/system/core/init/ |
H A D | devices.h | 25 mode_t perm, unsigned int uid,
|
H A D | ueventd.cpp | 101 mode_t perm; local 148 perm = strtol(args[1], &endptr, 8); 171 add_dev_perms(name, attr, perm, uid, gid, prefix, wildcard);
|
H A D | util.h | 31 int create_socket(const char *name, int type, mode_t perm,
|
H A D | util.cpp | 91 int create_socket(const char *name, int type, mode_t perm, uid_t uid, argument 138 chmod(addr.sun_path, perm); 141 addr.sun_path, perm, uid, gid);
|
H A D | init.h | 69 int perm; member in struct:socketinfo
|
H A D | devices.cpp | 75 mode_t perm; member in struct:perms_ 99 mode_t perm, unsigned int uid, unsigned int gid, 116 node->dp.perm = perm; 156 INFO("fixup %s %d %d 0%o\n", buf, dp->uid, dp->gid, dp->perm); 158 chmod(buf, dp->perm); 222 return dp->perm; 98 add_dev_perms(const char *name, const char *attr, mode_t perm, unsigned int uid, unsigned int gid, unsigned short prefix, unsigned short wildcard) argument
|
H A D | init_parser.cpp | 91 INFO(" socket %s %s 0%o\n", si->name, si->type, si->perm); 888 case K_socket: {/* name type perm [ uid gid context ] */ 890 parse_error(state, "socket option requires name, type, perm arguments\n"); 905 si->perm = strtoul(args[3], 0, 8);
|
H A D | init.cpp | 284 si->perm, si->uid, si->gid, si->socketcon ?: scon);
|
/system/bt/stack/gatt/ |
H A D | gatt_db.c | 42 static void *allocate_attr_in_db(tGATT_SVC_DB *p_db, tBT_UUID *p_uuid, tGATT_PERM perm); 125 tGATT_PERM perm = p_attr->permission; local 128 min_key_size = (((perm & GATT_ENCRYPT_KEY_SIZE_MASK) >> 12)); 134 if (!(perm & GATT_READ_ALLOWED)) 140 if ((perm & GATT_READ_AUTH_REQUIRED ) && !(sec_flag & GATT_SEC_FLAG_LKEY_UNAUTHED) && 147 if ((perm & GATT_READ_MITM_REQUIRED ) && !(sec_flag & GATT_SEC_FLAG_LKEY_AUTHED)) 153 if ((perm & GATT_READ_ENCRYPTED_REQUIRED ) && !(sec_flag & GATT_SEC_FLAG_ENCRYPTED)) 159 if ( (perm & GATT_READ_ENCRYPTED_REQUIRED) && (sec_flag & GATT_SEC_FLAG_ENCRYPTED) && (key_size < min_key_size)) 221 GATT_TRACE_DEBUG("read_attr_value uuid=0x%04x perm=0x%0x sec_flag=0x%x offset=%d read_long=%d", 488 ** perm 495 gatts_add_characteristic(tGATT_SVC_DB *p_db, tGATT_PERM perm, tGATT_CHAR_PROP property, tBT_UUID * p_char_uuid) argument 589 gatts_add_char_descr(tGATT_SVC_DB *p_db, tGATT_PERM perm, tBT_UUID * p_descr_uuid) argument 744 tGATT_PERM perm; local 918 allocate_attr_in_db(tGATT_SVC_DB *p_db, tBT_UUID *p_uuid, tGATT_PERM perm) argument [all...] |
H A D | gatt_api.c | 309 ** perm : Characteristic value declaration attribute permission. 316 tGATT_PERM perm,tGATT_CHAR_PROP property) 326 if ( ((property & GATT_CHAR_PROP_BIT_AUTH) && !(perm & GATT_WRITE_SIGNED_PERM)) || 327 ((perm & GATT_WRITE_SIGNED_PERM) && !(property & GATT_CHAR_PROP_BIT_AUTH)) ) 329 GATT_TRACE_DEBUG("Invalid configuration property=0x%x perm=0x%x ", property, perm); 334 perm, 349 ** perm : Characteristic value declaration attribute 358 tGATT_PERM perm, 377 perm, 315 GATTS_AddCharacteristic(UINT16 service_handle, tBT_UUID *p_char_uuid, tGATT_PERM perm,tGATT_CHAR_PROP property) argument 357 GATTS_AddCharDescriptor(UINT16 service_handle, tGATT_PERM perm, tBT_UUID * p_descr_uuid) argument [all...] |
