/external/selinux/libsepol/src/ |
roles.c | 4 #include <sepol/policydb/hashtab.h> 5 #include <sepol/policydb/policydb.h> 15 policydb_t *policydb = &p->p; local 16 *response = (hashtab_search(policydb->p_roles.table, role) != NULL); 26 policydb_t *policydb = &p->p; local 27 unsigned int tmp_nroles = policydb->p_roles.nprim; 35 tmp_roles[i] = strdup(policydb->p_role_val_to_name[i]);
|
booleans.c | 9 #include <sepol/policydb/hashtab.h> 10 #include <sepol/policydb/policydb.h> 11 #include <sepol/policydb/conditional.h> 15 policydb_t * policydb, 31 hashtab_search(policydb->p_bools.table, name); 55 const policydb_t * policydb, 59 const char *name = policydb->p_bool_val_to_name[bool_idx]; 60 cond_bool_datum_t *booldatum = policydb->bool_val_to_struct[bool_idx]; 90 policydb_t *policydb = &p->p local 110 const policydb_t *policydb = &p->p; local 121 const policydb_t *policydb = &p->p; local 144 const policydb_t *policydb = &p->p; local 184 const policydb_t *policydb = &p->p; local [all...] |
interfaces.c | 7 #include <sepol/policydb/policydb.h> 13 const policydb_t * policydb, 30 if (context_from_record(handle, policydb, 39 if (context_from_record(handle, policydb, 67 const policydb_t * policydb, 84 if (context_to_record(handle, policydb, ifcon, &tmp_con) < 0) 91 if (context_to_record(handle, policydb, msgcon, &tmp_con) < 0) 114 const policydb_t *policydb = &p->p; local 120 head = policydb->ocontexts[OCON_NETIF] 138 const policydb_t *policydb = &p->p; local 170 policydb_t *policydb = &p->p; local 224 const policydb_t *policydb = &p->p; local 241 const policydb_t *policydb = &p->p; local [all...] |
genbools.c | 6 #include <sepol/policydb/policydb.h> 7 #include <sepol/policydb/conditional.h> 77 static int load_booleans(struct policydb *policydb, const char *path, 107 datum = hashtab_search(policydb->p_bools.table, name); 138 hashtab_search(policydb->p_bools.table, 162 struct policydb policydb; local 166 if (policydb_init(&policydb)) 223 struct policydb policydb; local [all...] |
genusers.c | 8 #include <sepol/policydb/policydb.h> 35 static int load_users(struct policydb *policydb, const char *path) 88 usrdatum = hashtab_search(policydb->p_users.table, q); 114 usrdatum->s.value = ++policydb->p_users.nprim; 115 if (hashtab_insert(policydb->p_users.table, 165 roldatum = hashtab_search(policydb->p_roles.table, q); 186 if (policydb->mls) { 229 if (mls_context_to_sid(policydb, oldc, &r, &context) 296 struct policydb policydb; local [all...] |
ibendports.c | 8 #include <sepol/policydb/policydb.h> 15 const policydb_t *policydb, 45 if (context_from_record(handle, policydb, &tmp_con, 72 const policydb_t *policydb, 91 if (context_to_record(handle, policydb, con, &tmp_con) < 0) 114 const policydb_t *policydb = &p->p; local 116 head = policydb->ocontexts[OCON_IBENDPORT]; 130 const policydb_t *policydb = &p->p; local 137 head = policydb->ocontexts[OCON_IBENDPORT] 158 const policydb_t *policydb = &p->p; local 193 policydb_t *policydb = &p->p; local 224 const policydb_t *policydb = &p->p; local [all...] |
ibpkeys.c | 9 #include <sepol/policydb/policydb.h> 16 const policydb_t *policydb, 41 if (context_from_record(handle, policydb, &tmp_con, 68 const policydb_t *policydb, 84 if (context_to_record(handle, policydb, con, &tmp_con) < 0) 107 const policydb_t *policydb = &p->p; local 109 head = policydb->ocontexts[OCON_IBPKEY]; 123 const policydb_t *policydb = &p->p; local 130 head = policydb->ocontexts[OCON_IBPKEY] 153 const policydb_t *policydb = &p->p; local 189 policydb_t *policydb = &p->p; local 220 const policydb_t *policydb = &p->p; local [all...] |
