/system/extras/libfscrypt/ |
D | fscrypt.cpp | 138 static bool fscrypt_policy_set(const char *directory, const char *policy, in fscrypt_policy_set() argument 149 int fd = open(directory, O_DIRECTORY | O_NOFOLLOW | O_CLOEXEC); in fscrypt_policy_set() 151 PLOG(ERROR) << "Failed to open directory " << directory; in fscrypt_policy_set() 162 PLOG(ERROR) << "Failed to set encryption policy for " << directory << " to " << policy_hex in fscrypt_policy_set() 169 LOG(INFO) << "Policy for " << directory << " set to " << policy_hex in fscrypt_policy_set() 174 static bool fscrypt_policy_get(const char *directory, char *policy, in fscrypt_policy_get() argument 183 int fd = open(directory, O_DIRECTORY | O_NOFOLLOW | O_CLOEXEC); in fscrypt_policy_get() 185 PLOG(ERROR) << "Failed to open directory " << directory; in fscrypt_policy_get() 192 PLOG(ERROR) << "Failed to get encryption policy for " << directory; in fscrypt_policy_get() 194 log_ls(directory); in fscrypt_policy_get() [all …]
|
/system/timezone/distro/core/src/main/com/android/timezone/distro/ |
D | FileUtils.java | 85 public static void makeDirectoryWorldAccessible(File directory) throws IOException { in makeDirectoryWorldAccessible() argument 86 if (!directory.isDirectory()) { in makeDirectoryWorldAccessible() 87 throw new IOException(directory + " must be a directory"); in makeDirectoryWorldAccessible() 89 makeWorldReadable(directory); in makeDirectoryWorldAccessible() 90 if (!directory.setExecutable(true, false /* ownerOnly */)) { in makeDirectoryWorldAccessible() 91 throw new IOException("Unable to make " + directory + " world-executable"); in makeDirectoryWorldAccessible()
|
/system/tools/hidl/docs/ |
D | README.md | 16 generated HTML reference to the reference directory. Enable verbose mode: 23 Parse all HAL files in the Android `/hardware/interfaces/` directory 24 and output generated HTML reference docs to reference directory. Skip files 34 `resources/template/` directory. Since these files are bundled up in the fat jar
|
/system/core/rootdir/ |
D | ld_config_backward_compatibility_check.py | 103 for directory in directories: 104 if any(vendor_dir in directory for vendor_dir in VENDOR_DIRECTORIES): 106 configs[namespace].append(directory) 108 configs[namespace] = [directory]
|
/system/security/keystore/tests/ |
D | Makefile | 81 genhtml coverage.info --output-directory coverage 84 lcov --capture --directory=. --directory=.. -b . --output-file coverage.info 89 lcov --capture --directory=. --output-file coverage.info 90 genhtml coverage.info --output-directory coverage
|
/system/sepolicy/tools/ |
D | sepolicy_cleanup_check.sh | 56 if [ -n "`$adb_cmd shell ls -lZ $path < /dev/null |& grep "No such file or directory"`" ]; then 72 if [ -n "`$adb_cmd shell ls -lZ $path < /dev/null |& grep "No such file or directory"`" ]; then 91 if [ -n "`$adb_cmd shell ls -lZ "$path" < /dev/null |& grep "No such file or directory"`" ]; then
|
/system/bt/doc/ |
D | directory_layout.md | 3 ### General directory layout 4 Each directory should be a self contained subsystem consisting 11 ### Top level directory layout
|
/system/extras/libfscrypt/include/fscrypt/ |
D | fscrypt.h | 28 int fscrypt_policy_ensure(const char *directory, const char *policy,
|
/system/timezone/testing/data/ |
D | README | 1 This directory contains data files for testing time zone updates and the tools used to
|
/system/sepolicy/prebuilts/api/28.0/public/ |
D | vold_prepare_subdirs.te | 1 # SELinux directory creation and labelling for vold-managed directories
|
D | shared_relro.te | 4 # Grant write access to the shared relro files/directory.
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | vold_prepare_subdirs.te | 1 # SELinux directory creation and labelling for vold-managed directories
|
D | hal_face.te | 10 # Allow read/write access to the face template directory.
|
/system/sepolicy/public/ |
D | vold_prepare_subdirs.te | 1 # SELinux directory creation and labelling for vold-managed directories
|
/system/core/init/ |
D | devices.cpp | 204 std::string directory = Dirname(path); in FindPlatformDevice() local 206 while (directory != "/" && directory != ".") { in FindPlatformDevice() 208 if (Realpath(directory + "/subsystem", &subsystem_link_path) && in FindPlatformDevice() 211 directory.erase(0, sysfs_mount_point_.size()); in FindPlatformDevice() 212 *platform_device_path = directory; in FindPlatformDevice() 220 directory = Dirname(path); in FindPlatformDevice()
|
/system/update_engine/update_payload_key/ |
D | README | 1 This directory contains the public half of the payload signing key. This is
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | rs.te | 10 # Read files from the app home directory. 14 # Cleanup app_exec_data_file files in the app home directory.
|
/system/sepolicy/private/ |
D | rs.te | 10 # Read files from the app home directory. 14 # Cleanup app_exec_data_file files in the app home directory.
|
/system/timezone/tzlookup_generator/ |
D | README.android | 1 Tests in this directory can be run with vogar:
|
/system/core/trusty/keymaster/legacy/ |
D | Makefile | 118 genhtml coverage.info --output-directory coverage 121 lcov --capture --directory=. --output-file coverage.info 126 lcov --capture --directory=. --output-file coverage.info 127 genhtml coverage.info --output-directory coverage
|
/system/ca-certificates/ |
D | README.cacerts | 1 The filenames in the cacerts directory are in the format of <hash>.<n>
|
/system/sepolicy/prebuilts/api/26.0/public/ |
D | shared_relro.te | 4 # Grant write access to the shared relro files/directory.
|
/system/sepolicy/prebuilts/api/27.0/public/ |
D | shared_relro.te | 4 # Grant write access to the shared relro files/directory.
|
/system/extras/cppreopts/ |
D | cppreopts.rc | 29 # Optional script to copy additional preloaded content to data directory 37 # Optional script to copy additional preloaded content to data directory
|
/system/chre/host/msm/daemon/ |
D | README.md | 6 is compiled from a device-specific directory in vendor/.
|