/external/selinux/policycoreutils/gui/ |
H A D | sepolgen | 2 sepolicy generate $*
|
H A D | domainsPage.py | 29 from sepolicy import get_all_entrypoint_domains
|
H A D | polgengui.py | 32 from sepolicy import generate 37 import sepolicy.interface namespace 332 for u in sepolicy.interface.get_user(): 336 for a in sepolicy.interface.get_admin():
|
/external/selinux/policycoreutils/sepolicy/sepolicy/ |
H A D | booleans.py | 23 import sepolicy namespace 25 search = sepolicy.search 26 info = sepolicy.info 31 return info(sepolicy.ATTRIBUTE, attribute)[0]["types"] 37 allows = search([sepolicy.ALLOW], {sepolicy.SOURCE: src, sepolicy.CLASS: tclass, sepolicy.PERMS: perm}) 42 for l in map(lambda y: y[sepolicy.TARGET], filter(lambda x: set(perm).issubset(x[sepolicy [all...] |
H A D | communicate.py | 23 import sepolicy namespace 25 search = sepolicy.search 26 info = sepolicy.info 39 return info(sepolicy.ATTRIBUTE, attribute)[0]["types"] 45 allows = search([sepolicy.ALLOW], {sepolicy.SOURCE: src, sepolicy.CLASS: tclass, sepolicy.PERMS: perm}) 50 for l in map(lambda y: y[sepolicy.TARGET], filter(lambda x: set(perm).issubset(x[sepolicy [all...] |
H A D | network.py | 23 import sepolicy namespace 24 search = sepolicy.search 25 info = sepolicy.info 29 allows = search([sepolicy.ALLOW], {sepolicy.SOURCE: src, sepolicy.CLASS: tclass, sepolicy.PERMS: perm}) 32 for i in map(lambda y: y[sepolicy.TARGET], filter(lambda x: set(perm).issubset(x[sepolicy.PERMS]), allows)): 39 portrecs, portrecsbynum = sepolicy [all...] |
H A D | transition.py | 23 import sepolicy namespace 24 search = sepolicy.search 25 info = sepolicy.info 30 trans = search([sepolicy.ALLOW], {sepolicy.SOURCE: src}) 31 return map(lambda y: y[sepolicy.TARGET], filter(lambda x: "entrypoint" in x[sepolicy.PERMS], trans)) 35 return search([sepolicy.TRANSITION], {sepolicy.SOURCE: src, sepolicy [all...] |
H A D | interface.py | 26 import sepolicy namespace 60 from sepolicy import get_methods 86 for i in sepolicy.get_methods(): 103 if (("%s_exec_t" % k[:-5]) in sepolicy.get_all_types()): 109 for i in sepolicy.get_methods(): 112 if "%s_exec_t" % m[0] in sepolicy.get_all_types():
|
H A D | manpage.py | 30 import sepolicy namespace 31 from sepolicy import * 100 all_entrypoints = sepolicy.info(sepolicy.ATTRIBUTE, "entry_type")[0]["types"] 135 all_types = sepolicy.info(sepolicy.TYPE) 493 self.attributes = sepolicy.info(sepolicy.TYPE, (self.type))[0]["attributes"] 527 self.attributes[domain_type] = sepolicy.info(sepolicy [all...] |
H A D | gui.py | 32 from sepolicy.sedbus import SELinuxDBus 34 import sepolicy namespace 37 import sepolicy.network namespace 38 import sepolicy.manpage namespace 59 for f in sepolicy.file_type_str: 60 reverse_file_type_str[sepolicy.file_type_str[f]] = f 117 sepolicy_domains = sepolicy.get_all_domains() 127 self.code_path = distutils.sysconfig.get_python_lib(plat_specific=True) + "/sepolicy/" 128 glade_file = self.code_path + "sepolicy.glade" 509 entrypoint = sepolicy [all...] |
H A D | generate.py | 28 import sepolicy namespace 29 from sepolicy import get_all_types, get_all_attributes, get_all_roles 98 for p in sepolicy.info(sepolicy.PORT): 108 users = map(lambda x: x['name'], sepolicy.info(sepolicy.USER)) 591 if method in sepolicy.get_methods():
|
/external/selinux/policycoreutils/po/ |
H A D | Makefile | 64 ../sepolicy/info.c \ 65 ../sepolicy/search.c \ 66 ../sepolicy/sepolicy.py \ 67 ../sepolicy/sepolicy/communicate.py \ 68 ../sepolicy/sepolicy/__init__.py \ 69 ../sepolicy/sepolicy/networ [all...] |
/external/selinux/policycoreutils/sepolicy/ |
H A D | Makefile | 16 BASHCOMPLETIONS=sepolicy-bash-completion.sh 28 ln -sf sepolicy sepolgen 36 install -m 755 sepolicy.py $(BINDIR)/sepolicy 37 (cd $(BINDIR); ln -sf sepolicy sepolgen) 41 install -m 644 $(BASHCOMPLETIONS) $(BASHCOMPLETIONDIR)/sepolicy 52 install -m 644 sepolicy_256.png $(DATADIR)/pixmaps/sepolicy.png 55 install -m 644 sepolicy_$${i}.png $(DATADIR)/icons/hicolor/$${i}x$${i}/apps/sepolicy.png; \
|
H A D | sepolicy.py | 27 import sepolicy namespace 28 from sepolicy import get_os_version, get_conditionals, get_conditionals_format_text 43 usage = "sepolicy generate [-h] [-n NAME] [-p PATH] [" 58 domains = sepolicy.get_all_domains() 75 booleans = sepolicy.get_all_booleans() 98 domains = sepolicy.get_all_domains() 123 all_classes = map(lambda x: x['name'], sepolicy.info(sepolicy.TCLASS)) 133 from sepolicy.interface import get_admin 160 port_types = sepolicy 174 import sepolicy namespace 255 import sepolicy.network namespace 321 import sepolicy.gui namespace [all...] |
H A D | selinux_client.py | 3 from sepolicy.sedbus import SELinuxDBus
|
H A D | sepolicy-bash-completion.sh | 196 complete -F _sepolicy sepolicy
|
/external/selinux/policycoreutils/ |
H A D | Makefile | 1 SUBDIRS = sepolicy setfiles semanage load_policy newrole run_init sandbox secon audit2allow sestatus semodule_package semodule semodule_link semodule_expand semodule_deps sepolgen-ifgen setsebool scripts po man gui hll
|
/external/selinux/policycoreutils/sandbox/ |
H A D | sandbox | 36 import sepolicy 301 """) % "\n\t".join(sepolicy.info(sepolicy.ATTRIBUTE, "sandbox_type")[0]['types']) 376 sepolicy.info(sepolicy.TYPE, "sandbox_t")
|
/external/selinux/policycoreutils/semanage/ |
H A D | seobject.py | 36 import sepolicy namespace 37 from sepolicy import boolean_desc, boolean_category, gen_bool_dict 442 all = map(lambda y: y["name"], filter(lambda x: x["permissive"], sepolicy.info(sepolicy.TYPE))) 1019 valid_types = sepolicy.info(sepolicy.ATTRIBUTE, "port_type")[0]["types"] 1282 valid_types = sepolicy.info(sepolicy.ATTRIBUTE, "node_type")[0]["types"] 1707 valid_types = sepolicy.info(sepolicy [all...] |
H A D | semanage | 69 import sepolicy 78 roles = sepolicy.get_all_roles()
|