Home
last modified time | relevance | path

Searched refs:DONTAUDIT (Results 1 – 11 of 11) sorted by relevance

/external/selinux/python/semanage/
Dsemanage-bash-completion.sh79 [DONTAUDIT]='dontaudit'
161 elif __contains_word "$command" ${VERBS[DONTAUDIT]} ; then
/external/selinux/libselinux/src/
Daudit2why.c26 #define DONTAUDIT 1 macro
396 RETURN(DONTAUDIT) in analyze()
488 PyModule_AddIntConstant(m,"DONTAUDIT", DONTAUDIT);
/external/selinux/checkpolicy/
Dpolicy_scan.l160 DONTAUDIT |
161 dontaudit { return(DONTAUDIT); }
Dpolicy_parse.y129 %token DONTAUDIT
449 cond_dontaudit_def : DONTAUDIT names names ':' names names ';'
487 dontaudit_def : DONTAUDIT names names ':' names names ';'
/external/selinux/python/sepolgen/src/sepolgen/
Dpolicygen.py170 rule.rule_type = rule.DONTAUDIT
181 if av.type == audit2why.DONTAUDIT:
Drefpolicy.py517 DONTAUDIT = 1 variable in AVRule
534 elif self.rule_type == self.DONTAUDIT:
Drefparser.py802 a.rule_type = refpolicy.AVRule.DONTAUDIT
/external/selinux/python/sepolicy/sepolicy/
D__init__.py56 DONTAUDIT = 'dontaudit' variable
362 valid_types = set([ALLOW, AUDITALLOW, NEVERALLOW, DONTAUDIT, TRANSITION, ROLE_ALLOW])
388 if DONTAUDIT in types:
389 tertypes.append(DONTAUDIT)
1144 ruletype=[ALLOW, DONTAUDIT])
/external/selinux/python/sepolgen/tests/
Dtest_refpolicy.py170 a.rule_type = a.DONTAUDIT
290 a.rule_type = a.DONTAUDIT
/external/selinux/python/audit2allow/
Daudit2why259 if rc == audit2why.DONTAUDIT:
Daudit2allow259 if rc == audit2why.DONTAUDIT: