/external/selinux/libsepol/include/sepol/policydb/ |
policydb.h | 382 #define SYM_USERS 4 419 #define p_users_scope scope[SYM_USERS] 513 #define p_users symtab[SYM_USERS] 524 #define p_user_val_to_name sym_val_to_name[SYM_USERS]
|
/external/selinux/libsepol/src/ |
users.c | 242 tmp_ptr = realloc(policydb->sym_val_to_name[SYM_USERS], 247 policydb->sym_val_to_name[SYM_USERS] = tmp_ptr;
|
link.c | 587 state->cur->map[SYM_USERS][user->s.value - 1] = base_user->s.value; 829 bounds_val = state->cur->map[SYM_USERS][user->bounds - 1]; [all...] |
expand.c | 600 if (!is_id_enabled((char *)key, state->base, SYM_USERS)) 968 if (!is_id_enabled(id, state->base, SYM_USERS)) { [all...] |
policydb.c | [all...] |
/external/selinux/checkpolicy/ |
module_compiler.c | 59 [SYM_USERS] = "user", 522 ret = declare_symbol(SYM_USERS, id, datum, &value, &value); 524 ret = require_symbol(SYM_USERS, id, datum, &value, &value); 540 print_error_msg(ret, SYM_USERS); [all...] |
policy_define.c | [all...] |
/external/selinux/libsepol/tests/ |
test-common.c | 105 CU_ASSERT(p->sym_val_to_name[SYM_USERS][d->s.value - 1] == (char *)key);
|
/external/selinux/checkpolicy/test/ |
dismod.c | 346 display_id(p, fp, SYM_USERS, i, "");
|
/external/selinux/libsepol/cil/src/ |
cil_binary.c | 695 rc = symtab_insert(pdb, SYM_USERS, key, sepol_user, SCOPE_DECL, 0, &value); [all...] |