Lines Matching +full:unknown +full:- +full:key

45 int render_access_mask(uint32_t mask, avtab_key_t * key, policydb_t * p,  in render_access_mask()  argument
50 perm = sepol_av_to_string(p, key->target_class, mask); in render_access_mask()
59 fprintf(fp, "%s", p->p_type_val_to_name[type - 1]); in render_type()
63 int render_key(avtab_key_t * key, policydb_t * p, FILE * fp) in render_key() argument
66 stype = p->p_type_val_to_name[key->source_type - 1]; in render_key()
67 ttype = p->p_type_val_to_name[key->target_type - 1]; in render_key()
68 tclass = p->p_class_val_to_name[key->target_class - 1]; in render_key()
72 fprintf(fp, "%s %u : %s ", stype, key->target_type, tclass); in render_key()
74 fprintf(fp, "%u %s : %s ", key->source_type, ttype, tclass); in render_key()
76 fprintf(fp, "%u %u : %s ", key->source_type, key->target_type, in render_key()
87 int render_av_rule(avtab_key_t * key, avtab_datum_t * datum, uint32_t what, in render_av_rule() argument
92 && !(key-> in render_av_rule()
96 && (key-> in render_av_rule()
104 if (key->specified & AVTAB_ENABLED) in render_av_rule()
106 else if (!(key->specified & AVTAB_ENABLED)) in render_av_rule()
110 if (key->specified & AVTAB_AV) { in render_av_rule()
111 if (key->specified & AVTAB_ALLOWED) { in render_av_rule()
113 render_key(key, p, fp); in render_av_rule()
114 render_access_mask(datum->data, key, p, fp); in render_av_rule()
117 if (key->specified & AVTAB_AUDITALLOW) { in render_av_rule()
119 render_key(key, p, fp); in render_av_rule()
120 render_access_mask(datum->data, key, p, fp); in render_av_rule()
123 if (key->specified & AVTAB_AUDITDENY) { in render_av_rule()
125 render_key(key, p, fp); in render_av_rule()
128 render_access_mask(~datum->data, key, p, fp); in render_av_rule()
131 } else if (key->specified & AVTAB_TYPE) { in render_av_rule()
132 if (key->specified & AVTAB_TRANSITION) { in render_av_rule()
134 render_key(key, p, fp); in render_av_rule()
135 render_type(datum->data, p, fp); in render_av_rule()
138 if (key->specified & AVTAB_MEMBER) { in render_av_rule()
140 render_key(key, p, fp); in render_av_rule()
141 render_type(datum->data, p, fp); in render_av_rule()
144 if (key->specified & AVTAB_CHANGE) { in render_av_rule()
146 render_key(key, p, fp); in render_av_rule()
147 render_type(datum->data, p, fp); in render_av_rule()
150 } else if (key->specified & AVTAB_XPERMS) { in render_av_rule()
151 if (key->specified & AVTAB_XPERMS_ALLOWED) in render_av_rule()
153 else if (key->specified & AVTAB_XPERMS_AUDITALLOW) in render_av_rule()
155 else if (key->specified & AVTAB_XPERMS_DONTAUDIT) in render_av_rule()
157 render_key(key, p, fp); in render_av_rule()
158 fprintf(fp, "%s;\n", sepol_extended_perms_to_string(datum->xperms)); in render_av_rule()
161 return -1; in render_av_rule()
172 for (i = 0; i < a->nslot; i++) { in display_avtab()
173 for (cur = a->htable[i]; cur; cur = cur->next) { in display_avtab()
174 render_av_rule(&cur->key, &cur->datum, what, p, fp); in display_avtab()
185 for (i = 0; i < p->p_bools.nprim; i++) { in display_bools()
186 fprintf(fp, "%s : %d\n", p->p_bool_val_to_name[i], in display_bools()
187 p->bool_val_to_struct[i]->state); in display_bools()
196 for (cur = exp; cur != NULL; cur = cur->next) { in display_expr()
197 switch (cur->expr_type) { in display_expr()
200 p->p_bool_val_to_name[cur->bool - 1]); in display_expr()
232 for (cur = p->cond_list; cur != NULL; cur = cur->next) { in display_cond_expressions()
234 display_expr(p, cur->expr, fp); in display_cond_expressions()
235 fprintf(fp, "current state: %d\n", cur->cur_state); in display_cond_expressions()
237 for (av_cur = cur->true_list; av_cur != NULL; av_cur = av_cur->next) { in display_cond_expressions()
239 render_av_rule(&av_cur->node->key, &av_cur->node->datum, in display_cond_expressions()
243 for (av_cur = cur->false_list; av_cur != NULL; av_cur = av_cur->next) { in display_cond_expressions()
245 render_av_rule(&av_cur->node->key, &av_cur->node->datum, in display_cond_expressions()
254 if (p->handle_unknown == ALLOW_UNKNOWN) in display_handle_unknown()
255 fprintf(out_fp, "Allow unknown classes and permisions\n"); in display_handle_unknown()
256 else if (p->handle_unknown == DENY_UNKNOWN) in display_handle_unknown()
257 fprintf(out_fp, "Deny unknown classes and permisions\n"); in display_handle_unknown()
258 else if (p->handle_unknown == REJECT_UNKNOWN) in display_handle_unknown()
259 fprintf(out_fp, "Reject unknown classes and permisions\n"); in display_handle_unknown()
267 bool = hashtab_search(p->p_bools.table, name); in change_bool()
270 return -1; in change_bool()
272 bool->state = state; in change_bool()
285 ebitmap_for_each_bit(&p->policycaps, node, i) { in display_policycaps()
289 snprintf(buf, sizeof(buf), "unknown (%d)", i); in display_policycaps()
300 const char *id = p->sym_val_to_name[symbol_type][symbol_value]; in display_id()
310 ebitmap_for_each_bit(&p->permissive_map, node, i) { in display_permissive()
313 display_id(p, fp, SYM_TYPES, i - 1, ""); in display_permissive()
324 for (rt = p->role_tr; rt; rt = rt->next) { in display_role_trans()
325 display_id(p, fp, SYM_ROLES, rt->role - 1, ""); in display_role_trans()
326 display_id(p, fp, SYM_TYPES, rt->type - 1, ""); in display_role_trans()
327 display_id(p, fp, SYM_CLASSES, rt->tclass - 1, ":"); in display_role_trans()
328 display_id(p, fp, SYM_ROLES, rt->new_role - 1, ""); in display_role_trans()
338 for (ft = p->filename_trans; ft; ft = ft->next) { in display_filename_trans()
339 display_id(p, fp, SYM_TYPES, ft->stype - 1, ""); in display_filename_trans()
340 display_id(p, fp, SYM_TYPES, ft->ttype - 1, ""); in display_filename_trans()
341 display_id(p, fp, SYM_CLASSES, ft->tclass - 1, ":"); in display_filename_trans()
342 display_id(p, fp, SYM_TYPES, ft->otype - 1, ""); in display_filename_trans()
343 fprintf(fp, " %s\n", ft->name); in display_filename_trans()
361 printf("u) display unknown handling setting\n"); in menu()
463 ans[strlen(ans) - 1] = 0; in main()
478 ans[strlen(ans) - 1] = 0; in main()
509 OutfileName[strlen(OutfileName) - 1] = '\0'; /* fix_string (remove LF) */ in main()