Searched refs:perm (Results 1 - 21 of 21) sorted by relevance

/system/security/keystore/
H A Dpermissions.h45 const char* get_perm_label(perm_t perm);
54 bool has_permission(uid_t uid, perm_t perm, pid_t spid);
H A Dpermissions.cpp83 const char* get_perm_label(perm_t perm) { argument
84 unsigned int index = ffs(perm);
120 static bool keystore_selinux_check_access(uid_t uid, perm_t perm, pid_t spid) { argument
124 const char* str_perm = get_perm_label(perm);
160 bool has_permission(uid_t uid, perm_t perm, pid_t spid) { argument
169 return (user.perms & perm) && keystore_selinux_check_access(uid, perm, spid);
173 return (DEFAULT_PERMS & perm) && keystore_selinux_check_access(uid, perm, spid);
/system/sepolicy/tools/
H A Dsepolicy-check.c18 fprintf(stderr, "%s -s <source> -t <target> -c <class> -p <perm> -P <policy file>\n", arg0);
57 int check_perm(avtab_ptr_t current, perm_datum_t *perm) { argument
58 uint16_t perm_bitmask = 1U << (perm->s.value - 1);
66 perm_datum_t *perm, policydb_t *policy, avtab_t *avtab) {
89 match &= check_perm(cur, perm);
120 perm_datum_t *perm = NULL; local
152 perm = hashtab_search(cls->permissions.table, p);
153 if (perm == NULL) {
155 fprintf(stderr, "perm %s does not exist in class %s\n", p, c);
158 perm
63 expand_and_check(int s_op, uint32_t source_type, int t_op, uint32_t target_type, int c_op, uint32_t target_class, perm_datum_t *perm, policydb_t *policy, avtab_t *avtab) argument
235 char *policy = NULL, *source = NULL, *target = NULL, *class = NULL, *perm = NULL; local
[all...]
/system/bt/stack/gatt/
H A Dgatt_db.cc44 tGATT_PERM perm);
87 tGATT_PERM perm = attr.permission; local
89 min_key_size = (((perm & GATT_ENCRYPT_KEY_SIZE_MASK) >> 12));
94 if (!(perm & GATT_READ_ALLOWED)) {
99 if ((perm & GATT_READ_AUTH_REQUIRED) &&
106 if ((perm & GATT_READ_MITM_REQUIRED) &&
112 if ((perm & GATT_READ_ENCRYPTED_REQUIRED) &&
118 if ((perm & GATT_READ_ENCRYPTED_REQUIRED) &&
170 << StringPrintf(" perm=0x%02x sec_flag=0x%x offset=%d read_long=%d",
359 * perm
366 gatts_add_characteristic(tGATT_SVC_DB& db, tGATT_PERM perm, tGATT_CHAR_PROP property, const Uuid& char_uuid) argument
398 gatts_add_char_descr(tGATT_SVC_DB& db, tGATT_PERM perm, const Uuid& descr_uuid) argument
653 allocate_attr_in_db(tGATT_SVC_DB& db, const Uuid& uuid, tGATT_PERM perm) argument
[all...]
H A Dgatt_int.h564 extern uint16_t gatts_add_characteristic(tGATT_SVC_DB& db, tGATT_PERM perm,
567 extern uint16_t gatts_add_char_descr(tGATT_SVC_DB& db, tGATT_PERM perm,
/system/hwservicemanager/
H A DAccessControl.h21 bool checkPermission(const Context &context, pid_t sourceAuditPid, const char *targetContext, const char *perm, const char *interface);
22 bool checkPermission(const Context &context, pid_t sourcePid, const char *perm, const char *interface);
H A DAccessControl.cpp77 bool AccessControl::checkPermission(const Context &context, pid_t sourceAuditPid, const char *targetContext, const char *perm, const char *interface) { argument
89 perm, (void *) &ad) == 0);
94 bool AccessControl::checkPermission(const Context &context, pid_t sourceAuditPid, const char *perm, const char *interface) { argument
104 allowed = checkPermission(context, sourceAuditPid, targetContext, perm, interface);
/system/sepolicy/tools/sepolicy-analyze/
H A DAndroid.mk9 LOCAL_SRC_FILES := sepolicy-analyze.c dups.c neverallow.c perm.c typecmp.c booleans.c attribute.c utils.c
H A Dneverallow.c189 perm_datum_t *perm = NULL; local
336 perm = hashtab_search(cls->permissions.table, id);
337 if (cls->comdatum && !perm)
338 perm = hashtab_search(cls->comdatum->permissions.table, id);
339 if (!perm) {
344 node->data |= 1U << (perm->s.value - 1);
/system/core/init/
H A Ddescriptors.cpp37 gid_t gid, int perm, const std::string& context)
38 : name_(name), type_(type), uid_(uid), gid_(gid), perm_(perm), context_(context) {
74 gid_t gid, int perm, const std::string& context)
