HomeSort by relevance Sort by last modified time
    Searched refs:policydb (Results 1 - 25 of 163) sorted by null

1 2 3 4 5 6 7

  /system/sepolicy/tools/sepolicy-analyze/
attribute.h 4 #include <sepol/policydb/policydb.h>
9 int attribute_func(int argc, char **argv, policydb_t *policydb);
booleans.h 4 #include <sepol/policydb/policydb.h>
9 int booleans_func(int argc, char **argv, policydb_t *policydb);
dups.h 4 #include <sepol/policydb/policydb.h>
9 int dups_func(int argc, char **argv, policydb_t *policydb);
neverallow.h 4 #include <sepol/policydb/policydb.h>
9 int neverallow_func(int argc, char **argv, policydb_t *policydb);
perm.h 4 #include <sepol/policydb/policydb.h>
9 int permissive_func(int argc, char **argv, policydb_t *policydb);
typecmp.h 4 #include <sepol/policydb/policydb.h>
9 int typecmp_func(int argc, char **argv, policydb_t *policydb);
perm.c 7 static int list_permissive(policydb_t * policydb)
15 ebitmap_for_each_bit(&policydb->permissive_map, n, bit)
18 printf("%s\n", policydb->p_type_val_to_name[bit -1]);
24 int permissive_func (int argc, __attribute__ ((unused)) char **argv, policydb_t *policydb) {
29 return list_permissive(policydb);
utils.h 6 #include <sepol/policydb/avtab.h>
7 #include <sepol/policydb/policydb.h>
12 void display_allow(policydb_t *policydb, avtab_key_t *key, int idx, uint32_t perms);
14 int load_policy(char *filename, policydb_t * policydb, struct policy_file *pf);
  /external/selinux/libsepol/include/sepol/
kernel_to_cil.h 3 #include <sepol/policydb/policydb.h>
5 int sepol_kernel_policydb_to_cil(FILE *fp, struct policydb *pdb);
kernel_to_conf.h 3 #include <sepol/policydb/policydb.h>
5 int sepol_kernel_policydb_to_conf(FILE *fp, struct policydb *pdb);
roles.h 8 extern int sepol_role_exists(const sepol_policydb_t * policydb,
11 extern int sepol_role_list(const sepol_policydb_t * policydb,
interfaces.h 4 #include <sepol/policydb.h>
14 const sepol_policydb_t * policydb,
19 const sepol_policydb_t * policydb,
25 const sepol_policydb_t * policydb,
32 sepol_policydb_t * policydb,
43 const sepol_policydb_t * policydb,
module_to_cil.h 4 #include <sepol/policydb/policydb.h>
6 int sepol_module_policydb_to_cil(FILE *fp, struct policydb *pdb, int linked);
context.h 5 #include <sepol/policydb.h>
19 const sepol_policydb_t * policydb,
23 const sepol_policydb_t * policydb,
28 const sepol_policydb_t * policydb, const char *mls);
nodes.h 5 #include <sepol/policydb.h>
18 const sepol_policydb_t * policydb,
23 const sepol_policydb_t * policydb,
29 sepol_policydb_t * policydb,
40 const sepol_policydb_t * policydb,
ports.h 5 #include <sepol/policydb.h>
18 const sepol_policydb_t * policydb,
23 const sepol_policydb_t * policydb,
29 sepol_policydb_t * policydb,
40 const sepol_policydb_t * policydb,
  /external/selinux/libsepol/tests/
debug.h 23 #include <sepol/policydb/policydb.h>
24 #include <sepol/policydb/conditional.h>
test-linker-roles.h 24 #include <sepol/policydb/policydb.h>
test-expander-roles.c 26 #include <sepol/policydb/policydb.h>
helpers.h 25 #include <sepol/policydb/policydb.h>
26 #include <sepol/policydb/conditional.h>
46 * -1 error - the policydb will be destroyed but not freed.
  /external/selinux/checkpolicy/
parse_util.h 26 #include <sepol/policydb/policydb.h>
28 /* Read a source policy and populate the policydb passed in. The
29 * policydb must already have been created and configured (e.g.,
  /external/selinux/libsepol/src/
context.h 6 #include <sepol/policydb/context.h>
7 #include <sepol/policydb/policydb.h>
12 const policydb_t * policydb,
17 const policydb_t * policydb,
23 const policydb_t * policydb,
28 extern int context_is_valid(const policydb_t * policydb,
33 const policydb_t * policydb,
policydb_internal.h 4 #include <sepol/policydb.h>
  /external/selinux/libsemanage/src/
genhomedircon.h 26 sepol_policydb_t * policydb, int usepasswd,
  /external/selinux/libsepol/cil/src/
cil_strpool.h 33 #include <sepol/policydb/hashtab.h>

Completed in 212 milliseconds

1 2 3 4 5 6 7