nodes.c | 9 #include <sepol/policydb/policydb.h> 15 const policydb_t * policydb, 56 if (context_from_record(handle, policydb, &tmp_con, 84 const policydb_t * policydb, 129 if (context_to_record(handle, policydb, con, &tmp_con) < 0) 153 const policydb_t *policydb = &p->p; local 155 head = policydb->ocontexts[OCON_NODE]; 159 head = policydb->ocontexts[OCON_NODE6]; 174 const policydb_t *policydb = &p->p local 234 const policydb_t *policydb = &p->p; local 301 policydb_t *policydb = &p->p; local 351 const policydb_t *policydb = &p->p; local [all...] |
ports.c | 11 #include <sepol/policydb/policydb.h> 49 const policydb_t * policydb, 81 if (context_from_record(handle, policydb, &tmp_con, 108 const policydb_t * policydb, 131 if (context_to_record(handle, policydb, con, &tmp_con) < 0) 156 const policydb_t *policydb = &p->p; local 158 head = policydb->ocontexts[OCON_PORT]; 173 const policydb_t *policydb = &p->p; local 184 head = policydb->ocontexts[OCON_PORT] 211 const policydb_t *policydb = &p->p; local 251 policydb_t *policydb = &p->p; local 288 const policydb_t *policydb = &p->p; local [all...] |
users.c | 9 #include <sepol/policydb/policydb.h> 10 #include <sepol/policydb/hashtab.h> 11 #include <sepol/policydb/expand.h> 16 const policydb_t * policydb, 20 const char *name = policydb->p_user_val_to_name[user_idx]; 21 user_datum_t *usrdatum = policydb->user_val_to_struct[user_idx]; 42 char *role = policydb->p_role_val_to_name[bit]; 49 if (policydb->mls) { 66 if (mls_to_string(handle, policydb, &context, &str) < 0) 111 policydb_t *policydb = &p->p; local 297 const policydb_t *policydb = &p->p; local 311 const policydb_t *policydb = &p->p; local 322 const policydb_t *policydb = &p->p; local 352 const policydb_t *policydb = &p->p; local [all...] |
services.c | 58 #include <sepol/policydb/policydb.h> 59 #include <sepol/policydb/sidtab.h> 60 #include <sepol/policydb/services.h> 61 #include <sepol/policydb/conditional.h> 62 #include <sepol/policydb/flask.h> 63 #include <sepol/policydb/util.h> 78 static policydb_t mypolicydb, *policydb = &mypolicydb; variable 132 policydb = p; 154 policydb = &mypolicydb [all...] |
/system/sepolicy/tools/sepolicy-analyze/ |
sepolicy-analyze.c | 20 int (*func) (int argc, char **argv, policydb_t *policydb); 46 policydb_t policydb; local 53 if(load_policy(policy, &policydb, &pf)) 57 rc = analyze_components[i].func(argc - 2, argv + 2, &policydb); 60 policydb_destroy(&policydb);
|
dups.c | 15 policydb_t *policydb = args; local 33 sattr = &policydb->type_attr_map[k->source_type - 1]; 34 tattr = &policydb->type_attr_map[k->target_type - 1]; 35 stype = policydb->type_val_to_struct[k->source_type - 1]; 36 ttype = policydb->type_val_to_struct[k->target_type - 1]; 51 stype2 = policydb->type_val_to_struct[avkey.source_type - 1]; 52 ttype2 = policydb->type_val_to_struct[avkey.target_type - 1]; 56 for (node = avtab_search_node(&policydb->te_avtab, &avkey); 67 display_allow(policydb, k, i, d->data); 68 display_allow(policydb, &node->key, i, node->datum.data) [all...] |
/external/selinux/libsepol/tests/ |
test-downgrade.c | 27 #include <sepol/policydb/policydb.h> 28 #include <sepol/policydb/link.h> 29 #include <sepol/policydb/expand.h> 30 #include <sepol/policydb/conditional.h> 37 static policydb_t policydb; variable 46 * Description: Initialize the policydb (policy data base structure) 51 if (policydb_init(&policydb)) { 66 * Description: Destroys policydb structure 70 policydb_destroy(&policydb); [all...] |
/external/selinux/libsemanage/src/ |
fcontexts_local.c | 10 #include <sepol/policydb.h> 84 const sepol_policydb_t *policydb; member in struct:validate_handler_arg 95 const sepol_policydb_t *policydb = arg->policydb; local 104 && sepol_context_check(handle->sepolh, policydb, 122 const sepol_policydb_t * policydb) 127 arg.policydb = policydb;
|
