/system/sepolicy/ |
D | Android.mk | 336 sepolicy_policy.conf := $(intermediates)/policy.conf 337 $(sepolicy_policy.conf): PRIVATE_MLS_SENS := $(MLS_SENS) 338 $(sepolicy_policy.conf): PRIVATE_MLS_CATS := $(MLS_CATS) 339 $(sepolicy_policy.conf): PRIVATE_TARGET_BUILD_VARIANT := user 340 $(sepolicy_policy.conf): PRIVATE_TGT_ARCH := $(my_target_arch) 341 $(sepolicy_policy.conf): PRIVATE_TGT_WITH_ASAN := $(with_asan) 342 $(sepolicy_policy.conf): PRIVATE_TGT_WITH_NATIVE_COVERAGE := $(with_native_coverage) 343 $(sepolicy_policy.conf): PRIVATE_ADDITIONAL_M4DEFS := $(LOCAL_ADDITIONAL_M4DEFS) 344 $(sepolicy_policy.conf): PRIVATE_SEPOLICY_SPLIT := $(PRODUCT_SEPOLICY_SPLIT) 345 $(sepolicy_policy.conf): $(call build_policy, $(sepolicy_build_files), \ [all …]
|
D | treble_sepolicy_tests_for_release.mk | 19 $(version)_plat_policy.conf := $(intermediates)/$(version)_plat_policy.conf 20 $($(version)_plat_policy.conf): PRIVATE_MLS_SENS := $(MLS_SENS) 21 $($(version)_plat_policy.conf): PRIVATE_MLS_CATS := $(MLS_CATS) 22 $($(version)_plat_policy.conf): PRIVATE_TARGET_BUILD_VARIANT := user 23 $($(version)_plat_policy.conf): PRIVATE_TGT_ARCH := $(my_target_arch) 24 $($(version)_plat_policy.conf): PRIVATE_TGT_WITH_ASAN := $(with_asan) 25 $($(version)_plat_policy.conf): PRIVATE_TGT_WITH_NATIVE_COVERAGE := $(with_native_coverage) 26 $($(version)_plat_policy.conf): PRIVATE_ADDITIONAL_M4DEFS := $(LOCAL_ADDITIONAL_M4DEFS) 27 $($(version)_plat_policy.conf): PRIVATE_SEPOLICY_SPLIT := true 28 $($(version)_plat_policy.conf): $(call build_policy, $(sepolicy_build_files), \ [all …]
|
D | definitions.mk | 3 define transform-policy-to-conf 18 .KATI_READONLY := transform-policy-to-conf
|
D | mac_permissions.mk | 13 $(plat_mac_perms_keys.tmp): $(call build_policy, keys.conf, $(PLAT_PRIVATE_POLICY) $(PRODUCT_PRIVAT… 47 $(product_mac_perms_keys.tmp): $(call build_policy, keys.conf, $(PRODUCT_PRIVATE_POLICY) $(REQD_MAS… 75 $(vendor_mac_perms_keys.tmp): $(call build_policy, keys.conf, $(PLAT_VENDOR_POLICY) $(BOARD_VENDOR_… 103 $(odm_mac_perms_keys.tmp): $(call build_policy, keys.conf, $(BOARD_ODM_SEPOLICY_DIRS) $(REQD_MASK_P…
|
D | README | 29 Reviewing out/target/product/<device>/obj/ETC/sepolicy_intermediates/policy.conf 46 * keys.conf 72 Details of the configuration file (keys.conf) can be found in the subsection 73 keys.conf. This tool is also responsible for stripping the comments and 76 keys.conf 77 The keys.conf file is used for controlling the mapping of "tags" found in 92 organization and may need to extract the pem file for the insertkeys/keys.conf tools. 97 After extracting the pem, you can rename it, and configure keys.conf and
|
/system/bt/conf/ |
D | Android.bp | 1 // Bluetooth bt_stack.conf config file 4 name: "bt_stack.conf", 5 src: "bt_stack.conf", 9 // Bluetooth bt_did.conf config file 12 name: "bt_did.conf", 13 src: "bt_did.conf",
|
/system/update_engine/update_manager/ |
D | update_manager.conf.example | 3 # Normally this file is loaded from /etc/update_manager.conf. If 7 # /mnt/stateful_partition/etc/update_manager.conf 10 # /etc/update_manager.conf.
