Searched defs:allowed (Results 1 - 8 of 8) sorted by relevance
/system/connectivity/apmanager/dbus/ |
H A D | permission_broker_dbus_proxy.cc | 73 bool allowed = false; local 75 if (!proxy_->RequestUdpPortAccess(port, interface, fd, &allowed, &error)) { 80 if (!allowed) {
|
/system/security/keystore/ |
H A D | permissions.cpp | 130 bool allowed = selinux_check_access(sctx, tctx, selinux_class, str_perm, local 133 return allowed; 169 * Returns true if the callingUid is allowed to interact in the targetUid's
|
/system/update_engine/client_library/ |
H A D | client_binder.cc | 76 bool BinderUpdateEngineClient::SetUpdateOverCellularPermission(bool allowed) { argument 77 return service_->SetUpdateOverCellularPermission(allowed).isOk(); 81 bool* allowed) const { 82 return service_->GetUpdateOverCellularPermission(allowed).isOk();
|
H A D | client_dbus.cc | 75 bool DBusUpdateEngineClient::SetUpdateOverCellularPermission(bool allowed) { argument 76 return proxy_->SetUpdateOverCellularPermission(allowed, nullptr); 80 bool* allowed) const { 81 return proxy_->GetUpdateOverCellularPermission(allowed, nullptr);
|
/system/update_engine/ |
H A D | update_engine_client.cc | 301 bool allowed = FLAGS_update_over_cellular == "yes"; local 302 if (!allowed && FLAGS_update_over_cellular != "no") { 306 if (!client_->SetUpdateOverCellularPermission(allowed)) { 315 bool allowed; local 317 if (!client_->GetUpdateOverCellularPermission(&allowed)) { 323 << (allowed ? "ENABLED" : "DISABLED");
|
/system/webservd/webservd/ |
H A D | server.cc | 48 bool allowed) { 49 if (allowed) { 46 OnFirewallSuccess(const std::string& itf_name, uint16_t port, bool allowed) argument
|
/system/connectivity/shill/cellular/ |
H A D | cellular_capability_universal.h | 155 ModemModes(uint32_t allowed, MMModemMode preferred) argument 156 : allowed_modes(allowed),
|
/system/core/debuggerd/ |
H A D | debuggerd.cpp | 159 bool allowed = false; local 178 allowed = (selinux_check_access(scon, tcon, tclass, perm, reinterpret_cast<void*>(request)) == 0); 183 return allowed; 248 // However, system is only allowed to collect backtraces but cannot dump tombstones. 259 // No one else is allowed to dump arbitrary processes. 825 ALOGE("debuggerd: Not allowed to redirect action %d to 32 bit debuggerd\n", request.action);
|
Completed in 230 milliseconds