Searched refs:all (Results 1 – 25 of 870) sorted by relevance
12345678910>>...35
/system/bt/gd/packet/ |
D | packet_view_unittest.cc | 311 auto all = this->packet->begin(); in TYPED_TEST() local 312 size_t remaining = all.NumBytesRemaining(); in TYPED_TEST() 314 ASSERT_EQ(remaining, all.NumBytesRemaining()); in TYPED_TEST() 315 all.operator++(); in TYPED_TEST() 318 ASSERT_EQ(static_cast<size_t>(0), all.NumBytesRemaining()); in TYPED_TEST() 319 all.operator++(); in TYPED_TEST() 320 ASSERT_DEATH(all.operator*(), ""); in TYPED_TEST() 321 all.operator++(); in TYPED_TEST() 322 ASSERT_EQ(static_cast<size_t>(0), all.NumBytesRemaining()); in TYPED_TEST() 323 all.operator++(); in TYPED_TEST() [all …]
|
/system/linkerconfig/testdata/ |
D | prepare_root.sh | 20 all= 34 --all) 35 all=yes 57 if [ ! -z $bootstrap ] && [ ! -z $all ]; then 64 elif [ ! -z $all ]; then
|
/system/chre/build/ |
D | common.mk | 21 .PHONY: all 22 all: 28 MAKECMDGOALS = all
|
/system/bt/gd/security/cert/ |
D | security_test.py | 375 has192C = not all([i == 0 for i in oob_data[0]]) 376 has192R = not all([i == 0 for i in oob_data[1]]) 377 has256C = not all([i == 0 for i in oob_data[2]]) 378 has256R = not all([i == 0 for i in oob_data[3]]) 387 has192C = not all([i == 0 for i in oob_data[0]]) 388 has192R = not all([i == 0 for i in oob_data[1]]) 389 has256C = not all([i == 0 for i in oob_data[2]]) 390 has256R = not all([i == 0 for i in oob_data[3]]) 399 has192C = not all([i == 0 for i in oob_data[0]]) 400 has192R = not all([i == 0 for i in oob_data[1]]) [all …]
|
/system/sepolicy/prebuilts/api/31.0/private/ |
D | seapp_contexts | 76 # levelFrom (string; one of none, all, app, or user) 89 # levelFrom=all determines the level from both UID and user ID. 92 # levelFrom=app or levelFrom=all is only supported for _app UIDs. 103 # regular expressions exists on all input and output selectors. Neverallow 104 # rules are never output to the built seapp_contexts file. Like all keywords, 105 # neverallows are case-insensitive. A neverallow is asserted when all key value 145 …er=_app isPrivApp=true name=com.android.traceur domain=traceur_app type=app_data_file levelFrom=all 146 …App=true name=com.android.remoteprovisioner domain=remote_prov_app type=app_data_file levelFrom=all 151 user=secure_element seinfo=platform domain=secure_element levelFrom=all 153 user=shared_relro domain=shared_relro levelFrom=all [all …]
|
D | binderservicedomain.te | 1 # Rules common to all binder service domains 17 # allow all services to run permission checks
|
/system/sepolicy/private/ |
D | seapp_contexts | 76 # levelFrom (string; one of none, all, app, or user) 89 # levelFrom=all determines the level from both UID and user ID. 92 # levelFrom=app or levelFrom=all is only supported for _app UIDs. 103 # regular expressions exists on all input and output selectors. Neverallow 104 # rules are never output to the built seapp_contexts file. Like all keywords, 105 # neverallows are case-insensitive. A neverallow is asserted when all key value 145 …er=_app isPrivApp=true name=com.android.traceur domain=traceur_app type=app_data_file levelFrom=all 146 …App=true name=com.android.remoteprovisioner domain=remote_prov_app type=app_data_file levelFrom=all 151 user=secure_element seinfo=platform domain=secure_element levelFrom=all 153 user=shared_relro domain=shared_relro levelFrom=all [all …]
|
D | binderservicedomain.te | 1 # Rules common to all binder service domains 17 # allow all services to run permission checks
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | seapp_contexts | 76 # levelFrom (string; one of none, all, app, or user) 88 # levelFrom=all determines the level from both UID and user ID. 91 # levelFrom=app or levelFrom=all is only supported for _app UIDs. 102 # regular expressions exists on all input and output selectors. Neverallow 103 # rules are never output to the built seapp_contexts file. Like all keywords, 104 # neverallows are case-insensitive. A neverallow is asserted when all key value 144 …r=_app seinfo=platform name=com.android.traceur domain=traceur_app type=app_data_file levelFrom=all 147 user=network_stack seinfo=network_stack domain=network_stack levelFrom=all type=radio_data_file 149 user=secure_element seinfo=platform domain=secure_element levelFrom=all 158 user=_app isEphemeralApp=true domain=ephemeral_app type=app_data_file levelFrom=all [all …]
|
D | binderservicedomain.te | 1 # Rules common to all binder service domains 17 # allow all services to run permission checks
