/external/ipsec-tools/src/libipsec/ |
test-policy.c | 230 int spid; local 283 spid = test2sub(so); 285 printf("spdget(%u)\n", spid); 286 if (pfkey_send_spdget(so, spid) < 0) 295 if (pfkey_send_spddelete2(so, spid) < 0) 305 spid = test2sub(so);
|
/frameworks/av/drm/drmserver/ |
DrmManagerService.cpp | 61 bool DrmManagerService::selinuxIsProtectedCallAllowed(pid_t spid, drm_perm_t perm) { 70 if (getpidcon(spid, &sctx) != 0) { 71 ALOGE("SELinux: getpidcon(pid=%d) failed.\n", spid); 88 pid_t spid = ipcState->getCallingPid(); local 92 return selinuxIsProtectedCallAllowed(spid, perm);
|
/external/dbus/bus/ |
selinux.c | 480 unsigned long spid; local 488 if (!dbus_connection_get_unix_process_id (connection, &spid)) 489 spid = 0; 500 if (spid) 502 if (!_dbus_string_append (&auxdata, " spid=")) 505 if (!_dbus_string_append_uint (&auxdata, spid)) 551 unsigned long spid, tpid; local 559 if (!sender || !dbus_connection_get_unix_process_id (sender, &spid)) 560 spid = 0; 607 if (spid) [all...] |
/external/toybox/lib/ |
xwrap.c | 639 char pidfile[256], spid[32]; local 654 spid[xread(fd, spid, sizeof(spid)-1)] = 0; 656 pid = atoi(spid); 664 xwrite(fd, spid, sprintf(spid, "%ld\n", (long)getpid()));
|
/external/ipsec-tools/src/racoon/ |
handler.h | 257 u_int32_t spid; /* policy id by kernel */ member in struct:ph2handle
|
/system/security/keystore/ |
key_store_service.cpp | 490 pid_t spid = IPCThreadState::self()->getCallingPid(); local 491 if (!has_permission(callingUid, P_DUPLICATE, spid)) { 1198 pid_t spid = IPCThreadState::self()->getCallingPid(); local 1216 pid_t spid = IPCThreadState::self()->getCallingPid(); local [all...] |