Searched refs:tee (Results 1 – 25 of 48) sorted by relevance
12
/system/sepolicy/vendor/ |
D | tee.te | 2 # trusted execution environment (tee) daemon 5 init_daemon_domain(tee) 7 allow tee self:global_capability_class_set { dac_override }; 8 allow tee tee_device:chr_file rw_file_perms; 9 allow tee tee_data_file:dir create_dir_perms; 10 allow tee tee_data_file:file create_file_perms; 11 allow tee self:netlink_socket create_socket_perms_no_ioctl; 12 allow tee self:netlink_generic_socket create_socket_perms_no_ioctl; 13 allow tee ion_device:chr_file r_file_perms; 14 r_dir_file(tee, sysfs_type) [all …]
|
/system/sepolicy/prebuilts/api/34.0/public/ |
D | tee.te | 2 # trusted execution environment (tee) daemon 4 type tee, domain; 9 allow tee fingerprint_vendor_data_file:dir rw_dir_perms; 10 allow tee fingerprint_vendor_data_file:file create_file_perms;
|
/system/sepolicy/prebuilts/api/30.0/public/ |
D | tee.te | 2 # trusted execution environment (tee) daemon 4 type tee, domain; 9 allow tee fingerprint_vendor_data_file:dir rw_dir_perms; 10 allow tee fingerprint_vendor_data_file:file create_file_perms;
|
/system/sepolicy/prebuilts/api/31.0/public/ |
D | tee.te | 2 # trusted execution environment (tee) daemon 4 type tee, domain; 9 allow tee fingerprint_vendor_data_file:dir rw_dir_perms; 10 allow tee fingerprint_vendor_data_file:file create_file_perms;
|
/system/sepolicy/prebuilts/api/32.0/public/ |
D | tee.te | 2 # trusted execution environment (tee) daemon 4 type tee, domain; 9 allow tee fingerprint_vendor_data_file:dir rw_dir_perms; 10 allow tee fingerprint_vendor_data_file:file create_file_perms;
|
/system/sepolicy/prebuilts/api/33.0/public/ |
D | tee.te | 2 # trusted execution environment (tee) daemon 4 type tee, domain; 9 allow tee fingerprint_vendor_data_file:dir rw_dir_perms; 10 allow tee fingerprint_vendor_data_file:file create_file_perms;
|
/system/sepolicy/public/ |
D | tee.te | 2 # trusted execution environment (tee) daemon 4 type tee, domain; 9 allow tee fingerprint_vendor_data_file:dir rw_dir_perms; 10 allow tee fingerprint_vendor_data_file:file create_file_perms;
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | tee.te | 2 # trusted execution environment (tee) daemon 4 type tee, domain; 9 allow tee fingerprint_vendor_data_file:dir rw_dir_perms; 10 allow tee fingerprint_vendor_data_file:file create_file_perms;
|
/system/update_engine/sample_images/ |
D | generate_images.sh | 90 echo "foo" | sudo tee "${mntdir}"/dir1/dir2/file >/dev/null 91 echo "bar" | sudo tee "${mntdir}"/dir1/file >/dev/null 112 sudo tee "${mntdir}"/etc/update_engine.conf >/dev/null <<EOF 116 sudo tee "${mntdir}"/etc/lsb-release >/dev/null <<EOF 142 sudo tee "${mntdir}"/bin/postinst_example >/dev/null <<EOF 152 sudo tee "${mntdir}"/bin/postinst_fail3 >/dev/null <<EOF 157 sudo tee "${mntdir}"/bin/postinst_fail1 >/dev/null <<EOF 163 sudo tee "${mntdir}"/bin/postinst_suspend >/dev/null <<EOF 179 sudo tee "${mntdir}"/bin/postinst_progress >/dev/null <<EOF 190 sudo tee "${mntdir}"/bin/self_check_default_context >/dev/null <<EOF [all …]
|
/system/libufdt/utils/tests/ |
