/system/netd/include/ |
H A D | Permission.h | 21 // the permission the app (UID) has been granted. When applied to a network, it's the permission an 22 // app must hold to be allowed to use the network. PERMISSION_NONE means "no special permission is 23 // held by the app" or "no special permission is required to use the network". 28 // android.permission.INTERNET framework permission. 31 // such as those that hold the android.permission.CHANGE_NETWORK_STATE framework permission. 34 // partition, those that hold the android.permission.CONNECTIVITY_INTERNAL framework permission an 42 permissionToName(Permission permission) argument [all...] |
H A D | Fwmark.h | 30 Permission permission : 2; member in struct:Fwmark::__anon1879
|
/system/core/fingerprintd/ |
H A D | IFingerprintDaemon.cpp | 34 static const String16 USE_FINGERPRINT_PERMISSION("android.permission.USE_FINGERPRINT"); 35 static const String16 MANAGE_FINGERPRINT_PERMISSION("android.permission.MANAGE_FINGERPRINT"); 36 static const String16 HAL_FINGERPRINT_PERMISSION("android.permission.MANAGE_FINGERPRINT"); // TODO 37 static const String16 DUMP_PERMISSION("android.permission.DUMP"); 197 bool BnFingerprintDaemon::checkPermission(const String16& permission) { argument 201 return PermissionCache::checkPermission(permission, calling_pid, calling_uid);
|
/system/netd/server/ |
H A D | FwmarkServer.cpp | 88 Permission permission = mNetworkController->getPermissionForUser(client->getUid()); local 91 if ((permission & PERMISSION_SYSTEM) != PERMISSION_SYSTEM) { 117 permission = static_cast<Permission>(permission | fwmark.permission); 201 permission = PERMISSION_NONE; 227 permission = static_cast<Permission>(permission | fwmark.permission); 232 if ((permission [all...] |
H A D | PhysicalNetwork.cpp | 28 Permission permission, PhysicalNetwork::Delegate* delegate) { 29 if (int ret = RouteController::addInterfaceToDefaultNetwork(interface.c_str(), permission)) { 33 if (int ret = delegate->addFallthrough(interface, permission)) { 40 Permission permission, 43 permission)) { 47 if (int ret = delegate->removeFallthrough(interface, permission)) { 69 int PhysicalNetwork::destroySocketsLackingPermission(Permission permission) { argument 70 if (permission == PERMISSION_NONE) return 0; 74 ALOGE("Error closing sockets for netId %d permission change", mNetId); 77 if (int ret = sd.destroySocketsLackingPermission(mNetId, permission, 27 addToDefault(unsigned netId, const std::string& interface, Permission permission, PhysicalNetwork::Delegate* delegate) argument 39 removeFromDefault(unsigned netId, const std::string& interface, Permission permission, PhysicalNetwork::Delegate* delegate) argument 86 setPermission(Permission permission) argument [all...] |
H A D | NetdNativeService.cpp | 48 const char CONNECTIVITY_INTERNAL[] = "android.permission.CONNECTIVITY_INTERNAL"; 49 const char DUMP[] = "android.permission.DUMP"; 51 binder::Status checkPermission(const char *permission) { argument 55 if (checkCallingPermission(String16(permission), (int32_t *) &pid, (int32_t *) &uid)) { 58 auto err = StringPrintf("UID %d / PID %d lacks permission %s", uid, pid, permission); 74 #define ENFORCE_PERMISSION(permission) { \ 75 binder::Status status = checkPermission((permission)); \ 81 #define NETD_LOCKING_RPC(permission, lock) \ 82 ENFORCE_PERMISSION(permission); \ [all...] |
H A D | NetworkController.cpp | 71 Permission permission, bool add) WARN_UNUSED_RESULT; 75 Permission permission) override WARN_UNUSED_RESULT; 77 Permission permission) override WARN_UNUSED_RESULT; 79 int modifyFallthrough(const std::string& physicalInterface, Permission permission, 94 Permission permission, bool add) { 98 permission)) { 106 permission)) { 116 Permission permission) { 117 return modifyFallthrough(physicalInterface, permission, true); 121 Permission permission) { 92 modifyFallthrough(unsigned vpnNetId, const std::string& physicalInterface, Permission permission, bool add) argument 115 addFallthrough(const std::string& physicalInterface, Permission permission) argument 120 removeFallthrough(const std::string& physicalInterface, Permission permission) argument 125 modifyFallthrough(const std::string& physicalInterface, Permission permission, bool add) argument 314 createPhysicalNetwork(unsigned netId, Permission permission) argument 429 setPermissionForUsers(Permission permission, const std::vector<uid_t>& uids) argument 442 setPermissionForNetworks(Permission permission, const std::vector<unsigned>& netIds) argument 543 Permission permission = reinterpret_cast<PhysicalNetwork*>(network)->getPermission(); local 660 Permission permission = static_cast<PhysicalNetwork*>(network)->getPermission(); local [all...] |
