HomeSort by relevance Sort by last modified time
    Searched refs:sepolicy (Results 1 - 25 of 63) sorted by null

1 2 3

  /external/selinux/gui/
sepolgen 2 sepolicy generate $*
  /external/selinux/python/sepolicy/sepolicy/
booleans.py 23 import sepolicy
28 return sepolicy.info(sepolicy.ATTRIBUTE, attribute)[0]["types"]
34 allows = sepolicy.search([sepolicy.ALLOW], {sepolicy.SOURCE: src, sepolicy.CLASS: tclass, sepolicy.PERMS: perm})
39 for l in map(lambda y: y[sepolicy.TARGET], filter(lambda x: set(perm).issubset(x[sepolicy.PERMS]), allows))
    [all...]
communicate.py 23 import sepolicy
37 return list(next(sepolicy.info(sepolicy.ATTRIBUTE, attribute))["types"])
43 allows = sepolicy.search([sepolicy.ALLOW], {sepolicy.SOURCE: src, sepolicy.CLASS: tclass, sepolicy.PERMS: perm})
48 for l in map(lambda y: y[sepolicy.TARGET], filter(lambda x: set(perm).issubset(x[sepolicy.PERMS]), allows))
    [all...]
network.py 23 import sepolicy
27 allows = sepolicy.search([sepolicy.ALLOW], {sepolicy.SOURCE: src, sepolicy.CLASS: tclass, sepolicy.PERMS: perm})
30 for i in map(lambda y: y[sepolicy.TARGET], filter(lambda x: set(perm).issubset(x[sepolicy.PERMS]) and (not check_bools or x["enabled"]), allows)):
37 portrecs, portrecsbynum = sepolicy.gen_port_dict()
transition.py 23 import sepolicy
28 trans = sepolicy.search([sepolicy.ALLOW], {sepolicy.SOURCE: src})
29 return map(lambda y: y[sepolicy.TARGET], filter(lambda x: "entrypoint" in x[sepolicy.PERMS], trans))
33 return sepolicy.search([sepolicy.TRANSITION], {sepolicy.SOURCE: src, sepolicy.CLASS: "process"}
    [all...]
manpage.py 29 import sepolicy
47 tree = xml.etree.ElementTree.fromstring(sepolicy.policy_xml(path))
76 allusers_info = sepolicy.info(sepolicy.USER)
94 all_entrypoints = sepolicy.info(sepolicy.ATTRIBUTE, "entry_type")[0]["types"]
105 for d in sepolicy.get_all_domains():
114 for role in sepolicy.get_all_roles():
129 all_types = sepolicy.info(sepolicy.TYPE
    [all...]
  /device/google/dragon/sepolicy/
keys.conf 2 ALL : device/google/dragon/sepolicy/certs/app.x509.pem
  /device/google/marlin/sepolicy/
keys.conf 2 ALL : device/google/marlin/sepolicy/certs/app.x509.pem
  /device/google/marlin/sepolicy/verizon/
keys.conf 2 ALL : device/google/marlin/sepolicy/verizon/verizon.x509.pem
  /external/selinux/policycoreutils/po/
Makefile 64 ../sepolicy/sepolicy.py \
65 ../sepolicy/sepolicy/communicate.py \
66 ../sepolicy/sepolicy/__init__.py \
67 ../sepolicy/sepolicy/network.py \
68 ../sepolicy/sepolicy/generate.py
    [all...]
  /device/google/vrservices/vrcore/sepolicy/
keys.conf 3 ALL : device/google/vrservices/vrcore/sepolicy/certs/vrcore-release.x509.pem
9 ENG : device/google/vrservices/vrcore/sepolicy/certs/vrcore.x509.pem
10 USERDEBUG : device/google/vrservices/vrcore/sepolicy/certs/vrcore.x509.pem
11 USER : device/google/vrservices/vrcore/sepolicy/certs/vrcore-dummy.x509.pem
  /system/sepolicy/tools/
checkfc.c 43 } sepolicy; member in struct:__anon107685
