Home
last modified time | relevance | path

Searched refs:directory (Results 1 – 25 of 228) sorted by relevance

12345678910

/system/extras/libfscrypt/
Dfscrypt.cpp138 static bool fscrypt_policy_set(const char *directory, const char *policy, in fscrypt_policy_set() argument
149 int fd = open(directory, O_DIRECTORY | O_NOFOLLOW | O_CLOEXEC); in fscrypt_policy_set()
151 PLOG(ERROR) << "Failed to open directory " << directory; in fscrypt_policy_set()
162 PLOG(ERROR) << "Failed to set encryption policy for " << directory << " to " << policy_hex in fscrypt_policy_set()
169 LOG(INFO) << "Policy for " << directory << " set to " << policy_hex in fscrypt_policy_set()
174 static bool fscrypt_policy_get(const char *directory, char *policy, in fscrypt_policy_get() argument
183 int fd = open(directory, O_DIRECTORY | O_NOFOLLOW | O_CLOEXEC); in fscrypt_policy_get()
185 PLOG(ERROR) << "Failed to open directory " << directory; in fscrypt_policy_get()
192 PLOG(ERROR) << "Failed to get encryption policy for " << directory; in fscrypt_policy_get()
194 log_ls(directory); in fscrypt_policy_get()
[all …]
/system/timezone/distro/core/src/main/com/android/timezone/distro/
DFileUtils.java85 public static void makeDirectoryWorldAccessible(File directory) throws IOException { in makeDirectoryWorldAccessible() argument
86 if (!directory.isDirectory()) { in makeDirectoryWorldAccessible()
87 throw new IOException(directory + " must be a directory"); in makeDirectoryWorldAccessible()
89 makeWorldReadable(directory); in makeDirectoryWorldAccessible()
90 if (!directory.setExecutable(true, false /* ownerOnly */)) { in makeDirectoryWorldAccessible()
91 throw new IOException("Unable to make " + directory + " world-executable"); in makeDirectoryWorldAccessible()
/system/tools/hidl/docs/
DREADME.md16 generated HTML reference to the reference directory. Enable verbose mode:
23 Parse all HAL files in the Android `/hardware/interfaces/` directory
24 and output generated HTML reference docs to reference directory. Skip files
34 `resources/template/` directory. Since these files are bundled up in the fat jar
/system/core/rootdir/
Dld_config_backward_compatibility_check.py103 for directory in directories:
104 if any(vendor_dir in directory for vendor_dir in VENDOR_DIRECTORIES):
106 configs[namespace].append(directory)
108 configs[namespace] = [directory]
/system/security/keystore/tests/
DMakefile81 genhtml coverage.info --output-directory coverage
84 lcov --capture --directory=. --directory=.. -b . --output-file coverage.info
89 lcov --capture --directory=. --output-file coverage.info
90 genhtml coverage.info --output-directory coverage
/system/sepolicy/tools/
Dsepolicy_cleanup_check.sh56 if [ -n "`$adb_cmd shell ls -lZ $path < /dev/null |& grep "No such file or directory"`" ]; then
72 if [ -n "`$adb_cmd shell ls -lZ $path < /dev/null |& grep "No such file or directory"`" ]; then
91 if [ -n "`$adb_cmd shell ls -lZ "$path" < /dev/null |& grep "No such file or directory"`" ]; then
/system/bt/doc/
Ddirectory_layout.md3 ### General directory layout
4 Each directory should be a self contained subsystem consisting
11 ### Top level directory layout
/system/extras/libfscrypt/include/fscrypt/
Dfscrypt.h28 int fscrypt_policy_ensure(const char *directory, const char *policy,
/system/timezone/testing/data/
DREADME1 This directory contains data files for testing time zone updates and the tools used to
/system/sepolicy/prebuilts/api/28.0/public/
Dvold_prepare_subdirs.te1 # SELinux directory creation and labelling for vold-managed directories
Dshared_relro.te4 # Grant write access to the shared relro files/directory.
/system/sepolicy/prebuilts/api/29.0/public/
Dvold_prepare_subdirs.te1 # SELinux directory creation and labelling for vold-managed directories
Dhal_face.te10 # Allow read/write access to the face template directory.
/system/sepolicy/public/
Dvold_prepare_subdirs.te1 # SELinux directory creation and labelling for vold-managed directories
/system/core/init/
Ddevices.cpp204 std::string directory = Dirname(path); in FindPlatformDevice() local
206 while (directory != "/" && directory != ".") { in FindPlatformDevice()
208 if (Realpath(directory + "/subsystem", &subsystem_link_path) && in FindPlatformDevice()
211 directory.erase(0, sysfs_mount_point_.size()); in FindPlatformDevice()
212 *platform_device_path = directory; in FindPlatformDevice()
220 directory = Dirname(path); in FindPlatformDevice()
/system/update_engine/update_payload_key/
DREADME1 This directory contains the public half of the payload signing key. This is
/system/sepolicy/prebuilts/api/29.0/private/
Drs.te10 # Read files from the app home directory.
14 # Cleanup app_exec_data_file files in the app home directory.
/system/sepolicy/private/
Drs.te10 # Read files from the app home directory.
14 # Cleanup app_exec_data_file files in the app home directory.
/system/timezone/tzlookup_generator/
DREADME.android1 Tests in this directory can be run with vogar:
/system/core/trusty/keymaster/legacy/
DMakefile118 genhtml coverage.info --output-directory coverage
121 lcov --capture --directory=. --output-file coverage.info
126 lcov --capture --directory=. --output-file coverage.info
127 genhtml coverage.info --output-directory coverage
/system/ca-certificates/
DREADME.cacerts1 The filenames in the cacerts directory are in the format of <hash>.<n>
/system/sepolicy/prebuilts/api/26.0/public/
Dshared_relro.te4 # Grant write access to the shared relro files/directory.
/system/sepolicy/prebuilts/api/27.0/public/
Dshared_relro.te4 # Grant write access to the shared relro files/directory.
/system/extras/cppreopts/
Dcppreopts.rc29 # Optional script to copy additional preloaded content to data directory
37 # Optional script to copy additional preloaded content to data directory
/system/chre/host/msm/daemon/
DREADME.md6 is compiled from a device-specific directory in vendor/.

12345678910