/system/core/init/ |
H A D | devices_test.cpp | 13 * See the License for the specific language governing permissions and 224 Permissions permissions("/dev/null", 0666, 0, 0); 225 EXPECT_TRUE(permissions.Match("/dev/null")); 226 EXPECT_FALSE(permissions.Match("/dev/nullsuffix")); 227 EXPECT_FALSE(permissions.Match("/dev/nul")); 228 EXPECT_EQ(0666U, permissions.perm()); 229 EXPECT_EQ(0U, permissions.uid()); 230 EXPECT_EQ(0U, permissions.gid()); 236 Permissions permissions("/dev/dri/*", 0666, 0, 1000); 237 EXPECT_TRUE(permissions [all...] |
/system/bt/service/common/bluetooth/ |
H A D | descriptor.h | 13 // See the License for the specific language governing permissions and 27 Descriptor(uint16_t handle, const Uuid& uuid, uint16_t permissions) argument 28 : handle_(handle), uuid_(uuid), permissions_(permissions){}; 37 uint16_t permissions() const { return permissions_; } function in class:bluetooth::Descriptor
|
H A D | characteristic.h | 13 // See the License for the specific language governing permissions and 30 uint16_t permissions, 35 permissions_(permissions), 48 uint16_t permissions() const { return permissions_; } function in class:bluetooth::Characteristic 29 Characteristic(uint16_t handle, const Uuid& uuid, uint8_t properties, uint16_t permissions, const std::vector<Descriptor>& descriptors) argument
|
/system/core/libbacktrace/ |
H A D | BacktraceMap.cpp | 13 * See the License for the specific language governing permissions and 66 char permissions[5]; local 75 &start, &end, permissions, &name_pos) != 3) { 82 &start, &end, permissions, &name_pos) != 3) { 90 if (permissions[0] == 'r') { 93 if (permissions[1] == 'w') { 96 if (permissions[2] == 'x') {
|
/system/tpm/tpm_manager/server/ |
H A D | local_data_store_impl.cc | 13 // See the License for the specific language governing permissions and 45 int permissions = 0; local 46 if (base::GetPosixFilePermissions(path, &permissions) && 47 (permissions & ~kLocalDataPermissions) != 0) { 78 LOG(ERROR) << "Failed to set permissions for file: " << path.value();
|
/system/core/libkeyutils/include/ |
H A D | keyutils.h | 50 long keyctl_setperm(key_serial_t id, int permissions);
|
/system/bt/service/ |
H A D | gatt_server_old.h | 13 // See the License for the specific language governing permissions and 89 bool AddCharacteristic(const Uuid& id, int properties, int permissions); 94 int permissions);
|
H A D | gatt_server_old.cc | 13 // See the License for the specific language governing permissions and 101 uint16_t permissions); 504 uint16_t permissions) { 508 .permissions = permissions}); 620 int permissions) { 623 internal_->AddCharacteristic(id, properties, permissions); 636 int permissions) { 641 internal_->AddCharacteristic(id, properties, permissions); 648 // Control attributes have fixed permissions/propertie 502 AddCharacteristic(const Uuid& uuid, uint8_t properties, uint16_t permissions) argument 619 AddCharacteristic(const Uuid& id, int properties, int permissions) argument 635 AddBlob(const Uuid& id, const Uuid& control_id, int properties, int permissions) argument [all...] |
/system/core/libkeyutils/ |
H A D | keyutils.cpp | 65 long keyctl_setperm(key_serial_t id, int permissions) { argument 66 return keyctl(KEYCTL_SETPERM, id, permissions);
|
/system/tpm/attestation/server/ |
H A D | database_impl.cc | 13 // See the License for the specific language governing permissions and 101 int permissions = 0; local 102 if (base::GetPosixFilePermissions(path, &permissions) && 103 (permissions & kMask) != 0) { 104 LOG(WARNING) << "Attempting to fix permissions on attestation database."; 105 base::SetPosixFilePermissions(path, permissions & ~kMask); 125 LOG(ERROR) << "Failed to set permissions for file: " << file_path.value();
|
/system/bt/test/suite/gatt/ |
H A D | gatt_unittest.cc | 14 * See the License for the specific language governing permissions and 76 .permissions = 0x01 /* read only */}, 77 {.type = BTGATT_DB_DESCRIPTOR, .uuid = desc_uuid, .permissions = 0x01}};
|
/system/extras/boottime_tools/bootanalyze/ |
H A D | Android.mk | 12 # See the License for the specific language governing permissions and
|
/system/extras/boottime_tools/bootanalyze/stressfs/ |
H A D | Android.mk | 12 # See the License for the specific language governing permissions and
|
/system/extras/iotop/ |
H A D | Android.mk | 12 # See the License for the specific language governing permissions and
|
/system/extras/kexec_tools/ |
H A D | Android.mk | 12 # See the License for the specific language governing permissions and
|
/system/extras/ksmutils/ |
H A D | Android.mk | 12 # See the License for the specific language governing permissions and
|
/system/extras/latencytop/ |
H A D | Android.mk | 12 # See the License for the specific language governing permissions and
|
/system/extras/librank/ |
H A D | Android.mk | 12 # See the License for the specific language governing permissions and
|
/system/extras/preopt2cachename/ |
H A D | Android.mk | 12 # See the License for the specific language governing permissions and
|
/system/extras/procmem/ |
H A D | Android.mk | 12 # See the License for the specific language governing permissions and
|
/system/extras/procrank/ |
H A D | Android.mk | 12 # See the License for the specific language governing permissions and
|
/system/libufdt/ |
H A D | Android.mk | 12 # See the License for the specific language governing permissions and
|
/system/bt/include/hardware/ |
H A D | bt_common_types.h | 13 * See the License for the specific language governing permissions and 74 uint16_t permissions; member in struct:__anon710
|
/system/core/ |
H A D | platform_tools_tool_version.mk | 12 # See the License for the specific language governing permissions and
|
/system/extras/cppreopts/ |
H A D | Android.mk | 12 # See the License for the specific language governing permissions and
|