75 : DescriptorInfo(name, type, uid, gid, perm, context) {
88 return CreateSocket(name().c_str(), flags, passcred, perm(), uid(), gid(), context.c_str());
96 gid_t gid, int perm, const std::string& context)
98 : DescriptorInfo(name, type, uid, gid, perm, context) {
36 DescriptorInfo(const std::string& name, const std::string& type, uid_t uid, gid_t gid, int perm, const std::string& context) argument
73 SocketInfo(const std::string& name, const std::string& type, uid_t uid, gid_t gid, int perm, const std::string& context) argument
95 FileInfo(const std::string& name, const std::string& type, uid_t uid, gid_t gid, int perm, const std::string& context) argument
H A Ddescriptors.h31 gid_t gid, int perm, const std::string& context);
45 int perm() const { return perm_; } function in class:android::init::DescriptorInfo
65 gid_t gid, int perm, const std::string& context);
75 gid_t gid, int perm, const std::string& context);
H A Ddevices.h38 Permissions(const std::string& name, mode_t perm, uid_t uid, gid_t gid);
42 mode_t perm() const { return perm_; } function in class:android::init::Permissions
60 SysfsPermissions(const std::string& name, const std::string& attribute, mode_t perm, uid_t uid, argument
62 : Permissions(name, perm, uid, gid), attribute_(attribute) {}
H A Ddevices_test.cpp228 EXPECT_EQ(0666U, permissions.perm());
241 EXPECT_EQ(0666U, permissions.perm());
255 EXPECT_EQ(0666U, permissions.perm());
271 EXPECT_EQ(0666U, permissions.perm());
281 EXPECT_EQ(0660U, permissions.perm());
295 EXPECT_EQ(0660U, permissions.perm());
307 EXPECT_EQ(0660U, permissions.perm());
H A Dueventd_parser.cpp45 // args is now common to both sys and dev entries and contains: <perm> <uid> <gid>
48 mode_t perm = strtol(perm_string.c_str(), &end_pointer, 8); local
68 out_sysfs_permissions->emplace_back(name, sysfs_attribute, perm, uid, gid);
70 out_dev_permissions->emplace_back(name, perm, uid, gid);
H A Dutil.h41 int CreateSocket(const char* name, int type, bool passcred, mode_t perm, uid_t uid, gid_t gid,
H A Ddevices.cpp105 Permissions::Permissions(const std::string& name, mode_t perm, uid_t uid, gid_t gid) argument
106 : name_(name), perm_(perm), uid_(uid), gid_(gid), prefix_(false), wildcard_(false) {
148 << perm();
155 if (chmod(attribute_file.c_str(), perm()) != 0) {
156 PLOG(ERROR) << "chmod(" << attribute_file << ", " << perm() << ") failed";
216 return {it->perm(), it->uid(), it->gid()};
H A Dutil.cpp88 int CreateSocket(const char* name, int type, bool passcred, mode_t perm, uid_t uid, gid_t gid, argument
146 if (fchmodat(AT_FDCWD, addr.sun_path, perm, AT_SYMLINK_NOFOLLOW)) {
152 << ", mode " << std::oct << perm << std::dec
H A Dservice.cpp642 int perm = args.size() > 3 ? std::strtoul(args[3].c_str(), 0, 8) : -1; local
661 auto descriptor = std::make_unique<T>(args[1], args[2], *uid, *gid, perm, context);
675 // name type perm [ uid gid context ]
684 // name type perm [ uid gid context ]
/system/extras/librank/
H A Dlibrank.c174 static int parse_perm(const char *perm) argument
178 while (*perm) {
179 switch(*perm) {
190 fprintf(stderr, "Unknown permission '%c'\n", *perm);
193 perm++;
219 int perm; local
232 perm = 0;
252 {"perm", required_argument, 0, 'm'},
280 perm = parse_perm(optarg);
352 if (perm
[all...]
/system/core/liblog/tests/
H A Dliblog_test.cpp1911 bool perm = (gid == AID_ROOT) || (uid == AID_ROOT); local
1912 EXPECT_STREQ(perm ? "TRUE" : persist_hold, persist);
1920 EXPECT_STREQ(perm ? "FALSE" : persist_hold, persist);
1928 EXPECT_STREQ(perm ? "true" : persist_hold, persist);
1936 EXPECT_STREQ(perm ? "false" : persist_hold, persist);
1944 EXPECT_STREQ(perm ? "" : persist_hold, persist);
/system/keymaster/key_blob_utils/
H A Docb.c230 const vector unsigned char perm = {1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 0}; local
236 t = vec_perm(t, t, perm);

Completed in 412 milliseconds