Searched defs:new_con (Results 1 - 3 of 3) sorted by path

/external/selinux/libsepol/src/
H A Dcontext_record.c156 sepol_context_t *new_con = NULL; local
163 if (sepol_context_create(handle, &new_con) < 0)
166 if (!(new_con->user = strdup(con->user)))
169 if (!(new_con->role = strdup(con->role)))
172 if (!(new_con->type = strdup(con->type)))
175 if (con->mls && !(new_con->mls = strdup(con->mls)))
178 *con_ptr = new_con;
186 sepol_context_free(new_con);
H A Dexpand.c287 constraint_node_t *new_con = NULL, *last_new_con = NULL; local
292 new_con =
294 if (!new_con) {
297 memset(new_con, 0, sizeof(constraint_node_t));
298 new_con->permissions = src->permissions;
351 new_con->expr = new_expr;
357 *dst = new_con;
359 last_new_con->next = new_con;
361 last_new_con = new_con;
368 if (new_con)
[all...]
/external/selinux/policycoreutils/newrole/
H A Dnewrole.c804 security_context_t new_con = NULL; local
891 send_audit_message(0, old_context, new_con, ttyn);
936 if (!(new_con = context_str(context))) {
941 if (security_check_context(new_con) < 0) {
942 fprintf(stderr, _("%s is not a valid context\n"), new_con);
943 send_audit_message(0, old_context, new_con, ttyn);
947 *new_context = strdup(new_con);
961 /* Don't free new_con, context_free(context) handles this */

Completed in 672 milliseconds