/external/selinux/libsepol/tests/ |
test-linker-roles.c | 82 test_sym_presence(base, "g_b_role_1", SYM_ROLES, SCOPE_DECL, decls, 1); 92 test_sym_presence(base, "o1_b_role_1", SYM_ROLES, SCOPE_DECL, decls, 1); 113 test_sym_presence(base, "g_m1_role_1", SYM_ROLES, SCOPE_DECL, decls, 1); 123 test_sym_presence(base, "o1_m1_role_1", SYM_ROLES, SCOPE_DECL, decls, 1); 136 test_sym_presence(base, "g_b_role_2", SYM_ROLES, SCOPE_DECL, decls, 2); 148 test_sym_presence(base, "g_b_role_3", SYM_ROLES, SCOPE_DECL, decls, 3); 160 test_sym_presence(base, "o1_b_role_2", SYM_ROLES, SCOPE_DECL, decls, 2); 172 test_sym_presence(base, "g_b_role_4", SYM_ROLES, SCOPE_DECL, decls, 2); 184 test_sym_presence(base, "o3_b_role_1", SYM_ROLES, SCOPE_DECL, decls, 2); 197 test_sym_presence(base, "o4_b_role_1", SYM_ROLES, SCOPE_DECL, decls, 3) [all...] |
test-common.c | 81 CU_ASSERT(p->sym_val_to_name[SYM_ROLES][d->s.value - 1] == (char *)key); 218 printf("\nrole %s has %d types, %d expected\n", p->sym_val_to_name[SYM_ROLES][role->s.value - 1], found, len);
|
/external/selinux/libsepol/include/sepol/policydb/ |
policydb.h | 372 #define SYM_ROLES 2 409 #define p_roles_scope scope[SYM_ROLES] 503 #define p_roles symtab[SYM_ROLES] 514 #define p_role_val_to_name sym_val_to_name[SYM_ROLES]
|
/external/selinux/libsepol/src/ |
link.c | 422 state->cur->map[SYM_ROLES][role->s.value - 1] = base_role->s.value; 800 bounds_val = state->cur->map[SYM_ROLES][role->bounds - 1]; 1024 assert(mod->map[SYM_ROLES][i]); 1026 (&tmp, mod->map[SYM_ROLES][i] - 1, 1)) { 1120 assert(mod->map[SYM_ROLES][i]); 1122 (&e_tmp, mod->map[SYM_ROLES][i] - 1, 1)) { 1139 assert(mod->map[SYM_ROLES][i]); 1141 (&e_tmp, mod->map[SYM_ROLES][i] - 1, 1)) { [all...] |
policydb.c | 704 rc = symtab_insert(p, SYM_ROLES, key, role, 1089 for (i = SYM_ROLES; i < SYM_NUM; i++) { [all...] |
expand.c | 569 if (!is_id_enabled((char *)key, state->base, SYM_ROLES)) 746 if (!is_id_enabled(id, state->base, SYM_ROLES)) { 814 if (!is_id_enabled(id, state->base, SYM_ROLES)) { [all...] |
write.c | [all...] |
module_to_cil.c | 987 if (!is_id_in_ancestor_scope(pdb, decl_stack, role_node->role_name, SYM_ROLES)) { [all...] |
/external/selinux/checkpolicy/test/ |
dismod.c | 204 display_id(p, fp, SYM_ROLES, i, ""); 352 display_id(p, fp, SYM_ROLES, j, ""); 469 display_id(p, fp, SYM_ROLES, tr->new_role - 1, ""); 506 display_id(&policydb, fp, SYM_ROLES, role->s.value - 1, "");
|
dispol.c | 376 display_id(p, fp, SYM_ROLES, rt->role - 1, ""); 379 display_id(p, fp, SYM_ROLES, rt->new_role - 1, "");
|
/external/selinux/checkpolicy/ |
policy_define.c | [all...] |
module_compiler.c | 223 declare_symbol(SYM_ROLES, id, (hashtab_datum_t *) role, &value, 887 require_symbol(SYM_ROLES, id, (hashtab_datum_t *) role, [all...] |
/external/selinux/libsepol/cil/src/ |
cil_binary.c | 418 rc = symtab_insert(pdb, SYM_ROLES, (hashtab_key_t)key, sepol_role, SCOPE_DECL, 0, &value); [all...] |