Home
last modified time | relevance | path

Searched refs:sid (Results 1 – 24 of 24) sorted by relevance

/system/sepolicy/prebuilts/api/28.0/private/
Dinitial_sids7 sid kernel
8 sid security
9 sid unlabeled
10 sid fs
11 sid file
12 sid file_labels
13 sid init
14 sid any_socket
15 sid port
16 sid netif
[all …]
Dinitial_sid_contexts1 sid kernel u:r:kernel:s0
2 sid security u:object_r:kernel:s0
3 sid unlabeled u:object_r:unlabeled:s0
4 sid fs u:object_r:labeledfs:s0
5 sid file u:object_r:unlabeled:s0
6 sid file_labels u:object_r:unlabeled:s0
7 sid init u:object_r:unlabeled:s0
8 sid any_socket u:object_r:unlabeled:s0
9 sid port u:object_r:port:s0
10 sid netif u:object_r:netif:s0
[all …]
/system/sepolicy/prebuilts/api/29.0/private/
Dinitial_sids7 sid kernel
8 sid security
9 sid unlabeled
10 sid fs
11 sid file
12 sid file_labels
13 sid init
14 sid any_socket
15 sid port
16 sid netif
[all …]
Dinitial_sid_contexts1 sid kernel u:r:kernel:s0
2 sid security u:object_r:kernel:s0
3 sid unlabeled u:object_r:unlabeled:s0
4 sid fs u:object_r:labeledfs:s0
5 sid file u:object_r:unlabeled:s0
6 sid file_labels u:object_r:unlabeled:s0
7 sid init u:object_r:unlabeled:s0
8 sid any_socket u:object_r:unlabeled:s0
9 sid port u:object_r:port:s0
10 sid netif u:object_r:netif:s0
[all …]
/system/sepolicy/prebuilts/api/27.0/private/
Dinitial_sids7 sid kernel
8 sid security
9 sid unlabeled
10 sid fs
11 sid file
12 sid file_labels
13 sid init
14 sid any_socket
15 sid port
16 sid netif
[all …]
Dinitial_sid_contexts1 sid kernel u:r:kernel:s0
2 sid security u:object_r:kernel:s0
3 sid unlabeled u:object_r:unlabeled:s0
4 sid fs u:object_r:labeledfs:s0
5 sid file u:object_r:unlabeled:s0
6 sid file_labels u:object_r:unlabeled:s0
7 sid init u:object_r:unlabeled:s0
8 sid any_socket u:object_r:unlabeled:s0
9 sid port u:object_r:port:s0
10 sid netif u:object_r:netif:s0
[all …]
/system/sepolicy/prebuilts/api/26.0/private/
Dinitial_sids7 sid kernel
8 sid security
9 sid unlabeled
10 sid fs
11 sid file
12 sid file_labels
13 sid init
14 sid any_socket
15 sid port
16 sid netif
[all …]
Dinitial_sid_contexts1 sid kernel u:r:kernel:s0
2 sid security u:object_r:kernel:s0
3 sid unlabeled u:object_r:unlabeled:s0
4 sid fs u:object_r:labeledfs:s0
5 sid file u:object_r:unlabeled:s0
6 sid file_labels u:object_r:unlabeled:s0
7 sid init u:object_r:unlabeled:s0
8 sid any_socket u:object_r:unlabeled:s0
9 sid port u:object_r:port:s0
10 sid netif u:object_r:netif:s0
[all …]
/system/sepolicy/private/
Dinitial_sids7 sid kernel
8 sid security
9 sid unlabeled
10 sid fs
11 sid file
12 sid file_labels
13 sid init
14 sid any_socket
15 sid port
16 sid netif
[all …]
Dinitial_sid_contexts1 sid kernel u:r:kernel:s0
2 sid security u:object_r:kernel:s0
3 sid unlabeled u:object_r:unlabeled:s0
4 sid fs u:object_r:labeledfs:s0
5 sid file u:object_r:unlabeled:s0
6 sid file_labels u:object_r:unlabeled:s0
7 sid init u:object_r:unlabeled:s0
8 sid any_socket u:object_r:unlabeled:s0
9 sid port u:object_r:port:s0
10 sid netif u:object_r:netif:s0
[all …]
/system/security/keystore/
Dpermissions.cpp95 const char* sid; member
115 const char* sid = ad->sid ? ad->sid : "N/A"; in audit_callback() local
116 snprintf(buf, len, "pid=%d uid=%d sid=%s", ad->pid, ad->uid, sid); in audit_callback()
155 ad.sid = use_sid; in keystore_selinux_check_access()
179 bool has_permission(uid_t uid, perm_t perm, pid_t spid, const char* sid) { in has_permission() argument
185 if (sid == nullptr) { in has_permission()
192 return (user.perms & perm) && keystore_selinux_check_access(uid, perm, spid, sid); in has_permission()
196 return (DEFAULT_PERMS & perm) && keystore_selinux_check_access(uid, perm, spid, sid); in has_permission()
Dauth_token_table.h141 bool SatisfiesAuth(uint64_t sid, HardwareAuthenticatorType auth_type) const { in SatisfiesAuth() argument
142 return (sid == token_.userId || sid == token_.authenticatorId) && in SatisfiesAuth()
Dpermissions.h59 bool has_permission(uid_t uid, perm_t perm, pid_t spid, const char* sid);
Dauth_token_table.cpp226 for (auto sid : sids) { in SatisfiesAuth() local
227 if (SatisfiesAuth(sid, auth_type)) return true; in SatisfiesAuth()
/system/hwservicemanager/
DAccessControl.cpp33 const char* sid; member
104 ad.sid = source.sid.c_str(); in checkPermission()
107 allowed = (selinux_check_access(source.sid.c_str(), targetContext, "hwservice_manager", in checkPermission()
138 const char* sid = ad->sid ? ad->sid : "N/A"; in auditCallback() local
140 snprintf(buf, len, "interface=%s sid=%s pid=%d", ad->interfaceName, sid, ad->pid); in auditCallback()
DAccessControl.h30 std::string sid; member
DServiceManager.cpp43 const char* sid = self->getCallingSid(); in getBinderCallingContext() local
45 if (sid == nullptr) { in getBinderCallingContext()
52 return { true, sid, pid }; in getBinderCallingContext()
/system/core/gatekeeperd/
Dgatekeeperd.cpp76 void store_sid(uint32_t uid, uint64_t sid) { in store_sid() argument
84 write(fd, &sid, sizeof(sid)); in store_sid()
117 void maybe_store_sid(uint32_t uid, uint64_t sid) { in maybe_store_sid() argument
121 store_sid(uid, sid); in maybe_store_sid()
127 uint64_t sid; in read_sid() local
131 read(fd, &sid, sizeof(sid)); in read_sid()
133 return sid; in read_sid()
DIGateKeeperService.cpp149 uint64_t sid = getSecureUserId(uid); in onTransact() local
151 reply->writeInt64(sid); in onTransact()
/system/sepolicy/reqd_mask/
Dinitial_sids1 sid reqd_mask
Dinitial_sid_contexts1 sid reqd_mask u:r:reqd_mask_type:s0
/system/gatekeeper/tests/
Dgatekeeper_device_test.cpp216 secure_id_t sid = handle->user_id; in TEST_F() local
223 ASSERT_NE(sid, handle->user_id); in TEST_F()
240 secure_id_t sid = handle->user_id; in TEST_F() local
247 ASSERT_EQ(sid, handle->user_id); in TEST_F()
/system/bt/include/hardware/
Dble_scanner.h127 virtual void StartSync(uint8_t sid, RawAddress address, uint16_t skip,
/system/bt/btif/src/
Dbtif_ble_scanner.cc328 void StartSync(uint8_t sid, RawAddress address, uint16_t skip, in StartSync() argument