Home
last modified time | relevance | path

Searched refs:tee (Results 1 – 25 of 48) sorted by relevance

12

/system/sepolicy/vendor/
Dtee.te2 # trusted execution environment (tee) daemon
5 init_daemon_domain(tee)
7 allow tee self:global_capability_class_set { dac_override };
8 allow tee tee_device:chr_file rw_file_perms;
9 allow tee tee_data_file:dir create_dir_perms;
10 allow tee tee_data_file:file create_file_perms;
11 allow tee self:netlink_socket create_socket_perms_no_ioctl;
12 allow tee self:netlink_generic_socket create_socket_perms_no_ioctl;
13 allow tee ion_device:chr_file r_file_perms;
14 r_dir_file(tee, sysfs_type)
[all …]
/system/sepolicy/prebuilts/api/34.0/public/
Dtee.te2 # trusted execution environment (tee) daemon
4 type tee, domain;
9 allow tee fingerprint_vendor_data_file:dir rw_dir_perms;
10 allow tee fingerprint_vendor_data_file:file create_file_perms;
/system/sepolicy/prebuilts/api/30.0/public/
Dtee.te2 # trusted execution environment (tee) daemon
4 type tee, domain;
9 allow tee fingerprint_vendor_data_file:dir rw_dir_perms;
10 allow tee fingerprint_vendor_data_file:file create_file_perms;
/system/sepolicy/prebuilts/api/31.0/public/
Dtee.te2 # trusted execution environment (tee) daemon
4 type tee, domain;
9 allow tee fingerprint_vendor_data_file:dir rw_dir_perms;
10 allow tee fingerprint_vendor_data_file:file create_file_perms;
/system/sepolicy/prebuilts/api/32.0/public/
Dtee.te2 # trusted execution environment (tee) daemon
4 type tee, domain;
9 allow tee fingerprint_vendor_data_file:dir rw_dir_perms;
10 allow tee fingerprint_vendor_data_file:file create_file_perms;
/system/sepolicy/prebuilts/api/33.0/public/
Dtee.te2 # trusted execution environment (tee) daemon
4 type tee, domain;
9 allow tee fingerprint_vendor_data_file:dir rw_dir_perms;
10 allow tee fingerprint_vendor_data_file:file create_file_perms;
/system/sepolicy/public/
Dtee.te2 # trusted execution environment (tee) daemon
4 type tee, domain;
9 allow tee fingerprint_vendor_data_file:dir rw_dir_perms;
10 allow tee fingerprint_vendor_data_file:file create_file_perms;
/system/sepolicy/prebuilts/api/29.0/public/
Dtee.te2 # trusted execution environment (tee) daemon
4 type tee, domain;
9 allow tee fingerprint_vendor_data_file:dir rw_dir_perms;
10 allow tee fingerprint_vendor_data_file:file create_file_perms;
/system/update_engine/sample_images/
Dgenerate_images.sh90 echo "foo" | sudo tee "${mntdir}"/dir1/dir2/file >/dev/null
91 echo "bar" | sudo tee "${mntdir}"/dir1/file >/dev/null
112 sudo tee "${mntdir}"/etc/update_engine.conf >/dev/null <<EOF
116 sudo tee "${mntdir}"/etc/lsb-release >/dev/null <<EOF
142 sudo tee "${mntdir}"/bin/postinst_example >/dev/null <<EOF
152 sudo tee "${mntdir}"/bin/postinst_fail3 >/dev/null <<EOF
157 sudo tee "${mntdir}"/bin/postinst_fail1 >/dev/null <<EOF
163 sudo tee "${mntdir}"/bin/postinst_suspend >/dev/null <<EOF
179 sudo tee "${mntdir}"/bin/postinst_progress >/dev/null <<EOF
190 sudo tee "${mntdir}"/bin/self_check_default_context >/dev/null <<EOF
[all …]
/system/libufdt/utils/tests/
