Searched refs:sepolicy (Results 1 - 20 of 20) sorted by relevance

/external/selinux/policycoreutils/gui/
H A Dsepolgen2 sepolicy generate $*
H A DdomainsPage.py29 from sepolicy import get_all_entrypoint_domains
H A Dpolgengui.py32 from sepolicy import generate
37 import sepolicy.interface namespace
332 for u in sepolicy.interface.get_user():
336 for a in sepolicy.interface.get_admin():
/external/selinux/policycoreutils/sepolicy/sepolicy/
H A Dbooleans.py23 import sepolicy namespace
25 search = sepolicy.search
26 info = sepolicy.info
31 return info(sepolicy.ATTRIBUTE, attribute)[0]["types"]
37 allows = search([sepolicy.ALLOW], {sepolicy.SOURCE: src, sepolicy.CLASS: tclass, sepolicy.PERMS: perm})
42 for l in map(lambda y: y[sepolicy.TARGET], filter(lambda x: set(perm).issubset(x[sepolicy
[all...]
H A Dcommunicate.py23 import sepolicy namespace
25 search = sepolicy.search
26 info = sepolicy.info
39 return info(sepolicy.ATTRIBUTE, attribute)[0]["types"]
45 allows = search([sepolicy.ALLOW], {sepolicy.SOURCE: src, sepolicy.CLASS: tclass, sepolicy.PERMS: perm})
50 for l in map(lambda y: y[sepolicy.TARGET], filter(lambda x: set(perm).issubset(x[sepolicy
[all...]
H A Dnetwork.py23 import sepolicy namespace
24 search = sepolicy.search
25 info = sepolicy.info
29 allows = search([sepolicy.ALLOW], {sepolicy.SOURCE: src, sepolicy.CLASS: tclass, sepolicy.PERMS: perm})
32 for i in map(lambda y: y[sepolicy.TARGET], filter(lambda x: set(perm).issubset(x[sepolicy.PERMS]), allows)):
39 portrecs, portrecsbynum = sepolicy
[all...]
H A Dtransition.py23 import sepolicy namespace
24 search = sepolicy.search
25 info = sepolicy.info
30 trans = search([sepolicy.ALLOW], {sepolicy.SOURCE: src})
31 return map(lambda y: y[sepolicy.TARGET], filter(lambda x: "entrypoint" in x[sepolicy.PERMS], trans))
35 return search([sepolicy.TRANSITION], {sepolicy.SOURCE: src, sepolicy
[all...]
H A Dinterface.py26 import sepolicy namespace
60 from sepolicy import get_methods
86 for i in sepolicy.get_methods():
103 if (("%s_exec_t" % k[:-5]) in sepolicy.get_all_types()):
109 for i in sepolicy.get_methods():
112 if "%s_exec_t" % m[0] in sepolicy.get_all_types():
H A Dmanpage.py30 import sepolicy namespace
31 from sepolicy import *
100 all_entrypoints = sepolicy.info(sepolicy.ATTRIBUTE, "entry_type")[0]["types"]
135 all_types = sepolicy.info(sepolicy.TYPE)
493 self.attributes = sepolicy.info(sepolicy.TYPE, (self.type))[0]["attributes"]
527 self.attributes[domain_type] = sepolicy.info(sepolicy
[all...]
H A Dgui.py32 from sepolicy.sedbus import SELinuxDBus
34 import sepolicy namespace
37 import sepolicy.network namespace
38 import sepolicy.manpage namespace
59 for f in sepolicy.file_type_str:
60 reverse_file_type_str[sepolicy.file_type_str[f]] = f
117 sepolicy_domains = sepolicy.get_all_domains()
127 self.code_path = distutils.sysconfig.get_python_lib(plat_specific=True) + "/sepolicy/"
128 glade_file = self.code_path + "sepolicy.glade"
509 entrypoint = sepolicy
[all...]
H A Dgenerate.py28 import sepolicy namespace
29 from sepolicy import get_all_types, get_all_attributes, get_all_roles
98 for p in sepolicy.info(sepolicy.PORT):
108 users = map(lambda x: x['name'], sepolicy.info(sepolicy.USER))
591 if method in sepolicy.get_methods():
/external/selinux/policycoreutils/po/
H A DMakefile64 ../sepolicy/info.c \
65 ../sepolicy/search.c \
66 ../sepolicy/sepolicy.py \
67 ../sepolicy/sepolicy/communicate.py \
68 ../sepolicy/sepolicy/__init__.py \
69 ../sepolicy/sepolicy/networ
[all...]
/external/selinux/policycoreutils/sepolicy/
H A DMakefile16 BASHCOMPLETIONS=sepolicy-bash-completion.sh
28 ln -sf sepolicy sepolgen
36 install -m 755 sepolicy.py $(BINDIR)/sepolicy
37 (cd $(BINDIR); ln -sf sepolicy sepolgen)
41 install -m 644 $(BASHCOMPLETIONS) $(BASHCOMPLETIONDIR)/sepolicy
52 install -m 644 sepolicy_256.png $(DATADIR)/pixmaps/sepolicy.png
55 install -m 644 sepolicy_$${i}.png $(DATADIR)/icons/hicolor/$${i}x$${i}/apps/sepolicy.png; \
H A Dsepolicy.py27 import sepolicy namespace
28 from sepolicy import get_os_version, get_conditionals, get_conditionals_format_text
43 usage = "sepolicy generate [-h] [-n NAME] [-p PATH] ["
58 domains = sepolicy.get_all_domains()
75 booleans = sepolicy.get_all_booleans()
98 domains = sepolicy.get_all_domains()
123 all_classes = map(lambda x: x['name'], sepolicy.info(sepolicy.TCLASS))
133 from sepolicy.interface import get_admin
160 port_types = sepolicy
174 import sepolicy namespace
255 import sepolicy.network namespace
321 import sepolicy.gui namespace
[all...]
H A Dselinux_client.py3 from sepolicy.sedbus import SELinuxDBus
H A Dsepolicy-bash-completion.sh196 complete -F _sepolicy sepolicy
/external/selinux/policycoreutils/
H A DMakefile1 SUBDIRS = sepolicy setfiles semanage load_policy newrole run_init sandbox secon audit2allow sestatus semodule_package semodule semodule_link semodule_expand semodule_deps sepolgen-ifgen setsebool scripts po man gui hll
/external/selinux/policycoreutils/sandbox/
H A Dsandbox36 import sepolicy
301 """) % "\n\t".join(sepolicy.info(sepolicy.ATTRIBUTE, "sandbox_type")[0]['types'])
376 sepolicy.info(sepolicy.TYPE, "sandbox_t")
/external/selinux/policycoreutils/semanage/
H A Dseobject.py36 import sepolicy namespace
37 from sepolicy import boolean_desc, boolean_category, gen_bool_dict
442 all = map(lambda y: y["name"], filter(lambda x: x["permissive"], sepolicy.info(sepolicy.TYPE)))
1019 valid_types = sepolicy.info(sepolicy.ATTRIBUTE, "port_type")[0]["types"]
1282 valid_types = sepolicy.info(sepolicy.ATTRIBUTE, "node_type")[0]["types"]
1707 valid_types = sepolicy.info(sepolicy
[all...]
H A Dsemanage69 import sepolicy
78 roles = sepolicy.get_all_roles()

Completed in 197 milliseconds