D | mkdtimg_acpi_testdata.sh | 48 mkdtimg dump "$IMG" -b "$OUTDTB_CFG" | grep -v 'FDT' | tee "${OUTDIR}/cfg_create_acpi.dump" 56 mkdtimg dump "$IMG" -b "$OUTDTB" | grep -v 'FDT' | tee "${OUTDIR}/create_acpi.dump"
|
D | mkdtimg_testdata.sh | 46 mkdtimg dump "$IMG" -b "$OUTDTB_CFG" | tee "${OUTDIR}/cfg_create.dump" 58 mkdtimg dump "$IMG" -b "$OUTDTB" | tee "${OUTDIR}/create.dump"
|
/system/extras/tools/ |
D | graph_lockdep_chains | 269 tee /tmp/${progname}.split | 280 tee /tmp/${progname}.input |
|
/system/security/keystore2/src/ |
D | boot_level_keys.rs | 93 let tee = KeyMintDevice::get(SecurityLevel::TRUSTED_ENVIRONMENT) in get_level_zero_key_km_and_strategy() localVariable 95 if tee.version() >= KeyMintDevice::KEY_MASTER_V4_1 { in get_level_zero_key_km_and_strategy() 96 Ok((tee, DenyLaterStrategy::EarlyBootOnly)) in get_level_zero_key_km_and_strategy() 104 _ => Ok((tee, DenyLaterStrategy::MaxUsesPerBoot)), in get_level_zero_key_km_and_strategy()
|
D | shared_secret_negotiation.rs | 311 let tee = match get_keymint_device(&SecurityLevel::TRUSTED_ENVIRONMENT) { in transfer_root_of_trust() localVariable 318 let root_of_trust = match tee.getRootOfTrust(&challenge) { in transfer_root_of_trust()
|
/system/core/bootstat/ |
D | boot_reason_test.sh | 812 echo 'healthd: battery l=2 ' | adb_su tee /dev/kmsg >/dev/null 826 echo 'healthd: battery l=2 ' | adb_su tee /dev/kmsg >/dev/null 912 echo c | adb_su tee /proc/sysrq-trigger >/dev/null 939 echo "SysRq : Trigger a crash : 'test'" | adb_su tee /dev/kmsg 940 echo c | adb_su tee /proc/sysrq-trigger >/dev/null 970 adb_su tee /dev/kmsg
|
/system/core/shell_and_utilities/ |
D | README.md | 68 tac tail tar taskset tee test time timeout top touch tr traceroute 102 tac tail tar taskset tee test time timeout top touch tr traceroute 136 tac tail tar taskset tee **test** time timeout top touch tr traceroute 170 tee time timeout top touch tr traceroute traceroute6 true truncate 202 tac tail tar taskset tee time timeout top touch tr **traceroute** **traceroute6** 230 tail tar taskset tee time timeout top touch tr true truncate tty ulimit 255 sysctl tac tail tar taskset tee time timeout **top** touch tr true truncate 277 split stat strings swapoff swapon sync sysctl tac tail tar taskset tee 298 split stat strings swapoff swapon sync sysctl tac tail tar taskset tee
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | domain.te | 267 tee 313 -tee
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | domain.te | 307 tee 356 -tee
|
/system/apex/apexd/ |
D | Android.bp | 377 "| cut -c 3-| tee $(out)" 388 "| cut -c 3-| tee $(out)" 399 "| cut -c 3-| tee $(out)"
|
/system/sepolicy/prebuilts/api/31.0/private/ |
D | domain.te | 334 tee 391 -tee
|
/system/sepolicy/prebuilts/api/32.0/private/ |
D | domain.te | 334 tee 391 -tee
|
/system/sepolicy/prebuilts/api/33.0/private/ |
D | domain.te | 385 tee 442 -tee
|
/system/sepolicy/prebuilts/api/34.0/private/ |
D | domain.te | 462 tee 517 -tee
|
/system/sepolicy/private/ |
D | domain.te | 462 tee 517 -tee
|
/system/apex/shim/build/ |
D | Android.bp | 66 cmd: "sha512sum -b /dev/null | cut -d' ' -f1 | tee $(out)", 279 cmd: "sha512sum -b $(in) | cut -d' ' -f1 | tee $(out)",
|
12