/system/core/libbacktrace/ |
D | BacktraceMap.cpp | 51 char permissions[5]; local 60 &start, &end, permissions, &name_pos) != 3) { 67 &start, &end, permissions, &name_pos) != 3) { 75 if (permissions[0] == 'r') { 78 if (permissions[1] == 'w') { 81 if (permissions[2] == 'x') {
|
/system/bt/service/common/bluetooth/binder/ |
D | IBluetoothGattServer.cpp | 87 int permissions = data.readInt32(); in onTransact() local 91 server_if, *uuid, properties, permissions, &out_id); in onTransact() 106 int permissions = data.readInt32(); in onTransact() local 109 bool result = AddDescriptor(server_if, *uuid, permissions, &out_id); in onTransact() 230 int properties, int permissions, in AddCharacteristic() argument 239 data.writeInt32(permissions); in AddCharacteristic() 252 int server_if, const bluetooth::UUID& uuid, int permissions, in AddDescriptor() argument 260 data.writeInt32(permissions); in AddDescriptor()
|
D | IBluetoothGattServer.h | 72 int properties, int permissions, 75 int server_if, const bluetooth::UUID& uuid, int permissions, 134 int properties, int permissions, 137 int server_if, const bluetooth::UUID& uuid, int permissions,
|
/system/tpm/tpm_manager/server/ |
D | local_data_store_impl.cc | 41 int permissions = 0; in Read() local 42 if (base::GetPosixFilePermissions(path, &permissions) && in Read() 43 (permissions & ~kLocalDataPermissions) != 0) { in Read()
|
/system/tpm/attestation/server/ |
D | database_impl.cc | 101 int permissions = 0; in Read() local 102 if (base::GetPosixFilePermissions(path, &permissions) && in Read() 103 (permissions & kMask) != 0) { in Read() 105 base::SetPosixFilePermissions(path, permissions & ~kMask); in Read()
|
/system/bt/service/ |
D | gatt_server.h | 147 const UUID& uuid, int properties, int permissions); 155 const UUID& uuid, int permissions); 202 int permissions) in AttributeEntry() 203 : id(id), char_properties(char_properties), permissions(permissions) {} in AttributeEntry() 207 int permissions; member
|
D | gatt_server_old.h | 89 bool AddCharacteristic(const UUID &id, int properties, int permissions); 94 int permissions);
|
D | gatt_server.cpp | 108 const UUID& uuid, int properties, int permissions) { in AddCharacteristic() argument 112 << ", permissions: " << permissions; in AddCharacteristic() 127 AttributeEntry entry(*char_id, properties, permissions); in AddCharacteristic() 137 const UUID& uuid, int permissions) { in AddDescriptor() argument 140 << ", permissions: " << permissions; in AddDescriptor() 157 AttributeEntry entry(*desc_id, kCharacteristicPropertyNone, permissions); in AddDescriptor() 872 next_entry->permissions); in HandleNextEntry() 892 next_entry->permissions); in HandleNextEntry()
|
D | gatt_server_old.cpp | 101 int permissions); 513 int permissions) { in AddCharacteristic() argument 516 server_if, service_handle, &c_uuid, properties, permissions); in AddCharacteristic() 645 const UUID &id, int properties, int permissions) { in AddCharacteristic() argument 648 id, properties, permissions); in AddCharacteristic() 661 int permissions) { in AddBlob() argument 666 id, properties, permissions); in AddBlob()
|
/system/extras/ext4_utils/ |
D | key_control.cpp | 36 long keyctl_setperm(key_serial_t id, int permissions) in keyctl_setperm() argument 38 return keyctl(KEYCTL_SETPERM, id, permissions); in keyctl_setperm()
|
D | key_control.h | 26 long keyctl_setperm(key_serial_t id, int permissions);
|
/system/bt/btif/src/ |
D | btif_gatt_server.c | 96 uint16_t permissions; member 464 p_cb->permissions, p_cb->properties); in btgatts_handle_event() 473 BTA_GATTS_AddCharDescriptor(p_cb->srvc_handle, p_cb->permissions, in btgatts_handle_event() 589 int permissions) in btif_gatts_add_characteristic() argument 596 btif_cb.permissions = (uint16_t) permissions; in btif_gatts_add_characteristic() 603 int permissions) in btif_gatts_add_descriptor() argument 609 btif_cb.permissions = (uint16_t) permissions; in btif_gatts_add_descriptor()
|
/system/sepolicy/ |
D | attributes | 13 # Temporary attribute used for migrating permissions out of domain. 14 # Motivation: Domain is overly permissive. Start removing permissions 19 # reassigning the appropriate permissions to the inheriting domain 107 # All domains that access the boot_control HAL. The permissions the HAL
|
D | te_macros | 29 # Allow the necessary permissions. 57 # Allow the necessary permissions. 94 # Allow a base set of permissions required for all apps. 105 # Allow a base set of permissions required for network access. 112 # Allow a base set of permissions required for bluetooth access. 220 # Allow domain to check SELinux permissions via selinuxfs. 335 # Keystore is requires the following permissions
|
D | neverallow_macros | 2 # Common neverallow permissions
|
D | fingerprintd.te | 21 # For permissions checking
|
D | shared_relro.te | 5 # inherits from app to get basic permissions it needs to run.
|
D | servicemanager.te | 16 # Check SELinux permissions.
|
/system/bt/service/ipc/binder/ |
D | bluetooth_gatt_server_binder_server.cpp | 81 int properties, int permissions, in AddCharacteristic() argument 93 auto char_id = gatt_server->AddCharacteristic(uuid, properties, permissions); in AddCharacteristic() 106 int server_id, const bluetooth::UUID& uuid, int permissions, in AddDescriptor() argument 118 auto desc_id = gatt_server->AddDescriptor(uuid, permissions); in AddDescriptor()
|
D | bluetooth_gatt_server_binder_server.h | 51 int properties, int permissions, 54 int server_id, const bluetooth::UUID& uuid, int permissions,
|
/system/bt/service/hal/ |
D | fake_bluetooth_gatt_interface.cpp | 124 int properties, int permissions) { in FakeAddCharacteristic() argument 127 properties, permissions); in FakeAddCharacteristic() 134 int permissions) { in FakeAddDescriptor() argument 137 server_if, srvc_handle, uuid, permissions); in FakeAddDescriptor()
|
D | fake_bluetooth_gatt_interface.h | 70 int properties, int permissions) = 0; 73 int permissions) = 0;
|
/system/bt/service/doc/ |
D | IBluetoothGattClient.txt | 13 * See the License for the specific language governing permissions and 66 * device. If the read request fails due to characteristic permissions, 88 * permissions, this function will try to raise the connection security level 104 * device. If the read request fails due to descriptor permissions, 126 * permissions, this function will try to raise the connection security level
|
/system/connectivity/shill/ |
D | shill.gypi | 13 # See the License for the specific language governing permissions and
|
/system/connectivity/shill/init/ |
D | netfilter-common | 13 # See the License for the specific language governing permissions and
|