/external/selinux/gui/ |
sepolgen | 2 sepolicy generate $*
|
/external/selinux/python/sepolicy/sepolicy/ |
booleans.py | 23 import sepolicy 28 return sepolicy.info(sepolicy.ATTRIBUTE, attribute)[0]["types"] 34 allows = sepolicy.search([sepolicy.ALLOW], {sepolicy.SOURCE: src, sepolicy.CLASS: tclass, sepolicy.PERMS: perm}) 39 for l in map(lambda y: y[sepolicy.TARGET], filter(lambda x: set(perm).issubset(x[sepolicy.PERMS]), allows)) [all...] |
communicate.py | 23 import sepolicy 37 return list(next(sepolicy.info(sepolicy.ATTRIBUTE, attribute))["types"]) 43 allows = sepolicy.search([sepolicy.ALLOW], {sepolicy.SOURCE: src, sepolicy.CLASS: tclass, sepolicy.PERMS: perm}) 48 for l in map(lambda y: y[sepolicy.TARGET], filter(lambda x: set(perm).issubset(x[sepolicy.PERMS]), allows)) [all...] |
network.py | 23 import sepolicy 27 allows = sepolicy.search([sepolicy.ALLOW], {sepolicy.SOURCE: src, sepolicy.CLASS: tclass, sepolicy.PERMS: perm}) 30 for i in map(lambda y: y[sepolicy.TARGET], filter(lambda x: set(perm).issubset(x[sepolicy.PERMS]) and (not check_bools or x["enabled"]), allows)): 37 portrecs, portrecsbynum = sepolicy.gen_port_dict()
|
transition.py | 23 import sepolicy 28 trans = sepolicy.search([sepolicy.ALLOW], {sepolicy.SOURCE: src}) 29 return map(lambda y: y[sepolicy.TARGET], filter(lambda x: "entrypoint" in x[sepolicy.PERMS], trans)) 33 return sepolicy.search([sepolicy.TRANSITION], {sepolicy.SOURCE: src, sepolicy.CLASS: "process"} [all...] |
manpage.py | 29 import sepolicy 47 tree = xml.etree.ElementTree.fromstring(sepolicy.policy_xml(path)) 76 allusers_info = sepolicy.info(sepolicy.USER) 94 all_entrypoints = sepolicy.info(sepolicy.ATTRIBUTE, "entry_type")[0]["types"] 105 for d in sepolicy.get_all_domains(): 114 for role in sepolicy.get_all_roles(): 129 all_types = sepolicy.info(sepolicy.TYPE [all...] |
/device/google/dragon/sepolicy/ |
keys.conf | 2 ALL : device/google/dragon/sepolicy/certs/app.x509.pem
|
/device/google/marlin/sepolicy/ |
keys.conf | 2 ALL : device/google/marlin/sepolicy/certs/app.x509.pem
|
/device/google/marlin/sepolicy/verizon/ |
keys.conf | 2 ALL : device/google/marlin/sepolicy/verizon/verizon.x509.pem
|
/external/selinux/policycoreutils/po/ |
Makefile | 64 ../sepolicy/sepolicy.py \ 65 ../sepolicy/sepolicy/communicate.py \ 66 ../sepolicy/sepolicy/__init__.py \ 67 ../sepolicy/sepolicy/network.py \ 68 ../sepolicy/sepolicy/generate.py [all...] |
/device/google/vrservices/vrcore/sepolicy/ |
keys.conf | 3 ALL : device/google/vrservices/vrcore/sepolicy/certs/vrcore-release.x509.pem 9 ENG : device/google/vrservices/vrcore/sepolicy/certs/vrcore.x509.pem 10 USERDEBUG : device/google/vrservices/vrcore/sepolicy/certs/vrcore.x509.pem 11 USER : device/google/vrservices/vrcore/sepolicy/certs/vrcore-dummy.x509.pem
|
/system/sepolicy/tools/ |
