Searched refs:allowed (Results 1 - 9 of 9) sorted by relevance

/system/hwservicemanager/
H A DAccessControl.cpp66 bool allowed = false; local
77 allowed = (selinux_check_access(sourceContext, targetContext, "hwservice_manager",
82 return allowed;
87 bool allowed = false; local
95 allowed = checkPermission(sourcePid, targetContext, perm, interface);
99 return allowed;
/system/update_engine/client_library/include/update_engine/
H A Dclient.h75 virtual bool SetUpdateOverCellularPermission(bool allowed) = 0;
76 virtual bool GetUpdateOverCellularPermission(bool* allowed) const = 0;
/system/update_engine/client_library/
H A Dclient_dbus.h53 bool SetUpdateOverCellularPermission(bool allowed) override;
54 bool GetUpdateOverCellularPermission(bool* allowed) const override;
H A Dclient_binder.h59 bool SetUpdateOverCellularPermission(bool allowed) override;
60 bool GetUpdateOverCellularPermission(bool* allowed) const override;
H A Dclient_binder.cc90 bool BinderUpdateEngineClient::SetUpdateOverCellularPermission(bool allowed) { argument
91 return service_->SetUpdateOverCellularPermission(allowed).isOk();
95 bool* allowed) const {
96 return service_->GetUpdateOverCellularPermission(allowed).isOk();
H A Dclient_dbus.cc83 bool DBusUpdateEngineClient::SetUpdateOverCellularPermission(bool allowed) { argument
84 return proxy_->SetUpdateOverCellularPermission(allowed, nullptr);
88 bool* allowed) const {
89 return proxy_->GetUpdateOverCellularPermission(allowed, nullptr);
/system/update_engine/
H A Dupdate_engine_client.cc314 bool allowed = FLAGS_update_over_cellular == "yes"; local
315 if (!allowed && FLAGS_update_over_cellular != "no") {
319 if (!client_->SetUpdateOverCellularPermission(allowed)) {
328 bool allowed; local
330 if (!client_->GetUpdateOverCellularPermission(&allowed)) {
336 << (allowed ? "ENABLED" : "DISABLED");
/system/security/keystore/
H A Dpermissions.cpp138 bool allowed = selinux_check_access(sctx, tctx, selinux_class, str_perm, local
141 return allowed;
177 * Returns true if the callingUid is allowed to interact in the targetUid's
/system/sepolicy/
H A DAndroid.mk519 echo "ERROR: permissive domains not allowed in user builds" 1>&2; \
569 echo "ERROR: permissive domains not allowed in user builds" 1>&2; \

Completed in 82 milliseconds