Searched refs:contexts (Results 1 - 4 of 4) sorted by relevance
/base/security/selinux_adapter/scripts/selinux_check/ |
H A D | check_baseline.py | 179 for contexts in domain_policy.keys(): 180 if set(baseline_map.get(contexts, '')) != set(domain_policy.get(contexts, '')): 181 expect_perm = ''.join(['(', ' '.join(set(baseline_map.get(contexts, ''))), ')))']) 182 expect = ' '.join(['expect rule: (allow', domain, ' ('.join(contexts), expect_perm]) 183 actual_perm = ''.join(['(', ' '.join(set(domain_policy.get(contexts, ''))), ')))']) 184 actual = ' '.join(['actual rule: (allow', domain, ' ('.join(contexts), actual_perm])
|
H A D | check_perm_group.py | 185 for contexts in policy_db.allow_map.keys(): 190 check_success |= (set(perm_group.check_perms) <= set(policy_db.allow_map[contexts][check_class])) 195 violater = ' '.join(contexts)
|
/base/security/selinux_adapter/framework/policycoreutils/src/ |
H A D | contexts_trie.c | 30 static const char SYSTEM_PARAMETER_CONTEXTS[] = "/system/etc/selinux/targeted/contexts/parameter_contexts"; 31 static const char VENDOR_PARAMETER_CONTEXTS[] = "/vendor/etc/selinux/targeted/contexts/parameter_contexts"; 107 static bool InsertParamToTrie(ParamContextsTrie *root, const char *paramPrefix, const char *contexts, int index) in InsertParamToTrie() argument 109 if (root == NULL || paramPrefix == NULL || contexts == NULL) { in InsertParamToTrie() 128 root->prefixLabel = contexts; in InsertParamToTrie() 131 root->matchLabel = contexts; in InsertParamToTrie()
|
/base/security/selinux_adapter/framework/tools/param_check/ |
H A D | test.cpp | 74 std::cout << "param: " << buff->info.paraName << ", contexts: " << buff->info.paraContext in TestLoadList() 114 const char *contexts = GetParamLabel(paraName.c_str()); in TestReadPara() local 115 std::string path = "/dev/__parameters__/" + std::string(contexts); in TestReadPara()
|
Completed in 3 milliseconds