Searched refs:sctx (Results 1 – 4 of 4) sorted by relevance
/system/sepolicy/tests/ |
D | treble_sepolicy_tests.py | 54 sctx = alldomains[d] 56 print "\tcoredomain="+str(sctx.coredomain) 57 print "\tappdomain="+str(sctx.appdomain) 58 print "\tfromSystem="+str(sctx.fromSystem) 59 print "\tfromVendor="+str(sctx.fromVendor) 60 print "\tattributes="+str(sctx.attributes) 61 print "\tentrypoints="+str(sctx.entrypoints) 63 if sctx.entrypointpaths is not None: 64 for path in sctx.entrypointpaths: 148 if not x.sctx in alldomains: [all …]
|
D | policy.py | 10 self.sctx = data[1] 65 if "scontext" in kwargs and Rule.sctx not in kwargs['scontext']:
|
/system/security/keystore/ |
D | permissions.cpp | 122 char* sctx = NULL; in keystore_selinux_check_access() local 130 if (getpidcon(spid, &sctx) != 0) { in keystore_selinux_check_access() 138 bool allowed = selinux_check_access(sctx, tctx, selinux_class, str_perm, in keystore_selinux_check_access() 140 freecon(sctx); in keystore_selinux_check_access()
|
/system/core/init/ |
D | property_service.cpp | 75 static bool check_mac_perms(const std::string& name, char* sctx, struct ucred* cr) { in check_mac_perms() argument 77 if (!sctx) { in check_mac_perms() 95 … bool has_access = (selinux_check_access(sctx, tctx, "property_service", "set", &audit_data) == 0); in check_mac_perms() 101 static int check_control_mac_perms(const char *name, char *sctx, struct ucred *cr) in check_control_mac_perms() argument 115 return check_mac_perms(ctl_name, sctx, cr); in check_control_mac_perms()
|