Home
last modified time | relevance | path

Searched refs:sctx (Results 1 – 5 of 5) sorted by relevance

/system/security/keystore2/src/
Dpermission.rs721 let (sctx, namespace, is_su) = check_context()?; in check_grant_permission_selinux()
729 assert!(check_grant_permission(&sctx, NOT_GRANT_PERMS, &key).is_ok()); in check_grant_permission_selinux()
731 assert_perm_failed!(check_grant_permission(&sctx, KeyPerm::grant().into(), &key)); in check_grant_permission_selinux()
734 assert_perm_failed!(check_grant_permission(&sctx, UNPRIV_PERMS, &key)); in check_grant_permission_selinux()
849 let (sctx, namespace, is_su) = check_context()?; in check_key_permission_domain_selinux()
858 assert!(check_key_permission(0, &sctx, KeyPerm::use_(), &key, &None).is_ok()); in check_key_permission_domain_selinux()
859 assert!(check_key_permission(0, &sctx, KeyPerm::delete(), &key, &None).is_ok()); in check_key_permission_domain_selinux()
860 assert!(check_key_permission(0, &sctx, KeyPerm::get_info(), &key, &None).is_ok()); in check_key_permission_domain_selinux()
861 assert!(check_key_permission(0, &sctx, KeyPerm::rebind(), &key, &None).is_ok()); in check_key_permission_domain_selinux()
862 assert!(check_key_permission(0, &sctx, KeyPerm::update(), &key, &None).is_ok()); in check_key_permission_domain_selinux()
[all …]
/system/sepolicy/tests/
Dtreble_sepolicy_tests.py39 sctx = alldomains[d]
41 print "\tcoredomain="+str(sctx.coredomain)
42 print "\tappdomain="+str(sctx.appdomain)
43 print "\tfromSystem="+str(sctx.fromSystem)
44 print "\tfromVendor="+str(sctx.fromVendor)
45 print "\tattributes="+str(sctx.attributes)
46 print "\tentrypoints="+str(sctx.entrypoints)
48 if sctx.entrypointpaths is not None:
49 for path in sctx.entrypointpaths:
131 if not x.sctx in alldomains:
[all …]
Dsearchpolicy.py66 rules.append("allow " + r.sctx + " " + r.tctx + ":" + r.tclass + " { " +
69 rules.append("allow " + r.sctx + " " + r.tctx + ":" + r.tclass + " " +
Dpolicy.py39 self.sctx = data[1]
154 Rule.sctx not in kwargs['scontext']):
209 for sctx in kwargs['scontext']:
210 scontext |= self.ResolveTypeAttribute(sctx)
/system/security/keystore2/selinux/src/
Dlib.rs370 let sctx = Context::new("u:r:system_server:s0").unwrap(); in context_from_string() localVariable
371 check_access(&sctx, &tctx, "keystore2_key", "use")?; in context_from_string()