Home
last modified time | relevance | path

Searched refs:sctx (Results 1 – 4 of 4) sorted by relevance

/system/sepolicy/tests/
Dtreble_sepolicy_tests.py54 sctx = alldomains[d]
56 print "\tcoredomain="+str(sctx.coredomain)
57 print "\tappdomain="+str(sctx.appdomain)
58 print "\tfromSystem="+str(sctx.fromSystem)
59 print "\tfromVendor="+str(sctx.fromVendor)
60 print "\tattributes="+str(sctx.attributes)
61 print "\tentrypoints="+str(sctx.entrypoints)
63 if sctx.entrypointpaths is not None:
64 for path in sctx.entrypointpaths:
148 if not x.sctx in alldomains:
[all …]
Dpolicy.py10 self.sctx = data[1]
65 if "scontext" in kwargs and Rule.sctx not in kwargs['scontext']:
/system/security/keystore/
Dpermissions.cpp122 char* sctx = NULL; in keystore_selinux_check_access() local
130 if (getpidcon(spid, &sctx) != 0) { in keystore_selinux_check_access()
138 bool allowed = selinux_check_access(sctx, tctx, selinux_class, str_perm, in keystore_selinux_check_access()
140 freecon(sctx); in keystore_selinux_check_access()
/system/core/init/
Dproperty_service.cpp75 static bool check_mac_perms(const std::string& name, char* sctx, struct ucred* cr) { in check_mac_perms() argument
77 if (!sctx) { in check_mac_perms()
95 … bool has_access = (selinux_check_access(sctx, tctx, "property_service", "set", &audit_data) == 0); in check_mac_perms()
101 static int check_control_mac_perms(const char *name, char *sctx, struct ucred *cr) in check_control_mac_perms() argument
115 return check_mac_perms(ctl_name, sctx, cr); in check_control_mac_perms()