Searched refs:tctx (Results 1 – 6 of 6) sorted by relevance
/system/sepolicy/tests/ |
D | sepolicy_tests.py | 226 def checkIsolatedComputeAllowed(tctx, tclass): argument 230 … return tctx in allowedMemberTypes and tclass in permissionAllowList["isolated_compute_allowed"] 235 tctx, tclass, p = perm.split(":") 236 tctx = resolveHalServerSubtype(tctx) 238 if not checkIsolatedComputeAllowed(tctx, tclass) and \ 239 ( tctx not in permissionAllowList \ 240 or tclass not in permissionAllowList[tctx] \ 250 basePermissionSet = set([":".join([rule.tctx, rule.tclass, perm]) 255 typePermissionSet = set([":".join([rule.tctx, rule.tclass, perm]) 257 if not rule.tctx in [subType, subType + "_userfaultfd"]])
|
D | searchpolicy.py | 80 rules.append("allow " + r.sctx + " " + r.tctx + ":" + r.tclass + " { " + 83 rules.append("allow " + r.sctx + " " + r.tctx + ":" + r.tclass + " " +
|
D | policy.py | 93 self.tctx = data[2] 221 Rule.tctx not in kwargs['tcontext']): 278 for tctx in kwargs['tcontext']: 279 tcontext |= self.ResolveTypeAttribute(tctx) 613 self.alldomains[x.sctx].entrypoints.append(str(x.tctx)) 618 if x.tctx == "postinstall_file": 620 entrypointpath = self.pol.QueryFc(x.tctx)
|
/system/security/keystore2/selinux/src/ |
D | concurrency_test.rs | 102 let (tctx, sctx, perm, class) = ( in test_concurrent_check_access() 113 check_access(&sctx, &tctx, class, perm).unwrap(); in test_concurrent_check_access()
|
D | lib.rs | 690 let tctx = Context::new("u:object_r:keystore:s0").unwrap(); in context_from_string() localVariable 692 check_access(&sctx, &tctx, "keystore2_key", "use")?; in context_from_string()
|
/system/security/keystore2/src/ |
D | permission.rs | 384 let tctx = lookup_keystore2_key_context(key.nspace) in check_key_permission() localVariable 388 selinux::check_permission(caller_ctx, &tctx, KeyPerm::ManageBlob)?; in check_key_permission() 390 tctx in check_key_permission()
|