/external/selinux/libsepol/cil/include/cil/ |
cil_write_ast.h | 4 #include <cil/cil.h>
|
android.h | 3 #include <cil/cil.h>
|
/external/selinux/libsepol/cil/src/ |
cil_log.h | 34 #include <cil/cil.h>
|
cil_log.c | 35 #include <cil/cil.h>
|
cil_internal.h | 42 #include <cil/cil.h> 815 /* Ensure that CIL uses the same values as sepol services.h */ 900 /* Ensure that CIL uses the same values as sepol policydb.h */ 914 /* Ensure that CIL uses the same values as sepol policydb.h */
|
android.c | 1 #include <cil/android.h>
|
/external/selinux/libsepol/include/ |
Makefile | 4 CILDIR ?= ../cil 11 test -d $(INCDIR)/cil || install -m 755 -d $(INCDIR)/cil 14 install -m 644 $(wildcard $(CILDIR)/include/cil/*.h) $(INCDIR)/cil
|
/external/selinux/secilc/docs/ |
Makefile | 44 $(TMPDIR)/policy.cil: $(TESTDIR)/policy.cil 46 @# add a title for the TOC to policy.cil. This is needed to play nicely with the PDF conversion. 50 html: $(PANDOC_FILE_LIST) $(TMPDIR)/policy.cil 54 pdf: $(PANDOC_FILE_LIST) $(TMPDIR)/policy.cil
|
/frameworks/opt/telephony/tests/telephonytests/src/com/android/internal/telephony/ |
NetworkScanResultTest.java | 55 CellIdentityLte cil = new CellIdentityLte(320, 320, 11, 12, 13, 14); local 62 lte.setCellIdentity(cil);
|
/system/sepolicy/ |
Android.mk | 73 # 1) convert policies to CIL: 74 # - private + public platform policy to CIL 75 # - mapping file to CIL (should already be in CIL form) 76 # - non-platform public policy to CIL 77 # - non-platform public + private policy to CIL 117 platform_mapping_file := $(BOARD_SEPOLICY_VERS).cil 162 # CIL files which contain workarounds for current limitation of human-readable 163 # module policy language. These files are appended to the CIL files produced 165 sepolicy_build_cil_workaround_files := technical_debt.cil [all...] |
/external/selinux/secilc/ |
secil2conf.c | 38 #include <cil/cil.h> 40 #include <sepol/cil/cil.h> 118 fprintf(stderr, "No cil files specified\n");
|
secilc.c | 38 #include <cil/cil.h> 40 #include <sepol/cil/cil.h> 218 fprintf(stderr, "No cil files specified\n");
|
Makefile | 31 ./$(SECILC) test/policy.cil
|
/system/sepolicy/tools/ |
version_policy.c | 10 #include <cil/android.h> 11 #include <cil/cil.h> 12 #include <cil/cil_write_ast.h> 19 printf(" -m, --mapping generate cil version mapping from base policy\n"); 21 printf(" -o, --output=<file> write cil policy to <file>\n"); 28 * read_cil_file - Initialize db and parse CIL input file.
|
/external/selinux/checkpolicy/ |
checkmodule.c | 136 printf(" -C output CIL policy instead of binary policy\n"); 151 unsigned int binary = 0, cil = 0; local 162 {"cil", no_argument, NULL, 'C'}, 203 cil = 1; 281 if (modpolicydb.policy_type == POLICY_BASE && !cil) { 315 if (!cil) { 324 printf("%s: writing CIL to %s\n",argv[0], outfile); 333 } else if (cil) { 334 fprintf(stderr, "%s: No file to write CIL was specified\n", argv[0]);
|
checkpolicy.c | 393 unsigned int binary = 0, debug = 0, cil = 0, conf = 0; local 415 {"cil", no_argument, NULL, 'C'}, 465 cil = 1; 519 if (cil && conf) { 520 fprintf(stderr, "Can't convert to CIL and policy.conf at the same time\n"); 605 if (!cil) { 633 if (!cil) { 654 printf("%s: writing CIL to %s\n",argv[0], outfile); 669 } else if (cil) { 670 fprintf(stderr, "%s: No file to write CIL was specified\n", argv[0]) [all...] |
/external/selinux/libsemanage/src/ |
semanage_store.h | 29 #include <sepol/cil/cil.h>
|
direct_api.c | 24 #include <sepol/cil/cil.h> 621 * Write the users_extra entries from CIL modules. 676 * Write the seusers entries from CIL modules. 1003 if (!strcasecmp(modinfo->lang_ext, "cil")) { 1072 status = semanage_direct_write_langext(sh, "cil", modinfo); [all...] |
/external/selinux/libsepol/src/ |
Makefile | 8 CILDIR ?= ../cil
|
/system/sepolicy/private/ |
file_contexts | 43 /mapping_sepolicy\.cil u:object_r:sepolicy_file:s0 44 /nonplat_sepolicy\.cil u:object_r:sepolicy_file:s0 45 /plat_sepolicy\.cil u:object_r:sepolicy_file:s0 265 /system/etc/selinux/mapping/[0-9]+\.[0-9]+\.cil u:object_r:sepolicy_file:s0 272 /system/etc/selinux/plat_sepolicy.cil u:object_r:sepolicy_file:s0 273 /system/etc/selinux/plat_and_mapping_sepolicy\.cil\.sha256 u:object_r:sepolicy_file:s0 305 /vendor/etc/selinux/nonplat_sepolicy.cil u:object_r:sepolicy_file:s0
|
/system/sepolicy/prebuilts/api/26.0/private/ |
file_contexts | 43 /mapping_sepolicy\.cil u:object_r:sepolicy_file:s0 44 /nonplat_sepolicy\.cil u:object_r:sepolicy_file:s0 45 /plat_sepolicy\.cil u:object_r:sepolicy_file:s0 259 /system/etc/selinux/mapping/[0-9]+\.[0-9]+\.cil u:object_r:sepolicy_file:s0 266 /system/etc/selinux/plat_sepolicy.cil u:object_r:sepolicy_file:s0 267 /system/etc/selinux/plat_and_mapping_sepolicy\.cil\.sha256 u:object_r:sepolicy_file:s0 298 /vendor/etc/selinux/nonplat_sepolicy.cil u:object_r:sepolicy_file:s0
|
/external/robolectric/v3/runtime/ |
android-all-4.4_r1-robolectric-1.jar | |
android-all-5.0.0_r2-robolectric-1.jar | |
android-all-5.1.1_r9-robolectric-1.jar | |
/prebuilts/misc/common/robolectric/lib/ |
android-all-4.4_r1-robolectric-1.jar | |