/system/connectivity/apmanager/dbus/ |
D | permission_broker_dbus_proxy.cc | 73 bool allowed = false; in RequestUdpPortAccess() local 75 if (!proxy_->RequestUdpPortAccess(port, interface, fd, &allowed, &error)) { in RequestUdpPortAccess() 80 if (!allowed) { in RequestUdpPortAccess()
|
/system/update_engine/client_library/ |
D | client_binder.cc | 76 bool BinderUpdateEngineClient::SetUpdateOverCellularPermission(bool allowed) { in SetUpdateOverCellularPermission() argument 77 return service_->SetUpdateOverCellularPermission(allowed).isOk(); in SetUpdateOverCellularPermission() 81 bool* allowed) const { in GetUpdateOverCellularPermission() 82 return service_->GetUpdateOverCellularPermission(allowed).isOk(); in GetUpdateOverCellularPermission()
|
D | client_dbus.cc | 75 bool DBusUpdateEngineClient::SetUpdateOverCellularPermission(bool allowed) { in SetUpdateOverCellularPermission() argument 76 return proxy_->SetUpdateOverCellularPermission(allowed, nullptr); in SetUpdateOverCellularPermission() 80 bool* allowed) const { in GetUpdateOverCellularPermission() 81 return proxy_->GetUpdateOverCellularPermission(allowed, nullptr); in GetUpdateOverCellularPermission()
|
D | client_dbus.h | 50 bool SetUpdateOverCellularPermission(bool allowed) override; 51 bool GetUpdateOverCellularPermission(bool* allowed) const override;
|
D | client_binder.h | 57 bool SetUpdateOverCellularPermission(bool allowed) override; 58 bool GetUpdateOverCellularPermission(bool* allowed) const override;
|
/system/update_engine/ |
D | update_engine_client.cc | 301 bool allowed = FLAGS_update_over_cellular == "yes"; in ProcessFlags() local 302 if (!allowed && FLAGS_update_over_cellular != "no") { in ProcessFlags() 306 if (!client_->SetUpdateOverCellularPermission(allowed)) { in ProcessFlags() 315 bool allowed; in ProcessFlags() local 317 if (!client_->GetUpdateOverCellularPermission(&allowed)) { in ProcessFlags() 323 << (allowed ? "ENABLED" : "DISABLED"); in ProcessFlags()
|
/system/update_engine/client_library/include/update_engine/ |
D | client.h | 71 virtual bool SetUpdateOverCellularPermission(bool allowed) = 0; 72 virtual bool GetUpdateOverCellularPermission(bool* allowed) const = 0;
|
/system/sepolicy/ |
D | logd.te | 17 # logpersist is only allowed on userdebug and eng builds 61 # logd is not allowed to write anywhere other than /data/misc/logd, and then 65 # logpersist is only allowed on userdebug/eng builds
|
D | ioctl_macros | 1 # socket ioctls allowed to unprivileged apps 14 # socket ioctls never allowed to unprivileged apps
|
D | recovery_refresh.te | 28 # recovery_refresh is not allowed to write anywhere
|
D | recovery_persist.te | 30 # recovery_persist is not allowed to write anywhere other than recovery_data_file
|
D | app.te | 194 # File write access allowed for FDs returned through Storage Access Framework 250 # Others are either allowed elsewhere or not desired. 337 # sigchld allowed for parent death notification. 338 # signull allowed for kill(pid, 0) existence test. 441 # Blacklist app domains not allowed to execute from /data
|
D | recovery.te | 8 # Otherwise recovery is only allowed the domain rules.
|
D | priv_app.te | 135 # and priv_app is allowed fork permission to itself.
|
/system/security/keystore/ |
D | permissions.cpp | 130 bool allowed = selinux_check_access(sctx, tctx, selinux_class, str_perm, in keystore_selinux_check_access() local 133 return allowed; in keystore_selinux_check_access()
|
/system/webservd/webservd/ |
D | server.cc | 48 bool allowed) { in OnFirewallSuccess() argument 49 if (allowed) { in OnFirewallSuccess()
|
/system/connectivity/shill/ |
D | HACKING | 102 - C++ exceptions are not allowed in the code. An exception to this rule is 139 allowed but not necessary.
