Home
last modified time | relevance | path

Searched refs:update (Results 1 – 25 of 56) sorted by relevance

123

/system/sepolicy/
Dattributes6 # On change, update CHECK_FC_ASSERT_ATTRS
24 # On change, update CHECK_FC_ASSERT_ATTRS
33 # On change, update CHECK_FC_ASSERT_ATTRS
62 # On change, update CHECK_PC_ASSERT_ATTRS
83 # On change, update CHECK_SC_ASSERT_ATTRS
112 # update_engine related domains that need to apply an update and run
Dpostinstall.te1 # Domain where the postinstall program runs during the update.
37 # update.
Dupdate_engine_common.te2 # background daemon and the recovery tool to sideload an update.
12 # the update to an older version (channel change) or incompatible version
Dotapreopt_chroot.te17 # Allow otapreopt to use file descriptors from update-engine. It will
Dnetd.te38 # Needed to update /data/misc/wifi/hostapd.conf
45 # Needed to update /data/misc/net/rt_tables
Drecovery.te10 # Allow recovery to perform an update as update_engine would do.
40 # support to OTAs. However, that code has a bug. When an update occurs,
/system/core/include/mincrypt/
Dhash-internal.h40 void (* const update)(struct HASH_CTX*, const void*, int); member
54 #define HASH_update(ctx, data, len) (ctx)->f->update(ctx, data, len)
/system/core/libutils/
DCallStack.cpp34 this->update(ignoreDepth+1); in CallStack()
41 void CallStack::update(int32_t ignoreDepth, pid_t tid) { in update() function in android::CallStack
DProcessCallStack.cpp132 void ProcessCallStack::update() { in update() function in android::ProcessCallStack
189 threadInfo.callStack.update(ignoreDepth, tid); in update()
/system/update_engine/update_manager/
Dupdate_manager.conf.example1 # Configuration file for the update-manager component of update_engine.
13 # command "restart update-engine" from a root shell to make your
/system/weaved/libweaved/
DREADME.md6 register weave command handlers and update the device state they are
13 create their component, register command handlers and update the state.
17 the client can re-register command handlers, update the state again.
/system/vold/
DKeymaster.cpp38 virtual keymaster_error_t update(keymaster_operation_handle_t operation_handle,
71 keymaster_error_t update(keymaster_operation_handle_t operation_handle, in update() function in android::vold::KeymasterDevice
76 return mDevice->update(mDevice, operation_handle, in_params, input, input_consumed, in update()
127 mDevice->update(mOpHandle, nullptr, &inputBlob, &inputConsumed, nullptr, &outputBlob); in updateCompletely()
/system/sepolicy/tools/
Dpost_process_mac_perms56 app_certs.update(certs)
70 all_app_certs.update(app_certs)
/system/core/mkbootimg/
Dmkbootimg36 sha.update(f.read())
38 sha.update(pack('I', filesize(f)))
40 sha.update(pack('I', 0))
/system/core/include/utils/
DCallStack.h47 void update(int32_t ignoreDepth=1, pid_t tid=BACKTRACE_CURRENT_THREAD);
DProcessCallStack.h42 void update();
/system/core/healthd/include/healthd/
DBatteryMonitor.h42 bool update(void);
/system/update_engine/
Dupdate_metadata.proto17 // Update file format: A delta update file contains all the deltas needed
18 // to update a system from one specific version to another specific
19 // version. The update format is represented by this struct pseudocode:
101 // an update's signature by hashing the entire download. The section of the
106 // only know how to handle one type of signature, but an update may contain
202 // Describes the update to apply to a single partition.
209 // must be run to finalize the update process. See also |postinstall_path| and
263 // update. For major version = 2 see the |partitions| field.
DAndroid.mk526 true, no update sideload support.)
991 LOCAL_MODULE := brillo-update-payload-key
994 LOCAL_MODULE_STEM := update-payload-key.pub.pem
995 LOCAL_SRC_FILES := update_payload_key/brillo-update-payload-key.pub.pem
996 LOCAL_BUILT_MODULE_STEM := update_payload_key/brillo-update-payload-key.pub.pem
/system/keymaster/include/keymaster/
Dsoft_keymaster_device.h166 static keymaster_error_t update(const keymaster1_device_t* dev, //
223 static keymaster_error_t update(const keymaster2_device_t* dev, //
/system/bt/osi/src/socket_utils/
DREADME36 Please update the above list if adding more sources.
/system/keymaster/
Dandroid_keymaster_test_utils.cpp266 keymaster_error_t error = device()->update(device(), op_handle_, nullptr /* params */, &input, in UpdateOperation()
282 keymaster_error_t error = device()->update(device(), op_handle_, &additional_params, &input, in UpdateOperation()
703 device_.update = update; in Sha256OnlyWrapper()
865 static keymaster_error_t update(const keymaster1_device_t* dev, in update() function in keymaster::test::Sha256OnlyWrapper
871 return unwrap(dev)->update(unwrap(dev), operation_handle, in_params, input, input_consumed, in update()
Dsoft_keymaster_device.cpp265 km1_device_.update = update; in initialize_device_struct()
290 km2_device_.update = update; in initialize_device_struct()
1252 keymaster_error_t SoftKeymasterDevice::update(const keymaster1_device_t* dev, in update() function in keymaster::SoftKeymasterDevice
1269 return km1_dev->update(km1_dev, operation_handle, in_params, input, input_consumed, in update()
1316 keymaster_error_t SoftKeymasterDevice::update(const keymaster2_device_t* dev, in update() function in keymaster::SoftKeymasterDevice
1329 return update(&sk_dev->km1_device_, operation_handle, in_params, input, input_consumed, in update()
/system/extras/verity/
DVerityVerifier.java312 digest.update(salt); in checkBlock()
313 digest.update(data); in checkBlock()
DUtils.java269 verifier.update(input); in verify()
277 signer.update(input); in sign()

123