/external/selinux/sepolgen/tests/ |
D | test_refpolicy.py | 21 import sepolgen.refpolicy as refpolicy namespace 26 s = refpolicy.IdSet(["read", "write", "getattr"]) 28 s = refpolicy.IdSet() 34 sc = refpolicy.SecurityContext() 35 sc = refpolicy.SecurityContext("user_u:object_r:foo_t") 39 sc = refpolicy.SecurityContext() 52 sc = refpolicy.SecurityContext() 61 sc = refpolicy.SecurityContext() 65 sc1 = refpolicy.SecurityContext("user_u:object_r:foo_t") 66 sc2 = refpolicy.SecurityContext("user_u:object_r:foo_t") [all …]
|
D | test_interfaces.py | 25 import sepolgen.refpolicy as refpolicy namespace 34 self.assertEqual(p.type, refpolicy.SRC_TYPE) 49 self.assertEqual(p.type, refpolicy.SRC_TYPE) 50 self.assertEqual(p.obj_classes, refpolicy.IdSet(["file"])) 59 self.assertEqual(p.type, refpolicy.SRC_TYPE) 60 self.assertEqual(p.obj_classes, refpolicy.IdSet(["process"])) 69 self.assertEqual(p.type, refpolicy.SRC_TYPE) 70 self.assertEqual(p.obj_classes, refpolicy.IdSet(["dir"])) 79 self.assertEqual(p.type, refpolicy.TGT_TYPE) 80 self.assertEqual(p.obj_classes, refpolicy.IdSet(["dir"])) [all …]
|
D | test_access.py | 21 import sepolgen.refpolicy as refpolicy namespace 33 self.assertTrue(isinstance(a.perms, refpolicy.IdSet)) 120 b.perms = refpolicy.IdSet(["read"]) 124 b.perms = refpolicy.IdSet(["read", "write", "append"]) 128 b.perms = refpolicy.IdSet(["read", "append"]) 141 rule = refpolicy.AVRule() 163 self.assertEquals(av.perms, refpolicy.IdSet(["read", "write"])) 176 rule = refpolicy.AVRule() 206 self.assertEquals(av.perms, refpolicy.IdSet(["read", "write"])) 221 a.add("$1", "foo", "file", refpolicy.IdSet(["read", "write"])) [all …]
|
D | test_module.py | 28 mc.create_module_package("module_compile_test.te", refpolicy=True) 32 mc.refpolicy = True 33 mc.create_module_package("module_compile_test.te", refpolicy=False)
|
D | test_refparser.py | 22 import sepolgen.refpolicy as refpolicy namespace
|
D | test_audit.py | 22 import sepolgen.refpolicy 62 sc = sepolgen.refpolicy.SecurityContext()
|
/external/selinux/sepolgen/src/sepolgen/ |
D | refparser.py | 37 import refpolicy 353 m = refpolicy.ModuleDeclaration() 356 m.refpolicy = True 362 x = refpolicy.Interface(p[4]) 370 x = refpolicy.Template(p[4]) 401 o = refpolicy.OptionalPolicy() 411 x = refpolicy.TunablePolicy() 436 x = refpolicy.IfDef(p[4]) 451 i = refpolicy.InterfaceCall(ifname=p[1]) 483 s = refpolicy.ObjPermSet(p[4]) [all …]
|
D | policygen.py | 27 import refpolicy 81 self.module = refpolicy.Module() 124 refpolicy = True 126 refpolicy = False 128 mod.refpolicy = refpolicy 138 m = refpolicy.ModuleDeclaration() 143 m.refpolicy = True 145 m.refpolicy = False 157 rule = refpolicy.AVRule(av) 162 rule.comment = str(refpolicy.Comment(explain_access(av, verbosity=self.explain))) [all …]
|
D | output.py | 30 import refpolicy 47 for node, depth in refpolicy.walktree(self.module, showdepth=True): 93 if isinstance(a, refpolicy.InterfaceCall): 94 if isinstance(b, refpolicy.InterfaceCall): 99 if isinstance(b, refpolicy.AVRule): 116 c.append(refpolicy.Comment()) 121 c.append(refpolicy.Comment()) 135 if isinstance(rule, refpolicy.InterfaceCall): 142 sep_rules.append(refpolicy.Comment()) 144 comment = refpolicy.Comment() [all …]