93 int bit_pos = get_attr_bit(global_state.sepolicy.pdb, *attributes);
159 int rc = sepol_context_from_string(global_state.sepolicy.handle, context,
166 rc = sepol_context_check(global_state.sepolicy.handle,
167 global_state.sepolicy.sdb, ctx);
176 res = !is_type_of_attribute_set(global_state.sepolicy.pdb, type_name,
196 fprintf(stderr, "usage1: %s [-l|-p|-s|-v] [-e] sepolicy context_file\n\n"
213 if (global_state.sepolicy.file) {
214 fclose(global_state.sepolicy.file);
217 if (global_state.sepolicy.sdb)
    [all...]
Android.mk 40 LOCAL_MODULE := sepolicy-check
43 LOCAL_SRC_FILES := sepolicy-check.c
  /external/selinux/python/
Makefile 1 SUBDIRS = sepolicy audit2allow semanage sepolgen chcat
  /system/sepolicy/tools/sepolicy-analyze/
Android.mk 6 LOCAL_MODULE := sepolicy-analyze
9 LOCAL_SRC_FILES := sepolicy-analyze.c dups.c neverallow.c perm.c typecmp.c booleans.c attribute.c utils.c
  /cts/tools/selinux/
SELinuxNeverallowTestFrame.py 68 sepolicyAnalyze = buildHelper.getTestFile("sepolicy-analyze");
71 /* obtain sepolicy file from running device */
72 devicePolicyFile = File.createTempFile("sepolicy", ".tmp");
96 /* run sepolicy-analyze neverallow check on policy file using given neverallow rules */
  /external/selinux/python/sepolicy/
Makefile 17 BASHCOMPLETIONS=sepolicy-bash-completion.sh
29 ln -sf sepolicy sepolgen
37 install -m 755 sepolicy.py $(BINDIR)/sepolicy
38 (cd $(BINDIR); ln -sf sepolicy sepolgen)
42 install -m 644 $(BASHCOMPLETIONS) $(BASHCOMPLETIONDIR)/sepolicy
sepolicy.py 27 import sepolicy
28 from sepolicy import get_os_version, get_conditionals, get_conditionals_format_text
48 usage = "sepolicy generate [-h] [-n NAME] [-p PATH] ["
63 domains = sepolicy.get_all_domains()
80 booleans = sepolicy.get_all_booleans()
103 domains = sepolicy.get_all_domains()
128 all_classes = map(lambda x: x['name'], sepolicy.info(sepolicy.TCLASS))
138 from sepolicy.interface import get_admin
165 port_types = sepolicy.get_all_port_types(
    [all...]
  /device/generic/x86/
BoardConfig.mk 37 BOARD_SEPOLICY_DIRS += build/target/board/generic/sepolicy
38 BOARD_SEPOLICY_DIRS += build/target/board/generic_x86/sepolicy
  /device/generic/car/car-arm64/
BoardConfig.mk 21 packages/services/Car/car_product/sepolicy \
22 device/generic/car/common/sepolicy
  /device/generic/car/car-x86/
BoardConfig.mk 30 packages/services/Car/car_product/sepolicy \
31 device/generic/car/common/sepolicy
  /device/generic/car/car-x86_64/
BoardConfig.mk 22 packages/services/Car/car_product/sepolicy \
23 device/generic/car/common/sepolicy
  /build/make/target/board/generic_mips/
BoardConfig.mk 66 BOARD_SEPOLICY_DIRS += build/target/board/generic/sepolicy
  /device/generic/car/car-armv7-a-neon/
BoardConfig.mk 41 packages/services/Car/car_product/sepolicy \
42 device/generic/car/common/sepolicy
  /device/generic/mips/
BoardConfig.mk 38 BOARD_SEPOLICY_DIRS += build/target/board/generic/sepolicy

Completed in 484 milliseconds

1 2 3