Home
last modified time | relevance | path

Searched refs:getcon (Results 1 – 9 of 9) sorted by relevance

/system/core/init/
Dsubcontext_benchmark.cpp31 if (getcon(&context) != 0) { in BenchmarkSuccess()
Dreboot_test.cpp86 if (getcon(&ctx) == -1) { in GetSecurityContext()
Dservice_test.cpp51 if (getcon(&ctx) == -1) { in GetSecurityContext()
Dinit_test.cpp240 if (getcon(&ctx) == -1) { in GetSecurityContext()
Dservice.cpp84 if (getcon(&raw_con) == -1) { in ComputeContextFromExecutable()
/system/security/keystore2/selinux/src/
Dlib.rs235 pub fn getcon() -> Result<Context> { in getcon() function
240 match unsafe { selinux::getcon(&mut con) } { in getcon()
658 let context = getcon()?; in check_context()
807 assert_eq!(getpidcon(std::process::id() as i32).unwrap(), getcon().unwrap()); in test_getpidcon()
/system/security/keystore2/src/
Dpermission.rs37 use selinux::getcon;
39 use tests::test_getcon as getcon;
266 let target_context = getcon().context("check_keystore_permission: getcon failed.")?; in check_keystore_permission()
289 Domain::APP => getcon().context("check_grant_permission: getcon failed.")?, in check_grant_permission()
358 getcon().context(ks_err!("getcon failed."))? in check_key_permission()
484 let context = selinux::getcon()?; in check_context()
/system/security/keystore2/test_utils/
Drun_as.rs360 run_as(selinux::getcon().unwrap().to_str().unwrap(), getuid(), getgid(), || { in test_run_as_panics_on_closure_panic()
379 assert_eq!(TARGET_CTX, selinux::getcon().unwrap().to_str().unwrap()); in test_transition_to_untrusted_app()
428 assert_eq!(TARGET_CTX, selinux::getcon().unwrap().to_str().unwrap()); in test_run_as_child()
/system/hwservicemanager/
DAccessControl.cpp43 if (getcon(&mSeContext) != 0) { in AccessControl()