Home
last modified time | relevance | path

Searched refs:perm (Results 1 – 21 of 21) sorted by relevance

/system/bt/stack/gatt/
Dgatt_db.cc44 tGATT_PERM perm);
87 tGATT_PERM perm = attr.permission; in gatts_check_attr_readability() local
89 min_key_size = (((perm & GATT_ENCRYPT_KEY_SIZE_MASK) >> 12)); in gatts_check_attr_readability()
94 if (!(perm & GATT_READ_ALLOWED)) { in gatts_check_attr_readability()
99 if ((perm & GATT_READ_AUTH_REQUIRED) && in gatts_check_attr_readability()
106 if ((perm & GATT_READ_MITM_REQUIRED) && in gatts_check_attr_readability()
112 if ((perm & GATT_READ_ENCRYPTED_REQUIRED) && in gatts_check_attr_readability()
118 if ((perm & GATT_READ_ENCRYPTED_REQUIRED) && in gatts_check_attr_readability()
366 uint16_t gatts_add_characteristic(tGATT_SVC_DB& db, tGATT_PERM perm, in gatts_add_characteristic() argument
371 VLOG(1) << StringPrintf("%s: perm=0x%0x property=0x%0x", __func__, perm, in gatts_add_characteristic()
[all …]
Dgatt_int.h552 extern uint16_t gatts_add_characteristic(tGATT_SVC_DB& db, tGATT_PERM perm,
555 extern uint16_t gatts_add_char_descr(tGATT_SVC_DB& db, tGATT_PERM perm,
/system/sepolicy/tools/
Dsepolicy-check.c57 int check_perm(avtab_ptr_t current, perm_datum_t *perm) { in check_perm() argument
58 uint16_t perm_bitmask = 1U << (perm->s.value - 1); in check_perm()
66 perm_datum_t *perm, policydb_t *policy, avtab_t *avtab) { in expand_and_check() argument
89 match &= check_perm(cur, perm); in expand_and_check()
120 perm_datum_t *perm = NULL; in check_rule() local
152 perm = hashtab_search(cls->permissions.table, p); in check_rule()
153 if (perm == NULL) { in check_rule()
158 perm = hashtab_search(cls->comdatum->permissions.table, p); in check_rule()
159 if (perm == NULL) { in check_rule()
177 perm, policy, &policy->te_avtab); in check_rule()
[all …]
/system/security/keystore/
Dpermissions.cpp98 const char* get_perm_label(perm_t perm) { in get_perm_label() argument
99 unsigned int index = ffs(perm); in get_perm_label()
136 static bool keystore_selinux_check_access(uid_t uid, perm_t perm, pid_t spid, const char* ssid) { in keystore_selinux_check_access() argument
140 const char* str_perm = get_perm_label(perm); in keystore_selinux_check_access()
179 bool has_permission(uid_t uid, perm_t perm, pid_t spid, const char* sid) { in has_permission() argument
192 return (user.perms & perm) && keystore_selinux_check_access(uid, perm, spid, sid); in has_permission()
196 return (DEFAULT_PERMS & perm) && keystore_selinux_check_access(uid, perm, spid, sid); in has_permission()
Dpermissions.h45 const char* get_perm_label(perm_t perm);
59 bool has_permission(uid_t uid, perm_t perm, pid_t spid, const char* sid);
/system/core/init/
Ddescriptors.cpp37 gid_t gid, int perm, const std::string& context) in DescriptorInfo() argument
38 : name_(name), type_(type), uid_(uid), gid_(gid), perm_(perm), context_(context) { in DescriptorInfo()
74 gid_t gid, int perm, const std::string& context) in SocketInfo() argument
75 : DescriptorInfo(name, type, uid, gid, perm, context) { in SocketInfo()
88 return CreateSocket(name().c_str(), flags, passcred, perm(), uid(), gid(), context.c_str()); in Create()
96 gid_t gid, int perm, const std::string& context) in FileInfo() argument
98 : DescriptorInfo(name, type, uid, gid, perm, context) { in FileInfo()
Ddescriptors.h31 gid_t gid, int perm, const std::string& context);
45 int perm() const { return perm_; } in perm() function
65 gid_t gid, int perm, const std::string& context);
75 gid_t gid, int perm, const std::string& context);
Ddevices_test.cpp228 EXPECT_EQ(0666U, permissions.perm()); in TEST()
241 EXPECT_EQ(0666U, permissions.perm()); in TEST()
255 EXPECT_EQ(0666U, permissions.perm()); in TEST()
271 EXPECT_EQ(0666U, permissions.perm()); in TEST()
281 EXPECT_EQ(0660U, permissions.perm()); in TEST()
