Searched defs:new_con (Results 1 - 3 of 3) sorted by path
/external/selinux/libsepol/src/ |
H A D | context_record.c | 156 sepol_context_t *new_con = NULL; local 163 if (sepol_context_create(handle, &new_con) < 0) 166 if (!(new_con->user = strdup(con->user))) 169 if (!(new_con->role = strdup(con->role))) 172 if (!(new_con->type = strdup(con->type))) 175 if (con->mls && !(new_con->mls = strdup(con->mls))) 178 *con_ptr = new_con; 186 sepol_context_free(new_con);
|
H A D | expand.c | 287 constraint_node_t *new_con = NULL, *last_new_con = NULL; local 292 new_con = 294 if (!new_con) { 297 memset(new_con, 0, sizeof(constraint_node_t)); 298 new_con->permissions = src->permissions; 351 new_con->expr = new_expr; 357 *dst = new_con; 359 last_new_con->next = new_con; 361 last_new_con = new_con; 368 if (new_con) [all...] |
/external/selinux/policycoreutils/newrole/ |
H A D | newrole.c | 804 security_context_t new_con = NULL; local 891 send_audit_message(0, old_context, new_con, ttyn); 936 if (!(new_con = context_str(context))) { 941 if (security_check_context(new_con) < 0) { 942 fprintf(stderr, _("%s is not a valid context\n"), new_con); 943 send_audit_message(0, old_context, new_con, ttyn); 947 *new_context = strdup(new_con); 961 /* Don't free new_con, context_free(context) handles this */
|
Completed in 672 milliseconds