Lines Matching refs:fprintf
68 fprintf(fout, "class %s\n", secclass_map[i].name); in main()
69 fprintf(fout, "\n"); in main()
77 fprintf(fout, "sid %s\n", name); in main()
79 fprintf(fout, "sid unused%d\n", i); in main()
81 fprintf(fout, "\n"); in main()
86 fprintf(fout, "class %s\n", map->name); in main()
87 fprintf(fout, "{\n"); in main()
89 fprintf(fout, "\t%s\n", map->perms[j]); in main()
90 fprintf(fout, "}\n\n"); in main()
92 fprintf(fout, "\n"); in main()
96 fprintf(fout, "sensitivity s0;\n"); in main()
97 fprintf(fout, "sensitivity s1;\n"); in main()
98 fprintf(fout, "dominance { s0 s1 }\n"); in main()
99 fprintf(fout, "category c0;\n"); in main()
100 fprintf(fout, "category c1;\n"); in main()
101 fprintf(fout, "level s0:c0.c1;\n"); in main()
102 fprintf(fout, "level s1:c0.c1;\n"); in main()
108 fprintf(fout, "mlsconstrain %s {\n", map->name); in main()
110 fprintf(fout, "\t%s\n", map->perms[j]); in main()
117 fprintf(fout, "} (l2 eq h2 and h1 dom h2);\n\n"); in main()
123 fprintf(fout, "policycap %s;\n", selinux_policycap_names[i]); in main()
126 fprintf(fout, "type base_t;\n"); in main()
127 fprintf(fout, "role base_r;\n"); in main()
128 fprintf(fout, "role base_r types { base_t };\n"); in main()
130 fprintf(fout, "allow base_t base_t:%s *;\n", in main()
132 fprintf(fout, "user user_u roles { base_r }"); in main()
134 fprintf(fout, " level %s range %s - %s", SYSTEMLOW, in main()
136 fprintf(fout, ";\n"); in main()
146 fprintf(fout, "sid %s ", name); in main()
148 fprintf(fout, "sid unused%d\n", i); in main()
149 fprintf(fout, SUBJUSERROLETYPE "%s\n", in main()
152 fprintf(fout, "\n"); in main()
155 fprintf(fout, "fs_use_%s %s " OBJUSERROLETYPE "%s;\n", \ in main()
229 fprintf(fout, "genfscon %s %s " OBJUSERROLETYPE "%s\n", \ in main()
268 fprintf(fout, "/ " OBJUSERROLETYPE "%s\n", mls ? ":" SYSTEMLOW : ""); in main()
269 fprintf(fout, "/.* " OBJUSERROLETYPE "%s\n", mls ? ":" SYSTEMLOW : ""); in main()