295 EXPECT_EQ(0660U, permissions.perm()); in TEST()
307 EXPECT_EQ(0660U, permissions.perm()); in TEST()
Ddevices.h41 Permissions(const std::string& name, mode_t perm, uid_t uid, gid_t gid);
45 mode_t perm() const { return perm_; } in perm() function
65 SysfsPermissions(const std::string& name, const std::string& attribute, mode_t perm, uid_t uid, in SysfsPermissions() argument
67 : Permissions(name, perm, uid, gid), attribute_(attribute) {} in SysfsPermissions()
Ddevices.cpp139 Permissions::Permissions(const std::string& name, mode_t perm, uid_t uid, gid_t gid) in Permissions() argument
140 : name_(name), perm_(perm), uid_(uid), gid_(gid), prefix_(false), wildcard_(false) { in Permissions()
182 << perm(); in SetPermissions()
189 if (chmod(attribute_file.c_str(), perm()) != 0) { in SetPermissions()
190 PLOG(ERROR) << "chmod(" << attribute_file << ", " << perm() << ") failed"; in SetPermissions()
250 return {it->perm(), it->uid(), it->gid()}; in GetDevicePermissions()
Dueventd_parser.cpp53 mode_t perm = strtol(perm_string.c_str(), &end_pointer, 8); in ParsePermissionsLine() local
73 out_sysfs_permissions->emplace_back(name, sysfs_attribute, perm, uid, gid); in ParsePermissionsLine()
75 out_dev_permissions->emplace_back(name, perm, uid, gid); in ParsePermissionsLine()
Dutil.h41 int CreateSocket(const char* name, int type, bool passcred, mode_t perm, uid_t uid, gid_t gid,
Dutil.cpp84 int CreateSocket(const char* name, int type, bool passcred, mode_t perm, uid_t uid, gid_t gid, in CreateSocket() argument
142 if (fchmodat(AT_FDCWD, addr.sun_path, perm, AT_SYMLINK_NOFOLLOW)) { in CreateSocket()
148 << ", mode " << std::oct << perm << std::dec in CreateSocket()
Dservice.cpp716 int perm = args.size() > 3 ? std::strtoul(args[3].c_str(), 0, 8) : -1; in AddDescriptor() local
735 auto descriptor = std::make_unique<T>(args[1], args[2], *uid, *gid, perm, context); in AddDescriptor()
DREADME.md319 `socket <name> <type> <perm> [ <user> [ <group> [ <seclabel> ] ] ]`
/system/hwservicemanager/
DAccessControl.cpp95 …sion(const CallingContext& source, const char *targetContext, const char *perm, const char *interf… in checkPermission() argument
108 perm, (void *) &ad) == 0); in checkPermission()
113 bool AccessControl::checkPermission(const CallingContext& source, const char *perm, const char *int… in checkPermission() argument
123 allowed = checkPermission(source, targetContext, perm, interface); in checkPermission()
DAccessControl.h41 …bool checkPermission(const CallingContext& source, const char *targetContext, const char *perm, co…
42 bool checkPermission(const CallingContext& source, const char *perm, const char *interface);
/system/sepolicy/tools/sepolicy-analyze/
Dneverallow.c189 perm_datum_t *perm = NULL; in read_classperms() local
336 perm = hashtab_search(cls->permissions.table, id); in read_classperms()
337 if (cls->comdatum && !perm) in read_classperms()
338 perm = hashtab_search(cls->comdatum->permissions.table, id); in read_classperms()
339 if (!perm) { in read_classperms()
344 node->data |= 1U << (perm->s.value - 1); in read_classperms()
DAndroid.mk9 LOCAL_SRC_FILES := sepolicy-analyze.c dups.c neverallow.c perm.c typecmp.c booleans.c attribute.c u…
/system/core/liblog/tests/
Dliblog_test.cpp1891 bool perm = (gid == AID_ROOT) || (uid == AID_ROOT); in TEST() local
1892 EXPECT_STREQ(perm ? "TRUE" : persist_hold, persist); in TEST()
1900 EXPECT_STREQ(perm ? "FALSE" : persist_hold, persist); in TEST()
1908 EXPECT_STREQ(perm ? "true" : persist_hold, persist); in TEST()
1916 EXPECT_STREQ(perm ? "false" : persist_hold, persist); in TEST()
1924 EXPECT_STREQ(perm ? "" : persist_hold, persist); in TEST()
/system/keymaster/key_blob_utils/
Docb.c230 const vector unsigned char perm = {1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 0}; in double_block() local
236 t = vec_perm(t, t, perm); in double_block()