/system/netd/server/ |
H A D | PhysicalNetwork.cpp | 27 Permission permission, PhysicalNetwork::Delegate* delegate) { 28 if (int ret = RouteController::addInterfaceToDefaultNetwork(interface.c_str(), permission)) { 32 if (int ret = delegate->addFallthrough(interface, permission)) { 39 Permission permission, 42 permission)) { 46 if (int ret = delegate->removeFallthrough(interface, permission)) { 68 int PhysicalNetwork::setPermission(Permission permission) { argument 69 if (permission == mPermission) { 74 mPermission, permission)) { 75 ALOGE("failed to change permission o 26 addToDefault(unsigned netId, const std::string& interface, Permission permission, PhysicalNetwork::Delegate* delegate) argument 38 removeFromDefault(unsigned netId, const std::string& interface, Permission permission, PhysicalNetwork::Delegate* delegate) argument [all...] |
H A D | RouteController.h | 46 Permission permission) WARN_UNUSED_RESULT; 48 Permission permission) WARN_UNUSED_RESULT; 65 Permission permission) WARN_UNUSED_RESULT; 67 Permission permission) WARN_UNUSED_RESULT; 82 Permission permission) WARN_UNUSED_RESULT; 84 Permission permission) WARN_UNUSED_RESULT;
|
H A D | FwmarkServer.cpp | 78 Permission permission = mNetworkController->getPermissionForUser(client->getUid()); local 81 if ((permission & PERMISSION_SYSTEM) != PERMISSION_SYSTEM) { 107 permission = static_cast<Permission>(permission | fwmark.permission); 160 permission = PERMISSION_NONE; 186 permission = static_cast<Permission>(permission | fwmark.permission); 191 if ((permission [all...] |
H A D | PhysicalNetwork.h | 30 Permission permission) WARN_UNUSED_RESULT = 0; 32 Permission permission) WARN_UNUSED_RESULT = 0; 40 int setPermission(Permission permission) WARN_UNUSED_RESULT;
|
H A D | RouteController.cpp | 440 Permission permission, bool add) { 446 fwmark.permission = permission; 511 fwmark.permission = PERMISSION_SYSTEM; 512 mask.permission = PERMISSION_SYSTEM; 528 Permission permission, uid_t uidStart, 539 fwmark.permission = permission; 540 mask.permission = permission; 439 modifyIncomingPacketMark(unsigned netId, const char* interface, Permission permission, bool add) argument 527 modifyExplicitNetworkRule(unsigned netId, uint32_t table, Permission permission, uid_t uidStart, uid_t uidEnd, bool add) argument 550 modifyOutputInterfaceRules(const char* interface, uint32_t table, Permission permission, uid_t uidStart, uid_t uidEnd, bool add) argument 578 modifyImplicitNetworkRule(unsigned netId, uint32_t table, Permission permission, bool add) argument 601 modifyVpnFallthroughRule(uint16_t action, unsigned vpnNetId, const char* physicalInterface, Permission permission) argument 736 modifyPhysicalNetwork(unsigned netId, const char* interface, Permission permission, bool add) argument 795 modifyDefaultNetwork(uint16_t action, const char* interface, Permission permission) argument 977 addInterfaceToPhysicalNetwork(unsigned netId, const char* interface, Permission permission) argument 986 removeInterfaceFromPhysicalNetwork(unsigned netId, const char* interface, Permission permission) argument 1046 addInterfaceToDefaultNetwork(const char* interface, Permission permission) argument 1050 removeInterfaceFromDefaultNetwork(const char* interface, Permission permission) argument 1073 addVirtualNetworkFallthrough(unsigned vpnNetId, const char* physicalInterface, Permission permission) argument 1078 removeVirtualNetworkFallthrough(unsigned vpnNetId, const char* physicalInterface, Permission permission) argument [all...] |