database_policydb.c | 18 #include <sepol/policydb.h> 25 /* POLICYDB dbase */ 37 sepol_policydb_t *policydb; member in struct:dbase_policydb 48 sepol_policydb_free(dbase->policydb); 94 sepol_policydb_t *policydb = NULL; local 107 if (sepol_policydb_create(&policydb) < 0) { 108 ERR(handle, "could not create policydb object"); 113 * ENOENT is not fatal - we just create an empty policydb */ 121 /* If the file was opened successfully, read a policydb */ 132 if (sepol_policydb_read(policydb, pf) < 0 [all...] |
seusers_local.c | 9 #include <sepol/policydb.h> 234 const sepol_policydb_t *policydb; member in struct:validate_handler_arg 247 const sepol_policydb_t *policydb = arg->policydb; local 267 if (mls_range && sepol_policydb_mls_enabled(policydb)) { 273 if (sepol_mls_check(handle->sepolh, policydb, mls_range) < 0) 275 if (sepol_mls_contains(handle->sepolh, policydb, 319 const sepol_policydb_t * policydb) 324 arg.policydb = policydb; [all...] |
genhomedircon.c | 113 sepol_policydb_t *policydb; member in struct:__anon33675 567 s->policydb, ctx_record); 637 if (sepol_policydb_mls_enabled(s->policydb) && 1336 sepol_policydb_t * policydb, 1373 s.policydb = policydb; [all...] |
/external/selinux/libselinux/src/ |
load_policy.c | 16 #include <sepol/policydb.h> 67 sepol_policydb_t *policydb; local 215 if (policydb_create(&policydb)) { 220 if (policydb_read(policydb, pf)) { 222 policydb_free(policydb); 225 if (policydb_set_vers(policydb, kernvers) || 226 policydb_to_image(NULL, policydb, &data, &size)) { 232 policydb_free(policydb); 239 policydb_free(policydb);
|
audit2why.c | 14 #include <sepol/policydb.h> 15 #include <sepol/policydb/services.h> 43 sepol_policydb_t *policydb; member in struct:avc_t 89 avc->policydb, 102 avc->policydb, 128 avc->policydb, key, 178 sepol_policydb_free(avc->policydb); 239 /* Set up a policydb directly so that we can mutate it later 243 sepol_policydb_create(&avc->policydb)) { 251 if (sepol_policydb_read(avc->policydb, pf)) [all...] |
/external/selinux/python/audit2allow/ |
sepolgen-ifgen-attr-helper.c | 25 #include <sepol/policydb/policydb.h> 26 #include <sepol/policydb/avtab.h> 27 #include <sepol/policydb/util.h> 147 policydb_t *policydb; local 163 policydb = malloc(sizeof(policydb_t)); 164 if (policydb == NULL) { 169 if (policydb_init(policydb)) { 171 free(policydb); 175 ret = policydb_read(policydb, &pf, 1) [all...] |
/system/sepolicy/tools/ |
sepolicy-check.c | 9 #include <sepol/policydb/policydb.h> 10 #include <sepol/policydb/services.h> 11 #include <sepol/policydb/expand.h> 188 int load_policy(char *filename, policydb_t *policydb, struct policy_file *pf) { 215 if (policydb_init(policydb)) { 216 fprintf(stderr, "Could not initialize policydb!\n"); 221 ret = policydb_read(policydb, pf, 0); 236 policydb_t policydb; local 276 sepol_set_policydb(&policydb); [all...] |
/external/selinux/checkpolicy/test/ |
dispol.c | 20 #include <sepol/policydb/policydb.h> 21 #include <sepol/policydb/avtab.h> 22 #include <sepol/policydb/services.h> 23 #include <sepol/policydb/conditional.h> 24 #include <sepol/policydb/util.h> 25 #include <sepol/policydb/polcaps.h> 37 static policydb_t policydb; variable 429 if (policydb_init(&policydb)) { 433 ret = policydb_read(&policydb, &pf, 1) [all...] |
dismod.c | 30 #include <sepol/policydb/policydb.h> 31 #include <sepol/policydb/services.h> 32 #include <sepol/policydb/conditional.h> 33 #include <sepol/policydb/flask.h> 34 #include <sepol/policydb/link.h> 35 #include <sepol/policydb/module.h> 36 #include <sepol/policydb/util.h> 37 #include <sepol/policydb/polcaps.h> 57 static policydb_t policydb; variable [all...] |
/external/selinux/checkpolicy/ |
checkpolicy.c | 81 #include <sepol/policydb/policydb.h> 82 #include <sepol/policydb/services.h> 83 #include <sepol/policydb/conditional.h> 84 #include <sepol/policydb/hierarchy.h> 85 #include <sepol/policydb/flask.h> 86 #include <sepol/policydb/expand.h> 87 #include <sepol/policydb/link.h> 96 static policydb_t policydb; variable 238 type_rules = malloc(sizeof(struct avtab_node) * policydb.p_types.nprim) [all...] |