|
/system/core/libcutils/ |
D | fs_config.cpp | 134 static const char* conf[][2] = { variable 251 if (asprintf(&name, "%.*s%s", (int)len, target_out_path, conf[which][dir]) != -1) { in fs_config_open() 257 fd = TEMP_FAILURE_RETRY(open(conf[which][dir], O_RDONLY | O_BINARY)); in fs_config_open() 329 for (which = 0; which < (sizeof(conf) / sizeof(conf[0])); ++which) { in fs_config() 340 ALOGE("%s len is corrupted", conf[which][dir]); in fs_config() 345 ALOGE("%s out of memory", conf[which][dir]); in fs_config() 350 ALOGE("%s prefix is truncated", conf[which][dir]); in fs_config() 356 ALOGE("%s is corrupted", conf[which][dir]); in fs_config()
|
/system/extras/ext4_utils/ |
D | Android.bp | 77 name: "mke2fs.conf", 79 src: "mke2fs.conf",
|
D | Android.mk | 10 LOCAL_MODULE := mke2fs.conf
|
/system/bt/btif/src/ |
D | btif_config.cc | 551 static void btif_config_remove_unpaired(config_t* conf) { in btif_config_remove_unpaired() argument 552 CHECK(conf != NULL); in btif_config_remove_unpaired() 558 for (auto it = conf->sections.begin(); it != conf->sections.end();) { in btif_config_remove_unpaired() 563 if (!config_has_key(*conf, section, "LinkKey") && in btif_config_remove_unpaired() 564 !config_has_key(*conf, section, "LE_KEY_PENC") && in btif_config_remove_unpaired() 565 !config_has_key(*conf, section, "LE_KEY_PID") && in btif_config_remove_unpaired() 566 !config_has_key(*conf, section, "LE_KEY_PCSRK") && in btif_config_remove_unpaired() 567 !config_has_key(*conf, section, "LE_KEY_LENC") && in btif_config_remove_unpaired() 568 !config_has_key(*conf, section, "LE_KEY_LCSRK")) { in btif_config_remove_unpaired() 569 it = conf->sections.erase(it); in btif_config_remove_unpaired()
|
D | btif_dm.cc | 2738 char conf[64]; in btif_dm_get_smp_config() local 2742 strncpy(conf, recv->c_str(), 64); in btif_dm_get_smp_config() 2743 conf[63] = 0; // null terminate in btif_dm_get_smp_config() 2745 pch = strtok(conf, ","); in btif_dm_get_smp_config()
|
/system/sepolicy/tools/sepolicy-analyze/ |
D | README | 78 [-w] [-d] [-f neverallows.conf] | [-n "neverallow string"] 81 from the neverallows.conf file or a given string, which contain neverallow 82 statements in the same format as the SELinux policy.conf file, i.e. after 84 policy.conf file as the neverallows.conf file and sepolicy-analyze will 102 a full policy.conf file and output them in a more easily parsed format.
|
/system/bt/doc/ |
D | pts_guide.md | 30 `conf/bt_stack.conf`. To enable a flag, uncomment the corresponding line and
|
D | btsnoop_net.md | 6 This feature is enabled by setting `BtSnoopLogOutput=true` in `bt_stack.conf`.
|
D | directory_layout.md | 16 * conf - *Configuration* - Various configuration text files.
|
/system/bt/main/ |
D | Android.bp | 93 "bt_did.conf", 94 "bt_stack.conf",
|
/system/sepolicy/prebuilts/api/27.0/public/ |
D | dhcp.te | 17 # For /proc/sys/net/ipv4/conf/*/promote_secondaries
|
/system/sepolicy/prebuilts/api/26.0/public/ |
D | dhcp.te | 17 # For /proc/sys/net/ipv4/conf/*/promote_secondaries
|
/system/sepolicy/public/ |
D | dhcp.te | 17 # For /proc/sys/net/ipv4/conf/*/promote_secondaries
|
/system/sepolicy/prebuilts/api/28.0/public/ |
D | dhcp.te | 17 # For /proc/sys/net/ipv4/conf/*/promote_secondaries
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | dhcp.te | 17 # For /proc/sys/net/ipv4/conf/*/promote_secondaries
|
/system/core/fastboot/ |
D | Android.bp | 273 "mke2fs.conf",
|
/system/update_engine/sample_images/ |
D | generate_images.sh | 112 sudo tee "${mntdir}"/etc/update_engine.conf >/dev/null <<EOF
|
/system/core/rootdir/ |
D | init.rc | 164 write /proc/sys/net/ipv4/conf/all/accept_redirects 0 165 write /proc/sys/net/ipv6/conf/all/accept_redirects 0 472 # Fix the access permissions and group ownership for 'bt_config.conf' 473 chmod 0660 /data/misc/bluedroid/bt_config.conf 474 chown bluetooth bluetooth /data/misc/bluedroid/bt_config.conf 498 # give system access to wpa_supplicant.conf for backup and restore 499 chmod 0660 /data/misc/wifi/wpa_supplicant.conf
|