H A D | gatt_int.h | 697 extern UINT16 gatts_add_characteristic (tGATT_SVC_DB *p_db, tGATT_PERM perm, tGATT_CHAR_PROP property, tBT_UUID *p_char_uuid); 698 extern UINT16 gatts_add_char_descr (tGATT_SVC_DB *p_db, tGATT_PERM perm, tBT_UUID *p_dscp_uuid);
|
/system/extras/librank/ |
H A D | librank.c | 174 static int parse_perm(const char *perm) argument 178 while (*perm) { 179 switch(*perm) { 190 fprintf(stderr, "Unknown permission '%c'\n", *perm); 193 perm++; 220 int perm; local 233 perm = 0; 253 {"perm", required_argument, 0, 'm'}, 281 perm = parse_perm(optarg); 352 if (perm [all...] |
/system/bt/bta/gatt/ |
H A D | bta_gatts_api.c | 218 ** perm : Characteristic value declaration attribute permission. 225 tBTA_GATT_PERM perm, tBTA_GATT_CHAR_PROP property) 235 p_buf->perm = perm; 257 ** perm: descriptor access permission. 264 tBTA_GATT_PERM perm, 277 p_buf->perm = perm; 224 BTA_GATTS_AddCharacteristic(UINT16 service_id, tBT_UUID *p_char_uuid, tBTA_GATT_PERM perm, tBTA_GATT_CHAR_PROP property) argument 263 BTA_GATTS_AddCharDescriptor(UINT16 service_id, tBTA_GATT_PERM perm, tBT_UUID * p_descr_uuid) argument
|
H A D | bta_gatts_int.h | 97 tBTA_GATT_PERM perm; member in struct:__anon181 113 tBTA_GATT_PERM perm; member in struct:__anon183
|
H A D | bta_gatts_act.c | 452 p_msg->api_add_char.perm, 489 p_msg->api_add_char_descr.perm,
|
/system/core/sdcard/ |
H A D | sdcard.c | 151 perm_t perm; member in struct:node 423 if (node->perm == PERM_PRE_ROOT) { 461 node->perm = PERM_INHERIT; 467 switch (parent->perm) { 473 node->perm = PERM_ROOT; 480 node->perm = PERM_ANDROID; 487 node->perm = PERM_ANDROID_DATA; 490 node->perm = PERM_ANDROID_OBB; 496 node->perm = PERM_ANDROID_MEDIA; 517 if (parent_node && parent_node->perm [all...] |
/system/core/debuggerd/ |
H A D | debuggerd.cpp | 153 const char *perm; local 164 perm = debuggerd_perms[action]; 176 allowed = (selinux_check_access(scon, tcon, tclass, perm, NULL) == 0);
|
/system/bt/stack/include/ |
H A D | gatt_api.h | 769 ** perm : Characteristic value declaration attribute permission. 777 tGATT_PERM perm,tGATT_CHAR_PROP property); 790 ** perm : Characteristic value declaration attribute 798 extern UINT16 GATTS_AddCharDescriptor (UINT16 service_handle, tGATT_PERM perm,
|
/system/bt/bta/include/ |
H A D | bta_gatt_api.h | 1229 ** perm : Characteristic value declaration attribute permission. 1236 tBTA_GATT_PERM perm, tBTA_GATT_CHAR_PROP property); 1248 ** perm: descriptor access permission. 1256 tBTA_GATT_PERM perm,
|
/system/security/keystore/ |
H A D | keystore.cpp | 233 static const char *get_perm_label(perm_t perm) { argument 234 unsigned int index = ffs(perm); 259 static bool keystore_selinux_check_access(uid_t /*uid*/, perm_t perm, pid_t spid) { argument 266 const char *str_perm = get_perm_label(perm); 283 static bool has_permission(uid_t uid, perm_t perm, pid_t spid) { argument 292 return (user.perms & perm) && 293 keystore_selinux_check_access(uid, perm, spid); 297 return (DEFAULT_PERMS & perm) && 298 keystore_selinux_check_access(uid, perm, spid);
|
/system/keymaster/ |
H A D | ocb.c | 230 const vector unsigned char perm = {1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 0}; local 236 t = vec_perm(t, t, perm);
|