Searched refs:sctx (Results 1 – 5 of 5) sorted by relevance
/system/security/keystore2/src/ |
D | permission.rs | 540 let (sctx, namespace, is_su) = check_context()?; in check_grant_permission_selinux() 548 assert!(check_grant_permission(&sctx, NOT_GRANT_PERMS, &key).is_ok()); in check_grant_permission_selinux() 550 assert_perm_failed!(check_grant_permission(&sctx, KeyPerm::Grant.into(), &key)); in check_grant_permission_selinux() 553 assert_perm_failed!(check_grant_permission(&sctx, UNPRIV_PERMS, &key)); in check_grant_permission_selinux() 638 let (sctx, namespace, is_su) = check_context()?; in check_key_permission_domain_selinux() 646 assert!(check_key_permission(0, &sctx, KeyPerm::Use, &key, &None).is_ok()); in check_key_permission_domain_selinux() 647 assert!(check_key_permission(0, &sctx, KeyPerm::Delete, &key, &None).is_ok()); in check_key_permission_domain_selinux() 648 assert!(check_key_permission(0, &sctx, KeyPerm::GetInfo, &key, &None).is_ok()); in check_key_permission_domain_selinux() 649 assert!(check_key_permission(0, &sctx, KeyPerm::Rebind, &key, &None).is_ok()); in check_key_permission_domain_selinux() 650 assert!(check_key_permission(0, &sctx, KeyPerm::Update, &key, &None).is_ok()); in check_key_permission_domain_selinux() [all …]
|
/system/sepolicy/tests/ |
D | policy.py | 92 self.sctx = data[1] 216 Rule.sctx not in kwargs['scontext']): 271 for sctx in kwargs['scontext']: 272 scontext |= self.ResolveTypeAttribute(sctx) 611 if not x.sctx in self.alldomains: 613 self.alldomains[x.sctx].entrypoints.append(str(x.tctx)) 623 self.alldomains[x.sctx].entrypointpaths.extend(entrypointpath) 660 sctx = self.alldomains[d] 662 print("\tcoredomain="+str(sctx.coredomain)) 663 print("\tappdomain="+str(sctx.appdomain)) [all …]
|
D | searchpolicy.py | 80 rules.append("allow " + r.sctx + " " + r.tctx + ":" + r.tclass + " { " + 83 rules.append("allow " + r.sctx + " " + r.tctx + ":" + r.tclass + " " +
|
/system/security/keystore2/selinux/src/ |
D | concurrency_test.rs | 102 let (tctx, sctx, perm, class) = ( in test_concurrent_check_access() 113 check_access(&sctx, &tctx, class, perm).unwrap(); in test_concurrent_check_access()
|
D | lib.rs | 691 let sctx = Context::new("u:r:system_server:s0").unwrap(); in context_from_string() localVariable 692 check_access(&sctx, &tctx, "keystore2_key", "use")?; in context_from_string()
|