/system/security/keystore/ |
H A D | permissions.h | 45 const char* get_perm_label(perm_t perm); 54 bool has_permission(uid_t uid, perm_t perm, pid_t spid);
|
H A D | permissions.cpp | 83 const char* get_perm_label(perm_t perm) { argument 84 unsigned int index = ffs(perm); 120 static bool keystore_selinux_check_access(uid_t uid, perm_t perm, pid_t spid) { argument 124 const char* str_perm = get_perm_label(perm); 160 bool has_permission(uid_t uid, perm_t perm, pid_t spid) { argument 169 return (user.perms & perm) && keystore_selinux_check_access(uid, perm, spid); 173 return (DEFAULT_PERMS & perm) && keystore_selinux_check_access(uid, perm, spid);
|
/system/sepolicy/tools/ |
H A D | sepolicy-check.c | 18 fprintf(stderr, "%s -s <source> -t <target> -c <class> -p <perm> -P <policy file>\n", arg0); 57 int check_perm(avtab_ptr_t current, perm_datum_t *perm) { argument 58 uint16_t perm_bitmask = 1U << (perm->s.value - 1); 66 perm_datum_t *perm, policydb_t *policy, avtab_t *avtab) { 89 match &= check_perm(cur, perm); 120 perm_datum_t *perm = NULL; local 152 perm = hashtab_search(cls->permissions.table, p); 153 if (perm == NULL) { 155 fprintf(stderr, "perm %s does not exist in class %s\n", p, c); 158 perm 63 expand_and_check(int s_op, uint32_t source_type, int t_op, uint32_t target_type, int c_op, uint32_t target_class, perm_datum_t *perm, policydb_t *policy, avtab_t *avtab) argument 235 char *policy = NULL, *source = NULL, *target = NULL, *class = NULL, *perm = NULL; local [all...] |
/system/bt/stack/gatt/ |
H A D | gatt_db.cc | 44 tGATT_PERM perm); 87 tGATT_PERM perm = attr.permission; local 89 min_key_size = (((perm & GATT_ENCRYPT_KEY_SIZE_MASK) >> 12)); 94 if (!(perm & GATT_READ_ALLOWED)) { 99 if ((perm & GATT_READ_AUTH_REQUIRED) && 106 if ((perm & GATT_READ_MITM_REQUIRED) && 112 if ((perm & GATT_READ_ENCRYPTED_REQUIRED) && 118 if ((perm & GATT_READ_ENCRYPTED_REQUIRED) && 170 << StringPrintf(" perm=0x%02x sec_flag=0x%x offset=%d read_long=%d", 359 * perm 366 gatts_add_characteristic(tGATT_SVC_DB& db, tGATT_PERM perm, tGATT_CHAR_PROP property, const Uuid& char_uuid) argument 398 gatts_add_char_descr(tGATT_SVC_DB& db, tGATT_PERM perm, const Uuid& descr_uuid) argument 653 allocate_attr_in_db(tGATT_SVC_DB& db, const Uuid& uuid, tGATT_PERM perm) argument [all...] |
H A D | gatt_int.h | 564 extern uint16_t gatts_add_characteristic(tGATT_SVC_DB& db, tGATT_PERM perm, 567 extern uint16_t gatts_add_char_descr(tGATT_SVC_DB& db, tGATT_PERM perm,
|
/system/hwservicemanager/ |
H A D | AccessControl.h | 21 bool checkPermission(const Context &context, pid_t sourceAuditPid, const char *targetContext, const char *perm, const char *interface); 22 bool checkPermission(const Context &context, pid_t sourcePid, const char *perm, const char *interface);
|
H A D | AccessControl.cpp | 77 bool AccessControl::checkPermission(const Context &context, pid_t sourceAuditPid, const char *targetContext, const char *perm, const char *interface) { argument 89 perm, (void *) &ad) == 0); 94 bool AccessControl::checkPermission(const Context &context, pid_t sourceAuditPid, const char *perm, const char *interface) { argument 104 allowed = checkPermission(context, sourceAuditPid, targetContext, perm, interface);
|
/system/sepolicy/tools/sepolicy-analyze/ |
H A D | Android.mk | 9 LOCAL_SRC_FILES := sepolicy-analyze.c dups.c neverallow.c perm.c typecmp.c booleans.c attribute.c utils.c
|
H A D | neverallow.c | 189 perm_datum_t *perm = NULL; local 336 perm = hashtab_search(cls->permissions.table, id); 337 if (cls->comdatum && !perm) 338 perm = hashtab_search(cls->comdatum->permissions.table, id); 339 if (!perm) { 344 node->data |= 1U << (perm->s.value - 1);
|
/system/core/init/ |
H A D | descriptors.cpp | 37 gid_t gid, int perm, const std::string& context) 38 : name_(name), type_(type), uid_(uid), gid_(gid), perm_(perm), context_(context) { 74 gid_t gid, int perm, const std::string& context) 75 : DescriptorInfo(name, type, uid, gid, perm, context) { 88 return CreateSocket(name().c_str(), flags, passcred, perm(), uid(), gid(), context.c_str()); 96 gid_t gid, int perm, const std::string& context) 98 : DescriptorInfo(name, type, uid, gid, perm, context) { 36 DescriptorInfo(const std::string& name, const std::string& type, uid_t uid, gid_t gid, int perm, const std::string& context) argument 73 SocketInfo(const std::string& name, const std::string& type, uid_t uid, gid_t gid, int perm, const std::string& context) argument 95 FileInfo(const std::string& name, const std::string& type, uid_t uid, gid_t gid, int perm, const std::string& context) argument
|
H A D | descriptors.h | 31 gid_t gid, int perm, const std::string& context); 45 int perm() const { return perm_; } function in class:android::init::DescriptorInfo 65 gid_t gid, int perm, const std::string& context); 75 gid_t gid, int perm, const std::string& context);
|
H A D | devices.h | 38 Permissions(const std::string& name, mode_t perm, uid_t uid, gid_t gid); 42 mode_t perm() const { return perm_; } function in class:android::init::Permissions 60 SysfsPermissions(const std::string& name, const std::string& attribute, mode_t perm, uid_t uid, argument 62 : Permissions(name, perm, uid, gid), attribute_(attribute) {}
|
H A D | devices_test.cpp | 228 EXPECT_EQ(0666U, permissions.perm()); 241 EXPECT_EQ(0666U, permissions.perm()); 255 EXPECT_EQ(0666U, permissions.perm()); 271 EXPECT_EQ(0666U, permissions.perm()); 281 EXPECT_EQ(0660U, permissions.perm()); 295 EXPECT_EQ(0660U, permissions.perm()); 307 EXPECT_EQ(0660U, permissions.perm());
|
H A D | ueventd_parser.cpp | 45 // args is now common to both sys and dev entries and contains: <perm> <uid> <gid> 48 mode_t perm = strtol(perm_string.c_str(), &end_pointer, 8); local 68 out_sysfs_permissions->emplace_back(name, sysfs_attribute, perm, uid, gid); 70 out_dev_permissions->emplace_back(name, perm, uid, gid);
|
H A D | util.h | 41 int CreateSocket(const char* name, int type, bool passcred, mode_t perm, uid_t uid, gid_t gid,
|
H A D | devices.cpp | 105 Permissions::Permissions(const std::string& name, mode_t perm, uid_t uid, gid_t gid) argument 106 : name_(name), perm_(perm), uid_(uid), gid_(gid), prefix_(false), wildcard_(false) { 148 << perm(); 155 if (chmod(attribute_file.c_str(), perm()) != 0) { 156 PLOG(ERROR) << "chmod(" << attribute_file << ", " << perm() << ") failed"; 216 return {it->perm(), it->uid(), it->gid()};
|
H A D | util.cpp | 88 int CreateSocket(const char* name, int type, bool passcred, mode_t perm, uid_t uid, gid_t gid, argument 146 if (fchmodat(AT_FDCWD, addr.sun_path, perm, AT_SYMLINK_NOFOLLOW)) { 152 << ", mode " << std::oct << perm << std::dec
|
H A D | service.cpp | 642 int perm = args.size() > 3 ? std::strtoul(args[3].c_str(), 0, 8) : -1; local 661 auto descriptor = std::make_unique<T>(args[1], args[2], *uid, *gid, perm, context); 675 // name type perm [ uid gid context ] 684 // name type perm [ uid gid context ]
|
/system/extras/librank/ |
H A D | librank.c | 174 static int parse_perm(const char *perm) argument 178 while (*perm) { 179 switch(*perm) { 190 fprintf(stderr, "Unknown permission '%c'\n", *perm); 193 perm++; 219 int perm; local 232 perm = 0; 252 {"perm", required_argument, 0, 'm'}, 280 perm = parse_perm(optarg); 352 if (perm [all...] |
/system/core/liblog/tests/ |
H A D | liblog_test.cpp | 1911 bool perm = (gid == AID_ROOT) || (uid == AID_ROOT); local 1912 EXPECT_STREQ(perm ? "TRUE" : persist_hold, persist); 1920 EXPECT_STREQ(perm ? "FALSE" : persist_hold, persist); 1928 EXPECT_STREQ(perm ? "true" : persist_hold, persist); 1936 EXPECT_STREQ(perm ? "false" : persist_hold, persist); 1944 EXPECT_STREQ(perm ? "" : persist_hold, persist);
|
/system/keymaster/key_blob_utils/ |
H A D | ocb.c | 230 const vector unsigned char perm = {1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 0}; local 236 t = vec_perm(t, t, perm);
|