/system/sepolicy/mac_permissions/ |
D | Android.bp | 27 name: "keys.conf", 28 srcs: ["keys.conf"], 39 ":keys.conf{.plat_private}", 40 ":keys.conf{.system_ext_private}", 41 ":keys.conf{.product_private}", 49 ":keys.conf{.system_ext_private}", 50 ":keys.conf{.reqd_mask}", 62 ":keys.conf{.product_private}", 63 ":keys.conf{.reqd_mask}", 75 ":keys.conf{.plat_vendor_for_vendor}", [all …]
|
/system/sepolicy/ |
D | treble_sepolicy_tests_for_release.mk | 50 $(version)_plat_policy.conf := $(intermediates)/$(version)_plat_policy.conf 51 $($(version)_plat_policy.conf): PRIVATE_MLS_SENS := $(MLS_SENS) 52 $($(version)_plat_policy.conf): PRIVATE_MLS_CATS := $(MLS_CATS) 53 $($(version)_plat_policy.conf): PRIVATE_TARGET_BUILD_VARIANT := user 54 $($(version)_plat_policy.conf): PRIVATE_TGT_ARCH := $(my_target_arch) 55 $($(version)_plat_policy.conf): PRIVATE_TGT_WITH_ASAN := $(with_asan) 56 $($(version)_plat_policy.conf): PRIVATE_TGT_WITH_NATIVE_COVERAGE := $(with_native_coverage) 57 $($(version)_plat_policy.conf): PRIVATE_ADDITIONAL_M4DEFS := $(LOCAL_ADDITIONAL_M4DEFS) 58 $($(version)_plat_policy.conf): PRIVATE_SEPOLICY_SPLIT := true 59 $($(version)_plat_policy.conf): PRIVATE_POLICY_FILES := $(policy_files) [all …]
|
D | Android.bp | 96 // reqd_policy_mask - a policy.conf file which contains only the bare minimum 99 // This bare-minimum policy needs to be present in all policy.conf files, but 105 name: "reqd_policy_mask.conf", 112 src: ":reqd_policy_mask.conf", 140 name: "pub_policy.conf", 150 src: ":pub_policy.conf", 157 name: "system_ext_pub_policy.conf", 166 src: ":system_ext_pub_policy.conf", 173 name: "plat_pub_policy.conf", 181 src: ":plat_pub_policy.conf", [all …]
|
D | definitions.mk | 3 define transform-policy-to-conf 22 .KATI_READONLY := transform-policy-to-conf
|
D | README.md | 31 …ewing `out/target/product/<device>/obj/ETC/vendor_sepolicy.conf_intermediates/vendor_sepolicy.conf` 59 * `keys.conf` 84 Details of the configuration file (`keys.conf`) can be found in the subsection 85 keys.conf. This tool is also responsible for stripping the comments and 88 ### keys.conf 89 The `keys.conf` file is used for controlling the mapping of "tags" found in 104 organization and may need to extract the pem file for the `insertkeys/keys.conf` tools. 111 After extracting the pem, you can rename it, and configure `keys.conf` and
|
/system/linkerconfig/contents/tests/configuration/include/ |
D | configurationtest.h | 75 inline void ValidateConfiguration(const Configuration& conf) { in ValidateConfiguration() argument 76 EXPECT_NE(0u, conf.sections.size()); in ValidateConfiguration() 77 for (auto& [_, section] : conf.sections) { in ValidateConfiguration() 84 Configuration conf; in VerifyConfiguration() local 85 ParseConfiguration(configuration_str, conf); in VerifyConfiguration() 86 ValidateConfiguration(conf); in VerifyConfiguration()
|
D | linkerconfigparser.h | 34 inline void ParseDirPath(const std::string& line, Configuration& conf) { in ParseDirPath() argument 43 if (!MapContainsKey(conf.sections, section_name)) { in ParseDirPath() 44 conf.sections[section_name].name = section_name; in ParseDirPath() 45 conf.sections[section_name].namespaces["default"].name = "default"; in ParseDirPath() 48 conf.sections[section_name].dirs.push_back(dir_path); in ParseDirPath() 208 Configuration& conf) { in ParseConfiguration() argument 229 ASSERT_TRUE(MapContainsKey(conf.sections, section_name)) << line; in ParseConfiguration() 230 current_section = &conf.sections[section_name]; in ParseConfiguration() 236 ParseDirPath(line, conf); in ParseConfiguration()
|
/system/extras/ext4_utils/ |
D | Android.bp | 72 "mke2fs.conf", 89 name: "mke2fs.conf", 91 src: "mke2fs.conf", 98 "mke2fs.conf",