H A D | NetworkController.cpp | 68 Permission permission, bool add) WARN_UNUSED_RESULT; 72 Permission permission) override WARN_UNUSED_RESULT; 74 Permission permission) override WARN_UNUSED_RESULT; 76 int modifyFallthrough(const std::string& physicalInterface, Permission permission, 91 Permission permission, bool add) { 95 permission)) { 103 permission)) { 113 Permission permission) { 114 return modifyFallthrough(physicalInterface, permission, true); 118 Permission permission) { 89 modifyFallthrough(unsigned vpnNetId, const std::string& physicalInterface, Permission permission, bool add) argument 112 addFallthrough(const std::string& physicalInterface, Permission permission) argument 117 removeFallthrough(const std::string& physicalInterface, Permission permission) argument 122 modifyFallthrough(const std::string& physicalInterface, Permission permission, bool add) argument 280 createPhysicalNetwork(unsigned netId, Permission permission) argument 395 setPermissionForUsers(Permission permission, const std::vector<uid_t>& uids) argument 408 setPermissionForNetworks(Permission permission, const std::vector<unsigned>& netIds) argument 596 Permission permission = static_cast<PhysicalNetwork*>(network)->getPermission(); local [all...] |
H A D | NetworkController.h | 63 int createPhysicalNetwork(unsigned netId, Permission permission) WARN_UNUSED_RESULT; 71 void setPermissionForUsers(Permission permission, const std::vector<uid_t>& uids); 73 int setPermissionForNetworks(Permission permission,
|
H A D | ClatdController.cpp | 75 fwmark.permission = PERMISSION_SYSTEM;
|
H A D | CommandListener.cpp | 1638 // network create <netId> [permission] 1656 Permission permission = PERMISSION_NONE; local 1658 permission = stringToPermission(argv[3]); 1659 if (permission == PERMISSION_NONE) { 1660 return syntaxError(client, "Unknown permission"); 1663 if (int ret = sNetCtrl->createPhysicalNetwork(netId, permission)) { 1706 // network permission user set <permission> <uid> ... 1707 // network permission user clear <uid> ... 1708 // network permission networ 1715 Permission permission = PERMISSION_NONE; local [all...] |
H A D | TetherController.cpp | 232 fwmark.permission = PERMISSION_SYSTEM;
|
/system/netd/include/ |
H A D | Fwmark.h | 30 Permission permission : 2; member in struct:Fwmark::__anon1654
|
/system/core/fingerprintd/ |
H A D | IFingerprintDaemon.h | 80 bool checkPermission(const String16& permission);
|
H A D | IFingerprintDaemon.cpp | 34 static const String16 USE_FINGERPRINT_PERMISSION("android.permission.USE_FINGERPRINT"); 35 static const String16 MANAGE_FINGERPRINT_PERMISSION("android.permission.MANAGE_FINGERPRINT"); 36 static const String16 HAL_FINGERPRINT_PERMISSION("android.permission.MANAGE_FINGERPRINT"); // TODO 37 static const String16 DUMP_PERMISSION("android.permission.DUMP"); 187 bool BnFingerprintDaemon::checkPermission(const String16& permission) { argument 191 return PermissionCache::checkPermission(permission, calling_pid, calling_uid);
|
/system/bt/stack/gatt/ |
H A D | gatt_db.c | 125 tGATT_PERM perm = p_attr->permission; 223 p_attr16->permission, 488 ** perm: permission (authentication and key size requirements) 582 ** perm: characteristic descriptor permission type. 758 perm = p_attr->permission; 764 GATT_TRACE_DEBUG( "gatts_write_attr_perm_check p_attr->permission =0x%04x min_key_size==0x%04x", 765 p_attr->permission, 978 p_attr16->permission = perm; 997 p_attr16->handle, p_attr16->uuid, p_attr16->permission); 1002 p_attr32->handle, p_attr32->uuid, p_attr32->permission); [all...] |
H A D | gatt_int.h | 181 tGATT_PERM permission; member in struct:__anon865 194 tGATT_PERM permission; member in struct:__anon866 208 tGATT_PERM permission; member in struct:__anon867
|
/system/security/keystore/ |
H A D | keystore.cpp | 238 ALOGE("Keystore: Failed to retrieve permission label.\n"); 2102 ALOGW("permission denied for %d: getmtime", callingUid); 2136 ALOGW("permission denied for %d: duplicate", callingUid); 2720 ALOGW("addAuthToken: permission denied for %d", 2750 * permission and if acting on other uids the grants to do so. 2752 inline bool checkBinderPermission(perm_t permission, int32_t targetUid = UID_SELF) { argument 2755 if (!has_permission(callingUid, permission, spid)) { 2756 ALOGW("permission %s denied for %d", get_perm_label(permission), callingUid); 2768 * permission an 2770 checkBinderPermissionSelfOrSystem(perm_t permission, int32_t targetUid) argument 2787 checkBinderPermissionOrSelfTarget(perm_t permission, int32_t targetUid) argument 2804 checkBinderPermissionAndKeystoreState(perm_t permission, int32_t targetUid = -1, bool checkUnlocked = true) argument [all...] |