Home
last modified time | relevance | path

Searched refs:sctx (Results 1 – 5 of 5) sorted by relevance

/system/security/keystore2/src/
Dpermission.rs540 let (sctx, namespace, is_su) = check_context()?; in check_grant_permission_selinux()
548 assert!(check_grant_permission(&sctx, NOT_GRANT_PERMS, &key).is_ok()); in check_grant_permission_selinux()
550 assert_perm_failed!(check_grant_permission(&sctx, KeyPerm::Grant.into(), &key)); in check_grant_permission_selinux()
553 assert_perm_failed!(check_grant_permission(&sctx, UNPRIV_PERMS, &key)); in check_grant_permission_selinux()
638 let (sctx, namespace, is_su) = check_context()?; in check_key_permission_domain_selinux()
646 assert!(check_key_permission(0, &sctx, KeyPerm::Use, &key, &None).is_ok()); in check_key_permission_domain_selinux()
647 assert!(check_key_permission(0, &sctx, KeyPerm::Delete, &key, &None).is_ok()); in check_key_permission_domain_selinux()
648 assert!(check_key_permission(0, &sctx, KeyPerm::GetInfo, &key, &None).is_ok()); in check_key_permission_domain_selinux()
649 assert!(check_key_permission(0, &sctx, KeyPerm::Rebind, &key, &None).is_ok()); in check_key_permission_domain_selinux()
650 assert!(check_key_permission(0, &sctx, KeyPerm::Update, &key, &None).is_ok()); in check_key_permission_domain_selinux()
[all …]
/system/sepolicy/tests/
Dpolicy.py92 self.sctx = data[1]
216 Rule.sctx not in kwargs['scontext']):
271 for sctx in kwargs['scontext']:
272 scontext |= self.ResolveTypeAttribute(sctx)
611 if not x.sctx in self.alldomains:
613 self.alldomains[x.sctx].entrypoints.append(str(x.tctx))
623 self.alldomains[x.sctx].entrypointpaths.extend(entrypointpath)
660 sctx = self.alldomains[d]
662 print("\tcoredomain="+str(sctx.coredomain))
663 print("\tappdomain="+str(sctx.appdomain))
[all …]
Dsearchpolicy.py80 rules.append("allow " + r.sctx + " " + r.tctx + ":" + r.tclass + " { " +
83 rules.append("allow " + r.sctx + " " + r.tctx + ":" + r.tclass + " " +
/system/security/keystore2/selinux/src/
Dconcurrency_test.rs102 let (tctx, sctx, perm, class) = ( in test_concurrent_check_access()
113 check_access(&sctx, &tctx, class, perm).unwrap(); in test_concurrent_check_access()
Dlib.rs691 let sctx = Context::new("u:r:system_server:s0").unwrap(); in context_from_string() localVariable
692 check_access(&sctx, &tctx, "keystore2_key", "use")?; in context_from_string()