Dmkdtimg_acpi_testdata.sh48 mkdtimg dump "$IMG" -b "$OUTDTB_CFG" | grep -v 'FDT' | tee "${OUTDIR}/cfg_create_acpi.dump"
56 mkdtimg dump "$IMG" -b "$OUTDTB" | grep -v 'FDT' | tee "${OUTDIR}/create_acpi.dump"
Dmkdtimg_testdata.sh46 mkdtimg dump "$IMG" -b "$OUTDTB_CFG" | tee "${OUTDIR}/cfg_create.dump"
58 mkdtimg dump "$IMG" -b "$OUTDTB" | tee "${OUTDIR}/create.dump"
/system/extras/tools/
Dgraph_lockdep_chains269 tee /tmp/${progname}.split |
280 tee /tmp/${progname}.input |
/system/security/keystore2/src/
Dboot_level_keys.rs93 let tee = KeyMintDevice::get(SecurityLevel::TRUSTED_ENVIRONMENT) in get_level_zero_key_km_and_strategy() localVariable
95 if tee.version() >= KeyMintDevice::KEY_MASTER_V4_1 { in get_level_zero_key_km_and_strategy()
96 Ok((tee, DenyLaterStrategy::EarlyBootOnly)) in get_level_zero_key_km_and_strategy()
104 _ => Ok((tee, DenyLaterStrategy::MaxUsesPerBoot)), in get_level_zero_key_km_and_strategy()
Dshared_secret_negotiation.rs311 let tee = match get_keymint_device(&SecurityLevel::TRUSTED_ENVIRONMENT) { in transfer_root_of_trust() localVariable
318 let root_of_trust = match tee.getRootOfTrust(&challenge) { in transfer_root_of_trust()
/system/core/bootstat/
Dboot_reason_test.sh812 echo 'healthd: battery l=2 ' | adb_su tee /dev/kmsg >/dev/null
826 echo 'healthd: battery l=2 ' | adb_su tee /dev/kmsg >/dev/null
912 echo c | adb_su tee /proc/sysrq-trigger >/dev/null
939 echo "SysRq : Trigger a crash : 'test'" | adb_su tee /dev/kmsg
940 echo c | adb_su tee /proc/sysrq-trigger >/dev/null
970 adb_su tee /dev/kmsg
/system/core/shell_and_utilities/
DREADME.md68 tac tail tar taskset tee test time timeout top touch tr traceroute
102 tac tail tar taskset tee test time timeout top touch tr traceroute
136 tac tail tar taskset tee **test** time timeout top touch tr traceroute
170 tee time timeout top touch tr traceroute traceroute6 true truncate
202 tac tail tar taskset tee time timeout top touch tr **traceroute** **traceroute6**
230 tail tar taskset tee time timeout top touch tr true truncate tty ulimit
255 sysctl tac tail tar taskset tee time timeout **top** touch tr true truncate
277 split stat strings swapoff swapon sync sysctl tac tail tar taskset tee
298 split stat strings swapoff swapon sync sysctl tac tail tar taskset tee
/system/sepolicy/prebuilts/api/29.0/private/
Ddomain.te267 tee
313 -tee
/system/sepolicy/prebuilts/api/30.0/private/
Ddomain.te307 tee
356 -tee
/system/apex/apexd/
DAndroid.bp377 "| cut -c 3-| tee $(out)"
388 "| cut -c 3-| tee $(out)"
399 "| cut -c 3-| tee $(out)"
/system/sepolicy/prebuilts/api/31.0/private/
Ddomain.te334 tee
391 -tee
/system/sepolicy/prebuilts/api/32.0/private/
Ddomain.te334 tee
391 -tee
/system/sepolicy/prebuilts/api/33.0/private/
Ddomain.te385 tee
442 -tee
/system/sepolicy/prebuilts/api/34.0/private/
Ddomain.te462 tee
517 -tee
/system/sepolicy/private/
Ddomain.te462 tee
517 -tee
/system/apex/shim/build/
DAndroid.bp66 cmd: "sha512sum -b /dev/null | cut -d' ' -f1 | tee $(out)",
279 cmd: "sha512sum -b $(in) | cut -d' ' -f1 | tee $(out)",

12