/system/security/keystore/tests/fuzzer/ |
D | keystoreGetWifiHidl_fuzzer.cpp | 53 uint64_t grant = fdp.ConsumeIntegral<uint64_t>(); in LLVMFuzzerTestOneInput() local 55 snprintf(grantId, kGrantIdSize, "%" PRIx64, grant); in LLVMFuzzerTestOneInput()
|
/system/tools/aidl/tests/java/src/android/aidl/permission/service/ |
D | PermissionTestService.java | 67 mPermissionEnforcer.grant(permission); in Grant()
|
/system/hardware/interfaces/keystore2/aidl/aidl_api/android.system.keystore2/1/android/system/keystore2/ |
D | IKeystoreService.aidl | 43 …android.system.keystore2.KeyDescriptor grant(in android.system.keystore2.KeyDescriptor key, in int… in grant() method
|
/system/hardware/interfaces/keystore2/aidl/aidl_api/android.system.keystore2/2/android/system/keystore2/ |
D | IKeystoreService.aidl | 43 …android.system.keystore2.KeyDescriptor grant(in android.system.keystore2.KeyDescriptor key, in int… in grant() method
|
/system/hardware/interfaces/keystore2/aidl/android/system/keystore2/ |
D | IKeystoreService.aidl | 183 KeyDescriptor grant(in KeyDescriptor key, in int granteeUid, in int accessVector); in grant() method
|
/system/sepolicy/vendor/ |
D | wpa_supplicant_macsec.te | 11 # in addition to ioctls allowlisted for all domains, grant wpa_supplicant_macsec priv_sock_ioctls.
|
D | hal_wifi_supplicant_default.te | 26 # Devices upgrading to P may grant this permission in device-specific
|
/system/hardware/interfaces/keystore2/aidl/aidl_api/android.system.keystore2/3/android/system/keystore2/ |
D | IKeystoreService.aidl | 46 …android.system.keystore2.KeyDescriptor grant(in android.system.keystore2.KeyDescriptor key, in int… in grant() method
|
/system/hardware/interfaces/keystore2/aidl/aidl_api/android.system.keystore2/4/android/system/keystore2/ |
D | IKeystoreService.aidl | 46 …android.system.keystore2.KeyDescriptor grant(in android.system.keystore2.KeyDescriptor key, in int… in grant() method
|
/system/hardware/interfaces/keystore2/aidl/aidl_api/android.system.keystore2/current/android/system/keystore2/ |
D | IKeystoreService.aidl | 46 …android.system.keystore2.KeyDescriptor grant(in android.system.keystore2.KeyDescriptor key, in int… in grant() method
|
/system/security/keystore2/src/ |
D | service.rs | 339 fn grant( in grant() method 353 db.borrow_mut().grant( in grant() 412 fn grant( in grant() method 419 self.grant(key, grantee_uid, access_vector.into()).map_err(into_logged_binder) in grant()
|
/system/sepolicy/private/ |
D | fuseblkd.te | 2 # We need this to not grant fuseblkd_untrusted sys_admin permissions.
|
D | hal_wifi_supplicant.te | 8 # in addition to ioctls allowlisted for all domains, grant hal_wifi_supplicant priv_sock_ioctls.
|
D | su.te | 39 # grant su access to vndbinder 83 # su needs to be declared as hal_foo_client to grant hal_foo_server
|
D | access_vectors | 718 grant 753 grant
|
D | system_app.te | 134 grant
|
/system/security/keystore2/tests/ |
D | keystore2_client_update_subcomponent_tests.rs | 190 .grant(&key_metadata.key, GRANTEE_1_UID.try_into().unwrap(), access_vector) in keystore2_update_subcomponent_fails_permission_denied() 198 .grant(&key_metadata.key, GRANTEE_2_UID.try_into().unwrap(), access_vector) in keystore2_update_subcomponent_fails_permission_denied()
|
D | keystore2_client_keystore_engine_tests.rs | 67 keystore2.grant(&key_metadata.key, grantee_uid, access_vector) in generate_rsa_key_and_grant_to_user() 102 keystore2.grant(&key_metadata.key, grantee_uid, access_vector) in generate_ec_key_and_grant_to_user()
|
D | keystore2_client_grant_key_tests.rs | 53 keystore2.grant(&key_metadata.key, grantee_uid, access_vector) in generate_ec_key_and_grant_to_user() 375 let result = key_generations::map_ks_error(keystore2.grant( in keystore2_grant_key_fails_with_permission_denied() 444 let result = key_generations::map_ks_error(keystore2.grant( in keystore2_grant_fails_with_non_existing_key_expect_key_not_found_err() 560 .grant(&key_metadata.key, GRANTEE_UID.try_into().unwrap(), access_vector) in keystore2_ungrant_fails_with_non_existing_key_expect_key_not_found_error()
|
/system/sepolicy/microdroid/reqd_mask/ |
D | access_vectors | 718 grant 753 grant
|
/system/sepolicy/microdroid/system/private/ |
D | access_vectors | 718 grant 753 grant
|
D | domain.te | 169 # not grant the ioctl permission on these socket types. That must be granted 179 # not grant the wider ioctl permission. That must be granted 190 # this allowlist to domain does not grant the ioctl permission to
|
/system/sepolicy/reqd_mask/ |
D | access_vectors | 718 grant 753 grant
|
/system/sepolicy/tools/sepolicy-analyze/ |
D | README | 38 grant the same permissions where one allow rule is written
|
/system/security/keystore2/selinux/src/ |
D | lib.rs | 762 check_key_perm!(grant, true);
|