/external/selinux/libsepol/tests/ |
test-expander-attr-map.c | 93 CU_ASSERT(!hashtab_search((&base_expanded2)->p_types.table, "attr_check_base_optional_disabled_5")); 94 CU_ASSERT(!hashtab_search((&base_expanded2)->p_types.table, "attr_check_base_optional_disabled_5_1_t")); 95 CU_ASSERT(!hashtab_search((&base_expanded2)->p_types.table, "attr_check_base_optional_disabled_5_2_t")); 96 CU_ASSERT(!hashtab_search((&base_expanded2)->p_types.table, "attr_check_base_optional_disabled_8")); 97 CU_ASSERT(!hashtab_search((&base_expanded2)->p_types.table, "attr_check_base_optional_disabled_8_1_t")); 98 CU_ASSERT(!hashtab_search((&base_expanded2)->p_types.table, "attr_check_base_optional_disabled_8_2_t")); 99 CU_ASSERT(!hashtab_search((&base_expanded2)->p_types.table, "attr_check_mod_optional_disabled_4")); 100 CU_ASSERT(!hashtab_search((&base_expanded2)->p_types.table, "attr_check_mod_optional_disabled_4_1_t")); 101 CU_ASSERT(!hashtab_search((&base_expanded2)->p_types.table, "attr_check_mod_optional_disabled_4_2_t")); 102 CU_ASSERT(!hashtab_search((&base_expanded2)->p_types.table, "attr_check_mod_optional_disabled_7")) [all...] |
test-common.c | 155 type = hashtab_search(p->p_types.table, id); 156 primary = hashtab_search(p->p_types.table, primary_id); 234 attr = hashtab_search(decl->p_types.table, id); 236 attr = hashtab_search(p->p_types.table, id);
|
test-linker-types.c | 107 type = hashtab_search(p->p_types.table, id); 116 type = hashtab_search(p->decl_val_to_struct[decls[i] - 1]->p_types.table, id);
|
/external/sepolicy/tools/sepolicy-analyze/ |
attribute.c | 13 attr = hashtab_search(policydb->p_types.table, name);
|
typecmp.c | 168 type_rules = malloc(sizeof(struct avtab_node) * policydb->p_types.nprim); 173 memset(type_rules, 0, sizeof(struct avtab_node) * policydb->p_types.nprim); 204 for (i = 0; i < policydb->p_types.nprim - 1; i++) { 213 for (j = i + 1; j < policydb->p_types.nprim; j++) {
|
neverallow.c | 113 type = hashtab_search(policydb->p_types.table, id); 144 for (bit = 0; bit < policydb->p_types.nprim; bit++) { 163 for (bit = 0; bit < policydb->p_types.nprim; bit++) {
|
/external/selinux/libsepol/src/ |
context.c | 50 if (!c->type || c->type > p->p_types.nprim) 186 typdatum = (type_datum_t *) hashtab_search(policydb->p_types.table,
|
link.c | 451 base_type = hashtab_search(state->base->p_types.table, id); 490 new_type->s.value = state->base->p_types.nprim + 1; 492 ret = hashtab_insert(state->base->p_types.table, 498 state->base->p_types.nprim++; 515 (state->dest_decl->p_types.table, new_id, new_type)) { 518 state->dest_decl->p_types.nprim++; 773 dest = hashtab_search(state->base->p_types.table, key); 880 target_type = hashtab_search(state->base->p_types.table, target_id); 895 base_type = hashtab_search(state->base->p_types.table, id); 908 new_type->s.value = state->base->p_types.nprim + 1 [all...] |
expand.c | 115 new_type->s.value = ++state->out->p_types.nprim; 125 ret = hashtab_insert(state->out->p_types.table, 167 new_type = hashtab_search(state->out->p_types.table, id); 544 dest = hashtab_search(state->out->p_types.table, (char *)key); 681 ret = hashtab_insert(state->out->p_types.table, [all...] |
hierarchy.c | 468 if (hashtab_map(p->p_types.table, check_type_hierarchy_callback, &args))
|
policydb.c | 896 if (!typdatum->s.value || typdatum->s.value > p->p_types.nprim) 1053 p->p_users.nprim, p->p_roles.nprim, p->p_types.nprim, 1083 calloc(p->p_types.nprim, sizeof(type_datum_t *)); 1392 for (i = 0; i < p->p_types.nprim; i++) { 1399 for (i = 0; i < p->p_types.nprim; i++) { [all...] |
services.c | [all...] |
module_to_cil.c | 378 rc = hashtab_map(pdb->p_types.table, typealiases_gather_map, pdb); [all...] |
write.c | [all...] |
/external/sepolicy/tools/ |
sepolicy-check.c | 131 src = hashtab_search(policy->p_types.table, s); 138 tgt = hashtab_search(policy->p_types.table, t);
|
check_seapp.c | 228 dat = hashtab_search(d->p_types.table, type);
|
/external/selinux/checkpolicy/ |
checkpolicy.c | 235 type_rules = malloc(sizeof(struct avtab_node) * policydb.p_types.nprim); 241 sizeof(struct avtab_node) * policydb.p_types.nprim); 248 for (i = 0; i < policydb.p_types.nprim - 1; i++) { 251 for (j = i + 1; j < policydb.p_types.nprim; j++) {
|
policy_define.c | 226 t = hashtab_search(policydbp->p_types.table, type); 1225 t = hashtab_search(policydbp->p_types.table, id); 1257 t = hashtab_search(policydbp->p_types.table, id); 1270 attr = hashtab_search(policydbp->p_types.table, id); 1307 bounds = hashtab_search(policydbp->p_types.table, bounds_id); 1318 type = hashtab_search(policydbp->p_types.table, type_id); 1420 attr = hashtab_search(policydbp->p_types.table, id); 1493 t = hashtab_search(policydbp->p_types.table, id); 1565 datum = (type_datum_t *) hashtab_search(policydbp->p_types.table, [all...] |
module_compiler.c | 522 types_tab = policydbp->p_types.table; 524 types_tab = stack_top->decl->p_types.table; [all...] |
/external/selinux/policycoreutils/sepolgen-ifgen/ |
sepolgen-ifgen-attr-helper.c | 223 if (hashtab_map(p->p_types.table, attribute_callback, &cb_data)) {
|
/external/selinux/libsepol/cil/src/ |
cil_binary.c | 128 *sepol_type = hashtab_search(pdb->p_types.table, datum->fqn); 630 pdb->type_attr_map = cil_malloc(pdb->p_types.nprim * sizeof(ebitmap_t)); 633 for (i = 0; i < pdb->p_types.nprim; i++) { [all...] |
/external/selinux/libsepol/include/sepol/policydb/ |
policydb.h | 504 #define p_types symtab[SYM_TYPES] macro
|
/external/selinux/checkpolicy/test/ |
dismod.c | 336 if (hashtab_map(p->p_types.table, display_type_callback, fp))
|