Home
last modified time | relevance | path

Searched refs:tctx (Results 1 – 6 of 6) sorted by relevance

/system/sepolicy/tests/
Dsepolicy_tests.py226 def checkIsolatedComputeAllowed(tctx, tclass): argument
230 … return tctx in allowedMemberTypes and tclass in permissionAllowList["isolated_compute_allowed"]
235 tctx, tclass, p = perm.split(":")
236 tctx = resolveHalServerSubtype(tctx)
238 if not checkIsolatedComputeAllowed(tctx, tclass) and \
239 ( tctx not in permissionAllowList \
240 or tclass not in permissionAllowList[tctx] \
250 basePermissionSet = set([":".join([rule.tctx, rule.tclass, perm])
255 typePermissionSet = set([":".join([rule.tctx, rule.tclass, perm])
257 if not rule.tctx in [subType, subType + "_userfaultfd"]])
Dsearchpolicy.py80 rules.append("allow " + r.sctx + " " + r.tctx + ":" + r.tclass + " { " +
83 rules.append("allow " + r.sctx + " " + r.tctx + ":" + r.tclass + " " +
Dpolicy.py93 self.tctx = data[2]
221 Rule.tctx not in kwargs['tcontext']):
278 for tctx in kwargs['tcontext']:
279 tcontext |= self.ResolveTypeAttribute(tctx)
613 self.alldomains[x.sctx].entrypoints.append(str(x.tctx))
618 if x.tctx == "postinstall_file":
620 entrypointpath = self.pol.QueryFc(x.tctx)
/system/security/keystore2/selinux/src/
Dconcurrency_test.rs102 let (tctx, sctx, perm, class) = ( in test_concurrent_check_access()
113 check_access(&sctx, &tctx, class, perm).unwrap(); in test_concurrent_check_access()
Dlib.rs690 let tctx = Context::new("u:object_r:keystore:s0").unwrap(); in context_from_string() localVariable
692 check_access(&sctx, &tctx, "keystore2_key", "use")?; in context_from_string()
/system/security/keystore2/src/
Dpermission.rs384 let tctx = lookup_keystore2_key_context(key.nspace) in check_key_permission() localVariable
388 selinux::check_permission(caller_ctx, &tctx, KeyPerm::ManageBlob)?; in check_key_permission()
390 tctx in check_key_permission()