|
D | interfaces.py | 25 import refpolicy 40 self.type = refpolicy.SRC_TYPE 41 self.obj_classes = refpolicy.IdSet() 58 (self.name, refpolicy.field_to_str[self.type], " ".join(self.obj_classes)) 70 if (type == refpolicy.SRC_TYPE or type == refpolicy.TGT_TYPE) and \ 71 (p.type == refpolicy.TGT_TYPE or p.type == refpolicy.SRC_TYPE): 88 p.type = refpolicy.SRC_TYPE 145 if __param_insert(av.src_type, refpolicy.SRC_TYPE, av, params) == 1: 149 if __param_insert(av.tgt_type, refpolicy.TGT_TYPE, av, params) == 1: 153 if __param_insert(av.obj_class, refpolicy.OBJ_CLASS, av, params) == 1: [all …]
|
D | audit.py | 20 import refpolicy 165 self.scontext = refpolicy.SecurityContext() 166 self.tcontext = refpolicy.SecurityContext() 219 self.scontext = refpolicy.SecurityContext(fields[1]) 222 self.tcontext = refpolicy.SecurityContext(fields[1]) 301 self.invalid_context = refpolicy.SecurityContext() 302 self.scontext = refpolicy.SecurityContext() 303 self.tcontext = refpolicy.SecurityContext() 312 self.invalid_context = refpolicy.SecurityContext(recs[5]) 313 self.scontext = refpolicy.SecurityContext(recs[7].split("=")[1]) [all …]
|
D | access.py | 34 import refpolicy 87 self.perms = refpolicy.IdSet() 115 self.perms = refpolicy.IdSet(list[3:]) 286 types = refpolicy.IdSet() 299 s = refpolicy.IdSet() 327 role_type = refpolicy.RoleType()
|
D | module.py | 155 def create_module_package(self, sourcename, refpolicy=True): argument 171 if refpolicy:
|
D | refpolicy.py | 554 self.refpolicy = False 557 if self.refpolicy:
|
/external/selinux/sepolgen/ |
D | ChangeLog | 70 refpolicy from Dan Walsh. 105 * Expand the sepolgen parser to parse all current refpolicy modules from Karl MacMillan. 127 * Merged better matching for refpolicy style from Karl MacMillan
|
D | HACKING | 17 Reference Policy Representation (sepolgen.refpolicy)
|
/external/selinux/libsepol/tests/ |
D | Makefile | 51 …../../checkpolicy/checkpolicy -M policies/test-cond/refpolicy-base.conf -o policies/test-downgrade…
|
/external/selinux/policycoreutils/audit2allow/ |
D | audit2why | 227 mc.create_module_package(filename, self.__options.refpolicy) 302 if self.__options.refpolicy:
|
D | audit2allow | 227 mc.create_module_package(filename, self.__options.refpolicy) 303 if self.__options.refpolicy:
|
/external/selinux/libselinux/ |
D | ChangeLog | 365 * Update flask headers from refpolicy trunk from Dan Walsh. 418 * Regenerated Flask headers from refpolicy flask definitions. 679 * Regenerated Flask headers from refpolicy.
|
/external/selinux/policycoreutils/ |
D | ChangeLog | 709 the data needed by audit2allow to generate refpolicy. 759 * Patch from Dan Walsh to make audit2allow use refpolicy Makefile 900 * Merged audit2allow fixes for refpolicy from Dan Walsh.
|
/external/selinux/libsemanage/ |
D | ChangeLog | 373 (Tresys Technology), based on fc_sort.c code in refpolicy.
|