Home
last modified time | relevance | path

Searched refs:grant (Results 1 – 25 of 102) sorted by relevance

12345

/system/security/keystore/tests/fuzzer/
DkeystoreGetWifiHidl_fuzzer.cpp53 uint64_t grant = fdp.ConsumeIntegral<uint64_t>(); in LLVMFuzzerTestOneInput() local
55 snprintf(grantId, kGrantIdSize, "%" PRIx64, grant); in LLVMFuzzerTestOneInput()
/system/tools/aidl/tests/java/src/android/aidl/permission/service/
DPermissionTestService.java67 mPermissionEnforcer.grant(permission); in Grant()
/system/hardware/interfaces/keystore2/aidl/aidl_api/android.system.keystore2/1/android/system/keystore2/
DIKeystoreService.aidl43 …android.system.keystore2.KeyDescriptor grant(in android.system.keystore2.KeyDescriptor key, in int… in grant() method
/system/hardware/interfaces/keystore2/aidl/aidl_api/android.system.keystore2/2/android/system/keystore2/
DIKeystoreService.aidl43 …android.system.keystore2.KeyDescriptor grant(in android.system.keystore2.KeyDescriptor key, in int… in grant() method
/system/hardware/interfaces/keystore2/aidl/android/system/keystore2/
DIKeystoreService.aidl183 KeyDescriptor grant(in KeyDescriptor key, in int granteeUid, in int accessVector); in grant() method
/system/sepolicy/vendor/
Dwpa_supplicant_macsec.te11 # in addition to ioctls allowlisted for all domains, grant wpa_supplicant_macsec priv_sock_ioctls.
Dhal_wifi_supplicant_default.te26 # Devices upgrading to P may grant this permission in device-specific
/system/hardware/interfaces/keystore2/aidl/aidl_api/android.system.keystore2/3/android/system/keystore2/
DIKeystoreService.aidl46 …android.system.keystore2.KeyDescriptor grant(in android.system.keystore2.KeyDescriptor key, in int… in grant() method
/system/hardware/interfaces/keystore2/aidl/aidl_api/android.system.keystore2/4/android/system/keystore2/
DIKeystoreService.aidl46 …android.system.keystore2.KeyDescriptor grant(in android.system.keystore2.KeyDescriptor key, in int… in grant() method
/system/hardware/interfaces/keystore2/aidl/aidl_api/android.system.keystore2/current/android/system/keystore2/
DIKeystoreService.aidl46 …android.system.keystore2.KeyDescriptor grant(in android.system.keystore2.KeyDescriptor key, in int… in grant() method
/system/security/keystore2/src/
Dservice.rs339 fn grant( in grant() method
353 db.borrow_mut().grant( in grant()
412 fn grant( in grant() method
419 self.grant(key, grantee_uid, access_vector.into()).map_err(into_logged_binder) in grant()
/system/sepolicy/private/
Dfuseblkd.te2 # We need this to not grant fuseblkd_untrusted sys_admin permissions.
Dhal_wifi_supplicant.te8 # in addition to ioctls allowlisted for all domains, grant hal_wifi_supplicant priv_sock_ioctls.
Dsu.te39 # grant su access to vndbinder
83 # su needs to be declared as hal_foo_client to grant hal_foo_server
Daccess_vectors718 grant
753 grant
Dsystem_app.te134 grant
/system/security/keystore2/tests/
Dkeystore2_client_update_subcomponent_tests.rs190 .grant(&key_metadata.key, GRANTEE_1_UID.try_into().unwrap(), access_vector) in keystore2_update_subcomponent_fails_permission_denied()
198 .grant(&key_metadata.key, GRANTEE_2_UID.try_into().unwrap(), access_vector) in keystore2_update_subcomponent_fails_permission_denied()
Dkeystore2_client_keystore_engine_tests.rs67 keystore2.grant(&key_metadata.key, grantee_uid, access_vector) in generate_rsa_key_and_grant_to_user()
102 keystore2.grant(&key_metadata.key, grantee_uid, access_vector) in generate_ec_key_and_grant_to_user()
Dkeystore2_client_grant_key_tests.rs53 keystore2.grant(&key_metadata.key, grantee_uid, access_vector) in generate_ec_key_and_grant_to_user()
375 let result = key_generations::map_ks_error(keystore2.grant( in keystore2_grant_key_fails_with_permission_denied()
444 let result = key_generations::map_ks_error(keystore2.grant( in keystore2_grant_fails_with_non_existing_key_expect_key_not_found_err()
560 .grant(&key_metadata.key, GRANTEE_UID.try_into().unwrap(), access_vector) in keystore2_ungrant_fails_with_non_existing_key_expect_key_not_found_error()
/system/sepolicy/microdroid/reqd_mask/
Daccess_vectors718 grant
753 grant
/system/sepolicy/microdroid/system/private/
Daccess_vectors718 grant
753 grant
Ddomain.te169 # not grant the ioctl permission on these socket types. That must be granted
179 # not grant the wider ioctl permission. That must be granted
190 # this allowlist to domain does not grant the ioctl permission to
/system/sepolicy/reqd_mask/
Daccess_vectors718 grant
753 grant
/system/sepolicy/tools/sepolicy-analyze/
DREADME38 grant the same permissions where one allow rule is written
/system/security/keystore2/selinux/src/
Dlib.rs762 check_key_perm!(grant, true);

12345