Searched refs:allowed (Results 1 - 9 of 9) sorted by relevance
/system/hwservicemanager/ |
H A D | AccessControl.cpp | 66 bool allowed = false; local 77 allowed = (selinux_check_access(sourceContext, targetContext, "hwservice_manager", 82 return allowed; 87 bool allowed = false; local 95 allowed = checkPermission(sourcePid, targetContext, perm, interface); 99 return allowed;
|
/system/update_engine/client_library/include/update_engine/ |
H A D | client.h | 75 virtual bool SetUpdateOverCellularPermission(bool allowed) = 0; 76 virtual bool GetUpdateOverCellularPermission(bool* allowed) const = 0;
|
/system/update_engine/client_library/ |
H A D | client_dbus.h | 53 bool SetUpdateOverCellularPermission(bool allowed) override; 54 bool GetUpdateOverCellularPermission(bool* allowed) const override;
|
H A D | client_binder.h | 59 bool SetUpdateOverCellularPermission(bool allowed) override; 60 bool GetUpdateOverCellularPermission(bool* allowed) const override;
|
H A D | client_binder.cc | 90 bool BinderUpdateEngineClient::SetUpdateOverCellularPermission(bool allowed) { argument 91 return service_->SetUpdateOverCellularPermission(allowed).isOk(); 95 bool* allowed) const { 96 return service_->GetUpdateOverCellularPermission(allowed).isOk();
|
H A D | client_dbus.cc | 83 bool DBusUpdateEngineClient::SetUpdateOverCellularPermission(bool allowed) { argument 84 return proxy_->SetUpdateOverCellularPermission(allowed, nullptr); 88 bool* allowed) const { 89 return proxy_->GetUpdateOverCellularPermission(allowed, nullptr);
|
/system/update_engine/ |
H A D | update_engine_client.cc | 314 bool allowed = FLAGS_update_over_cellular == "yes"; local 315 if (!allowed && FLAGS_update_over_cellular != "no") { 319 if (!client_->SetUpdateOverCellularPermission(allowed)) { 328 bool allowed; local 330 if (!client_->GetUpdateOverCellularPermission(&allowed)) { 336 << (allowed ? "ENABLED" : "DISABLED");
|
/system/security/keystore/ |
H A D | permissions.cpp | 138 bool allowed = selinux_check_access(sctx, tctx, selinux_class, str_perm, local 141 return allowed; 177 * Returns true if the callingUid is allowed to interact in the targetUid's
|
/system/sepolicy/ |
H A D | Android.mk | 519 echo "ERROR: permissive domains not allowed in user builds" 1>&2; \ 569 echo "ERROR: permissive domains not allowed in user builds" 1>&2; \
|
Completed in 82 milliseconds