/external/selinux/gui/ |
sepolgen | 2 sepolicy generate $*
|
/external/selinux/python/sepolicy/sepolicy/ |
booleans.py | 23 import sepolicy 28 return sepolicy.info(sepolicy.ATTRIBUTE, attribute)[0]["types"] 34 allows = sepolicy.search([sepolicy.ALLOW], {sepolicy.SOURCE: src, sepolicy.CLASS: tclass, sepolicy.PERMS: perm}) 39 for l in map(lambda y: y[sepolicy.TARGET], filter(lambda x: set(perm).issubset(x[sepolicy.PERMS]), allows)) [all...] |
communicate.py | 23 import sepolicy 37 return list(next(sepolicy.info(sepolicy.ATTRIBUTE, attribute))["types"]) 43 allows = sepolicy.search([sepolicy.ALLOW], {sepolicy.SOURCE: src, sepolicy.CLASS: tclass, sepolicy.PERMS: perm}) 48 for l in map(lambda y: y[sepolicy.TARGET], filter(lambda x: set(perm).issubset(x[sepolicy.PERMS]), allows)) [all...] |
network.py | 23 import sepolicy 27 allows = sepolicy.search([sepolicy.ALLOW], {sepolicy.SOURCE: src, sepolicy.CLASS: tclass, sepolicy.PERMS: perm}) 30 for i in map(lambda y: y[sepolicy.TARGET], filter(lambda x: set(perm).issubset(x[sepolicy.PERMS]) and (not check_bools or x["enabled"]), allows)): 37 portrecs, portrecsbynum = sepolicy.gen_port_dict()
|
transition.py | 23 import sepolicy 28 trans = sepolicy.search([sepolicy.ALLOW], {sepolicy.SOURCE: src}) 29 return map(lambda y: y[sepolicy.TARGET], filter(lambda x: "entrypoint" in x[sepolicy.PERMS], trans)) 33 return sepolicy.search([sepolicy.TRANSITION], {sepolicy.SOURCE: src, sepolicy.CLASS: "process"} [all...] |
manpage.py | 29 import sepolicy 54 tree = xml.etree.ElementTree.fromstring(sepolicy.policy_xml(path)) 83 allusers_info = sepolicy.info(sepolicy.USER) 100 all_entrypoints = next(sepolicy.info(sepolicy.ATTRIBUTE, "entry_type"))["types"] 111 for d in sepolicy.get_all_domains(): 120 for role in sepolicy.get_all_roles(): 135 all_types = sepolicy.info(sepolicy.TYPE [all...] |
/device/google/dragon/sepolicy/ |
keys.conf | 2 ALL : device/google/dragon/sepolicy/certs/app.x509.pem
|
/device/google/marlin/sepolicy/ |
keys.conf | 2 ALL : device/google/marlin/sepolicy/certs/app.x509.pem
|
/device/google/marlin/sepolicy/verizon/ |
keys.conf | 2 ALL : device/google/marlin/sepolicy/verizon/verizon.x509.pem
|
/device/google/wahoo/sepolicy/verizon/ |
keys.conf | 2 ALL : device/google/wahoo/sepolicy/verizon/verizon.x509.pem
|
/device/google/wahoo/sepolicy/vendor/ |
keys.conf | 2 ALL : device/google/wahoo/sepolicy/vendor/certs/tango_release.x509.pem 5 ENG : device/google/wahoo/sepolicy/vendor/certs/tango.x509.pem 6 USERDEBUG : device/google/wahoo/sepolicy/vendor/certs/tango.x509.pem 7 USER : device/google/wahoo/sepolicy/vendor/certs/tango_userdev.x509.pem 10 ALL : device/google/wahoo/sepolicy/vendor/certs/app.x509.pem 13 ALL : device/google/wahoo/sepolicy/vendor/certs/easel.x509.pem 16 ALL : device/google/wahoo/sepolicy/vendor/certs/arcore_release.x509.pem 19 ENG : device/google/wahoo/sepolicy/vendor/certs/arcore.x509.pem 20 USERDEBUG : device/google/wahoo/sepolicy/vendor/certs/arcore.x509.pem 21 USER : device/google/wahoo/sepolicy/vendor/certs/arcore_userdev.x509.pe [all...] |