|
/system/tools/hidl/scripts/ |
D | hidl2aidl-all-interfaces.sh | 8 function hidl2aidl-all-interfaces-main() { 26 hidl2aidl-all-interfaces-main
|
D | hal-queries.sh | 37 function all-interfaces() { 77 comm -3 <(all-interfaces "$package_root" "$package") <(current-interfaces "$package_root") 102 all-interfaces "$ANDROID_BUILD_TOP/$path" "$root"
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | seapp_contexts | 76 # levelFrom (string; one of none, all, app, or user) 88 # levelFrom=all determines the level from both UID and user ID. 91 # levelFrom=app or levelFrom=all is only supported for _app UIDs. 102 # regular expressions exists on all input and output selectors. Neverallow 103 # rules are never output to the built seapp_contexts file. Like all keywords, 104 # neverallows are case-insensitive. A neverallow is asserted when all key value 143 …r=_app seinfo=platform name=com.android.traceur domain=traceur_app type=app_data_file levelFrom=all 146 user=network_stack seinfo=network_stack domain=network_stack levelFrom=all type=radio_data_file 148 user=secure_element seinfo=platform domain=secure_element levelFrom=all 153 user=_isolated domain=isolated_app levelFrom=all [all …]
|
D | binderservicedomain.te | 1 # Rules common to all binder service domains 17 # allow all services to run permission checks
|
/system/libhidl/vintfdata/ |
D | freeze.sh | 22 local modules_to_build=check-vintf-all 24 …"${ANDROID_BUILD_TOP}/build/soong/soong_ui.bash" --build-mode --all-modules --dir="$(pwd)" ${modul…
|
/system/chre/external/ |
D | external.mk | 22 GOOGLE_X86_GOOGLETEST_SRCS += $(GOOGLETEST_PATH)/src/gtest-all.cc 27 GOOGLE_X86_GOOGLETEST_SRCS += $(GOOGLEMOCK_PATH)/src/gmock-all.cc
|
/system/sepolicy/prebuilts/api/28.0/private/ |
D | seapp_contexts | 50 # levelFrom (string; one of none, all, app, or user) 55 # levelFrom=app or levelFrom=all is only supported for _app UIDs. 62 # regular expressions exists on all input and output selectors. Neverallow 63 # rules are never output to the built seapp_contexts file. Like all keywords, 64 # neverallows are case-insensitive. A neverallow is asserted when all key value 102 …r=_app seinfo=platform name=com.android.traceur domain=traceur_app type=app_data_file levelFrom=all 106 user=secure_element seinfo=platform domain=secure_element levelFrom=all 111 user=_isolated domain=isolated_app levelFrom=all 114 user=_app isV2App=true isEphemeralApp=true domain=ephemeral_app type=app_data_file levelFrom=all 116 user=_app minTargetSdkVersion=28 domain=untrusted_app type=app_data_file levelFrom=all
|
D | binderservicedomain.te | 1 # Rules common to all binder service domains 17 # allow all services to run permission checks
|
/system/extras/tests/timetest/ |
D | Android.bp | 6 // all of the 'license_kinds' from "system_extras_tests_license" 15 "-fstack-protector-all",
|
/system/bt/vendor_libs/test_vendor_lib/types/ |
D | Android.bp | 5 // all of the 'license_kinds' from "system_bt_license" 23 …/* we export all classes, so change default visibility, instead of having EXPORT_SYMBOL on each cl…
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | binderservicedomain.te | 1 # Rules common to all binder service domains 17 # allow all services to run permission checks
|
/system/sepolicy/prebuilts/api/27.0/private/ |
D | binderservicedomain.te | 1 # Rules common to all binder service domains 17 # allow all services to run permission checks
|
/system/tools/aidl/metadata/ |
D | Android.bp | 1 // build time C++ available list of all AIDL interfaces in the tree 5 // all of the 'license_kinds' from "system_tools_aidl_license"
|
/system/memory/libmemunreachable/ |
D | README.md | 6 …detector. It uses an imprecise mark-and-sweep garbage collector pass over all native memory, repo… 63 …6. *Original process*: Allocations are re-enabled using `malloc_enable()`, but all threads are sti… 64 …ormal `fork()`. The sweeper process has a copy of all memory from the original process, including… 65 8. Collection process releases all threads from `ptrace` and exits 67 …10. *Sweeper process*: A list of all active allocations is produced by examining the memory mappin… 68 …11. A list of all roots is produced from globals (.data and .bss sections of binaries), and regist… 90 - `malloc enable()`: re-enable allocations in all threads.
|
/system/extras/ |
D | Android.mk | 17 include $(all-subdir-makefiles)
|
12345678910>>...35