Home
last modified time | relevance | path

Searched refs:perm (Results 1 – 25 of 25) sorted by relevance

/system/sepolicy/tools/
Dsepolicy-check.c57 int check_perm(avtab_ptr_t current, perm_datum_t *perm) { in check_perm() argument
58 uint16_t perm_bitmask = 1U << (perm->s.value - 1); in check_perm()
66 perm_datum_t *perm, policydb_t *policy, avtab_t *avtab) { in expand_and_check() argument
89 match &= check_perm(cur, perm); in expand_and_check()
120 perm_datum_t *perm = NULL; in check_rule() local
152 perm = hashtab_search(cls->permissions.table, p); in check_rule()
153 if (perm == NULL) { in check_rule()
158 perm = hashtab_search(cls->comdatum->permissions.table, p); in check_rule()
159 if (perm == NULL) { in check_rule()
177 perm, policy, &policy->te_avtab); in check_rule()
[all …]
/system/security/keystore/
Dpermissions.cpp65 const char* get_perm_label(perm_t perm) { in get_perm_label() argument
66 unsigned int index = ffs(perm); in get_perm_label()
108 static bool keystore_selinux_check_access(uid_t uid, perm_t perm, pid_t spid) { in keystore_selinux_check_access() argument
116 const char* str_perm = get_perm_label(perm); in keystore_selinux_check_access()
152 bool has_permission(uid_t uid, perm_t perm, pid_t spid) { in has_permission() argument
161 return (user.perms & perm) && keystore_selinux_check_access(uid, perm, spid); in has_permission()
165 return (DEFAULT_PERMS & perm) && keystore_selinux_check_access(uid, perm, spid); in has_permission()
Dpermissions.h44 const char* get_perm_label(perm_t perm);
53 bool has_permission(uid_t uid, perm_t perm, pid_t spid);
/system/bt/stack/gatt/
Dgatt_db.c42 static void *allocate_attr_in_db(tGATT_SVC_DB *p_db, tBT_UUID *p_uuid, tGATT_PERM perm);
125 tGATT_PERM perm = p_attr->permission; in gatts_check_attr_readability() local
128 min_key_size = (((perm & GATT_ENCRYPT_KEY_SIZE_MASK) >> 12)); in gatts_check_attr_readability()
134 if (!(perm & GATT_READ_ALLOWED)) in gatts_check_attr_readability()
140 if ((perm & GATT_READ_AUTH_REQUIRED ) && !(sec_flag & GATT_SEC_FLAG_LKEY_UNAUTHED) && in gatts_check_attr_readability()
147 if ((perm & GATT_READ_MITM_REQUIRED ) && !(sec_flag & GATT_SEC_FLAG_LKEY_AUTHED)) in gatts_check_attr_readability()
153 if ((perm & GATT_READ_ENCRYPTED_REQUIRED ) && !(sec_flag & GATT_SEC_FLAG_ENCRYPTED)) in gatts_check_attr_readability()
159 …if ( (perm & GATT_READ_ENCRYPTED_REQUIRED) && (sec_flag & GATT_SEC_FLAG_ENCRYPTED) && (key_size < … in gatts_check_attr_readability()
489 UINT16 gatts_add_characteristic (tGATT_SVC_DB *p_db, tGATT_PERM perm, in gatts_add_characteristic() argument
496 GATT_TRACE_DEBUG("gatts_add_characteristic perm=0x%0x property=0x%0x", perm, property); in gatts_add_characteristic()
[all …]
Dgatt_api.c315 tGATT_PERM perm,tGATT_CHAR_PROP property) in GATTS_AddCharacteristic() argument
325 if ( ((property & GATT_CHAR_PROP_BIT_AUTH) && !(perm & GATT_WRITE_SIGNED_PERM)) || in GATTS_AddCharacteristic()
326 ((perm & GATT_WRITE_SIGNED_PERM) && !(property & GATT_CHAR_PROP_BIT_AUTH)) ) in GATTS_AddCharacteristic()
328 GATT_TRACE_DEBUG("Invalid configuration property=0x%x perm=0x%x ", property, perm); in GATTS_AddCharacteristic()
333 perm, in GATTS_AddCharacteristic()
357 tGATT_PERM perm, in GATTS_AddCharDescriptor() argument
376 perm, in GATTS_AddCharDescriptor()
Dgatt_int.h679 extern UINT16 gatts_add_characteristic (tGATT_SVC_DB *p_db, tGATT_PERM perm, tGATT_CHAR_PROP proper…
680 extern UINT16 gatts_add_char_descr (tGATT_SVC_DB *p_db, tGATT_PERM perm, tBT_UUID *p_dscp_uuid);
/system/extras/librank/
Dlibrank.c174 static int parse_perm(const char *perm) in parse_perm() argument
178 while (*perm) { in parse_perm()
179 switch(*perm) { in parse_perm()
190 fprintf(stderr, "Unknown permission '%c'\n", *perm); in parse_perm()
193 perm++; in parse_perm()
220 int perm; in main() local
233 perm = 0; in main()
281 perm = parse_perm(optarg); in main()
353 if (perm && (pm_map_flags(maps[j]) & PM_MAP_PERMISSIONS) != perm) in main()
/system/bt/bta/gatt/
Dbta_gatts_api.c201 tBTA_GATT_PERM perm, tBTA_GATT_CHAR_PROP property) in BTA_GATTS_AddCharacteristic() argument
