/system/sepolicy/prebuilts/api/28.0/private/ |
D | initial_sids | 7 sid kernel 8 sid security 9 sid unlabeled 10 sid fs 11 sid file 12 sid file_labels 13 sid init 14 sid any_socket 15 sid port 16 sid netif [all …]
|
D | initial_sid_contexts | 1 sid kernel u:r:kernel:s0 2 sid security u:object_r:kernel:s0 3 sid unlabeled u:object_r:unlabeled:s0 4 sid fs u:object_r:labeledfs:s0 5 sid file u:object_r:unlabeled:s0 6 sid file_labels u:object_r:unlabeled:s0 7 sid init u:object_r:unlabeled:s0 8 sid any_socket u:object_r:unlabeled:s0 9 sid port u:object_r:port:s0 10 sid netif u:object_r:netif:s0 [all …]
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | initial_sids | 7 sid kernel 8 sid security 9 sid unlabeled 10 sid fs 11 sid file 12 sid file_labels 13 sid init 14 sid any_socket 15 sid port 16 sid netif [all …]
|
D | initial_sid_contexts | 1 sid kernel u:r:kernel:s0 2 sid security u:object_r:kernel:s0 3 sid unlabeled u:object_r:unlabeled:s0 4 sid fs u:object_r:labeledfs:s0 5 sid file u:object_r:unlabeled:s0 6 sid file_labels u:object_r:unlabeled:s0 7 sid init u:object_r:unlabeled:s0 8 sid any_socket u:object_r:unlabeled:s0 9 sid port u:object_r:port:s0 10 sid netif u:object_r:netif:s0 [all …]
|
/system/sepolicy/prebuilts/api/27.0/private/ |
D | initial_sids | 7 sid kernel 8 sid security 9 sid unlabeled 10 sid fs 11 sid file 12 sid file_labels 13 sid init 14 sid any_socket 15 sid port 16 sid netif [all …]
|
D | initial_sid_contexts | 1 sid kernel u:r:kernel:s0 2 sid security u:object_r:kernel:s0 3 sid unlabeled u:object_r:unlabeled:s0 4 sid fs u:object_r:labeledfs:s0 5 sid file u:object_r:unlabeled:s0 6 sid file_labels u:object_r:unlabeled:s0 7 sid init u:object_r:unlabeled:s0 8 sid any_socket u:object_r:unlabeled:s0 9 sid port u:object_r:port:s0 10 sid netif u:object_r:netif:s0 [all …]
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | initial_sids | 7 sid kernel 8 sid security 9 sid unlabeled 10 sid fs 11 sid file 12 sid file_labels 13 sid init 14 sid any_socket 15 sid port 16 sid netif [all …]
|
D | initial_sid_contexts | 1 sid kernel u:r:kernel:s0 2 sid security u:object_r:kernel:s0 3 sid unlabeled u:object_r:unlabeled:s0 4 sid fs u:object_r:labeledfs:s0 5 sid file u:object_r:unlabeled:s0 6 sid file_labels u:object_r:unlabeled:s0 7 sid init u:object_r:unlabeled:s0 8 sid any_socket u:object_r:unlabeled:s0 9 sid port u:object_r:port:s0 10 sid netif u:object_r:netif:s0 [all …]
|
/system/sepolicy/private/ |
D | initial_sids | 7 sid kernel 8 sid security 9 sid unlabeled 10 sid fs 11 sid file 12 sid file_labels 13 sid init 14 sid any_socket 15 sid port 16 sid netif [all …]
|
D | initial_sid_contexts | 1 sid kernel u:r:kernel:s0 2 sid security u:object_r:kernel:s0 3 sid unlabeled u:object_r:unlabeled:s0 4 sid fs u:object_r:labeledfs:s0 5 sid file u:object_r:unlabeled:s0 6 sid file_labels u:object_r:unlabeled:s0 7 sid init u:object_r:unlabeled:s0 8 sid any_socket u:object_r:unlabeled:s0 9 sid port u:object_r:port:s0 10 sid netif u:object_r:netif:s0 [all …]
|
/system/security/keystore/ |
D | permissions.cpp | 95 const char* sid; member 115 const char* sid = ad->sid ? ad->sid : "N/A"; in audit_callback() local 116 snprintf(buf, len, "pid=%d uid=%d sid=%s", ad->pid, ad->uid, sid); in audit_callback() 155 ad.sid = use_sid; in keystore_selinux_check_access() 179 bool has_permission(uid_t uid, perm_t perm, pid_t spid, const char* sid) { in has_permission() argument 185 if (sid == nullptr) { in has_permission() 192 return (user.perms & perm) && keystore_selinux_check_access(uid, perm, spid, sid); in has_permission() 196 return (DEFAULT_PERMS & perm) && keystore_selinux_check_access(uid, perm, spid, sid); in has_permission()
|
D | auth_token_table.h | 141 bool SatisfiesAuth(uint64_t sid, HardwareAuthenticatorType auth_type) const { in SatisfiesAuth() argument 142 return (sid == token_.userId || sid == token_.authenticatorId) && in SatisfiesAuth()
|
D | permissions.h | 59 bool has_permission(uid_t uid, perm_t perm, pid_t spid, const char* sid);
|
D | auth_token_table.cpp | 226 for (auto sid : sids) { in SatisfiesAuth() local 227 if (SatisfiesAuth(sid, auth_type)) return true; in SatisfiesAuth()
|
/system/hwservicemanager/ |
D | AccessControl.cpp | 33 const char* sid; member 104 ad.sid = source.sid.c_str(); in checkPermission() 107 allowed = (selinux_check_access(source.sid.c_str(), targetContext, "hwservice_manager", in checkPermission() 138 const char* sid = ad->sid ? ad->sid : "N/A"; in auditCallback() local 140 snprintf(buf, len, "interface=%s sid=%s pid=%d", ad->interfaceName, sid, ad->pid); in auditCallback()
|
D | AccessControl.h | 30 std::string sid; member
|
D | ServiceManager.cpp | 43 const char* sid = self->getCallingSid(); in getBinderCallingContext() local 45 if (sid == nullptr) { in getBinderCallingContext() 52 return { true, sid, pid }; in getBinderCallingContext()
|
/system/core/gatekeeperd/ |
D | gatekeeperd.cpp | 76 void store_sid(uint32_t uid, uint64_t sid) { in store_sid() argument 84 write(fd, &sid, sizeof(sid)); in store_sid() 117 void maybe_store_sid(uint32_t uid, uint64_t sid) { in maybe_store_sid() argument 121 store_sid(uid, sid); in maybe_store_sid() 127 uint64_t sid; in read_sid() local 131 read(fd, &sid, sizeof(sid)); in read_sid() 133 return sid; in read_sid()
|
D | IGateKeeperService.cpp | 149 uint64_t sid = getSecureUserId(uid); in onTransact() local 151 reply->writeInt64(sid); in onTransact()
|
/system/sepolicy/reqd_mask/ |
D | initial_sids | 1 sid reqd_mask
|
D | initial_sid_contexts | 1 sid reqd_mask u:r:reqd_mask_type:s0
|
/system/gatekeeper/tests/ |
D | gatekeeper_device_test.cpp | 216 secure_id_t sid = handle->user_id; in TEST_F() local 223 ASSERT_NE(sid, handle->user_id); in TEST_F() 240 secure_id_t sid = handle->user_id; in TEST_F() local 247 ASSERT_EQ(sid, handle->user_id); in TEST_F()
|
/system/bt/include/hardware/ |
D | ble_scanner.h | 127 virtual void StartSync(uint8_t sid, RawAddress address, uint16_t skip,
|
/system/bt/btif/src/ |
D | btif_ble_scanner.cc | 328 void StartSync(uint8_t sid, RawAddress address, uint16_t skip, in StartSync() argument
|