Home
last modified time | relevance | path

Searched refs:SELINUX_SUCC (Results 1 – 9 of 9) sorted by relevance

/base/security/selinux_adapter/test/unittest/service_checker/
Dunit_test.cpp51 ASSERT_EQ(SELINUX_SUCC, HdfListServiceCheck(getpid()));
68 ASSERT_EQ(SELINUX_SUCC, HdfGetServiceCheck(getpid(), TEST_SERVICE_NAME.c_str()));
85 ASSERT_EQ(SELINUX_SUCC, HdfAddServiceCheck(getpid(), TEST_SERVICE_NAME.c_str()));
102 ASSERT_EQ(SELINUX_SUCC, service.ListServiceCheck(getpid()));
121 ASSERT_EQ(SELINUX_SUCC, service.GetServiceCheck(getpid(), TEST_SERVICE_NAME));
139 ASSERT_EQ(SELINUX_SUCC, service.GetRemoteServiceCheck(getpid(), TEST_SERVICE_NAME));
157 ASSERT_EQ(SELINUX_SUCC, service.AddServiceCheck(getpid(), TEST_SERVICE_NAME));
/base/security/selinux_adapter/test/unittest/selinux_common_test/
Dunit_test.cpp53 EXPECT_EQ(SELINUX_SUCC, ret);
56 EXPECT_EQ(SELINUX_SUCC, ret);
59 EXPECT_EQ(SELINUX_SUCC, ret);
62 EXPECT_NE(SELINUX_SUCC, ret);
65 ASSERT_EQ(SELINUX_SUCC, ret);
/base/security/selinux_adapter/interfaces/policycoreutils/src/
Dservice_checker.cpp159 return SELINUX_SUCC; in CheckServiceNameValid()
223 return SELINUX_SUCC; in GetServiceContext()
236 return SELINUX_SUCC; in GetCallingContext()
249 return SELINUX_SUCC; in GetThisContext()
256 if (ret != SELINUX_SUCC) { in CheckPerm()
269 if (ret != SELINUX_SUCC) { in CheckPerm()
285 return ret == 0 ? SELINUX_SUCC : -SELINUX_PERMISSION_DENY; in CheckPerm()
Dhap_restorecon.cpp230 if (res != SELINUX_SUCC) { in HapFileRestorecon()
235 return failFlag ? -SELINUX_RESTORECON_ERROR : SELINUX_SUCC; in HapFileRestorecon()
245 return SELINUX_SUCC; in HapFileRestorecon()
266 return SELINUX_SUCC; in HapFileRestorecon()
350 return SELINUX_SUCC; in RestoreconSb()
365 return SELINUX_SUCC; in GetSecontext()
401 return SELINUX_SUCC; in HapLabelLookup()
418 return SELINUX_SUCC; in HapLabelLookup()
429 return SELINUX_SUCC; in HapDomainSetcontext()
479 return SELINUX_SUCC; in HapDomainSetcontext()
[all …]
Dselinux_error.cpp22 [SELINUX_SUCC] = "success",
Dparam_checker.c72 return res == 0 ? SELINUX_SUCC : -SELINUX_PERMISSION_DENY; in CheckPerm()
/base/security/selinux_adapter/test/unittest/hap_restorecon/
Dunit_test.cpp240 ASSERT_EQ(SELINUX_SUCC, ret);
270 ASSERT_EQ(SELINUX_SUCC, ret);
337 EXPECT_EQ(SELINUX_SUCC, test.HapFileRestorecon(TEST_HAP_PATH, g_hapFileInfoWithoutFlags));
367 …EXPECT_EQ(SELINUX_SUCC, test.HapFileRestorecon(TEST_ACCOUNT_SUB_PATH_1_FILE_1, g_hapFileInfoWithou…
423 ASSERT_EQ(SELINUX_SUCC, test.HapFileRestorecon(hapFileInfo));
469 ASSERT_EQ(SELINUX_SUCC, test.HapFileRestorecon(hapFileInfo));
502 ASSERT_EQ(SELINUX_SUCC, ret);
514 ASSERT_EQ(SELINUX_SUCC, ret);
537 ASSERT_EQ(SELINUX_SUCC, ret);
587 ASSERT_EQ(SELINUX_SUCC, test.RestoreconSb(TEST_SUB_PATH_1, g_hapFileInfoForRepeatLabel));
[all …]
/base/security/selinux_adapter/interfaces/policycoreutils/include/
Dselinux_error.h28 SELINUX_SUCC, enumerator
/base/security/selinux_adapter/test/unittest/paraperm_checker/
Dunit_test.cpp32 ASSERT_EQ(res, SELINUX_SUCC); in SetUpTestCase()