Searched refs:sctx (Results 1 – 5 of 5) sorted by relevance
/system/security/keystore2/src/ |
D | permission.rs | 721 let (sctx, namespace, is_su) = check_context()?; in check_grant_permission_selinux() 729 assert!(check_grant_permission(&sctx, NOT_GRANT_PERMS, &key).is_ok()); in check_grant_permission_selinux() 731 assert_perm_failed!(check_grant_permission(&sctx, KeyPerm::grant().into(), &key)); in check_grant_permission_selinux() 734 assert_perm_failed!(check_grant_permission(&sctx, UNPRIV_PERMS, &key)); in check_grant_permission_selinux() 849 let (sctx, namespace, is_su) = check_context()?; in check_key_permission_domain_selinux() 858 assert!(check_key_permission(0, &sctx, KeyPerm::use_(), &key, &None).is_ok()); in check_key_permission_domain_selinux() 859 assert!(check_key_permission(0, &sctx, KeyPerm::delete(), &key, &None).is_ok()); in check_key_permission_domain_selinux() 860 assert!(check_key_permission(0, &sctx, KeyPerm::get_info(), &key, &None).is_ok()); in check_key_permission_domain_selinux() 861 assert!(check_key_permission(0, &sctx, KeyPerm::rebind(), &key, &None).is_ok()); in check_key_permission_domain_selinux() 862 assert!(check_key_permission(0, &sctx, KeyPerm::update(), &key, &None).is_ok()); in check_key_permission_domain_selinux() [all …]
|
/system/sepolicy/tests/ |
D | treble_sepolicy_tests.py | 39 sctx = alldomains[d] 41 print "\tcoredomain="+str(sctx.coredomain) 42 print "\tappdomain="+str(sctx.appdomain) 43 print "\tfromSystem="+str(sctx.fromSystem) 44 print "\tfromVendor="+str(sctx.fromVendor) 45 print "\tattributes="+str(sctx.attributes) 46 print "\tentrypoints="+str(sctx.entrypoints) 48 if sctx.entrypointpaths is not None: 49 for path in sctx.entrypointpaths: 131 if not x.sctx in alldomains: [all …]
|
D | searchpolicy.py | 66 rules.append("allow " + r.sctx + " " + r.tctx + ":" + r.tclass + " { " + 69 rules.append("allow " + r.sctx + " " + r.tctx + ":" + r.tclass + " " +
|
D | policy.py | 39 self.sctx = data[1] 154 Rule.sctx not in kwargs['scontext']): 209 for sctx in kwargs['scontext']: 210 scontext |= self.ResolveTypeAttribute(sctx)
|
/system/security/keystore2/selinux/src/ |
D | lib.rs | 370 let sctx = Context::new("u:r:system_server:s0").unwrap(); in context_from_string() localVariable 371 check_access(&sctx, &tctx, "keystore2_key", "use")?; in context_from_string()
|