OXIESEC PANEL
- Current Dir:
/
/
usr
/
include
/
sepol
Server IP: 2a02:4780:11:1084:0:327f:3464:10
Upload:
Create Dir:
Name
Size
Modified
Perms
📁
..
-
10/21/2025 06:53:52 AM
rwxr-xr-x
📄
boolean_record.h
1.51 KB
10/09/2021 02:44:18 AM
rw-r--r--
📄
booleans.h
2.19 KB
10/09/2021 02:44:18 AM
rw-r--r--
📁
cil
-
10/21/2025 06:53:50 AM
rwxr-xr-x
📄
context.h
752 bytes
10/09/2021 02:44:18 AM
rw-r--r--
📄
context_record.h
1.63 KB
10/09/2021 02:44:18 AM
rw-r--r--
📄
debug.h
975 bytes
10/09/2021 02:44:18 AM
rw-r--r--
📄
errcodes.h
851 bytes
10/09/2021 02:44:18 AM
rw-r--r--
📄
handle.h
1.36 KB
10/09/2021 02:44:18 AM
rw-r--r--
📄
ibendport_record.h
2.13 KB
10/09/2021 02:44:18 AM
rw-r--r--
📄
ibendports.h
1.35 KB
10/09/2021 02:44:18 AM
rw-r--r--
📄
ibpkey_record.h
2.25 KB
10/09/2021 02:44:18 AM
rw-r--r--
📄
ibpkeys.h
1.32 KB
10/09/2021 02:44:18 AM
rw-r--r--
📄
iface_record.h
1.8 KB
10/09/2021 02:44:18 AM
rw-r--r--
📄
interfaces.h
1.37 KB
10/09/2021 02:44:18 AM
rw-r--r--
📄
kernel_to_cil.h
125 bytes
10/09/2021 02:44:18 AM
rw-r--r--
📄
kernel_to_conf.h
126 bytes
10/09/2021 02:44:18 AM
rw-r--r--
📄
module.h
2.62 KB
10/09/2021 02:44:18 AM
rw-r--r--
📄
module_to_cil.h
329 bytes
10/09/2021 02:44:18 AM
rw-r--r--
📄
node_record.h
2.74 KB
10/09/2021 02:44:18 AM
rw-r--r--
📄
nodes.h
1.28 KB
10/09/2021 02:44:18 AM
rw-r--r--
📁
policydb
-
10/21/2025 06:53:50 AM
rwxr-xr-x
📄
policydb.h
4.58 KB
10/09/2021 02:44:18 AM
rw-r--r--
📄
port_record.h
1.97 KB
10/09/2021 02:44:18 AM
rw-r--r--
📄
ports.h
1.28 KB
10/09/2021 02:44:18 AM
rw-r--r--
📄
roles.h
339 bytes
10/09/2021 02:44:18 AM
rw-r--r--
📄
sepol.h
862 bytes
10/09/2021 02:44:18 AM
rw-r--r--
📄
user_record.h
2.33 KB
10/09/2021 02:44:18 AM
rw-r--r--
📄
users.h
1.98 KB
10/09/2021 02:44:18 AM
rw-r--r--
Editing: users.h
Close
#ifndef _SEPOL_USERS_H_ #define _SEPOL_USERS_H_ #include <sepol/policydb.h> #include <sepol/user_record.h> #include <sepol/handle.h> #include <stddef.h> #ifdef __cplusplus extern "C" { #endif /*---------compatibility------------*/ /* Given an existing binary policy (starting at 'data with length 'len') and user configurations living in 'usersdir', generate a new binary policy for the new user configurations. Sets '*newdata' and '*newlen' to refer to the new binary policy image. */ extern int sepol_genusers(void *data, size_t len, const char *usersdir, void **newdata, size_t * newlen); /* Enable or disable deletion of users by sepol_genusers(3) when a user in original binary policy image is not defined by the new user configurations. Defaults to disabled. */ extern void sepol_set_delusers(int on); /*--------end compatibility----------*/ /* Modify the user, or add it, if the key is not found */ extern int sepol_user_modify(sepol_handle_t * handle, sepol_policydb_t * policydb, const sepol_user_key_t * key, const sepol_user_t * data); /* Return the number of users */ extern int sepol_user_count(sepol_handle_t * handle, const sepol_policydb_t * p, unsigned int *response); /* Check if the specified user exists */ extern int sepol_user_exists(sepol_handle_t * handle, const sepol_policydb_t * policydb, const sepol_user_key_t * key, int *response); /* Query a user - returns the user or NULL if not found */ extern int sepol_user_query(sepol_handle_t * handle, const sepol_policydb_t * p, const sepol_user_key_t * key, sepol_user_t ** response); /* Iterate the users * The handler may return: * -1 to signal an error condition, * 1 to signal successful exit * 0 to signal continue */ extern int sepol_user_iterate(sepol_handle_t * handle, const sepol_policydb_t * policydb, int (*fn) (const sepol_user_t * user, void *fn_arg), void *arg); #ifdef __cplusplus } #endif #endif