scontext           65 src/cronnext.c void free_security_context(security_context_t *scontext) {
scontext           67 src/cronnext.c 	(void)scontext;
scontext          121 src/funcs.h    void free_security_context( security_context_t *scontext );
scontext          279 src/security.c static int cron_authorize_context(security_context_t scontext,
scontext          303 src/security.c 	retval = security_compute_av(scontext, file_context,
scontext          312 src/security.c static int cron_authorize_range(security_context_t scontext,
scontext          335 src/security.c 	retval = security_compute_av(scontext, ucontext,
scontext          360 src/security.c 		if (!(ccon = context_new(u->scontext))) {
scontext          387 src/security.c 	else if (!u->scontext) {
scontext          391 src/security.c 	else if (!(*ucontextp = strdup(u->scontext))) {
scontext          407 src/security.c 	if (u->scontext == 0L) {
scontext          420 src/security.c 	if (!ucontext || strcmp(u->scontext, ucontext)) {
scontext          421 src/security.c 		if (!cron_authorize_range(u->scontext, ucontext)) {
scontext          426 src/security.c 						u->name, (char *) ucontext, u->scontext) >= 0) {
scontext          436 src/security.c 						(char *) ucontext, u->scontext) >= 0) {
scontext          447 src/security.c 						(char *) ucontext, u->scontext) >= 0) {
scontext          485 src/security.c 	security_context_t scontext = NULL;
scontext          505 src/security.c 		retval = get_default_context_with_level(seuser, level, NULL, &scontext);
scontext          523 src/security.c 		retval = get_default_context_with_rolelevel(current_user, current_role, level, NULL, &scontext);
scontext          529 src/security.c 	if (selinux_trans_to_raw_context(scontext, &rawcontext) == 0) {
scontext          530 src/security.c 		freecon(scontext);
scontext          531 src/security.c 		scontext = rawcontext;
scontext          551 src/security.c 			freecon(scontext);
scontext          558 src/security.c 			*rcontext = scontext;
scontext          563 src/security.c 	if (!cron_authorize_context(scontext, file_context)) {
scontext          566 src/security.c 		     "Unauthorized SELinux context=%s file_context=%s", (char *) scontext, file_context) >= 0) {
scontext          572 src/security.c 		freecon(scontext);
scontext          586 src/security.c 	*rcontext = scontext;
scontext          592 src/security.c void free_security_context(security_context_t * scontext) {
scontext          593 src/security.c 	if (*scontext != NULL) {
scontext          594 src/security.c 		freecon(*scontext);
scontext          595 src/security.c 		*scontext = 0L;
scontext           69 src/structs.h  	security_context_t	scontext;    /* SELinux security context */
scontext           58 src/user.c     	free_security_context(&(u->scontext));
scontext          112 src/user.c     		crontab_fd, &u->scontext, tabname) != 0) {