/system/sepolicy/ |
D | attributes | 6 # On change, update CHECK_FC_ASSERT_ATTRS 24 # On change, update CHECK_FC_ASSERT_ATTRS 33 # On change, update CHECK_FC_ASSERT_ATTRS 62 # On change, update CHECK_PC_ASSERT_ATTRS 83 # On change, update CHECK_SC_ASSERT_ATTRS 112 # update_engine related domains that need to apply an update and run
|
D | postinstall.te | 1 # Domain where the postinstall program runs during the update. 37 # update.
|
D | update_engine_common.te | 2 # background daemon and the recovery tool to sideload an update. 12 # the update to an older version (channel change) or incompatible version
|
D | otapreopt_chroot.te | 17 # Allow otapreopt to use file descriptors from update-engine. It will
|
D | netd.te | 38 # Needed to update /data/misc/wifi/hostapd.conf 45 # Needed to update /data/misc/net/rt_tables
|
D | recovery.te | 10 # Allow recovery to perform an update as update_engine would do. 40 # support to OTAs. However, that code has a bug. When an update occurs,
|
/system/core/include/mincrypt/ |
D | hash-internal.h | 40 void (* const update)(struct HASH_CTX*, const void*, int); member 54 #define HASH_update(ctx, data, len) (ctx)->f->update(ctx, data, len)
|
/system/core/libutils/ |
D | CallStack.cpp | 34 this->update(ignoreDepth+1); in CallStack() 41 void CallStack::update(int32_t ignoreDepth, pid_t tid) { in update() function in android::CallStack
|
D | ProcessCallStack.cpp | 132 void ProcessCallStack::update() { in update() function in android::ProcessCallStack 189 threadInfo.callStack.update(ignoreDepth, tid); in update()
|
/system/update_engine/update_manager/ |
D | update_manager.conf.example | 1 # Configuration file for the update-manager component of update_engine. 13 # command "restart update-engine" from a root shell to make your
|
/system/weaved/libweaved/ |
D | README.md | 6 register weave command handlers and update the device state they are 13 create their component, register command handlers and update the state. 17 the client can re-register command handlers, update the state again.
|
/system/vold/ |
D | Keymaster.cpp | 38 virtual keymaster_error_t update(keymaster_operation_handle_t operation_handle, 71 keymaster_error_t update(keymaster_operation_handle_t operation_handle, in update() function in android::vold::KeymasterDevice 76 return mDevice->update(mDevice, operation_handle, in_params, input, input_consumed, in update() 127 mDevice->update(mOpHandle, nullptr, &inputBlob, &inputConsumed, nullptr, &outputBlob); in updateCompletely()
|
/system/sepolicy/tools/ |
D | post_process_mac_perms | 56 app_certs.update(certs) 70 all_app_certs.update(app_certs)
|
/system/core/mkbootimg/ |
D | mkbootimg | 36 sha.update(f.read()) 38 sha.update(pack('I', filesize(f))) 40 sha.update(pack('I', 0))
|
/system/core/include/utils/ |
D | CallStack.h | 47 void update(int32_t ignoreDepth=1, pid_t tid=BACKTRACE_CURRENT_THREAD);
|
D | ProcessCallStack.h | 42 void update();
|
/system/core/healthd/include/healthd/ |
D | BatteryMonitor.h | 42 bool update(void);
|
/system/update_engine/ |
D | update_metadata.proto | 17 // Update file format: A delta update file contains all the deltas needed 18 // to update a system from one specific version to another specific 19 // version. The update format is represented by this struct pseudocode: 101 // an update's signature by hashing the entire download. The section of the 106 // only know how to handle one type of signature, but an update may contain 202 // Describes the update to apply to a single partition. 209 // must be run to finalize the update process. See also |postinstall_path| and 263 // update. For major version = 2 see the |partitions| field.
|
D | Android.mk | 526 true, no update sideload support.) 991 LOCAL_MODULE := brillo-update-payload-key 994 LOCAL_MODULE_STEM := update-payload-key.pub.pem 995 LOCAL_SRC_FILES := update_payload_key/brillo-update-payload-key.pub.pem 996 LOCAL_BUILT_MODULE_STEM := update_payload_key/brillo-update-payload-key.pub.pem
|
/system/keymaster/include/keymaster/ |
D | soft_keymaster_device.h | 166 static keymaster_error_t update(const keymaster1_device_t* dev, // 223 static keymaster_error_t update(const keymaster2_device_t* dev, //
|
/system/bt/osi/src/socket_utils/ |
D | README | 36 Please update the above list if adding more sources.
|
/system/keymaster/ |
D | android_keymaster_test_utils.cpp | 266 keymaster_error_t error = device()->update(device(), op_handle_, nullptr /* params */, &input, in UpdateOperation() 282 keymaster_error_t error = device()->update(device(), op_handle_, &additional_params, &input, in UpdateOperation() 703 device_.update = update; in Sha256OnlyWrapper() 865 static keymaster_error_t update(const keymaster1_device_t* dev, in update() function in keymaster::test::Sha256OnlyWrapper 871 return unwrap(dev)->update(unwrap(dev), operation_handle, in_params, input, input_consumed, in update()
|
D | soft_keymaster_device.cpp | 265 km1_device_.update = update; in initialize_device_struct() 290 km2_device_.update = update; in initialize_device_struct() 1252 keymaster_error_t SoftKeymasterDevice::update(const keymaster1_device_t* dev, in update() function in keymaster::SoftKeymasterDevice 1269 return km1_dev->update(km1_dev, operation_handle, in_params, input, input_consumed, in update() 1316 keymaster_error_t SoftKeymasterDevice::update(const keymaster2_device_t* dev, in update() function in keymaster::SoftKeymasterDevice 1329 return update(&sk_dev->km1_device_, operation_handle, in_params, input, input_consumed, in update()
|
/system/extras/verity/ |
D | VerityVerifier.java | 312 digest.update(salt); in checkBlock() 313 digest.update(data); in checkBlock()
|
D | Utils.java | 269 verifier.update(input); in verify() 277 signer.update(input); in sign()
|