/system/bt/stack/gatt/ |
D | gatt_db.c | 42 static void *allocate_attr_in_db(tGATT_SVC_DB *p_db, tBT_UUID *p_uuid, tGATT_PERM perm); 125 tGATT_PERM perm = p_attr->permission; in gatts_check_attr_readability() local 128 min_key_size = (((perm & GATT_ENCRYPT_KEY_SIZE_MASK) >> 12)); in gatts_check_attr_readability() 134 if (!(perm & GATT_READ_ALLOWED)) in gatts_check_attr_readability() 140 if ((perm & GATT_READ_AUTH_REQUIRED ) && !(sec_flag & GATT_SEC_FLAG_LKEY_UNAUTHED) && in gatts_check_attr_readability() 147 if ((perm & GATT_READ_MITM_REQUIRED ) && !(sec_flag & GATT_SEC_FLAG_LKEY_AUTHED)) in gatts_check_attr_readability() 153 if ((perm & GATT_READ_ENCRYPTED_REQUIRED ) && !(sec_flag & GATT_SEC_FLAG_ENCRYPTED)) in gatts_check_attr_readability() 159 …if ( (perm & GATT_READ_ENCRYPTED_REQUIRED) && (sec_flag & GATT_SEC_FLAG_ENCRYPTED) && (key_size < … in gatts_check_attr_readability() 495 UINT16 gatts_add_characteristic (tGATT_SVC_DB *p_db, tGATT_PERM perm, in gatts_add_characteristic() argument 502 GATT_TRACE_DEBUG("gatts_add_characteristic perm=0x%0x property=0x%0x", perm, property); in gatts_add_characteristic() [all …]
|
D | gatt_api.c | 316 tGATT_PERM perm,tGATT_CHAR_PROP property) in GATTS_AddCharacteristic() argument 326 if ( ((property & GATT_CHAR_PROP_BIT_AUTH) && !(perm & GATT_WRITE_SIGNED_PERM)) || in GATTS_AddCharacteristic() 327 ((perm & GATT_WRITE_SIGNED_PERM) && !(property & GATT_CHAR_PROP_BIT_AUTH)) ) in GATTS_AddCharacteristic() 329 GATT_TRACE_DEBUG("Invalid configuration property=0x%x perm=0x%x ", property, perm); in GATTS_AddCharacteristic() 334 perm, in GATTS_AddCharacteristic() 358 tGATT_PERM perm, in GATTS_AddCharDescriptor() argument 377 perm, in GATTS_AddCharDescriptor()
|
D | gatt_int.h | 697 extern UINT16 gatts_add_characteristic (tGATT_SVC_DB *p_db, tGATT_PERM perm, tGATT_CHAR_PROP proper… 698 extern UINT16 gatts_add_char_descr (tGATT_SVC_DB *p_db, tGATT_PERM perm, tBT_UUID *p_dscp_uuid);
|
/system/extras/librank/ |
D | librank.c | 174 static int parse_perm(const char *perm) in parse_perm() argument 178 while (*perm) { in parse_perm() 179 switch(*perm) { in parse_perm() 190 fprintf(stderr, "Unknown permission '%c'\n", *perm); in parse_perm() 193 perm++; in parse_perm() 220 int perm; in main() local 233 perm = 0; in main() 281 perm = parse_perm(optarg); in main() 352 if (perm && (pm_map_flags(maps[j]) & PM_MAP_PERMISSIONS) != perm) in main()
|
/system/core/init/ |
D | ueventd.cpp | 101 mode_t perm; in set_device_permission() local 148 perm = strtol(args[1], &endptr, 8); in set_device_permission() 171 add_dev_perms(name, attr, perm, uid, gid, prefix, wildcard); in set_device_permission()
|
D | devices.h | 25 mode_t perm, unsigned int uid,
|
D | devices.cpp | 75 mode_t perm; member 99 mode_t perm, unsigned int uid, unsigned int gid, in add_dev_perms() argument 116 node->dp.perm = perm; in add_dev_perms() 156 INFO("fixup %s %d %d 0%o\n", buf, dp->uid, dp->gid, dp->perm); in fixup_sys_perms() 158 chmod(buf, dp->perm); in fixup_sys_perms() 222 return dp->perm; in get_device_perm()
|
D | util.h | 31 int create_socket(const char *name, int type, mode_t perm,
|
D | util.cpp | 91 int create_socket(const char *name, int type, mode_t perm, uid_t uid, in create_socket() argument 138 chmod(addr.sun_path, perm); in create_socket() 141 addr.sun_path, perm, uid, gid); in create_socket()
