[ SYSTEM ]: Linux srv.persadacompanies.com 4.18.0-553.56.1.el8_10.x86_64 #1 SMP Tue Jun 10 05:00:59 EDT 2025 x86_64
[ SERVER ]: Apache | PHP: 8.4.19
[ USER ]: persadamedika | IP: 45.64.1.108
GEFORCE FILE MANAGER
/
usr
/
include
/
sepol
/
policydb
/
UPLOAD:
NAME
SIZE
QUICK PERMS
ACTIONS
📄 avrule_block.h
1,637 B
SET
[ EDIT ]
|
[ DEL ]
📄 avtab.h
4,743 B
SET
[ EDIT ]
|
[ DEL ]
📄 conditional.h
4,733 B
SET
[ EDIT ]
|
[ DEL ]
📄 constraint.h
2,571 B
SET
[ EDIT ]
|
[ DEL ]
📄 context.h
3,332 B
SET
[ EDIT ]
|
[ DEL ]
📄 ebitmap.h
3,176 B
SET
[ EDIT ]
|
[ DEL ]
📄 expand.h
3,656 B
SET
[ EDIT ]
|
[ DEL ]
📄 flask.h
4,992 B
SET
[ EDIT ]
|
[ DEL ]
📄 flask_types.h
1,779 B
SET
[ EDIT ]
|
[ DEL ]
📄 hashtab.h
4,392 B
SET
[ EDIT ]
|
[ DEL ]
📄 hierarchy.h
1,818 B
SET
[ EDIT ]
|
[ DEL ]
📄 link.h
517 B
SET
[ EDIT ]
|
[ DEL ]
📄 mls_types.h
4,376 B
SET
[ EDIT ]
|
[ DEL ]
📄 module.h
1,532 B
SET
[ EDIT ]
|
[ DEL ]
📄 polcaps.h
721 B
SET
[ EDIT ]
|
[ DEL ]
📄 policydb.h
25,976 B
SET
[ EDIT ]
|
[ DEL ]
📄 services.h
8,583 B
SET
[ EDIT ]
|
[ DEL ]
📄 sidtab.h
1,976 B
SET
[ EDIT ]
|
[ DEL ]
📄 symtab.h
1,102 B
SET
[ EDIT ]
|
[ DEL ]
📄 util.h
1,461 B
SET
[ EDIT ]
|
[ DEL ]
DELETE SELECTED
[ CLOSE ]
EDIT: sidtab.h
/* Author : Stephen Smalley, <sds@tycho.nsa.gov> */ /* FLASK */ /* * A security identifier table (sidtab) is a hash table * of security context structures indexed by SID value. */ #ifndef _SEPOL_POLICYDB_SIDTAB_H_ #define _SEPOL_POLICYDB_SIDTAB_H_ #include <sepol/policydb/context.h> #ifdef __cplusplus extern "C" { #endif typedef struct sidtab_node { sepol_security_id_t sid; /* security identifier */ context_struct_t context; /* security context structure */ struct sidtab_node *next; } sidtab_node_t; typedef struct sidtab_node *sidtab_ptr_t; #define SIDTAB_HASH_BITS 7 #define SIDTAB_HASH_BUCKETS (1 << SIDTAB_HASH_BITS) #define SIDTAB_HASH_MASK (SIDTAB_HASH_BUCKETS-1) #define SIDTAB_SIZE SIDTAB_HASH_BUCKETS typedef struct { sidtab_ptr_t *htable; unsigned int nel; /* number of elements */ unsigned int next_sid; /* next SID to allocate */ unsigned char shutdown; } sidtab_t; extern int sepol_sidtab_init(sidtab_t * s); extern int sepol_sidtab_insert(sidtab_t * s, sepol_security_id_t sid, context_struct_t * context); extern context_struct_t *sepol_sidtab_search(sidtab_t * s, sepol_security_id_t sid); extern int sepol_sidtab_map(sidtab_t * s, int (*apply) (sepol_security_id_t sid, context_struct_t * context, void *args), void *args); extern void sepol_sidtab_map_remove_on_error(sidtab_t * s, int (*apply) (sepol_security_id_t s, context_struct_t * context, void *args), void *args); extern int sepol_sidtab_context_to_sid(sidtab_t * s, /* IN */ context_struct_t * context, /* IN */ sepol_security_id_t * sid); /* OUT */ extern void sepol_sidtab_hash_eval(sidtab_t * h, char *tag); extern void sepol_sidtab_destroy(sidtab_t * s); extern void sepol_sidtab_set(sidtab_t * dst, sidtab_t * src); extern void sepol_sidtab_shutdown(sidtab_t * s); #ifdef __cplusplus } #endif #endif /* _SIDTAB_H_ */ /* FLASK */