all...] |
dispol.c | 20 #include <sepol/policydb/policydb.h> 21 #include <sepol/policydb/avtab.h> 22 #include <sepol/policydb/services.h> 23 #include <sepol/policydb/conditional.h> 24 #include <sepol/policydb/util.h> 25 #include <sepol/policydb/polcaps.h> 37 static policydb_t policydb; variable 409 if (policydb_init(&policydb)) { 413 ret = policydb_read(&policydb, &pf, 1) [all...] |