newcontext        492 security/selinux/ss/mls.c 		    struct context *newcontext,
newcontext        511 security/selinux/ss/mls.c 			return mls_range_set(newcontext, r);
newcontext        521 security/selinux/ss/mls.c 			return mls_context_cpy_low(newcontext, scontext);
newcontext        523 security/selinux/ss/mls.c 			return mls_context_cpy_high(newcontext, scontext);
newcontext        525 security/selinux/ss/mls.c 			return mls_context_cpy(newcontext, scontext);
newcontext        527 security/selinux/ss/mls.c 			return mls_context_cpy_low(newcontext, tcontext);
newcontext        529 security/selinux/ss/mls.c 			return mls_context_cpy_high(newcontext, tcontext);
newcontext        531 security/selinux/ss/mls.c 			return mls_context_cpy(newcontext, tcontext);
newcontext        538 security/selinux/ss/mls.c 			return mls_context_cpy(newcontext, scontext);
newcontext        541 security/selinux/ss/mls.c 			return mls_context_cpy_low(newcontext, scontext);
newcontext        544 security/selinux/ss/mls.c 		return mls_context_cpy_low(newcontext, scontext);
newcontext         57 security/selinux/ss/mls.h 		    struct context *newcontext,
newcontext       1580 security/selinux/ss/services.c 	struct context *newcontext)
newcontext       1591 security/selinux/ss/services.c 	if (context_struct_to_string(policydb, newcontext, &n, &nlen))
newcontext       1611 security/selinux/ss/services.c 				  struct context *newcontext,
newcontext       1633 security/selinux/ss/services.c 		newcontext->type = otype->otype;
newcontext       1648 security/selinux/ss/services.c 	struct context *scontext = NULL, *tcontext = NULL, newcontext;
newcontext       1669 security/selinux/ss/services.c 	context_init(&newcontext);
newcontext       1708 security/selinux/ss/services.c 			newcontext.user = tcontext->user;
newcontext       1712 security/selinux/ss/services.c 			newcontext.user = scontext->user;
newcontext       1717 security/selinux/ss/services.c 		newcontext.user = tcontext->user;
newcontext       1723 security/selinux/ss/services.c 		newcontext.role = scontext->role;
newcontext       1725 security/selinux/ss/services.c 		newcontext.role = tcontext->role;
newcontext       1728 security/selinux/ss/services.c 			newcontext.role = scontext->role;
newcontext       1730 security/selinux/ss/services.c 			newcontext.role = OBJECT_R_VAL;
newcontext       1735 security/selinux/ss/services.c 		newcontext.type = scontext->type;
newcontext       1737 security/selinux/ss/services.c 		newcontext.type = tcontext->type;
newcontext       1741 security/selinux/ss/services.c 			newcontext.type = scontext->type;
newcontext       1744 security/selinux/ss/services.c 			newcontext.type = tcontext->type;
newcontext       1768 security/selinux/ss/services.c 		newcontext.type = avdatum->u.data;
newcontext       1773 security/selinux/ss/services.c 		filename_compute_type(policydb, &newcontext, scontext->type,
newcontext       1785 security/selinux/ss/services.c 				newcontext.role = roletr->new_role;
newcontext       1794 security/selinux/ss/services.c 			     &newcontext, sock);
newcontext       1799 security/selinux/ss/services.c 	if (!policydb_context_isvalid(policydb, &newcontext)) {
newcontext       1803 security/selinux/ss/services.c 							&newcontext);
newcontext       1808 security/selinux/ss/services.c 	rc = sidtab_context_to_sid(sidtab, &newcontext, out_sid);
newcontext       1811 security/selinux/ss/services.c 	context_destroy(&newcontext);