X7ROOT File Manager
Current Path:
/usr/include/sepol/policydb
usr
/
include
/
sepol
/
policydb
/
ðŸ“
..
📄
avrule_block.h
(1.6 KB)
📄
avtab.h
(4.63 KB)
📄
conditional.h
(4.62 KB)
📄
constraint.h
(2.51 KB)
📄
context.h
(3.25 KB)
📄
ebitmap.h
(3.1 KB)
📄
expand.h
(3.57 KB)
📄
flask.h
(4.88 KB)
📄
flask_types.h
(1.74 KB)
📄
hashtab.h
(4.29 KB)
📄
hierarchy.h
(1.78 KB)
📄
link.h
(517 B)
📄
mls_types.h
(4.27 KB)
📄
module.h
(1.5 KB)
📄
polcaps.h
(721 B)
📄
policydb.h
(25.37 KB)
📄
services.h
(8.38 KB)
📄
sidtab.h
(1.93 KB)
📄
symtab.h
(1.08 KB)
📄
util.h
(1.43 KB)
Editing: flask_types.h
/* -*- linux-c -*- */ /* * Author : Stephen Smalley, <sds@tycho.nsa.gov> */ #ifndef _SEPOL_POLICYDB_FLASK_TYPES_H_ #define _SEPOL_POLICYDB_FLASK_TYPES_H_ /* * The basic Flask types and constants. */ #include <sys/types.h> #include <stdint.h> #ifdef __cplusplus extern "C" { #endif /* * A security context is a set of security attributes * associated with each subject and object controlled * by the security policy. The security context type * is defined as a variable-length string that can be * interpreted by any application or user with an * understanding of the security policy. */ typedef char *sepol_security_context_t; /* * An access vector (AV) is a collection of related permissions * for a pair of SIDs. The bits within an access vector * are interpreted differently depending on the class of * the object. The access vector interpretations are specified * in flask/access_vectors, and the corresponding constants * for permissions are defined in the automatically generated * header file av_permissions.h. */ typedef uint32_t sepol_access_vector_t; /* * Each object class is identified by a fixed-size value. * The set of security classes is specified in flask/security_classes, * with the corresponding constants defined in the automatically * generated header file flask.h. */ typedef uint16_t sepol_security_class_t; #define SEPOL_SECCLASS_NULL 0x0000 /* no class */ #define SELINUX_MAGIC 0xf97cff8c #define SELINUX_MOD_MAGIC 0xf97cff8d typedef uint32_t sepol_security_id_t; #define SEPOL_SECSID_NULL 0 struct sepol_av_decision { sepol_access_vector_t allowed; sepol_access_vector_t decided; sepol_access_vector_t auditallow; sepol_access_vector_t auditdeny; uint32_t seqno; }; #ifdef __cplusplus } #endif #endif
Upload File
Create Folder