Lines Matching defs:scontext
375 * only. For these rules, scontext is the context before the transition,
384 static int constraint_expr_eval_reason(context_struct_t *scontext,
513 val1 = scontext->user;
519 val1 = scontext->type;
525 val1 = scontext->role;
554 l1 = &(scontext->range.level[0]);
560 l1 = &(scontext->range.level[0]);
566 l1 = &(scontext->range.level[1]);
572 l1 = &(scontext->range.level[1]);
578 l1 = &(scontext->range.level[0]);
579 l2 = &(scontext->range.level[1]);
643 c = scontext;
840 static int context_struct_compute_av(context_struct_t * scontext,
849 static void type_attribute_bounds_av(context_struct_t *scontext,
863 source = policydb->type_val_to_struct[scontext->type - 1];
871 memcpy(&lo_scontext, scontext, sizeof(lo_scontext));
905 static int context_struct_compute_av(context_struct_t * scontext,
946 sattr = &policydb->type_attr_map[scontext->type - 1];
985 !constraint_expr_eval_reason(scontext, tcontext, NULL,
1006 scontext->role != tcontext->role) {
1008 if (scontext->role == ra->role &&
1022 type_attribute_bounds_av(scontext, tcontext, tclass, requested, avd,
1096 context_struct_t *scontext = 0, *tcontext = 0;
1099 scontext = sepol_sidtab_search(sidtab, ssid);
1100 if (!scontext) {
1112 rc = context_struct_compute_av(scontext, tcontext, tclass,
1132 context_struct_t *scontext = 0, *tcontext = 0;
1135 scontext = sepol_sidtab_search(sidtab, ssid);
1136 if (!scontext) {
1159 rc = context_struct_compute_av(scontext, tcontext, tclass,
1246 * allocated string of the correct size. Set `*scontext'
1251 sepol_security_context_t * scontext,
1263 rc = context_to_string(NULL, policydb, context, scontext, scontext_len);
1271 * has the string representation specified by `scontext'.
1273 int sepol_context_to_sid(sepol_const_security_context_t scontext,
1281 scontext, scontext_len) < 0)
1297 ERR(NULL, "could not convert %s to sid", scontext);
1302 scontext,
1316 context_to_string(NULL, policydb, scontext, &s, &slen);
1320 "scontext=%s tcontext=%s tclass=%s",
1335 context_struct_t *scontext = 0, *tcontext = 0, newcontext;
1342 scontext = sepol_sidtab_search(sidtab, ssid);
1343 if (!scontext) {
1369 newcontext.user = scontext->user;
1380 newcontext.role = scontext->role;
1385 newcontext.role = scontext->role;
1392 newcontext.type = scontext->type;
1398 newcontext.type = scontext->type;
1406 avkey.source_type = scontext->type;
1434 if (roletr->role == scontext->role &&
1446 rc = mls_compute_sid(policydb, scontext, tcontext, tclass, specified,
1453 rc = compute_sid_handle_invalid_context(scontext,