/system/security/keystore2/src/ |
D | permission.rs | 200 GRANT, selinux name: grant; 468 if access_vec.includes(KeyPerm::grant()) { in check_grant_permission() 591 KeyPerm::grant(), 711 KeyPerm::grant().into(), in check_grant_permission_app() 731 assert_perm_failed!(check_grant_permission(&sctx, KeyPerm::grant().into(), &key)); in check_grant_permission_selinux() 746 KeyPerm::grant(), in check_key_permission_domain_grant() 775 assert!(check_key_permission(0, &system_server_ctx, KeyPerm::grant(), &key, &None).is_ok()); in check_key_permission_domain_app() 788 assert_perm_failed!(check_key_permission(0, &shell_ctx, KeyPerm::grant(), &key, &None)); in check_key_permission_domain_app() 863 assert!(check_key_permission(0, &sctx, KeyPerm::grant(), &key, &None).is_ok()); in check_key_permission_domain_selinux() 874 assert_perm_failed!(check_key_permission(0, &sctx, KeyPerm::grant(), &key, &None)); in check_key_permission_domain_selinux() [all …]
|
D | service.rs | 322 fn grant( in grant() method 331 db.borrow_mut().grant( in grant() 346 check_key_permission(KeyPerm::grant(), k, &None) in ungrant() 394 fn grant( in grant() method 401 map_or_log_err(self.grant(key, grantee_uid, access_vector.into()), Ok) in grant()
|
/system/hardware/interfaces/keystore2/aidl/android/system/keystore2/ |
D | IKeystoreService.aidl | 179 KeyDescriptor grant(in KeyDescriptor key, in int granteeUid, in int accessVector); in grant() method
|
/system/hardware/interfaces/keystore2/aidl/aidl_api/android.system.keystore2/current/android/system/keystore2/ |
D | IKeystoreService.aidl | 43 …android.system.keystore2.KeyDescriptor grant(in android.system.keystore2.KeyDescriptor key, in int… in grant() method
|
/system/hardware/interfaces/keystore2/aidl/aidl_api/android.system.keystore2/1/android/system/keystore2/ |
D | IKeystoreService.aidl | 43 …android.system.keystore2.KeyDescriptor grant(in android.system.keystore2.KeyDescriptor key, in int… in grant() method
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | hal_wifi_supplicant.te | 7 # in addition to ioctls allowlisted for all domains, grant hal_wifi_supplicant priv_sock_ioctls.
|
D | su.te | 17 # grant su access to vndbinder 58 # su needs to be declared as hal_foo_client to grant hal_foo_server
|
/system/sepolicy/prebuilts/api/30.0/public/ |
D | hal_wifi_supplicant.te | 7 # in addition to ioctls allowlisted for all domains, grant hal_wifi_supplicant priv_sock_ioctls.
|
D | su.te | 17 # grant su access to vndbinder 59 # su needs to be declared as hal_foo_client to grant hal_foo_server
|
/system/sepolicy/prebuilts/api/28.0/public/ |
D | hal_wifi_supplicant.te | 8 # in addition to ioctls allowlisted for all domains, grant hal_wifi_supplicant priv_sock_ioctls.
|
D | su.te | 17 # grant su access to vndbinder 56 # su needs to be declared as hal_foo_client to grant hal_foo_server
|
/system/sepolicy/prebuilts/api/31.0/public/ |
D | hal_wifi_supplicant.te | 7 # in addition to ioctls allowlisted for all domains, grant hal_wifi_supplicant priv_sock_ioctls.
|
D | su.te | 17 # grant su access to vndbinder 61 # su needs to be declared as hal_foo_client to grant hal_foo_server
|
/system/sepolicy/public/ |
D | hal_wifi_supplicant.te | 7 # in addition to ioctls allowlisted for all domains, grant hal_wifi_supplicant priv_sock_ioctls.
|
D | su.te | 17 # grant su access to vndbinder 61 # su needs to be declared as hal_foo_client to grant hal_foo_server
|
/system/sepolicy/vendor/ |
D | hal_wifi_supplicant_default.te | 26 # Devices upgrading to P may grant this permission in device-specific
|
/system/sepolicy/prebuilts/api/27.0/public/ |
D | hal_wifi_supplicant.te | 8 # in addition to ioctls allowlisted for all domains, grant hal_wifi_supplicant priv_sock_ioctls.
|
D | su.te | 17 # grant su access to vndbinder
|
D | update_engine_common.te | 43 # due to the more specific grant to proc_misc immediately below.
|
/system/sepolicy/prebuilts/api/26.0/public/ |
D | hal_wifi_supplicant.te | 8 # in addition to ioctls allowlisted for all domains, grant hal_wifi_supplicant priv_sock_ioctls.
|
D | su.te | 17 # grant su access to vndbinder
|
D | update_engine_common.te | 37 # due to the more specific grant to proc_misc immediately below.
|
/system/sepolicy/prebuilts/api/31.0/private/ |
D | system_app.te | 128 grant 137 grant
|
/system/sepolicy/private/ |
D | system_app.te | 128 grant 137 grant
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | system_app.te | 75 grant
|