Searched refs:permission (Results 1 - 22 of 22) sorted by relevance

/system/netd/include/
H A DPermission.h21 // the permission the app (UID) has been granted. When applied to a network, it's the permission an
22 // app must hold to be allowed to use the network. PERMISSION_NONE means "no special permission is
23 // held by the app" or "no special permission is required to use the network".
28 // android.permission.INTERNET framework permission.
31 // such as those that hold the android.permission.CHANGE_NETWORK_STATE framework permission.
34 // partition, those that hold the android.permission.CONNECTIVITY_INTERNAL framework permission an
42 permissionToName(Permission permission) argument
[all...]
H A DFwmark.h30 Permission permission : 2; member in struct:Fwmark::__anon1879
/system/netd/server/
H A DPhysicalNetwork.cpp28 Permission permission, PhysicalNetwork::Delegate* delegate) {
29 if (int ret = RouteController::addInterfaceToDefaultNetwork(interface.c_str(), permission)) {
33 if (int ret = delegate->addFallthrough(interface, permission)) {
40 Permission permission,
43 permission)) {
47 if (int ret = delegate->removeFallthrough(interface, permission)) {
69 int PhysicalNetwork::destroySocketsLackingPermission(Permission permission) { argument
70 if (permission == PERMISSION_NONE) return 0;
74 ALOGE("Error closing sockets for netId %d permission change", mNetId);
77 if (int ret = sd.destroySocketsLackingPermission(mNetId, permission,
27 addToDefault(unsigned netId, const std::string& interface, Permission permission, PhysicalNetwork::Delegate* delegate) argument
39 removeFromDefault(unsigned netId, const std::string& interface, Permission permission, PhysicalNetwork::Delegate* delegate) argument
86 setPermission(Permission permission) argument
[all...]
H A DPhysicalNetwork.h30 Permission permission) WARN_UNUSED_RESULT = 0;
32 Permission permission) WARN_UNUSED_RESULT = 0;
40 int setPermission(Permission permission) WARN_UNUSED_RESULT;
49 int destroySocketsLackingPermission(Permission permission);
H A DRouteController.h46 Permission permission) WARN_UNUSED_RESULT;
48 Permission permission) WARN_UNUSED_RESULT;
70 Permission permission) WARN_UNUSED_RESULT;
72 Permission permission) WARN_UNUSED_RESULT;
87 Permission permission) WARN_UNUSED_RESULT;
89 Permission permission) WARN_UNUSED_RESULT;
H A DRouteController.cpp455 Permission permission, bool add) {
461 fwmark.permission = permission;
526 fwmark.permission = PERMISSION_SYSTEM;
527 mask.permission = PERMISSION_SYSTEM;
543 Permission permission, uid_t uidStart,
554 fwmark.permission = permission;
555 mask.permission = permission;
454 modifyIncomingPacketMark(unsigned netId, const char* interface, Permission permission, bool add) argument
542 modifyExplicitNetworkRule(unsigned netId, uint32_t table, Permission permission, uid_t uidStart, uid_t uidEnd, bool add) argument
565 modifyOutputInterfaceRules(const char* interface, uint32_t table, Permission permission, uid_t uidStart, uid_t uidEnd, bool add) argument
593 modifyImplicitNetworkRule(unsigned netId, uint32_t table, Permission permission, bool add) argument
616 modifyVpnFallthroughRule(uint16_t action, unsigned vpnNetId, const char* physicalInterface, Permission permission) argument
751 modifyPhysicalNetwork(unsigned netId, const char* interface, Permission permission, bool add) argument
828 modifyDefaultNetwork(uint16_t action, const char* interface, Permission permission) argument
1010 addInterfaceToPhysicalNetwork(unsigned netId, const char* interface, Permission permission) argument
1019 removeInterfaceFromPhysicalNetwork(unsigned netId, const char* interface, Permission permission) argument
1087 addInterfaceToDefaultNetwork(const char* interface, Permission permission) argument
1091 removeInterfaceFromDefaultNetwork(const char* interface, Permission permission) argument
1114 addVirtualNetworkFallthrough(unsigned vpnNetId, const char* physicalInterface, Permission permission) argument
1119 removeVirtualNetworkFallthrough(unsigned vpnNetId, const char* physicalInterface, Permission permission) argument
[all...]
