/system/sepolicy/prebuilts/api/26.0/private/ |
D | initial_sids | 7 sid kernel 8 sid security 9 sid unlabeled 10 sid fs 11 sid file 12 sid file_labels 13 sid init 14 sid any_socket 15 sid port 16 sid netif [all …]
|
D | initial_sid_contexts | 1 sid kernel u:r:kernel:s0 2 sid security u:object_r:kernel:s0 3 sid unlabeled u:object_r:unlabeled:s0 4 sid fs u:object_r:labeledfs:s0 5 sid file u:object_r:unlabeled:s0 6 sid file_labels u:object_r:unlabeled:s0 7 sid init u:object_r:unlabeled:s0 8 sid any_socket u:object_r:unlabeled:s0 9 sid port u:object_r:port:s0 10 sid netif u:object_r:netif:s0 [all …]
|
/system/sepolicy/prebuilts/api/27.0/private/ |
D | initial_sids | 7 sid kernel 8 sid security 9 sid unlabeled 10 sid fs 11 sid file 12 sid file_labels 13 sid init 14 sid any_socket 15 sid port 16 sid netif [all …]
|
D | initial_sid_contexts | 1 sid kernel u:r:kernel:s0 2 sid security u:object_r:kernel:s0 3 sid unlabeled u:object_r:unlabeled:s0 4 sid fs u:object_r:labeledfs:s0 5 sid file u:object_r:unlabeled:s0 6 sid file_labels u:object_r:unlabeled:s0 7 sid init u:object_r:unlabeled:s0 8 sid any_socket u:object_r:unlabeled:s0 9 sid port u:object_r:port:s0 10 sid netif u:object_r:netif:s0 [all …]
|
/system/sepolicy/private/ |
D | initial_sids | 7 sid kernel 8 sid security 9 sid unlabeled 10 sid fs 11 sid file 12 sid file_labels 13 sid init 14 sid any_socket 15 sid port 16 sid netif [all …]
|
D | initial_sid_contexts | 1 sid kernel u:r:kernel:s0 2 sid security u:object_r:kernel:s0 3 sid unlabeled u:object_r:unlabeled:s0 4 sid fs u:object_r:labeledfs:s0 5 sid file u:object_r:unlabeled:s0 6 sid file_labels u:object_r:unlabeled:s0 7 sid init u:object_r:unlabeled:s0 8 sid any_socket u:object_r:unlabeled:s0 9 sid port u:object_r:port:s0 10 sid netif u:object_r:netif:s0 [all …]
|
/system/sepolicy/prebuilts/api/28.0/private/ |
D | initial_sids | 7 sid kernel 8 sid security 9 sid unlabeled 10 sid fs 11 sid file 12 sid file_labels 13 sid init 14 sid any_socket 15 sid port 16 sid netif [all …]
|
D | initial_sid_contexts | 1 sid kernel u:r:kernel:s0 2 sid security u:object_r:kernel:s0 3 sid unlabeled u:object_r:unlabeled:s0 4 sid fs u:object_r:labeledfs:s0 5 sid file u:object_r:unlabeled:s0 6 sid file_labels u:object_r:unlabeled:s0 7 sid init u:object_r:unlabeled:s0 8 sid any_socket u:object_r:unlabeled:s0 9 sid port u:object_r:port:s0 10 sid netif u:object_r:netif:s0 [all …]
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | initial_sids | 7 sid kernel 8 sid security 9 sid unlabeled 10 sid fs 11 sid file 12 sid file_labels 13 sid init 14 sid any_socket 15 sid port 16 sid netif [all …]
|
D | initial_sid_contexts | 1 sid kernel u:r:kernel:s0 2 sid security u:object_r:kernel:s0 3 sid unlabeled u:object_r:unlabeled:s0 4 sid fs u:object_r:labeledfs:s0 5 sid file u:object_r:unlabeled:s0 6 sid file_labels u:object_r:unlabeled:s0 7 sid init u:object_r:unlabeled:s0 8 sid any_socket u:object_r:unlabeled:s0 9 sid port u:object_r:port:s0 10 sid netif u:object_r:netif:s0 [all …]
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | initial_sids | 7 sid kernel 8 sid security 9 sid unlabeled 10 sid fs 11 sid file 12 sid file_labels 13 sid init 14 sid any_socket 15 sid port 16 sid netif [all …]
|
D | initial_sid_contexts | 1 sid kernel u:r:kernel:s0 2 sid security u:object_r:kernel:s0 3 sid unlabeled u:object_r:unlabeled:s0 4 sid fs u:object_r:labeledfs:s0 5 sid file u:object_r:unlabeled:s0 6 sid file_labels u:object_r:unlabeled:s0 7 sid init u:object_r:unlabeled:s0 8 sid any_socket u:object_r:unlabeled:s0 9 sid port u:object_r:port:s0 10 sid netif u:object_r:netif:s0 [all …]
|
/system/security/keystore/ |
