Home
last modified time | relevance | path

Searched refs:all (Results 1 – 25 of 870) sorted by relevance

12345678910>>...35

/system/bt/gd/packet/
Dpacket_view_unittest.cc311 auto all = this->packet->begin(); in TYPED_TEST() local
312 size_t remaining = all.NumBytesRemaining(); in TYPED_TEST()
314 ASSERT_EQ(remaining, all.NumBytesRemaining()); in TYPED_TEST()
315 all.operator++(); in TYPED_TEST()
318 ASSERT_EQ(static_cast<size_t>(0), all.NumBytesRemaining()); in TYPED_TEST()
319 all.operator++(); in TYPED_TEST()
320 ASSERT_DEATH(all.operator*(), ""); in TYPED_TEST()
321 all.operator++(); in TYPED_TEST()
322 ASSERT_EQ(static_cast<size_t>(0), all.NumBytesRemaining()); in TYPED_TEST()
323 all.operator++(); in TYPED_TEST()
[all …]
/system/linkerconfig/testdata/
Dprepare_root.sh20 all=
34 --all)
35 all=yes
57 if [ ! -z $bootstrap ] && [ ! -z $all ]; then
64 elif [ ! -z $all ]; then
/system/chre/build/
Dcommon.mk21 .PHONY: all
22 all:
28 MAKECMDGOALS = all
/system/bt/gd/security/cert/
Dsecurity_test.py375 has192C = not all([i == 0 for i in oob_data[0]])
376 has192R = not all([i == 0 for i in oob_data[1]])
377 has256C = not all([i == 0 for i in oob_data[2]])
378 has256R = not all([i == 0 for i in oob_data[3]])
387 has192C = not all([i == 0 for i in oob_data[0]])
388 has192R = not all([i == 0 for i in oob_data[1]])
389 has256C = not all([i == 0 for i in oob_data[2]])
390 has256R = not all([i == 0 for i in oob_data[3]])
399 has192C = not all([i == 0 for i in oob_data[0]])
400 has192R = not all([i == 0 for i in oob_data[1]])
[all …]
/system/sepolicy/prebuilts/api/31.0/private/
Dseapp_contexts76 # levelFrom (string; one of none, all, app, or user)
89 # levelFrom=all determines the level from both UID and user ID.
92 # levelFrom=app or levelFrom=all is only supported for _app UIDs.
103 # regular expressions exists on all input and output selectors. Neverallow
104 # rules are never output to the built seapp_contexts file. Like all keywords,
105 # neverallows are case-insensitive. A neverallow is asserted when all key value
145 …er=_app isPrivApp=true name=com.android.traceur domain=traceur_app type=app_data_file levelFrom=all
146 …App=true name=com.android.remoteprovisioner domain=remote_prov_app type=app_data_file levelFrom=all
151 user=secure_element seinfo=platform domain=secure_element levelFrom=all
153 user=shared_relro domain=shared_relro levelFrom=all
[all …]
Dbinderservicedomain.te1 # Rules common to all binder service domains
17 # allow all services to run permission checks
/system/sepolicy/private/
Dseapp_contexts76 # levelFrom (string; one of none, all, app, or user)
89 # levelFrom=all determines the level from both UID and user ID.
92 # levelFrom=app or levelFrom=all is only supported for _app UIDs.
103 # regular expressions exists on all input and output selectors. Neverallow
104 # rules are never output to the built seapp_contexts file. Like all keywords,
105 # neverallows are case-insensitive. A neverallow is asserted when all key value
145 …er=_app isPrivApp=true name=com.android.traceur domain=traceur_app type=app_data_file levelFrom=all
146 …App=true name=com.android.remoteprovisioner domain=remote_prov_app type=app_data_file levelFrom=all
151 user=secure_element seinfo=platform domain=secure_element levelFrom=all
153 user=shared_relro domain=shared_relro levelFrom=all
[all …]
Dbinderservicedomain.te1 # Rules common to all binder service domains
17 # allow all services to run permission checks
/system/sepolicy/prebuilts/api/30.0/private/
Dseapp_contexts76 # levelFrom (string; one of none, all, app, or user)
88 # levelFrom=all determines the level from both UID and user ID.
91 # levelFrom=app or levelFrom=all is only supported for _app UIDs.
102 # regular expressions exists on all input and output selectors. Neverallow
103 # rules are never output to the built seapp_contexts file. Like all keywords,
104 # neverallows are case-insensitive. A neverallow is asserted when all key value
144 …r=_app seinfo=platform name=com.android.traceur domain=traceur_app type=app_data_file levelFrom=all
147 user=network_stack seinfo=network_stack domain=network_stack levelFrom=all type=radio_data_file
149 user=secure_element seinfo=platform domain=secure_element levelFrom=all
158 user=_app isEphemeralApp=true domain=ephemeral_app type=app_data_file levelFrom=all
[all …]
