Searched defs:allowed (Results 1 - 8 of 8) sorted by relevance

/system/connectivity/apmanager/dbus/
H A Dpermission_broker_dbus_proxy.cc73 bool allowed = false; local
75 if (!proxy_->RequestUdpPortAccess(port, interface, fd, &allowed, &error)) {
80 if (!allowed) {
/system/security/keystore/
H A Dpermissions.cpp130 bool allowed = selinux_check_access(sctx, tctx, selinux_class, str_perm, local
133 return allowed;
169 * Returns true if the callingUid is allowed to interact in the targetUid's
/system/update_engine/client_library/
H A Dclient_binder.cc76 bool BinderUpdateEngineClient::SetUpdateOverCellularPermission(bool allowed) { argument
77 return service_->SetUpdateOverCellularPermission(allowed).isOk();
81 bool* allowed) const {
82 return service_->GetUpdateOverCellularPermission(allowed).isOk();
H A Dclient_dbus.cc75 bool DBusUpdateEngineClient::SetUpdateOverCellularPermission(bool allowed) { argument
76 return proxy_->SetUpdateOverCellularPermission(allowed, nullptr);
80 bool* allowed) const {
81 return proxy_->GetUpdateOverCellularPermission(allowed, nullptr);
/system/update_engine/
H A Dupdate_engine_client.cc301 bool allowed = FLAGS_update_over_cellular == "yes"; local
302 if (!allowed && FLAGS_update_over_cellular != "no") {
306 if (!client_->SetUpdateOverCellularPermission(allowed)) {
315 bool allowed; local
317 if (!client_->GetUpdateOverCellularPermission(&allowed)) {
323 << (allowed ? "ENABLED" : "DISABLED");
/system/webservd/webservd/
H A Dserver.cc48 bool allowed) {
49 if (allowed) {
46 OnFirewallSuccess(const std::string& itf_name, uint16_t port, bool allowed) argument
/system/connectivity/shill/cellular/
H A Dcellular_capability_universal.h155 ModemModes(uint32_t allowed, MMModemMode preferred) argument
156 : allowed_modes(allowed),
/system/core/debuggerd/
H A Ddebuggerd.cpp159 bool allowed = false; local
178 allowed = (selinux_check_access(scon, tcon, tclass, perm, reinterpret_cast<void*>(request)) == 0);
183 return allowed;
248 // However, system is only allowed to collect backtraces but cannot dump tombstones.
259 // No one else is allowed to dump arbitrary processes.
825 ALOGE("debuggerd: Not allowed to redirect action %d to 32 bit debuggerd\n", request.action);

Completed in 230 milliseconds