checkfc.c | 43 } sepolicy; member in struct:__anon107685 93 int bit_pos = get_attr_bit(global_state.sepolicy.pdb, *attributes); 159 int rc = sepol_context_from_string(global_state.sepolicy.handle, context, 166 rc = sepol_context_check(global_state.sepolicy.handle, 167 global_state.sepolicy.sdb, ctx); 176 res = !is_type_of_attribute_set(global_state.sepolicy.pdb, type_name, 196 fprintf(stderr, "usage1: %s [-l|-p|-s|-v] [-e] sepolicy context_file\n\n" 213 if (global_state.sepolicy.file) { 214 fclose(global_state.sepolicy.file); 217 if (global_state.sepolicy.sdb) [all...] |
Android.mk | 40 LOCAL_MODULE := sepolicy-check 43 LOCAL_SRC_FILES := sepolicy-check.c
|
/external/selinux/python/ |
Makefile | 1 SUBDIRS = sepolicy audit2allow semanage sepolgen chcat
|
/system/sepolicy/tools/sepolicy-analyze/ |
Android.mk | 6 LOCAL_MODULE := sepolicy-analyze 9 LOCAL_SRC_FILES := sepolicy-analyze.c dups.c neverallow.c perm.c typecmp.c booleans.c attribute.c utils.c
|
/cts/tools/selinux/ |
SELinuxNeverallowTestFrame.py | 68 sepolicyAnalyze = buildHelper.getTestFile("sepolicy-analyze"); 71 /* obtain sepolicy file from running device */ 72 devicePolicyFile = File.createTempFile("sepolicy", ".tmp"); 96 /* run sepolicy-analyze neverallow check on policy file using given neverallow rules */
|
/external/selinux/python/sepolicy/ |
Makefile | 17 BASHCOMPLETIONS=sepolicy-bash-completion.sh 29 ln -sf sepolicy sepolgen 37 install -m 755 sepolicy.py $(BINDIR)/sepolicy 38 (cd $(BINDIR); ln -sf sepolicy sepolgen) 42 install -m 644 $(BASHCOMPLETIONS) $(BASHCOMPLETIONDIR)/sepolicy
|
sepolicy.py | 27 import sepolicy 28 from sepolicy import get_os_version, get_conditionals, get_conditionals_format_text 48 usage = "sepolicy generate [-h] [-n NAME] [-p PATH] [" 63 domains = sepolicy.get_all_domains() 80 booleans = sepolicy.get_all_booleans() 103 domains = sepolicy.get_all_domains() 128 all_classes = map(lambda x: x['name'], sepolicy.info(sepolicy.TCLASS)) 138 from sepolicy.interface import get_admin 165 port_types = sepolicy.get_all_port_types( [all...] |
/device/generic/x86/ |
BoardConfig.mk | 37 BOARD_SEPOLICY_DIRS += build/target/board/generic/sepolicy 38 BOARD_SEPOLICY_DIRS += build/target/board/generic_x86/sepolicy
|
/device/generic/car/car-arm64/ |
BoardConfig.mk | 21 packages/services/Car/car_product/sepolicy \ 22 device/generic/car/common/sepolicy
|
/device/generic/car/car-x86/ |
BoardConfig.mk | 30 packages/services/Car/car_product/sepolicy \ 31 device/generic/car/common/sepolicy
|
/device/generic/car/car-x86_64/ |
BoardConfig.mk | 22 packages/services/Car/car_product/sepolicy \ 23 device/generic/car/common/sepolicy
|
/build/make/target/board/generic_mips/ |
BoardConfig.mk | 66 BOARD_SEPOLICY_DIRS += build/target/board/generic/sepolicy
|
/device/generic/car/car-armv7-a-neon/ |
BoardConfig.mk | 41 packages/services/Car/car_product/sepolicy \ 42 device/generic/car/common/sepolicy
|
/device/generic/mips/ |
BoardConfig.mk | 38 BOARD_SEPOLICY_DIRS += build/target/board/generic/sepolicy
|