/external/selinux/libselinux/src/ |
H A D | is_customizable_type.c | 64 int is_context_customizable(const char * scontext) argument 75 c = context_new(scontext);
|
H A D | matchpathcon.c | 509 char * scontext = NULL; local 518 if (selabel_lookup_raw(hnd, &scontext, path, st.st_mode)) { 522 rc = lsetfilecon_raw(path, scontext); 523 freecon(scontext);
|
/external/selinux/libsepol/src/ |
H A D | context.c | 83 * allocated string of the correct size. Set `*scontext' 93 char *scontext = NULL; local 109 scontext = malloc(scontext_len); 110 if (!scontext) 112 scontext[scontext_len - 1] = '\0'; 117 ptr = scontext; 130 *result = scontext; 136 free(scontext); 149 context_struct_t *scontext = NULL; local 160 scontext [all...] |
H A D | genusers.c | 187 char *scontext, *r, *s; local 210 scontext = malloc(p - q); 211 if (!scontext) { 217 r = scontext; 225 r = scontext; 230 ERR(NULL, "invalid level %s (%s:%u)", scontext, 232 free(scontext); 236 free(scontext); 256 scontext = malloc(p - q); 257 if (!scontext) { [all...] |
H A D | mls.c | 164 * the MLS fields of `context' into the string `*scontext'. 165 * Update `*scontext' to point to the end of the MLS fields. 168 const context_struct_t * context, char **scontext) 178 scontextp = *scontext; 250 *scontext = scontextp; 322 * the string `*scontext'. Update `*scontext' to 330 char oldc, char **scontext, context_struct_t * context) 347 scontextp = p = *scontext; 442 *scontext 167 mls_sid_to_context(const policydb_t * policydb, const context_struct_t * context, char **scontext) argument 329 mls_context_to_sid(const policydb_t * policydb, char oldc, char **scontext, context_struct_t * context) argument 605 mls_compute_sid(policydb_t * policydb, context_struct_t * scontext, context_struct_t * tcontext, sepol_security_class_t tclass, uint32_t specified, context_struct_t * newcontext) argument [all...] |
H A D | services.c | 376 * only. For these rules, scontext is the context before the transition, 385 static int constraint_expr_eval_reason(context_struct_t *scontext, argument 496 val1 = scontext->user; 502 val1 = scontext->type; 508 val1 = scontext->role; 537 l1 = &(scontext->range.level[0]); 543 l1 = &(scontext->range.level[0]); 549 l1 = &(scontext->range.level[1]); 555 l1 = &(scontext->range.level[1]); 561 l1 = &(scontext 831 context_struct_compute_av(context_struct_t * scontext, context_struct_t * tcontext, sepol_security_class_t tclass, sepol_access_vector_t requested, struct sepol_av_decision *avd, unsigned int *reason, char **r_buf, unsigned int flags) argument 1068 context_struct_t *scontext = 0, *tcontext = 0; local 1104 context_struct_t *scontext = 0, *tcontext = 0; local 1220 sepol_sid_to_context(sepol_security_id_t sid, sepol_security_context_t * scontext, size_t * scontext_len) argument 1243 sepol_context_to_sid(const sepol_security_context_t scontext, size_t scontext_len, sepol_security_id_t * sid) argument 1271 compute_sid_handle_invalid_context(context_struct_t * scontext, context_struct_t * tcontext, sepol_security_class_t tclass, context_struct_t * newcontext) argument 1304 context_struct_t *scontext = 0, *tcontext = 0, newcontext; local [all...] |
/external/selinux/checkpolicy/ |
H A D | checkpolicy.c | 126 sepol_security_context_t scontext; local 130 rc = sepol_sid_to_context(sid, &scontext, &scontext_len); 134 printf("sid %d -> scontext %s\n", sid, scontext); 135 free(scontext); 383 sepol_security_context_t scontext; local 768 &scontext, &scontext_len); 771 printf("\nscontext %s\n", scontext); 772 free(scontext); 785 printf("scontext [all...] |
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
H A D | org.mortbay.jetty.server_6.1.23.v201004211559.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |