Home
last modified time | relevance | path

Searched refs:Permission (Results 1 – 20 of 20) sorted by relevance

/system/netd/server/
DPhysicalNetwork.h31 Permission permission) = 0;
33 Permission permission) = 0;
40 Permission getPermission() const;
41 [[nodiscard]] int setPermission(Permission permission);
54 int destroySocketsLackingPermission(Permission permission);
59 Permission mPermission;
DRouteController.h110 Permission permission,
114 Permission permission,
125 Permission oldPermission,
126 Permission newPermission);
138 Permission permission);
140 Permission permission);
158 Permission permission);
161 Permission permission);
191 static int modifyDefaultNetwork(uint16_t action, const char* interface, Permission permission);
193 const UidRangeMap& uidRangeMap, Permission permission,
[all …]
DNetworkController.h108 [[nodiscard]] int createPhysicalNetwork(unsigned netId, Permission permission);
109 [[nodiscard]] int createPhysicalOemNetwork(Permission permission, unsigned* netId);
116 Permission getPermissionForUser(uid_t uid) const;
117 void setPermissionForUsers(Permission permission, const std::vector<uid_t>& uids);
119 [[nodiscard]] int setPermissionForNetworks(Permission permission,
165 Permission getPermissionForUserLocked(uid_t uid) const;
167 [[nodiscard]] int createPhysicalNetworkLocked(unsigned netId, Permission permission);
183 std::map<uid_t, Permission> mUsers;
DNetworkController.cpp75 Permission permission, bool add);
79 Permission permission) override;
81 Permission permission) override;
83 [[nodiscard]] int modifyFallthrough(const std::string& physicalInterface, Permission permission,
98 Permission permission, bool add) { in modifyFallthrough()
120 Permission permission) { in addFallthrough()
125 Permission permission) { in removeFallthrough()
130 Permission permission, bool add) { in modifyFallthrough()
383 int NetworkController::createPhysicalNetworkLocked(unsigned netId, Permission permission) { in createPhysicalNetworkLocked()
409 int NetworkController::createPhysicalNetwork(unsigned netId, Permission permission) { in createPhysicalNetwork()
[all …]
DPhysicalNetwork.cpp30 [[nodiscard]] int addToDefault(unsigned netId, const std::string& interface, Permission permission, in addToDefault()
43 Permission permission, PhysicalNetwork::Delegate* delegate) { in removeFromDefault()
65 Permission PhysicalNetwork::getPermission() const { in getPermission()
69 int PhysicalNetwork::destroySocketsLackingPermission(Permission permission) { in destroySocketsLackingPermission()
98 int PhysicalNetwork::setPermission(Permission permission) { in setPermission()
DRouteController.cpp457 int modifyIncomingPacketMark(unsigned netId, const char* interface, Permission permission, in modifyIncomingPacketMark()
547 Permission permission, uid_t uidStart, in modifyExplicitNetworkRule()
571 Permission permission, uid_t uidStart, in modifyOutputInterfaceRules()
624 Permission permission) { in modifyVpnFallthroughRule()
795 const UidRangeMap& uidRangeMap, Permission permission, in modifyPhysicalNetwork()
995 Permission permission) { in modifyDefaultNetwork()
1189 Permission permission, in addInterfaceToPhysicalNetwork()
1201 Permission permission, in removeInterfaceFromPhysicalNetwork()
1243 Permission oldPermission, in modifyPhysicalNetworkPermission()
1244 Permission newPermission) { in modifyPhysicalNetworkPermission()
[all …]
DFwmarkServer.cpp128 Permission permission = mNetworkController->getPermissionForUser(client->getUid()); in processClient()
174 permission = static_cast<Permission>(permission | fwmark.permission); in processClient()
290 permission = static_cast<Permission>(permission | fwmark.permission); in processClient()
DSockDiag.h81 int destroySocketsLackingPermission(unsigned netId, Permission permission,
DNetdHwService.cpp67 Permission permission = PERMISSION_SYSTEM; in createOemNetwork()
DNetdNativeService.cpp1130 Permission NetdNativeService::convertPermission(int32_t permission) { in convertPermission()
1133 return Permission::PERMISSION_NETWORK; in convertPermission()
1135 return Permission::PERMISSION_SYSTEM; in convertPermission()
1137 return Permission::PERMISSION_NONE; in convertPermission()
1158 Permission permission = Permission::PERMISSION_NONE; in networkClearPermissionForUser()
DSockDiagTest.cpp293 Permission permission;
427 Permission permission = permissionTestcases[i].permission; in shouldHaveClosedSocket()
DSockDiag.cpp464 int SockDiag::destroySocketsLackingPermission(unsigned netId, Permission permission, in destroySocketsLackingPermission()
DNetdNativeService.h270 Permission convertPermission(int32_t permission);
/system/netd/include/
DPermission.h38 enum Permission { enum
44 inline const char *permissionToName(Permission permission) { in permissionToName()
DFwmark.h30 Permission permission : 2;
/system/extras/tests/workloads/
Ddefs.sh464 if ${ADB}ls /data 2>/dev/null | grep -q "Permission denied"; then
/system/timezone/testing/data/test3/output_data/icu_overlay/
DLICENSE6 Permission is hereby granted, free of charge, to any person obtaining
50 Permission is hereby granted, free of charge, to any person obtaining
/system/timezone/testing/data/test1/output_data/icu_overlay/
DLICENSE6 Permission is hereby granted, free of charge, to any person obtaining
50 Permission is hereby granted, free of charge, to any person obtaining
/system/timezone/testing/data/test2/output_data/icu_overlay/
DLICENSE6 Permission is hereby granted, free of charge, to any person obtaining
50 Permission is hereby granted, free of charge, to any person obtaining
/system/timezone/output_data/icu_overlay/
DLICENSE6 Permission is hereby granted, free of charge, to any person obtaining
50 Permission is hereby granted, free of charge, to any person obtaining