H A DFwmarkServer.cpp88 Permission permission = mNetworkController->getPermissionForUser(client->getUid()); local
91 if ((permission & PERMISSION_SYSTEM) != PERMISSION_SYSTEM) {
117 permission = static_cast<Permission>(permission | fwmark.permission);
201 permission = PERMISSION_NONE;
227 permission = static_cast<Permission>(permission | fwmark.permission);
232 if ((permission
[all...]
H A DNetworkController.cpp71 Permission permission, bool add) WARN_UNUSED_RESULT;
75 Permission permission) override WARN_UNUSED_RESULT;
77 Permission permission) override WARN_UNUSED_RESULT;
79 int modifyFallthrough(const std::string& physicalInterface, Permission permission,
94 Permission permission, bool add) {
98 permission)) {
106 permission)) {
116 Permission permission) {
117 return modifyFallthrough(physicalInterface, permission, true);
121 Permission permission) {
92 modifyFallthrough(unsigned vpnNetId, const std::string& physicalInterface, Permission permission, bool add) argument
115 addFallthrough(const std::string& physicalInterface, Permission permission) argument
120 removeFallthrough(const std::string& physicalInterface, Permission permission) argument
125 modifyFallthrough(const std::string& physicalInterface, Permission permission, bool add) argument
314 createPhysicalNetwork(unsigned netId, Permission permission) argument
429 setPermissionForUsers(Permission permission, const std::vector<uid_t>& uids) argument
442 setPermissionForNetworks(Permission permission, const std::vector<unsigned>& netIds) argument
543 Permission permission = reinterpret_cast<PhysicalNetwork*>(network)->getPermission(); local
660 Permission permission = static_cast<PhysicalNetwork*>(network)->getPermission(); local
[all...]
H A DNetdNativeService.cpp48 const char CONNECTIVITY_INTERNAL[] = "android.permission.CONNECTIVITY_INTERNAL";
49 const char DUMP[] = "android.permission.DUMP";
51 binder::Status checkPermission(const char *permission) { argument
55 if (checkCallingPermission(String16(permission), (int32_t *) &pid, (int32_t *) &uid)) {
58 auto err = StringPrintf("UID %d / PID %d lacks permission %s", uid, pid, permission);
74 #define ENFORCE_PERMISSION(permission) { \
75 binder::Status status = checkPermission((permission)); \
81 #define NETD_LOCKING_RPC(permission, lock) \
82 ENFORCE_PERMISSION(permission); \
[all...]
H A DNetworkController.h64 int createPhysicalNetwork(unsigned netId, Permission permission) WARN_UNUSED_RESULT;
72 void setPermissionForUsers(Permission permission, const std::vector<uid_t>& uids);
74 int setPermissionForNetworks(Permission permission,
H A DClatdController.cpp75 fwmark.permission = PERMISSION_SYSTEM;
H A DSockDiag.h67 int destroySocketsLackingPermission(unsigned netId, Permission permission,
H A DSockDiagTest.cpp301 Permission permission; member in struct:__anon1896
368 fwmark.permission = permissionTestcases[i].permission;
435 Permission permission = permissionTestcases[i].permission;
436 return permission != PERMISSION_NETWORK && permission != PERMISSION_SYSTEM;
H A DSockDiag.cpp410 // 1. The opening app no longer has permission to use this network, or:
411 // 2. The opening app does have permission, but did not explicitly select this network.
418 int SockDiag::destroySocketsLackingPermission(unsigned netId, Permission permission, argument
434 controlMark.permission = permission;
455 // If explicit and permission bits match, go to the JMP below which rejects the socket
489 if (int ret = destroyLiveSockets(shouldDestroy, "permission change", iov, ARRAY_SIZE(iov))) {
494 ALOGI("Destroyed %d sockets for netId %d permission=%d in %.1f ms",
495 mSocketsDestroyed, netId, permission, s.timeTaken());
H A DCommandListener.cpp1615 // network create <netId> [permission]
1633 Permission permission = PERMISSION_NONE; local
1635 permission = stringToPermission(argv[3]);
1636 if (permission == PERMISSION_NONE) {
1637 return syntaxError(client, "Unknown permission");
1640 if (int ret = gCtls->netCtrl.createPhysicalNetwork(netId, permission)) {
1683 // network permission user set <permission> <uid> ...
