Home
last modified time | relevance | path

Searched refs:perm (Results 1 – 25 of 26) sorted by relevance

12

/system/bt/stack/gatt/
Dgatt_db.cc46 tGATT_PERM perm);
89 tGATT_PERM perm = attr.permission; in gatts_check_attr_readability() local
91 min_key_size = (((perm & GATT_ENCRYPT_KEY_SIZE_MASK) >> 12)); in gatts_check_attr_readability()
96 if (!(perm & GATT_READ_ALLOWED)) { in gatts_check_attr_readability()
101 if ((perm & GATT_READ_AUTH_REQUIRED) && in gatts_check_attr_readability()
108 if ((perm & GATT_READ_MITM_REQUIRED) && in gatts_check_attr_readability()
114 if ((perm & GATT_READ_ENCRYPTED_REQUIRED) && in gatts_check_attr_readability()
120 if ((perm & GATT_READ_ENCRYPTED_REQUIRED) && in gatts_check_attr_readability()
365 uint16_t gatts_add_characteristic(tGATT_SVC_DB& db, tGATT_PERM perm, in gatts_add_characteristic() argument
370 VLOG(1) << StringPrintf("%s: perm=0x%0x property=0x%0x", __func__, perm, in gatts_add_characteristic()
[all …]
Dgatt_int.h634 extern uint16_t gatts_add_characteristic(tGATT_SVC_DB& db, tGATT_PERM perm,
639 extern uint16_t gatts_add_char_descr(tGATT_SVC_DB& db, tGATT_PERM perm,
/system/sepolicy/tools/
Dsepolicy-check.c57 int check_perm(avtab_ptr_t current, perm_datum_t *perm) { in check_perm() argument
58 uint16_t perm_bitmask = 1U << (perm->s.value - 1); in check_perm()
66 perm_datum_t *perm, policydb_t *policy, avtab_t *avtab) { in expand_and_check() argument
89 match &= check_perm(cur, perm); in expand_and_check()
120 perm_datum_t *perm = NULL; in check_rule() local
152 perm = hashtab_search(cls->permissions.table, p); in check_rule()
153 if (perm == NULL) { in check_rule()
158 perm = hashtab_search(cls->comdatum->permissions.table, p); in check_rule()
159 if (perm == NULL) { in check_rule()
177 perm, policy, &policy->te_avtab); in check_rule()
[all …]
/system/security/keystore2/selinux/src/
Dlib.rs80 pub fn perm() -> Self { in perm() method
283 pub fn check_access(source: &CStr, target: &CStr, tclass: &str, perm: &str) -> Result<()> { in check_access()
289 let c_perm = CString::new(perm).with_context(|| { in check_access()
290 format!("check_access: Failed to convert perm \"{}\" to CString.", perm) in check_access()
308 io::ErrorKind::PermissionDenied => Err(anyhow!(Error::perm())), in check_access()
317 source, target, tclass, perm in check_access()
375 mod perm { module
393 ($perm:ident, $privileged:expr) => {
394 check_key_perm!($perm, $privileged, stringify!($perm));
396 ($perm:ident, $privileged:expr, $p_str:expr) => {
[all …]
/system/hwservicemanager/
DAccessControl.cpp95 …sion(const CallingContext& source, const char *targetContext, const char *perm, const char *interf… in checkPermission() argument
108 perm, (void *) &ad) == 0); in checkPermission()
113 bool AccessControl::checkPermission(const CallingContext& source, const char *perm, const char *int… in checkPermission() argument
123 allowed = checkPermission(source, targetContext, perm, interface); in checkPermission()
DAccessControl.h43 …bool checkPermission(const CallingContext& source, const char *targetContext, const char *perm, co…
44 bool checkPermission(const CallingContext& source, const char *perm, const char *interface);
/system/core/init/
Ddevices_test.cpp228 EXPECT_EQ(0666U, permissions.perm()); in TEST()
241 EXPECT_EQ(0666U, permissions.perm()); in TEST()
255 EXPECT_EQ(0666U, permissions.perm()); in TEST()
272 EXPECT_EQ(0666U, permissions.perm()); in TEST()
289 EXPECT_EQ(0666U, permissions.perm()); in TEST()
300 EXPECT_EQ(0660U, permissions.perm()); in TEST()
314 EXPECT_EQ(0660U, permissions.perm()); in TEST()
326 EXPECT_EQ(0660U, permissions.perm()); in TEST()
Ddevices.h41 Permissions(const std::string& name, mode_t perm, uid_t uid, gid_t gid, bool no_fnm_pathname);
45 mode_t perm() const { return perm_; } in perm() function
66 SysfsPermissions(const std::string& name, const std::string& attribute, mode_t perm, uid_t uid, in SysfsPermissions() argument
68 : Permissions(name, perm, uid, gid, no_fnm_pathname), attribute_(attribute) {} in SysfsPermissions()
