Searched refs:roleallow (Results 1 – 15 of 15) sorted by relevance
/external/selinux/secilc/docs/ |
D | cil_role_statements.md | 178 roleallow section in Role Statements 191 (roleallow current_role_id new_role_id) 202 <td align="left"><p><code>roleallow</code></p></td> 203 <td align="left"><p>The <code>roleallow</code> keyword.</p></td> 223 …and above, any valid class may be used. Note that a [`roleallow`](cil_role_statements.md#roleallow… 269 (roleallow unconfined.role msg_filter.role)
|
D | README.md | 114 * [roleallow](cil_role_statements.md#roleallow)
|
D | cil_container_statements.md | 200 … | [`role`](cil_role_statements.md#role) | [`roleallow`](cil_role_statements.md#roleallow…
|
/external/selinux/libsepol/cil/src/ |
D | cil_tree.c | 758 struct cil_roleallow *roleallow = node->data; in cil_tree_print_node() local 761 if (roleallow->src != NULL) { in cil_tree_print_node() 762 cil_log(CIL_INFO, " %s", ((struct cil_symtab_datum*)roleallow->src)->name); in cil_tree_print_node() 764 cil_log(CIL_INFO, " %s", roleallow->src_str); in cil_tree_print_node() 767 if (roleallow->tgt != NULL) { in cil_tree_print_node() 768 cil_log(CIL_INFO, " %s", ((struct cil_symtab_datum*)roleallow->tgt)->name); in cil_tree_print_node() 770 cil_log(CIL_INFO, " %s", roleallow->tgt_str); in cil_tree_print_node()
|
D | cil_binary.h | 286 …l_roleallow_to_policydb(policydb_t *pdb, const struct cil_db *db, struct cil_roleallow *roleallow);
|
D | cil.c | 2170 void cil_roleallow_init(struct cil_roleallow **roleallow) in cil_roleallow_init() argument 2172 *roleallow = cil_malloc(sizeof(**roleallow)); in cil_roleallow_init() 2174 (*roleallow)->src_str = NULL; in cil_roleallow_init() 2175 (*roleallow)->src = NULL; in cil_roleallow_init() 2176 (*roleallow)->tgt_str = NULL; in cil_roleallow_init() 2177 (*roleallow)->tgt = NULL; in cil_roleallow_init()
|
D | cil_policy.c | 1042 struct cil_roleallow *roleallow = (struct cil_roleallow*)current->data; in cil_name_to_policy() local 1043 char *src_str = ((struct cil_symtab_datum*)roleallow->src)->name; in cil_name_to_policy() 1044 char *tgt_str = ((struct cil_symtab_datum*)roleallow->tgt)->name; in cil_name_to_policy()
|
D | cil_build_ast.h | 106 void cil_destroy_roleallow(struct cil_roleallow *roleallow);
|
D | cil_build_ast.c | 1842 struct cil_roleallow *roleallow = NULL; in cil_gen_roleallow() local 1854 cil_roleallow_init(&roleallow); in cil_gen_roleallow() 1856 roleallow->src_str = parse_current->next->data; in cil_gen_roleallow() 1857 roleallow->tgt_str = parse_current->next->next->data; in cil_gen_roleallow() 1859 ast_node->data = roleallow; in cil_gen_roleallow() 1867 cil_destroy_roleallow(roleallow); in cil_gen_roleallow() 1871 void cil_destroy_roleallow(struct cil_roleallow *roleallow) in cil_destroy_roleallow() argument 1873 if (roleallow == NULL) { in cil_destroy_roleallow() 1877 free(roleallow); in cil_destroy_roleallow()
|
D | cil_resolve_ast.c | 1050 struct cil_roleallow *roleallow = current->data; in cil_resolve_roleallow() local 1055 rc = cil_resolve_name(current, roleallow->src_str, CIL_SYM_ROLES, extra_args, &src_datum); in cil_resolve_roleallow() 1059 roleallow->src = (struct cil_role*)src_datum; in cil_resolve_roleallow() 1061 rc = cil_resolve_name(current, roleallow->tgt_str, CIL_SYM_ROLES, extra_args, &tgt_datum); in cil_resolve_roleallow() 1065 roleallow->tgt = (struct cil_role*)tgt_datum; in cil_resolve_roleallow()
|
D | cil_binary.c | 2234 …il_roleallow_to_policydb(policydb_t *pdb, const struct cil_db *db, struct cil_roleallow *roleallow) in cil_roleallow_to_policydb() argument 2244 rc = __cil_expand_role(roleallow->src, &src_bitmap); in cil_roleallow_to_policydb() 2247 rc = __cil_expand_role(roleallow->tgt, &tgt_bitmap); in cil_roleallow_to_policydb()
|
/external/selinux/libsepol/cil/test/integration_testing/ |
D | nonmls.cil | 49 (roleallow rolea_r roleb_r)
|
D | mls_policy.cil | 73 (roleallow rolea_r roleb_r)
|
/external/selinux/secilc/test/ |
D | integration.cil | 145 (roleallow system_r user_r)
|
D | policy.cil | 219 (roleallow system_r user_r)
|