/external/selinux/libsepol/tests/ |
test-linker-cond-map.h | 24 extern void base_cond_tests(policydb_t * base); 25 extern void module_cond_tests(policydb_t * base);
|
test-linker-types.h | 24 extern void base_type_tests(policydb_t * base); 25 extern void module_type_tests(policydb_t * base);
|
test-linker-roles.h | 26 extern void base_role_tests(policydb_t * base); 27 extern void module_role_tests(policydb_t * base);
|
test-common.h | 37 extern void test_sym_presence(policydb_t * p, const char *id, int sym_type, unsigned int scope_type, unsigned int *decls, unsigned int len); 43 extern void test_policydb_indexes(policydb_t * p); 53 extern void test_alias_datum(policydb_t * p, const char *id, const char *primary_id, char mode, unsigned int flavor); 65 extern role_datum_t *test_role_type_set(policydb_t * p, const char *id, avrule_decl_t * decl, const char **types, unsigned int len, unsigned int flags); 76 extern void test_attr_types(policydb_t * p, const char *id, avrule_decl_t * decl, const char **types, int len);
|
helpers.h | 36 * p policydb_t into which the policy will be read. This should be 48 extern int test_load_policy(policydb_t * p, int policy_type, int mls, const char *test_name, const char *policy_name); 57 extern avrule_decl_t *test_find_decl_by_sym(policydb_t * p, int symtab, const char *sym);
|
test-downgrade.h | 102 int read_binary_policy(const char *path, policydb_t *); 117 int write_binary_policy(const char *path, policydb_t *);
|
test-expander.c | 48 policydb_t role_expanded; 49 policydb_t user_expanded; 50 policydb_t base_expanded2; 51 static policydb_t basemod; 52 static policydb_t basemod2; 53 static policydb_t mod2; 54 static policydb_t base_expanded; 55 static policydb_t base_only_mod; 56 static policydb_t base_only_expanded; 57 static policydb_t role_basemod [all...] |
test-expander-roles.c | 30 extern policydb_t role_expanded;
|
/external/selinux/libsepol/cil/src/ |
cil_binary.h | 74 int cil_common_to_policydb(policydb_t *pdb, struct cil_class *cil_common, common_datum_t **common_out); 84 int cil_class_to_policydb(policydb_t *pdb, struct cil_class *cil_class); 94 int cil_role_to_policydb(policydb_t *pdb, struct cil_role *cil_role); 105 int cil_roletype_to_policydb(policydb_t *pdb, const struct cil_db *db, struct cil_role *role); 115 int cil_type_to_policydb(policydb_t *pdb, struct cil_type *cil_type, void *type_value_to_cil[]); 125 int cil_typealias_to_policydb(policydb_t *pdb, struct cil_alias *cil_alias); 137 int cil_typepermissive_to_policydb(policydb_t *pdb, struct cil_typepermissive *cil_typeperm); 147 int cil_typeattribute_to_policydb(policydb_t *pdb, struct cil_typeattribute *cil_attr, void *type_value_to_cil[]); 162 int cil_typeattribute_to_bitmap(policydb_t *pdb, const struct cil_db *cdb, struct cil_typeattribute *cil_attr); 172 int cil_policycap_to_policydb(policydb_t *pdb, struct cil_policycap *cil_polcap) [all...] |
/external/selinux/libsepol/src/ |
mls.h | 31 const policydb_t * policydb, 35 const policydb_t * policydb, 39 extern int mls_compute_context_len(const policydb_t * policydb, 43 extern void mls_sid_to_context(const policydb_t * policydb, 48 extern int mls_context_to_sid(const policydb_t * policydb, 52 extern int mls_context_isvalid(const policydb_t * p, 55 extern int mls_convert_context(policydb_t * oldp, 56 policydb_t * newp, context_struct_t * context); 58 extern int mls_compute_sid(policydb_t * policydb,
|
context.h | 12 const policydb_t * policydb, 17 const policydb_t * policydb, 23 const policydb_t * policydb, 28 extern int context_is_valid(const policydb_t * policydb, 33 const policydb_t * policydb,
|
/external/selinux/libsepol/include/sepol/policydb/ |
hierarchy.h | 35 extern int hierarchy_add_bounds(sepol_handle_t *handle, policydb_t *p); 38 extern int bounds_check_type(sepol_handle_t *handle, policydb_t *p, uint32_t child, 41 extern int bounds_check_users(sepol_handle_t *handle, policydb_t *p); 42 extern int bounds_check_roles(sepol_handle_t *handle, policydb_t *p); 43 extern int bounds_check_types(sepol_handle_t *handle, policydb_t *p); 45 extern int hierarchy_check_constraints(sepol_handle_t * handle, policydb_t * p);
|
expand.h | 48 extern int expand_module_avrules(sepol_handle_t * handle, policydb_t * base, 49 policydb_t * out, uint32_t * typemap, uint32_t * boolmap, 58 policydb_t * base, policydb_t * out, 62 extern int expand_convert_type_set(policydb_t * p, uint32_t * typemap, 65 extern int type_set_expand(type_set_t * set, ebitmap_t * t, policydb_t * p, 67 extern int role_set_expand(role_set_t * x, ebitmap_t * r, policydb_t * out, policydb_t * base, uint32_t * rolemap); 69 policydb_t *p, sepol_handle_t *h); 71 policydb_t *p, sepol_handle_t *h) [all...] |
avrule_block.h | 34 extern avrule_decl_t *get_avrule_decl(policydb_t * p, uint32_t decl_id); 35 extern cond_list_t *get_decl_cond_list(policydb_t * p, 38 extern int is_id_enabled(char *id, policydb_t * p, int symbol_table); 39 extern int is_perm_enabled(char *class_id, char *perm_id, policydb_t * p);
|
link.h | 21 policydb_t * b, policydb_t ** mods, int len,
|
conditional.h | 97 extern int cond_evaluate_expr(policydb_t * p, cond_expr_t * expr); 101 extern int cond_normalize_expr(policydb_t * p, cond_node_t * cn); 105 extern cond_node_t *cond_node_find(policydb_t * p, 109 extern cond_node_t *cond_node_create(policydb_t * p, cond_node_t * node); 111 extern cond_node_t *cond_node_search(policydb_t * p, cond_node_t * list, 114 extern int evaluate_conds(policydb_t * p); 123 extern int cond_policydb_init(policydb_t * p); 124 extern void cond_policydb_destroy(policydb_t * p); 127 extern int cond_init_bool_indexes(policydb_t * p); 133 extern int cond_read_bool(policydb_t * p, hashtab_t h, struct policy_file *fp) [all...] |
/external/selinux/checkpolicy/ |
parse_util.h | 33 int read_source_policy(policydb_t * p, const char *file, const char *progname);
|
/system/sepolicy/tools/sepolicy-analyze/ |
attribute.h | 9 int attribute_func(int argc, char **argv, policydb_t *policydb);
|
booleans.h | 9 int booleans_func(int argc, char **argv, policydb_t *policydb);
|
dups.h | 9 int dups_func(int argc, char **argv, policydb_t *policydb);
|
neverallow.h | 9 int neverallow_func(int argc, char **argv, policydb_t *policydb);
|
perm.h | 9 int permissive_func(int argc, char **argv, policydb_t *policydb);
|
typecmp.h | 9 int typecmp_func(int argc, char **argv, policydb_t *policydb);
|
perm.c | 7 static int list_permissive(policydb_t * policydb) 24 int permissive_func (int argc, __attribute__ ((unused)) char **argv, policydb_t *policydb) {
|
utils.h | 12 void display_allow(policydb_t *policydb, avtab_key_t *key, int idx, uint32_t perms); 14 int load_policy(char *filename, policydb_t * policydb, struct policy_file *pf);
|