Ddevices.cpp127 Permissions::Permissions(const std::string& name, mode_t perm, uid_t uid, gid_t gid, in Permissions() argument
130 perm_(perm), in Permissions()
177 << perm(); in SetPermissions()
184 if (chmod(attribute_file.c_str(), perm()) != 0) { in SetPermissions()
185 PLOG(ERROR) << "chmod(" << attribute_file << ", " << perm() << ") failed"; in SetPermissions()
246 return {it->perm(), it->uid(), it->gid()}; in GetDevicePermissions()
Dueventd_parser.cpp54 mode_t perm = strtol(perm_string.c_str(), &end_pointer, 8); in ParsePermissionsLine() local
83 out_sysfs_permissions->emplace_back(name, sysfs_attribute, perm, uid, gid, no_fnm_pathname); in ParsePermissionsLine()
85 out_dev_permissions->emplace_back(name, perm, uid, gid, no_fnm_pathname); in ParsePermissionsLine()
Dservice_utils.h54 int perm = 0; member
Dutil.h47 Result<int> CreateSocket(const std::string& name, int type, bool passcred, mode_t perm, uid_t uid,
Dutil.cpp89 Result<int> CreateSocket(const std::string& name, int type, bool passcred, mode_t perm, uid_t uid, in CreateSocket() argument
142 if (fchmodat(AT_FDCWD, addr.sun_path, perm, AT_SYMLINK_NOFOLLOW)) { in CreateSocket()
147 << ", mode " << std::oct << perm << std::dec in CreateSocket()
Dsnapuserd_transition.cpp64 socket_desc.perm = 0660; in LaunchFirstStageSnapuserd()
Dservice_utils.cpp170 auto result = CreateSocket(name, type | SOCK_CLOEXEC, passcred, perm, uid, gid, socket_context); in Create()
Dservice_parser.cpp438 socket.perm = strtol(args[3].c_str(), &end, 8); in ParseSocket()
/system/security/keystore2/src/
Dutils.rs44 pub fn check_keystore_permission(perm: KeystorePerm) -> anyhow::Result<()> { in check_keystore_permission()
50 perm, in check_keystore_permission()
74 perm: KeyPerm, in check_key_permission()
84 perm, in check_key_permission()
Dpermission.rs351 mod perm { module
426 type IntoIter = perm::IntoIter;
435 pub fn check_keystore_permission(caller_ctx: &CStr, perm: KeystorePerm) -> anyhow::Result<()> { in check_keystore_permission()
437 selinux::check_access(caller_ctx, &target_context, "keystore2", perm.to_selinux()) in check_keystore_permission()
469 return Err(selinux::Error::perm()).context("Grant permission cannot be granted."); in check_grant_permission()
507 perm: KeyPerm, in check_key_permission()
519 if access_vector.includes(perm) { in check_key_permission()
528 return Err(selinux::Error::perm()) in check_key_permission()
538 return Err(selinux::Error::perm()) in check_key_permission()
539 .context(format!("\"{}\" not granted", perm.to_selinux())); in check_key_permission()
[all …]
Derror.rs70 pub fn perm() -> Self { in perm() method
263 Err(anyhow!(selinux::Error::perm())).context("nested nexted selinux permission denied") in nested_nested_selinux_perm()
Dservice.rs264 _ => return Err(Error::perm()).context( in list_entries()
/system/sepolicy/tools/sepolicy-analyze/
Dneverallow.c189 perm_datum_t *perm = NULL; in read_classperms() local
336 perm = hashtab_search(cls->permissions.table, id); in read_classperms()
337 if (cls->comdatum && !perm) in read_classperms()
338 perm = hashtab_search(cls->comdatum->permissions.table, id); in read_classperms()
339 if (!perm) { in read_classperms()
344 node->data |= 1U << (perm->s.value - 1); in read_classperms()
DAndroid.bp17 "perm.c",
/system/logging/liblog/tests/
Dliblog_test.cpp1686 bool perm = (gid == AID_ROOT) || (uid == AID_ROOT); in TEST() local
1687 EXPECT_STREQ(perm ? "TRUE" : persist_hold, persist); in TEST()
1695 EXPECT_STREQ(perm ? "FALSE" : persist_hold, persist); in TEST()
1703 EXPECT_STREQ(perm ? "true" : persist_hold, persist); in TEST()
1711 EXPECT_STREQ(perm ? "false" : persist_hold, persist); in TEST()
1719 EXPECT_STREQ(perm ? "" : persist_hold, persist); in TEST()
/system/security/keystore2/legacykeystore/
Dlib.rs196 pub fn perm() -> Self { in perm() method
302 Err(Error::perm()).with_context(|| { in get_effective_uid()
/system/keymaster/key_blob_utils/
Docb.c231 const vector unsigned char perm = {1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 0}; in double_block() local
237 t = vec_perm(t, t, perm); in double_block()

12