Home
last modified time | relevance | path

Searched refs:grant (Results 1 – 25 of 116) sorted by relevance

12345

/system/security/keystore/
Dgrant_store.cpp71 auto grant = uid_grant_list.find(grant_no); in get() local
72 if (grant == uid_grant_list.end()) return {}; in get()
73 if (grant->entry_.alias() != wrappedAlias) return {}; in get()
74 return {&(*grant), std::move(lock)}; in get()
DKeyStore.cpp121 auto grant = mGrants.get(uid, alias); in getBlobEntryIfExists() local
122 if (grant) { in getBlobEntryIfExists()
123 kbe = grant->entry_; in getBlobEntryIfExists()
/system/sepolicy/prebuilts/api/29.0/public/
Dhal_wifi_supplicant.te7 # in addition to ioctls whitelisted for all domains, grant hal_wifi_supplicant priv_sock_ioctls.
Dsu.te17 # grant su access to vndbinder
58 # su needs to be declared as hal_foo_client to grant hal_foo_server
/system/sepolicy/public/
Dhal_wifi_supplicant.te7 # in addition to ioctls whitelisted for all domains, grant hal_wifi_supplicant priv_sock_ioctls.
Dsu.te17 # grant su access to vndbinder
58 # su needs to be declared as hal_foo_client to grant hal_foo_server
/system/sepolicy/prebuilts/api/28.0/public/
Dhal_wifi_supplicant.te8 # in addition to ioctls whitelisted for all domains, grant hal_wifi_supplicant priv_sock_ioctls.
Dsu.te17 # grant su access to vndbinder
56 # su needs to be declared as hal_foo_client to grant hal_foo_server
Dnetd.te6 # in addition to ioctls whitelisted for all domains, grant netd priv_sock_ioctls.
/system/sepolicy/vendor/
Dhal_wifi_supplicant_default.te26 # Devices upgrading to P may grant this permission in device-specific
/system/sepolicy/prebuilts/api/26.0/public/
Dhal_wifi_supplicant.te8 # in addition to ioctls whitelisted for all domains, grant hal_wifi_supplicant priv_sock_ioctls.
Dupdate_engine_common.te37 # due to the more specific grant to proc_misc immediately below.
Dsu.te17 # grant su access to vndbinder
Dnetd.te6 # in addition to ioctls whitelisted for all domains, grant netd priv_sock_ioctls.
/system/sepolicy/prebuilts/api/27.0/public/
Dhal_wifi_supplicant.te8 # in addition to ioctls whitelisted for all domains, grant hal_wifi_supplicant priv_sock_ioctls.
Dsu.te17 # grant su access to vndbinder
Dupdate_engine_common.te43 # due to the more specific grant to proc_misc immediately below.
Dnetd.te6 # in addition to ioctls whitelisted for all domains, grant netd priv_sock_ioctls.
/system/sepolicy/prebuilts/api/26.0/private/
Dsystem_app.te75 grant
/system/sepolicy/prebuilts/api/27.0/private/
Dsystem_app.te78 grant
/system/security/keystore/binder/android/security/keystore/
DIKeystoreService.aidl43 String grant(String name, int granteeUid); in grant() method
/system/sepolicy/prebuilts/api/28.0/private/
Dsystem_app.te104 grant
/system/sepolicy/prebuilts/api/29.0/private/
Dsystem_app.te123 grant
/system/sepolicy/private/
Dsystem_app.te123 grant
/system/sepolicy/tools/sepolicy-analyze/
DREADME38 grant the same permissions where one allow rule is written

12345