Home
last modified time | relevance | path

Searched refs:permissions (Results 1 – 25 of 214) sorted by relevance

123456789

/system/core/libbacktrace/
DBacktraceMap.cpp51 char permissions[5]; local
60 &start, &end, permissions, &name_pos) != 3) {
67 &start, &end, permissions, &name_pos) != 3) {
75 if (permissions[0] == 'r') {
78 if (permissions[1] == 'w') {
81 if (permissions[2] == 'x') {
/system/bt/service/common/bluetooth/binder/
DIBluetoothGattServer.cpp87 int permissions = data.readInt32(); in onTransact() local
91 server_if, *uuid, properties, permissions, &out_id); in onTransact()
106 int permissions = data.readInt32(); in onTransact() local
109 bool result = AddDescriptor(server_if, *uuid, permissions, &out_id); in onTransact()
230 int properties, int permissions, in AddCharacteristic() argument
239 data.writeInt32(permissions); in AddCharacteristic()
252 int server_if, const bluetooth::UUID& uuid, int permissions, in AddDescriptor() argument
260 data.writeInt32(permissions); in AddDescriptor()
DIBluetoothGattServer.h72 int properties, int permissions,
75 int server_if, const bluetooth::UUID& uuid, int permissions,
134 int properties, int permissions,
137 int server_if, const bluetooth::UUID& uuid, int permissions,
/system/tpm/tpm_manager/server/
Dlocal_data_store_impl.cc41 int permissions = 0; in Read() local
42 if (base::GetPosixFilePermissions(path, &permissions) && in Read()
43 (permissions & ~kLocalDataPermissions) != 0) { in Read()
/system/tpm/attestation/server/
Ddatabase_impl.cc101 int permissions = 0; in Read() local
102 if (base::GetPosixFilePermissions(path, &permissions) && in Read()
103 (permissions & kMask) != 0) { in Read()
105 base::SetPosixFilePermissions(path, permissions & ~kMask); in Read()
/system/bt/service/
Dgatt_server.h147 const UUID& uuid, int properties, int permissions);
155 const UUID& uuid, int permissions);
202 int permissions) in AttributeEntry()
203 : id(id), char_properties(char_properties), permissions(permissions) {} in AttributeEntry()
207 int permissions; member
Dgatt_server_old.h89 bool AddCharacteristic(const UUID &id, int properties, int permissions);
94 int permissions);
Dgatt_server.cpp108 const UUID& uuid, int properties, int permissions) { in AddCharacteristic() argument
112 << ", permissions: " << permissions; in AddCharacteristic()
127 AttributeEntry entry(*char_id, properties, permissions); in AddCharacteristic()
137 const UUID& uuid, int permissions) { in AddDescriptor() argument
140 << ", permissions: " << permissions; in AddDescriptor()
157 AttributeEntry entry(*desc_id, kCharacteristicPropertyNone, permissions); in AddDescriptor()
872 next_entry->permissions); in HandleNextEntry()
892 next_entry->permissions); in HandleNextEntry()
Dgatt_server_old.cpp101 int permissions);
513 int permissions) { in AddCharacteristic() argument
516 server_if, service_handle, &c_uuid, properties, permissions); in AddCharacteristic()
645 const UUID &id, int properties, int permissions) { in AddCharacteristic() argument
648 id, properties, permissions); in AddCharacteristic()
661 int permissions) { in AddBlob() argument
666 id, properties, permissions); in AddBlob()
/system/extras/ext4_utils/
Dkey_control.cpp36 long keyctl_setperm(key_serial_t id, int permissions) in keyctl_setperm() argument
38 return keyctl(KEYCTL_SETPERM, id, permissions); in keyctl_setperm()
Dkey_control.h26 long keyctl_setperm(key_serial_t id, int permissions);
/system/bt/btif/src/
Dbtif_gatt_server.c96 uint16_t permissions; member
464 p_cb->permissions, p_cb->properties); in btgatts_handle_event()
473 BTA_GATTS_AddCharDescriptor(p_cb->srvc_handle, p_cb->permissions, in btgatts_handle_event()
589 int permissions) in btif_gatts_add_characteristic() argument
596 btif_cb.permissions = (uint16_t) permissions; in btif_gatts_add_characteristic()
603 int permissions) in btif_gatts_add_descriptor() argument
609 btif_cb.permissions = (uint16_t) permissions; in btif_gatts_add_descriptor()
/system/sepolicy/
Dattributes13 # Temporary attribute used for migrating permissions out of domain.
14 # Motivation: Domain is overly permissive. Start removing permissions
19 # reassigning the appropriate permissions to the inheriting domain
107 # All domains that access the boot_control HAL. The permissions the HAL
Dte_macros29 # Allow the necessary permissions.
57 # Allow the necessary permissions.
94 # Allow a base set of permissions required for all apps.
105 # Allow a base set of permissions required for network access.
112 # Allow a base set of permissions required for bluetooth access.
220 # Allow domain to check SELinux permissions via selinuxfs.
335 # Keystore is requires the following permissions
Dneverallow_macros2 # Common neverallow permissions
Dfingerprintd.te21 # For permissions checking
Dshared_relro.te5 # inherits from app to get basic permissions it needs to run.
Dservicemanager.te16 # Check SELinux permissions.
/system/bt/service/ipc/binder/
Dbluetooth_gatt_server_binder_server.cpp81 int properties, int permissions, in AddCharacteristic() argument
93 auto char_id = gatt_server->AddCharacteristic(uuid, properties, permissions); in AddCharacteristic()
106 int server_id, const bluetooth::UUID& uuid, int permissions, in AddDescriptor() argument
118 auto desc_id = gatt_server->AddDescriptor(uuid, permissions); in AddDescriptor()
Dbluetooth_gatt_server_binder_server.h51 int properties, int permissions,
54 int server_id, const bluetooth::UUID& uuid, int permissions,
/system/bt/service/hal/
Dfake_bluetooth_gatt_interface.cpp124 int properties, int permissions) { in FakeAddCharacteristic() argument
127 properties, permissions); in FakeAddCharacteristic()
134 int permissions) { in FakeAddDescriptor() argument
137 server_if, srvc_handle, uuid, permissions); in FakeAddDescriptor()
Dfake_bluetooth_gatt_interface.h70 int properties, int permissions) = 0;
73 int permissions) = 0;
/system/bt/service/doc/
DIBluetoothGattClient.txt13 * See the License for the specific language governing permissions and
66 * device. If the read request fails due to characteristic permissions,
88 * permissions, this function will try to raise the connection security level
104 * device. If the read request fails due to descriptor permissions,
126 * permissions, this function will try to raise the connection security level
/system/connectivity/shill/
Dshill.gypi13 # See the License for the specific language governing permissions and
/system/connectivity/shill/init/
Dnetfilter-common13 # See the License for the specific language governing permissions and

123456789