|
/system/core/libcutils/ |
D | fs_config.cpp | 131 static const char* conf[][2] = { variable 258 if (asprintf(&name, "%.*s%s", (int)len, target_out_path, conf[which][dir]) != -1) { in fs_config_open() 264 fd = TEMP_FAILURE_RETRY(open(conf[which][dir], O_RDONLY | O_BINARY)); in fs_config_open() 335 for (which = 0; which < (sizeof(conf) / sizeof(conf[0])); ++which) { in fs_config() 346 ALOGE("%s len is corrupted", conf[which][dir]); in fs_config() 351 ALOGE("%s out of memory", conf[which][dir]); in fs_config() 356 ALOGE("%s prefix is truncated", conf[which][dir]); in fs_config() 362 ALOGE("%s is corrupted", conf[which][dir]); in fs_config()
|
/system/sepolicy/microdroid/ |
D | Android.bp | 109 name: "microdroid_reqd_policy_mask.conf", 117 src: ":microdroid_reqd_policy_mask.conf", 123 name: "microdroid_plat_sepolicy.conf", 132 src: ":microdroid_plat_sepolicy.conf", 137 name: "microdroid_plat_pub_policy.conf", 145 src: ":microdroid_plat_pub_policy.conf", 174 name: "microdroid_vendor_sepolicy.conf", 182 src: ":microdroid_vendor_sepolicy.conf", 287 name: "microdroid_general_sepolicy.conf",
|
/system/nfc/conf/ |
D | Android.bp | 25 name: "libnfc-nci.conf-default", 26 src: "libnfc-nci.conf", 27 filename: "libnfc-nci.conf",
|
/system/linkerconfig/modules/tests/ |
D | configuration_test.cc | 152 Configuration conf(std::move(sections), dir_to_sections); in TEST() local 155 conf.WriteConfig(writer); in TEST()
|
/system/apex/tools/ |
D | create_apex_skeleton.sh | 52 cat > csr.conf <<EOF 68 openssl req -x509 -config csr.conf -newkey rsa:4096 -nodes -days 999999 -keyout key.pem -out ${APEX… 69 rm csr.conf
|
/system/sepolicy/tools/sepolicy-analyze/ |
D | README | 78 [-w] [-d] [-f neverallows.conf] | [-n "neverallow string"] 81 from the neverallows.conf file or a given string, which contain neverallow 82 statements in the same format as the SELinux policy.conf file, i.e. after 84 policy.conf file as the neverallows.conf file and sepolicy-analyze will 102 a full policy.conf file and output them in a more easily parsed format.
|
/system/sepolicy/build/soong/ |
D | policy.go | 212 conf := android.PathForModuleOut(ctx, c.stem()).OutputPath 240 Text("> ").Output(conf) 243 return conf 342 func (c *policyCil) compileConfToCil(ctx android.ModuleContext, conf android.Path) android.OutputPa… 350 Input(conf) 406 conf := android.PathForModuleSrc(ctx, *c.properties.Src) 407 cil := c.compileConfToCil(ctx, conf)
|
/system/update_engine/sample_images/ |
D | generate_test_erofs_images.sh | 40 echo "PAYLOAD_MINOR_VERSION=1234" > ${fs_root}/etc/update_engine.conf
|
/system/sepolicy/public/ |
D | dhcp.te | 18 # For /proc/sys/net/ipv4/conf/*/promote_secondaries
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | dhcp.te | 17 # For /proc/sys/net/ipv4/conf/*/promote_secondaries
|
/system/sepolicy/prebuilts/api/32.0/public/ |
D | dhcp.te | 18 # For /proc/sys/net/ipv4/conf/*/promote_secondaries
|
/system/sepolicy/prebuilts/api/30.0/public/ |
D | dhcp.te | 17 # For /proc/sys/net/ipv4/conf/*/promote_secondaries
|
/system/sepolicy/prebuilts/api/33.0/public/ |
D | dhcp.te | 18 # For /proc/sys/net/ipv4/conf/*/promote_secondaries
|
/system/sepolicy/prebuilts/api/31.0/public/ |
D | dhcp.te | 18 # For /proc/sys/net/ipv4/conf/*/promote_secondaries
|
/system/sepolicy/prebuilts/api/34.0/public/ |
D | dhcp.te | 18 # For /proc/sys/net/ipv4/conf/*/promote_secondaries
|
/system/apex/apexer/ |
D | Android.bp | 57 out: ["mke2fs.conf"], 66 // TODO(b/157625953) mke2fs.conf can't embedded directly.
|
/system/linkerconfig/ |
D | main.cc | 156 Result<void> WriteConfigurationToFile(Configuration& conf, in WriteConfigurationToFile() argument 171 conf.WriteConfig(config_writer); in WriteConfigurationToFile()
|