/external/selinux/policycoreutils/po/ |
Makefile | 72 ../sepolicy/sepolicy.py \ 73 ../sepolicy/sepolicy/communicate.py \ 74 ../sepolicy/sepolicy/__init__.py \ 75 ../sepolicy/sepolicy/network.py \ 76 ../sepolicy/sepolicy/generate.py [all...] |
/device/google/vrservices/vrcore/sepolicy/ |
keys.conf | 3 ALL : device/google/vrservices/vrcore/sepolicy/certs/vrcore-release.x509.pem 9 ENG : device/google/vrservices/vrcore/sepolicy/certs/vrcore.x509.pem 10 USERDEBUG : device/google/vrservices/vrcore/sepolicy/certs/vrcore.x509.pem 11 USER : device/google/vrservices/vrcore/sepolicy/certs/vrcore-dummy.x509.pem
|
/system/sepolicy/tools/ |
checkfc.c | 43 } sepolicy; member in struct:__anon115160 93 int bit_pos = get_attr_bit(global_state.sepolicy.pdb, *attributes); 159 int rc = sepol_context_from_string(global_state.sepolicy.handle, context, 166 rc = sepol_context_check(global_state.sepolicy.handle, 167 global_state.sepolicy.sdb, ctx); 176 res = !is_type_of_attribute_set(global_state.sepolicy.pdb, type_name, 196 fprintf(stderr, "usage1: %s [-l|-p|-s|-v] [-e] sepolicy context_file\n\n" 213 if (global_state.sepolicy.file) { 214 fclose(global_state.sepolicy.file); 217 if (global_state.sepolicy.sdb) [all...] |
Android.mk | 40 LOCAL_MODULE := sepolicy-check 43 LOCAL_SRC_FILES := sepolicy-check.c
|
/external/selinux/python/ |
Makefile | 1 SUBDIRS = sepolicy audit2allow semanage sepolgen chcat
|
/system/sepolicy/tools/sepolicy-analyze/ |
Android.mk | 6 LOCAL_MODULE := sepolicy-analyze 9 LOCAL_SRC_FILES := sepolicy-analyze.c dups.c neverallow.c perm.c typecmp.c booleans.c attribute.c utils.c
|
/external/selinux/python/sepolicy/ |
Makefile | 17 BASHCOMPLETIONS=sepolicy-bash-completion.sh 29 ln -sf sepolicy sepolgen 37 install -m 755 sepolicy.py $(BINDIR)/sepolicy 38 (cd $(BINDIR); ln -sf sepolicy sepolgen) 42 install -m 644 $(BASHCOMPLETIONS) $(BASHCOMPLETIONDIR)/sepolicy
|
/device/generic/x86/ |
BoardConfig.mk | 37 BOARD_SEPOLICY_DIRS += build/target/board/generic/sepolicy 38 BOARD_SEPOLICY_DIRS += build/target/board/generic_x86/sepolicy
|
/cts/tools/selinux/ |
SELinuxNeverallowTestFrame.py | 68 sepolicyAnalyze = buildHelper.getTestFile("sepolicy-analyze"); 93 /* run sepolicy-analyze neverallow check on policy file using given neverallow rules */
|
/device/google/muskie/walleye/ |
BoardConfig.mk | 25 #sepolicy common to muskie/walleye 26 BOARD_SEPOLICY_DIRS += device/google/muskie/sepolicy
|
/build/make/target/board/generic_arm64_ab/ |
BoardConfig.mk | 41 BOARD_SEPOLICY_DIRS += build/target/board/generic_arm64_ab/sepolicy
|
/build/make/target/board/generic_mips/ |
BoardConfig.mk | 74 BOARD_SEPOLICY_DIRS += build/target/board/generic/sepolicy
|
/device/generic/mips/ |
BoardConfig.mk | 38 BOARD_SEPOLICY_DIRS += build/target/board/generic/sepolicy
|
/device/linaro/hikey/ |
BoardConfigCommon.mk | 39 BOARD_SEPOLICY_DIRS += device/linaro/hikey/sepolicy 40 BOARD_SEPOLICY_DIRS += system/bt/vendor_libs/linux/sepolicy
|