H A D | SockDiag.cpp | 410 // 1. The opening app no longer has permission to use this network, or: 411 // 2. The opening app does have permission, but did not explicitly select this network. 418 int SockDiag::destroySocketsLackingPermission(unsigned netId, Permission permission, argument 434 controlMark.permission = permission; 455 // If explicit and permission bits match, go to the JMP below which rejects the socket 489 if (int ret = destroyLiveSockets(shouldDestroy, "permission change", iov, ARRAY_SIZE(iov))) { 494 ALOGI("Destroyed %d sockets for netId %d permission=%d in %.1f ms", 495 mSocketsDestroyed, netId, permission, s.timeTaken());
|
H A D | SockDiagTest.cpp | 301 Permission permission; member in struct:__anon1896 368 fwmark.permission = permissionTestcases[i].permission; 435 Permission permission = permissionTestcases[i].permission; 436 return permission != PERMISSION_NETWORK && permission != PERMISSION_SYSTEM;
|
H A D | CommandListener.cpp | 1615 // network create <netId> [permission] 1633 Permission permission = PERMISSION_NONE; local 1635 permission = stringToPermission(argv[3]); 1636 if (permission == PERMISSION_NONE) { 1637 return syntaxError(client, "Unknown permission"); 1640 if (int ret = gCtls->netCtrl.createPhysicalNetwork(netId, permission)) { 1683 // network permission user set <permission> <uid> ... 1684 // network permission user clear <uid> ... 1685 // network permission networ 1692 Permission permission = PERMISSION_NONE; local [all...] |
H A D | RouteController.cpp | 455 Permission permission, bool add) { 461 fwmark.permission = permission; 526 fwmark.permission = PERMISSION_SYSTEM; 527 mask.permission = PERMISSION_SYSTEM; 543 Permission permission, uid_t uidStart, 554 fwmark.permission = permission; 555 mask.permission = permission; 454 modifyIncomingPacketMark(unsigned netId, const char* interface, Permission permission, bool add) argument 542 modifyExplicitNetworkRule(unsigned netId, uint32_t table, Permission permission, uid_t uidStart, uid_t uidEnd, bool add) argument 565 modifyOutputInterfaceRules(const char* interface, uint32_t table, Permission permission, uid_t uidStart, uid_t uidEnd, bool add) argument 593 modifyImplicitNetworkRule(unsigned netId, uint32_t table, Permission permission, bool add) argument 616 modifyVpnFallthroughRule(uint16_t action, unsigned vpnNetId, const char* physicalInterface, Permission permission) argument 751 modifyPhysicalNetwork(unsigned netId, const char* interface, Permission permission, bool add) argument 828 modifyDefaultNetwork(uint16_t action, const char* interface, Permission permission) argument 1010 addInterfaceToPhysicalNetwork(unsigned netId, const char* interface, Permission permission) argument 1019 removeInterfaceFromPhysicalNetwork(unsigned netId, const char* interface, Permission permission) argument 1087 addInterfaceToDefaultNetwork(const char* interface, Permission permission) argument 1091 removeInterfaceFromDefaultNetwork(const char* interface, Permission permission) argument 1114 addVirtualNetworkFallthrough(unsigned vpnNetId, const char* physicalInterface, Permission permission) argument 1119 removeVirtualNetworkFallthrough(unsigned vpnNetId, const char* physicalInterface, Permission permission) argument [all...] |
/system/bt/stack/gatt/ |
H A D | gatt_int.h | 181 tGATT_PERM permission; member in struct:__anon910 194 tGATT_PERM permission; member in struct:__anon911 208 tGATT_PERM permission; member in struct:__anon912
|
/system/security/keystore/ |
H A D | key_store_service.cpp | 466 ALOGW("permission denied for %d: getmtime", targetUid); 501 ALOGW("permission denied for %d: duplicate", callingUid); 1203 ALOGW("addAuthToken: permission denied for %d", IPCThreadState::self()->getCallingUid()); 1251 // TODO(tuckeris): add permission check. This should be callable from ClockworkHome only. 1286 * permission and if acting on other uids the grants to do so. 1288 bool KeyStoreService::checkBinderPermission(perm_t permission, int32_t targetUid) { argument 1291 if (!has_permission(callingUid, permission, spid)) { 1292 ALOGW("permission %s denied for %d", get_perm_label(permission), callingUid); 1304 * permission an 1306 checkBinderPermissionSelfOrSystem(perm_t permission, int32_t targetUid) argument 1323 checkBinderPermissionOrSelfTarget(perm_t permission, int32_t targetUid) argument 1340 checkBinderPermissionAndKeystoreState(perm_t permission, int32_t targetUid, bool checkUnlocked) argument [all...] |