|
D | init.h | 69 int perm; member
|
D | init_parser.cpp | 91 INFO(" socket %s %s 0%o\n", si->name, si->type, si->perm); in dump_parser_state() 905 si->perm = strtoul(args[3], 0, 8); in parse_line_service()
|
D | init.cpp | 284 si->perm, si->uid, si->gid, si->socketcon ?: scon); in service_start()
|
D | readme.txt | 73 socket <name> <type> <perm> [ <user> [ <group> [ <seclabel> ] ] ]
|
/system/bt/bta/gatt/ |
D | bta_gatts_api.c | 225 tBTA_GATT_PERM perm, tBTA_GATT_CHAR_PROP property) in BTA_GATTS_AddCharacteristic() argument 235 p_buf->perm = perm; in BTA_GATTS_AddCharacteristic() 264 tBTA_GATT_PERM perm, in BTA_GATTS_AddCharDescriptor() argument 277 p_buf->perm = perm; in BTA_GATTS_AddCharDescriptor()
|
D | bta_gatts_int.h | 97 tBTA_GATT_PERM perm; member 113 tBTA_GATT_PERM perm; member
|
D | bta_gatts_act.c | 452 p_msg->api_add_char.perm, in bta_gatts_add_char() 489 p_msg->api_add_char_descr.perm, in bta_gatts_add_char_descr()
|
/system/core/sdcard/ |
D | sdcard.c | 151 perm_t perm; member 423 if (node->perm == PERM_PRE_ROOT) { in attr_from_stat() 461 node->perm = PERM_INHERIT; in derive_permissions_locked() 467 switch (parent->perm) { in derive_permissions_locked() 473 node->perm = PERM_ROOT; in derive_permissions_locked() 480 node->perm = PERM_ANDROID; in derive_permissions_locked() 487 node->perm = PERM_ANDROID_DATA; in derive_permissions_locked() 490 node->perm = PERM_ANDROID_OBB; in derive_permissions_locked() 496 node->perm = PERM_ANDROID_MEDIA; in derive_permissions_locked() 517 if (parent_node && parent_node->perm == PERM_ROOT) { in check_caller_access_to_name() [all …]
|
/system/core/debuggerd/ |
D | debuggerd.cpp | 153 const char *perm; in selinux_action_allowed() local 164 perm = debuggerd_perms[action]; in selinux_action_allowed() 176 allowed = (selinux_check_access(scon, tcon, tclass, perm, NULL) == 0); in selinux_action_allowed()
|
/system/bt/stack/include/ |
D | gatt_api.h | 777 tGATT_PERM perm,tGATT_CHAR_PROP property); 798 extern UINT16 GATTS_AddCharDescriptor (UINT16 service_handle, tGATT_PERM perm,
|
/system/bt/bta/include/ |
D | bta_gatt_api.h | 1236 tBTA_GATT_PERM perm, tBTA_GATT_CHAR_PROP property); 1256 tBTA_GATT_PERM perm,
|
/system/security/keystore/ |
D | keystore.cpp | 233 static const char *get_perm_label(perm_t perm) { in get_perm_label() argument 234 unsigned int index = ffs(perm); in get_perm_label() 259 static bool keystore_selinux_check_access(uid_t /*uid*/, perm_t perm, pid_t spid) { in keystore_selinux_check_access() argument 266 const char *str_perm = get_perm_label(perm); in keystore_selinux_check_access() 283 static bool has_permission(uid_t uid, perm_t perm, pid_t spid) { in has_permission() argument 292 return (user.perms & perm) && in has_permission() 293 keystore_selinux_check_access(uid, perm, spid); in has_permission() 297 return (DEFAULT_PERMS & perm) && in has_permission() 298 keystore_selinux_check_access(uid, perm, spid); in has_permission()
|
/system/keymaster/ |
D | ocb.c | 230 const vector unsigned char perm = {1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 0}; in double_block() local 236 t = vec_perm(t, t, perm); in double_block()
|