Searched refs:grant (Results 1 – 25 of 127) sorted by relevance
123456
/system/security/keystore/ |
D | grant_store.cpp | 71 auto grant = uid_grant_list.find(grant_no); in get() local 72 if (grant == uid_grant_list.end()) return {}; in get() 73 if (grant->entry_.alias() != wrappedAlias) return {}; in get() 74 return {&(*grant), std::move(lock)}; in get()
|
D | KeyStore.cpp | 121 auto grant = mGrants.get(uid, alias); in getBlobEntryIfExists() local 122 if (grant) { in getBlobEntryIfExists() 123 kbe = grant->entry_; in getBlobEntryIfExists()
|
/system/sepolicy/prebuilts/api/30.0/public/ |
D | hal_wifi_supplicant.te | 7 # in addition to ioctls allowlisted for all domains, grant hal_wifi_supplicant priv_sock_ioctls.
|
D | su.te | 17 # grant su access to vndbinder 59 # su needs to be declared as hal_foo_client to grant hal_foo_server
|
/system/sepolicy/public/ |
D | hal_wifi_supplicant.te | 7 # in addition to ioctls allowlisted for all domains, grant hal_wifi_supplicant priv_sock_ioctls.
|
D | su.te | 17 # grant su access to vndbinder 59 # su needs to be declared as hal_foo_client to grant hal_foo_server
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | hal_wifi_supplicant.te | 7 # in addition to ioctls allowlisted for all domains, grant hal_wifi_supplicant priv_sock_ioctls.
|
D | su.te | 17 # grant su access to vndbinder 58 # su needs to be declared as hal_foo_client to grant hal_foo_server
|
/system/sepolicy/prebuilts/api/28.0/public/ |
D | hal_wifi_supplicant.te | 8 # in addition to ioctls allowlisted for all domains, grant hal_wifi_supplicant priv_sock_ioctls.
|
D | su.te | 17 # grant su access to vndbinder 56 # su needs to be declared as hal_foo_client to grant hal_foo_server
|
/system/sepolicy/vendor/ |
D | hal_wifi_supplicant_default.te | 26 # Devices upgrading to P may grant this permission in device-specific
|
/system/sepolicy/prebuilts/api/27.0/public/ |
D | hal_wifi_supplicant.te | 8 # in addition to ioctls allowlisted for all domains, grant hal_wifi_supplicant priv_sock_ioctls.
|
D | su.te | 17 # grant su access to vndbinder
|
D | update_engine_common.te | 43 # due to the more specific grant to proc_misc immediately below.
|
/system/sepolicy/prebuilts/api/26.0/public/ |
D | hal_wifi_supplicant.te | 8 # in addition to ioctls allowlisted for all domains, grant hal_wifi_supplicant priv_sock_ioctls.
|
D | su.te | 17 # grant su access to vndbinder
|
D | update_engine_common.te | 37 # due to the more specific grant to proc_misc immediately below.
|
D | netd.te | 6 # in addition to ioctls allowlisted for all domains, grant netd priv_sock_ioctls.
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | system_app.te | 75 grant
|
/system/sepolicy/prebuilts/api/27.0/private/ |
D | system_app.te | 78 grant
|
/system/security/keystore/binder/android/security/keystore/ |
D | IKeystoreService.aidl | 49 String grant(String name, int granteeUid); in grant() method
|
/system/sepolicy/prebuilts/api/28.0/private/ |
D | system_app.te | 104 grant
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | system_app.te | 123 grant
|
/system/bpf/bpfloader/ |
D | bpfloader.rc | 52 # Ideally, we'd simply grant bpfloader the IPC_LOCK capability and it
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | system_app.te | 136 grant
|
123456