1684 // network permission user clear <uid> ...
1685 // network permission networ
1692 Permission permission = PERMISSION_NONE; local
[all...]
H A DTetherController.cpp239 fwmark.permission = PERMISSION_SYSTEM;
/system/security/keystore/
H A Dkey_store_service.h140 * permission and if acting on other uids the grants to do so.
142 bool checkBinderPermission(perm_t permission, int32_t targetUid = UID_SELF);
146 * permission and the target uid is the caller or the caller is system.
148 bool checkBinderPermissionSelfOrSystem(perm_t permission, int32_t targetUid);
152 * permission or the target of the operation is the caller's uid. This is
153 * for operation where the permission is only for cross-uid activity and all
157 bool checkBinderPermissionOrSelfTarget(perm_t permission, int32_t targetUid);
160 * Helper method to check that the caller has the required permission as
163 * Returns NO_ERROR on success, PERMISSION_DENIED on a permission error and
167 int32_t checkBinderPermissionAndKeystoreState(perm_t permission, int32_
[all...]
H A Dkey_store_service.cpp466 ALOGW("permission denied for %d: getmtime", targetUid);
501 ALOGW("permission denied for %d: duplicate", callingUid);
1203 ALOGW("addAuthToken: permission denied for %d", IPCThreadState::self()->getCallingUid());
1251 // TODO(tuckeris): add permission check. This should be callable from ClockworkHome only.
1286 * permission and if acting on other uids the grants to do so.
1288 bool KeyStoreService::checkBinderPermission(perm_t permission, int32_t targetUid) { argument
1291 if (!has_permission(callingUid, permission, spid)) {
1292 ALOGW("permission %s denied for %d", get_perm_label(permission), callingUid);
1304 * permission an
1306 checkBinderPermissionSelfOrSystem(perm_t permission, int32_t targetUid) argument
1323 checkBinderPermissionOrSelfTarget(perm_t permission, int32_t targetUid) argument
1340 checkBinderPermissionAndKeystoreState(perm_t permission, int32_t targetUid, bool checkUnlocked) argument
[all...]
/system/core/fingerprintd/
H A DIFingerprintDaemon.h82 bool checkPermission(const String16& permission);
H A DIFingerprintDaemon.cpp34 static const String16 USE_FINGERPRINT_PERMISSION("android.permission.USE_FINGERPRINT");
35 static const String16 MANAGE_FINGERPRINT_PERMISSION("android.permission.MANAGE_FINGERPRINT");
36 static const String16 HAL_FINGERPRINT_PERMISSION("android.permission.MANAGE_FINGERPRINT"); // TODO
37 static const String16 DUMP_PERMISSION("android.permission.DUMP");
197 bool BnFingerprintDaemon::checkPermission(const String16& permission) { argument
201 return PermissionCache::checkPermission(permission, calling_pid, calling_uid);
/system/bt/stack/gatt/
H A Dgatt_db.c125 tGATT_PERM perm = p_attr->permission;
223 p_attr16->permission,
482 ** perm: permission (authentication and key size requirements)
576 ** perm: characteristic descriptor permission type.
752 perm = p_attr->permission;
758 GATT_TRACE_DEBUG( "gatts_write_attr_perm_check p_attr->permission =0x%04x min_key_size==0x%04x",
759 p_attr->permission,
970 p_attr16->permission = perm;
989 p_attr16->handle, p_attr16->uuid, p_attr16->permission);
994 p_attr32->handle, p_attr32->uuid, p_attr32->permission);
[all...]
H A Dgatt_int.h181 tGATT_PERM permission; member in struct:__anon910
194 tGATT_PERM permission; member in struct:__anon911
208 tGATT_PERM permission; member in struct:__anon912

Completed in 166 milliseconds