D | permissions.cpp | 93 const char* sid; member 113 const char* sid = ad->sid ? ad->sid : "N/A"; in audit_callback() local 114 snprintf(buf, len, "pid=%d uid=%d sid=%s", ad->pid, ad->uid, sid); in audit_callback() 153 ad.sid = use_sid; in keystore_selinux_check_access() 177 bool has_permission(uid_t uid, perm_t perm, pid_t spid, const char* sid) { in has_permission() argument 183 if (sid == nullptr) { in has_permission() 190 return (user.perms & perm) && keystore_selinux_check_access(uid, perm, spid, sid); in has_permission() 194 return (DEFAULT_PERMS & perm) && keystore_selinux_check_access(uid, perm, spid, sid); in has_permission()
|
D | auth_token_table.h | 143 bool SatisfiesAuth(uint64_t sid, HardwareAuthenticatorType auth_type) const { in SatisfiesAuth() argument 144 return (sid == token_.userId || sid == token_.authenticatorId) && in SatisfiesAuth()
|
D | permissions.h | 59 bool has_permission(uid_t uid, perm_t perm, pid_t spid, const char* sid);
|
/system/hwservicemanager/ |
D | AccessControl.cpp | 33 const char* sid; member 104 ad.sid = source.sid.c_str(); in checkPermission() 107 allowed = (selinux_check_access(source.sid.c_str(), targetContext, "hwservice_manager", in checkPermission() 138 const char* sid = ad->sid ? ad->sid : "N/A"; in auditCallback() local 140 snprintf(buf, len, "interface=%s sid=%s pid=%d", ad->interfaceName, sid, ad->pid); in auditCallback()
|
D | AccessControl.h | 32 std::string sid; member
|
/system/bt/gd/l2cap/classic/cert/ |
D | cert_l2cap.py | 86 def send_configure_request(self, options, sid=2, continuation=l2cap_packets.Continuation.END): argument 88 request = l2cap_packets.ConfigurationRequestBuilder(sid, self._dcid, continuation, options) 104 sid = request.GetIdentifier() 107 …config_response = l2cap_packets.ConfigurationResponseBuilder(sid, self._dcid, l2cap_packets.Contin… 112 sid = request.GetIdentifier() 115 …config_response = l2cap_packets.ConfigurationResponseBuilder(sid, self._dcid, l2cap_packets.Contin… 215 sid = request.get().GetIdentifier() 223 sid, scid, dcid, l2cap_packets.ConnectionResponseResult.SUCCESS, 236 sid = request.get().GetIdentifier() 244 …0x03, sid, 0x08, 0x00, dcid, 0x00, dcid, 0x00, 0x00, 0x00, 0x00, 0x00, 0x04, sid + 1, 0x04, 0x00, … [all …]
|
/system/core/gatekeeperd/ |
D | gatekeeperd.cpp | 79 void store_sid(uint32_t uid, uint64_t sid) { in store_sid() argument 87 write(fd, &sid, sizeof(sid)); in store_sid() 120 void maybe_store_sid(uint32_t uid, uint64_t sid) { in maybe_store_sid() argument 124 store_sid(uid, sid); in maybe_store_sid() 130 uint64_t sid; in read_sid() local 134 read(fd, &sid, sizeof(sid)); in read_sid() 136 return sid; in read_sid() 324 Status getSecureUserId(int32_t uid, int64_t* sid) override { in getSecureUserId() argument 325 *sid = read_sid(uid); in getSecureUserId()
|
/system/bt/gd/l2cap/le/cert/ |
D | cert_le_l2cap.py | 143 sid = request.get().GetIdentifier() 144 reject = l2cap_packets.LeCommandRejectNotUnderstoodBuilder(sid) 154 sid = request.GetIdentifier() 163 …response = l2cap_packets.LeCreditBasedConnectionResponseBuilder(sid, our_scid, mtu, mps, initial_c… 176 sid = disconnection_request.GetIdentifier() 179 response = l2cap_packets.LeDisconnectionResponseBuilder(sid, dcid, scid)
|
/system/sepolicy/reqd_mask/ |
D | initial_sids | 1 sid reqd_mask
|
D | initial_sid_contexts | 1 sid reqd_mask u:r:reqd_mask_type:s0
|
/system/gatekeeper/tests/ |
D | gatekeeper_device_test.cpp | 216 secure_id_t sid = handle->user_id; in TEST_F() local 223 ASSERT_NE(sid, handle->user_id); in TEST_F() 240 secure_id_t sid = handle->user_id; in TEST_F() local 247 ASSERT_EQ(sid, handle->user_id); in TEST_F()
|
/system/bt/gd/hci/ |
D | le_advertising_manager.h | 53 uint8_t sid = 0x00; variable
|
/system/bt/gd/hci/facade/ |
D | le_advertising_manager_facade.proto | 62 int32 sid = 12; field
|