208 p_buf->perm = perm; in BTA_GATTS_AddCharacteristic()
234 tBTA_GATT_PERM perm, in BTA_GATTS_AddCharDescriptor() argument
242 p_buf->perm = perm; in BTA_GATTS_AddCharDescriptor()
Dbta_gatts_int.h97 tBTA_GATT_PERM perm; member
113 tBTA_GATT_PERM perm; member
Dbta_gatts_act.c433 p_msg->api_add_char.perm, in bta_gatts_add_char()
468 p_msg->api_add_char_descr.perm, in bta_gatts_add_char_descr()
/system/core/init/
Dueventd.cpp100 mode_t perm; in set_device_permission() local
147 perm = strtol(args[1], &endptr, 8); in set_device_permission()
170 add_dev_perms(name, attr, perm, uid, gid, prefix, wildcard); in set_device_permission()
Ddevices.h25 mode_t perm, unsigned int uid,
Dservice.cpp46 SocketInfo::SocketInfo() : uid(0), gid(0), perm(0) { in SocketInfo()
50 gid_t gid, int perm, const std::string& socketcon) in SocketInfo() argument
51 : name(name), type(type), uid(uid), gid(gid), perm(perm), socketcon(socketcon) { in SocketInfo()
164 INFO(" socket %s %s 0%o\n", si.name.c_str(), si.type.c_str(), si.perm); in DumpState()
254 int perm = std::stoul(args[3], 0, 8); in HandleSocket() local
259 sockets_.emplace_back(args[1], args[2], uid, gid, perm, socketcon); in HandleSocket()
405 int s = create_socket(si.name.c_str(), socket_type, si.perm, in Start()
Ddevices.cpp76 mode_t perm; member
100 mode_t perm, unsigned int uid, unsigned int gid, in add_dev_perms() argument
117 node->dp.perm = perm; in add_dev_perms()
157 INFO("fixup %s %d %d 0%o\n", buf, dp->uid, dp->gid, dp->perm); in fixup_sys_perms()
159 chmod(buf, dp->perm); in fixup_sys_perms()
223 return dp->perm; in get_device_perm()
Dutil.h31 int create_socket(const char *name, int type, mode_t perm,
Dutil.cpp101 int create_socket(const char *name, int type, mode_t perm, uid_t uid, in create_socket() argument
158 ret = fchmodat(AT_FDCWD, addr.sun_path, perm, AT_SYMLINK_NOFOLLOW); in create_socket()
165 addr.sun_path, perm, uid, gid); in create_socket()
Dservice.h53 gid_t gid, int perm, const std::string& socketcon);
58 int perm; member
Dreadme.txt129 socket <name> <type> <perm> [ <user> [ <group> [ <seclabel> ] ] ]
/system/sepolicy/tools/sepolicy-analyze/
Dneverallow.c192 perm_datum_t *perm = NULL; in read_classperms() local
336 perm = hashtab_search(cls->permissions.table, id); in read_classperms()
337 if (cls->comdatum && !perm) in read_classperms()
338 perm = hashtab_search(cls->comdatum->permissions.table, id); in read_classperms()
339 if (!perm) { in read_classperms()
344 node->data |= 1U << (perm->s.value - 1); in read_classperms()
DAndroid.mk10 LOCAL_SRC_FILES := sepolicy-analyze.c dups.c neverallow.c perm.c typecmp.c booleans.c attribute.c u…
/system/core/sdcard/
Dsdcard.c158 perm_t perm; member
430 if (node->perm == PERM_PRE_ROOT) { in attr_from_stat()
468 node->perm = PERM_INHERIT; in derive_permissions_locked()
474 switch (parent->perm) { in derive_permissions_locked()
480 node->perm = PERM_ROOT; in derive_permissions_locked()
487 node->perm = PERM_ANDROID; in derive_permissions_locked()
494 node->perm = PERM_ANDROID_DATA; in derive_permissions_locked()
497 node->perm = PERM_ANDROID_OBB; in derive_permissions_locked()
503 node->perm = PERM_ANDROID_MEDIA; in derive_permissions_locked()
534 if (parent_node && parent_node->perm == PERM_ROOT) { in check_caller_access_to_name()
[all …]
/system/bt/stack/include/
Dgatt_api.h777 tGATT_PERM perm,tGATT_CHAR_PROP property);
798 extern UINT16 GATTS_AddCharDescriptor (UINT16 service_handle, tGATT_PERM perm,
/system/core/debuggerd/
Ddebuggerd.cpp158 const char *perm; in selinux_action_allowed() local
166 perm = debuggerd_perms[request->action]; in selinux_action_allowed()
178 allowed = (selinux_check_access(scon, tcon, tclass, perm, reinterpret_cast<void*>(request)) == 0); in selinux_action_allowed()
/system/bt/bta/include/
Dbta_gatt_api.h1116 tBTA_GATT_PERM perm, tBTA_GATT_CHAR_PROP property);
1136 tBTA_GATT_PERM perm,
/system/keymaster/
Docb.c230 const vector unsigned char perm = {1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 0}; in double_block() local
236 t = vec_perm(t, t, perm); in double_block()