Home
last modified time | relevance | path

Searched refs:sctx (Results 1 – 4 of 4) sorted by relevance

/system/sepolicy/tests/
Dtreble_sepolicy_tests.py39 sctx = alldomains[d]
41 print "\tcoredomain="+str(sctx.coredomain)
42 print "\tappdomain="+str(sctx.appdomain)
43 print "\tfromSystem="+str(sctx.fromSystem)
44 print "\tfromVendor="+str(sctx.fromVendor)
45 print "\tattributes="+str(sctx.attributes)
46 print "\tentrypoints="+str(sctx.entrypoints)
48 if sctx.entrypointpaths is not None:
49 for path in sctx.entrypointpaths:
131 if not x.sctx in alldomains:
[all …]
Dsearchpolicy.py66 rules.append("allow " + r.sctx + " " + r.tctx + ":" + r.tclass + " { " +
69 rules.append("allow " + r.sctx + " " + r.tctx + ":" + r.tclass + " " +
Dpolicy.py39 self.sctx = data[1]
139 Rule.sctx not in kwargs['scontext']):
194 for sctx in kwargs['scontext']:
195 scontext |= self.ResolveTypeAttribute(sctx)
/system/security/keystore/
Dpermissions.cpp136 char* sctx = nullptr; in keystore_selinux_check_access() local
144 if (ssid == nullptr && getpidcon(spid, &sctx) != 0) { in keystore_selinux_check_access()
149 const char* use_sid = ssid ? ssid : sctx; in keystore_selinux_check_access()
157 freecon(sctx); in keystore_selinux_check_access()