|
/system/connectivity/shill/cellular/ |
D | cellular_capability_universal.h | 155 ModemModes(uint32_t allowed, MMModemMode preferred) in ModemModes() 156 : allowed_modes(allowed), in ModemModes()
|
/system/tpm/trunks/generator/ |
D | raw_structures.txt | 1413 In some cases, the allowed values are numeric values with no associated mnemonic. In such a case, t… 1603 column. This “+” indicates that this is a conditional value that may be allowed in certain situatio… 1625 an optional value that may be allowed 1633 the conditional value is allowed. If no “+” is present, then the conditional value is not allowed. 1712 illustrates a union in which a conditional null selector is allowed to indicate an empty union memb… 1899 is used in the union instance of 4.9.3, any of the allowed union members of NUMBER_UNION could be 1906 allowed list. In this particular case, the effect is the same in either case since the only values … 1916 list of allowed values 2018 code. The allowed values for a parameter may be included in the definition of the parameter by 2034 first number is an expression that represents the minimum allowed value and the second number [all …]
|
D | raw_structures_fixed.txt | 1413 In some cases, the allowed values are numeric values with no associated mnemonic. In such a case, t… 1603 column. This “+” indicates that this is a conditional value that may be allowed in certain situatio… 1625 an optional value that may be allowed 1633 the conditional value is allowed. If no “+” is present, then the conditional value is not allowed. 1712 illustrates a union in which a conditional null selector is allowed to indicate an empty union memb… 1899 is used in the union instance of 4.9.3, any of the allowed union members of NUMBER_UNION could be 1906 allowed list. In this particular case, the effect is the same in either case since the only values … 1916 list of allowed values 2018 code. The allowed values for a parameter may be included in the definition of the parameter by 2034 first number is an expression that represents the minimum allowed value and the second number [all …]
|
D | raw_commands_fixed.txt | 938 allowed types. These decorations are described in this clause. 968 indicates that the parameter is allowed to use the “null” value of the data type (see "Conditional 976 If a handle does not have this symbol, then an authorization session is not allowed. 1073 If the handle references an NV Index, then the allowed authorizations are determined by the 1327 3) If the maximum allowed number of sessions have been unmarshaled and fewer octets than 1352 Only one session is allowed for: 1427 If adminWithPolicy is CLEAR, then any type of authorization session is allowed . 1665 the value of a size parameter is larger or smaller than allowed 1684 a parameter does not have one of its allowed values 1687 …ver, the unmarshaling code is required to validate that all parameters have values that are allowed [all …]
|
D | raw_commands.txt | 938 allowed types. These decorations are described in this clause. 968 indicates that the parameter is allowed to use the “null” value of the data type (see "Conditional 976 If a handle does not have this symbol, then an authorization session is not allowed. 1073 If the handle references an NV Index, then the allowed authorizations are determined by the 1327 3) If the maximum allowed number of sessions have been unmarshaled and fewer octets than 1352 Only one session is allowed for: 1427 If adminWithPolicy is CLEAR, then any type of authorization session is allowed . 1665 the value of a size parameter is larger or smaller than allowed 1684 a parameter does not have one of its allowed values 1687 …ver, the unmarshaling code is required to validate that all parameters have values that are allowed [all …]
|
/system/core/debuggerd/ |
D | debuggerd.cpp | 159 bool allowed = false; in selinux_action_allowed() local 178 allowed = (selinux_check_access(scon, tcon, tclass, perm, reinterpret_cast<void*>(request)) == 0); in selinux_action_allowed() 183 return allowed; in selinux_action_allowed()
|
/system/tpm/attestation/common/ |
D | common.proto | 15 // Describes allowed key usage.
|
/system/connectivity/shill/doc/ |
D | ipconfig-api.txt | 42 for IPv4 and any allowed format for IPv6 (as specified
|