/system/timezone/distro/core/src/main/com/android/timezone/distro/ |
D | FileUtils.java | 85 public static void makeDirectoryWorldAccessible(File directory) throws IOException { in makeDirectoryWorldAccessible() argument 86 if (!directory.isDirectory()) { in makeDirectoryWorldAccessible() 87 throw new IOException(directory + " must be a directory"); in makeDirectoryWorldAccessible() 89 makeWorldReadable(directory); in makeDirectoryWorldAccessible() 90 if (!directory.setExecutable(true, false /* ownerOnly */)) { in makeDirectoryWorldAccessible() 91 throw new IOException("Unable to make " + directory + " world-executable"); in makeDirectoryWorldAccessible()
|
/system/security/keystore/tests/ |
D | Makefile | 81 genhtml coverage.info --output-directory coverage 84 lcov --capture --directory=. --directory=.. -b . --output-file coverage.info 89 lcov --capture --directory=. --output-file coverage.info 90 genhtml coverage.info --output-directory coverage
|
/system/sepolicy/tools/ |
D | sepolicy_cleanup_check.sh | 56 if [ -n "`$adb_cmd shell ls -lZ $path < /dev/null |& grep "No such file or directory"`" ]; then 72 if [ -n "`$adb_cmd shell ls -lZ $path < /dev/null |& grep "No such file or directory"`" ]; then 91 if [ -n "`$adb_cmd shell ls -lZ "$path" < /dev/null |& grep "No such file or directory"`" ]; then
|
/system/extras/libfscrypt/ |
D | fscrypt.cpp | 282 bool EnsurePolicy(const EncryptionPolicy& policy, const std::string& directory) { in EnsurePolicy() argument 323 android::base::unique_fd fd(open(directory.c_str(), O_DIRECTORY | O_NOFOLLOW | O_CLOEXEC)); in EnsurePolicy() 325 PLOG(ERROR) << "Failed to open directory " << directory; in EnsurePolicy() 344 LOG(ERROR) << "Failed to set encryption policy of " << directory << " to " in EnsurePolicy() 347 log_ls(directory.c_str()); in EnsurePolicy() 353 LOG(INFO) << "Verified that " << directory << " has the encryption policy " in EnsurePolicy() 356 LOG(INFO) << "Encryption policy of " << directory << " set to " in EnsurePolicy()
|
/system/bt/doc/ |
D | directory_layout.md | 3 ### General directory layout 4 Each directory should be a self contained subsystem consisting 11 ### Top level directory layout
|
/system/core/init/ |
D | ueventd.cpp | 131 void GenerateRestoreCon(const std::string& directory); 164 void ColdBoot::GenerateRestoreCon(const std::string& directory) { in GenerateRestoreCon() argument 165 std::unique_ptr<DIR, decltype(&closedir)> dir(opendir(directory.c_str()), &closedir); in GenerateRestoreCon() 177 std::string fullpath = directory + "/" + dent->d_name; in GenerateRestoreCon()
|
D | devices.cpp | 191 std::string directory = Dirname(path); in FindPlatformDevice() local 193 while (directory != "/" && directory != ".") { in FindPlatformDevice() 195 if (Realpath(directory + "/subsystem", &subsystem_link_path) && in FindPlatformDevice() 198 directory.erase(0, sysfs_mount_point_.size()); in FindPlatformDevice() 199 *platform_device_path = directory; in FindPlatformDevice() 207 directory = Dirname(path); in FindPlatformDevice()
|
/system/nfc/src/fuzzers/ |
D | README.md | 3 This directory contains a couple NFC fuzzers targeting different part of the 53 current working directory set to the fuzzer directory. You can also source 71 directory ($ANDROID_BUILD_TOP/system/nfc/src/fuzzers/nci), all you need is 86 4. Archiving all the logs into a directory named by the crashing function
|
D | fuzz.sh | 135 …$ANDROID_BUILD_TOP/prebuilts/gdb/linux-x86/bin/gdb --directory=$ANDROID_BUILD_TOP -ex "target remo… 141 …lcov --directory ./coverage --base-directory $ANDROID_BUILD_TOP --gcov-tool $(pwd)/../llvm-gcov --…
|
/system/timezone/testing/data/ |
D | README | 1 This directory contains data files for testing time zone updates and the tools used to
|
/system/sepolicy/prebuilts/api/28.0/public/ |
D | vold_prepare_subdirs.te | 1 # SELinux directory creation and labelling for vold-managed directories
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | vold_prepare_subdirs.te | 1 # SELinux directory creation and labelling for vold-managed directories
|
/system/sepolicy/public/ |
D | vold_prepare_subdirs.te | 1 # SELinux directory creation and labelling for vold-managed directories
|
/system/sepolicy/prebuilts/api/30.0/public/ |
D | vold_prepare_subdirs.te | 1 # SELinux directory creation and labelling for vold-managed directories
|
/system/update_engine/update_payload_key/ |
D | README | 1 This directory contains the public half of the payload signing key. This is
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | rs.te | 10 # Read files from the app home directory. 14 # Cleanup app_exec_data_file files in the app home directory.
|
/system/sepolicy/private/ |
D | rs.te | 10 # Read files from the app home directory. 14 # Cleanup app_exec_data_file files in the app home directory.
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | rs.te | 10 # Read files from the app home directory. 14 # Cleanup app_exec_data_file files in the app home directory.
|
/system/core/trusty/keymaster/legacy/ |
D | Makefile | 118 genhtml coverage.info --output-directory coverage 121 lcov --capture --directory=. --output-file coverage.info 126 lcov --capture --directory=. --output-file coverage.info 127 genhtml coverage.info --output-directory coverage
|
/system/teeui/test/example_config/ |
D | README | 4 Include the following three files in a new directory that you would want to run 82 The current directory contains a test_main.cpp that initiates the localization 84 Make a copy of the cpp file (found in this directory) and place it in the 85 test configuration directory you will run the test from.
|
/system/ca-certificates/ |
D | README.cacerts | 1 The filenames in the cacerts directory are in the format of <hash>.<n>
|
/system/core/cli-test/ |
D | README.md | 22 data anywhere except in the `files/` subdirectory of the directory containing 62 the scenes to rewrite the test files directory to `$FILES` because otherwise any 63 path in the output would depend on the temporary directory used to run the test.) 89 * There's currently no way (other than the `files/` directory) to share repeated
|
/system/sepolicy/prebuilts/api/26.0/public/ |
D | shared_relro.te | 4 # Grant write access to the shared relro files/directory.
|
/system/sepolicy/prebuilts/api/27.0/public/ |
D | shared_relro.te | 4 # Grant write access to the shared relro files/directory.
|
/system/extras/cppreopts/ |
D | cppreopts.rc | 29 # Optional script to copy additional preloaded content to data directory 37 # Optional script to copy additional preloaded content to data directory
|