Dbinderservicedomain.te1 # Rules common to all binder service domains
17 # allow all services to run permission checks
/system/tools/hidl/scripts/
Dhidl2aidl-all-interfaces.sh8 function hidl2aidl-all-interfaces-main() {
26 hidl2aidl-all-interfaces-main
Dhal-queries.sh37 function all-interfaces() {
77 comm -3 <(all-interfaces "$package_root" "$package") <(current-interfaces "$package_root")
102 all-interfaces "$ANDROID_BUILD_TOP/$path" "$root"
/system/sepolicy/prebuilts/api/29.0/private/
Dseapp_contexts76 # levelFrom (string; one of none, all, app, or user)
88 # levelFrom=all determines the level from both UID and user ID.
91 # levelFrom=app or levelFrom=all is only supported for _app UIDs.
102 # regular expressions exists on all input and output selectors. Neverallow
103 # rules are never output to the built seapp_contexts file. Like all keywords,
104 # neverallows are case-insensitive. A neverallow is asserted when all key value
143 …r=_app seinfo=platform name=com.android.traceur domain=traceur_app type=app_data_file levelFrom=all
146 user=network_stack seinfo=network_stack domain=network_stack levelFrom=all type=radio_data_file
148 user=secure_element seinfo=platform domain=secure_element levelFrom=all
153 user=_isolated domain=isolated_app levelFrom=all
[all …]
Dbinderservicedomain.te1 # Rules common to all binder service domains
17 # allow all services to run permission checks
/system/libhidl/vintfdata/
Dfreeze.sh22 local modules_to_build=check-vintf-all
24 …"${ANDROID_BUILD_TOP}/build/soong/soong_ui.bash" --build-mode --all-modules --dir="$(pwd)" ${modul…
/system/chre/external/
Dexternal.mk22 GOOGLE_X86_GOOGLETEST_SRCS += $(GOOGLETEST_PATH)/src/gtest-all.cc
27 GOOGLE_X86_GOOGLETEST_SRCS += $(GOOGLEMOCK_PATH)/src/gmock-all.cc
/system/sepolicy/prebuilts/api/28.0/private/
Dseapp_contexts50 # levelFrom (string; one of none, all, app, or user)
55 # levelFrom=app or levelFrom=all is only supported for _app UIDs.
62 # regular expressions exists on all input and output selectors. Neverallow
63 # rules are never output to the built seapp_contexts file. Like all keywords,
64 # neverallows are case-insensitive. A neverallow is asserted when all key value
102 …r=_app seinfo=platform name=com.android.traceur domain=traceur_app type=app_data_file levelFrom=all
106 user=secure_element seinfo=platform domain=secure_element levelFrom=all
111 user=_isolated domain=isolated_app levelFrom=all
114 user=_app isV2App=true isEphemeralApp=true domain=ephemeral_app type=app_data_file levelFrom=all
116 user=_app minTargetSdkVersion=28 domain=untrusted_app type=app_data_file levelFrom=all
Dbinderservicedomain.te1 # Rules common to all binder service domains
17 # allow all services to run permission checks
/system/extras/tests/timetest/
DAndroid.bp6 // all of the 'license_kinds' from "system_extras_tests_license"
15 "-fstack-protector-all",
/system/bt/vendor_libs/test_vendor_lib/types/
DAndroid.bp5 // all of the 'license_kinds' from "system_bt_license"
23 …/* we export all classes, so change default visibility, instead of having EXPORT_SYMBOL on each cl…
/system/sepolicy/prebuilts/api/26.0/private/
Dbinderservicedomain.te1 # Rules common to all binder service domains
17 # allow all services to run permission checks
/system/sepolicy/prebuilts/api/27.0/private/
Dbinderservicedomain.te1 # Rules common to all binder service domains
17 # allow all services to run permission checks
/system/tools/aidl/metadata/
DAndroid.bp1 // build time C++ available list of all AIDL interfaces in the tree
5 // all of the 'license_kinds' from "system_tools_aidl_license"
/system/memory/libmemunreachable/
DREADME.md6 …detector. It uses an imprecise mark-and-sweep garbage collector pass over all native memory, repo…
63 …6. *Original process*: Allocations are re-enabled using `malloc_enable()`, but all threads are sti…
64 …ormal `fork()`. The sweeper process has a copy of all memory from the original process, including…
65 8. Collection process releases all threads from `ptrace` and exits
67 …10. *Sweeper process*: A list of all active allocations is produced by examining the memory mappin…
68 …11. A list of all roots is produced from globals (.data and .bss sections of binaries), and regist…
90 - `malloc enable()`: re-enable allocations in all threads.
/system/extras/
DAndroid.mk17 include $(all-subdir-makefiles)

12345678910>>...35