/external/selinux/libsepol/src/ |
context.c | 102 strlen(policydb->p_role_val_to_name[context->role - 1]) + 1; 121 policydb->p_role_val_to_name[context->role - 1], 126 strlen(policydb->p_role_val_to_name[context->role - 1]) + 1 + 261 policydb->p_role_val_to_name[context->role -
|
roles.c | 35 tmp_roles[i] = strdup(policydb->p_role_val_to_name[i]);
|
kernel_to_cil.c | 184 names = ebitmap_to_str(&curr->names, pdb->p_role_val_to_name, 1); 1241 rc = strs_add(strs, pdb->p_role_val_to_name[i]); [all...] |
kernel_to_conf.c | 181 names = ebitmap_to_str(&curr->names, pdb->p_role_val_to_name, 1); 1215 rc = strs_add(strs, pdb->p_role_val_to_name[i]); [all...] |
users.c | 42 char *role = policydb->p_role_val_to_name[bit];
|
module_to_cil.c | 820 val_to_name = pdb->p_role_val_to_name; 1024 rc = ebitmap_to_names(&rs->roles, pdb->p_role_val_to_name, names, num_names); 1447 pdb->p_role_val_to_name[rule->new_role - 1]); [all...] |
services.c | 256 policydb->p_role_val_to_name[i]); [all...] |
expand.c | 777 base_reg_role_id = state->base->p_role_val_to_name[i]; [all...] |
hierarchy.c | 530 (char *)k, a->p->p_role_val_to_name[rp->s.value - 1]);
|
policydb.c | 968 if (p->p_role_val_to_name[role->s.value - 1] != NULL) 970 p->p_role_val_to_name[role->s.value - 1] = (char *)key; [all...] |
/external/selinux/libsepol/tests/ |
test-expander-users.c | 52 if (strcmp(role_names[j], p->p_role_val_to_name[i]) == 0) {
|
/external/selinux/checkpolicy/test/ |
dismod.c | 421 role = p->p_role_val_to_name[cur->context[0].role - 1]; 430 role = p->p_role_val_to_name[cur->context[0].role - 1];
|
/external/selinux/libsepol/include/sepol/policydb/ |
policydb.h | 522 #define p_role_val_to_name sym_val_to_name[SYM_ROLES] macro
|
/external/selinux/checkpolicy/ |
module_compiler.c | 244 policydbp->p_role_val_to_name[role->bounds - 1]); 489 policydbp->p_role_val_to_name[user->bounds - 1]); [all...] |
/external/selinux/libsepol/cil/src/ |
cil_binary.c | [all...] |