/system/sepolicy/ |
D | Android.mk | 229 reqd_policy_mask.conf := $(intermediates)/reqd_policy_mask.conf 230 $(reqd_policy_mask.conf): PRIVATE_MLS_SENS := $(MLS_SENS) 231 $(reqd_policy_mask.conf): PRIVATE_MLS_CATS := $(MLS_CATS) 232 $(reqd_policy_mask.conf): PRIVATE_TGT_ARCH := $(my_target_arch) 233 $(reqd_policy_mask.conf): PRIVATE_TGT_WITH_ASAN := $(with_asan) 234 $(reqd_policy_mask.conf): PRIVATE_ADDITIONAL_M4DEFS := $(LOCAL_ADDITIONAL_M4DEFS) 235 $(reqd_policy_mask.conf): PRIVATE_FULL_TREBLE := $(PRODUCT_FULL_TREBLE) 236 $(reqd_policy_mask.conf): $(call build_policy, $(sepolicy_build_files), $(REQD_MASK_POLICY)) 237 $(transform-policy-to-conf) 242 $(reqd_policy_mask.cil): $(reqd_policy_mask.conf) $(HOST_OUT_EXECUTABLES)/checkpolicy [all …]
|
D | definitions.mk | 3 define transform-policy-to-conf 15 .KATI_READONLY := transform-policy-to-conf
|
D | README | 29 Reviewing out/target/product/<device>/obj/ETC/sepolicy_intermediates/policy.conf 46 * keys.conf 72 Details of the configuration file (keys.conf) can be found in the subsection 73 keys.conf. This tool is also responsible for stripping the comments and 76 keys.conf 77 The keys.conf file is used for controlling the mapping of "tags" found in 92 organization and may need to extract the pem file for the insertkeys/keys.conf tools. 97 After extracting the pem, you can rename it, and configure keys.conf and
|
/system/update_engine/update_manager/ |
D | update_manager.conf.example | 3 # Normally this file is loaded from /etc/update_manager.conf. If 7 # /mnt/stateful_partition/etc/update_manager.conf 10 # /etc/update_manager.conf.
|
/system/bt/conf/ |
D | Android.mk | 8 LOCAL_MODULE := bt_stack.conf 18 LOCAL_MODULE := bt_did.conf
|
/system/core/libcutils/ |
D | fs_config.cpp | 119 static const char* conf[][2] = { variable 248 if (asprintf(&name, "%.*s%s", (int)len, target_out_path, conf[which][dir]) != -1) { in fs_config_open() 254 fd = TEMP_FAILURE_RETRY(open(conf[which][dir], O_RDONLY | O_BINARY)); in fs_config_open() 316 for (which = 0; which < (sizeof(conf) / sizeof(conf[0])); ++which) { in fs_config() 327 ALOGE("%s len is corrupted", conf[which][dir]); in fs_config() 332 ALOGE("%s out of memory", conf[which][dir]); in fs_config() 337 ALOGE("%s prefix is truncated", conf[which][dir]); in fs_config() 343 ALOGE("%s is corrupted", conf[which][dir]); in fs_config()
|
/system/bt/btif/src/ |
D | btif_config.cc | 463 static void btif_config_remove_unpaired(config_t* conf) { in btif_config_remove_unpaired() argument 464 CHECK(conf != NULL); in btif_config_remove_unpaired() 470 const config_section_node_t* snode = config_section_begin(conf); in btif_config_remove_unpaired() 471 while (snode != config_section_end(conf)) { in btif_config_remove_unpaired() 474 if (!config_has_key(conf, section, "LinkKey") && in btif_config_remove_unpaired() 475 !config_has_key(conf, section, "LE_KEY_PENC") && in btif_config_remove_unpaired() 476 !config_has_key(conf, section, "LE_KEY_PID") && in btif_config_remove_unpaired() 477 !config_has_key(conf, section, "LE_KEY_PCSRK") && in btif_config_remove_unpaired() 478 !config_has_key(conf, section, "LE_KEY_LENC") && in btif_config_remove_unpaired() 479 !config_has_key(conf, section, "LE_KEY_LCSRK")) { in btif_config_remove_unpaired() [all …]
|
D | btif_dm.cc | 2723 char conf[64]; in btif_dm_get_smp_config() local 2728 strncpy(conf, recv, 64); in btif_dm_get_smp_config() 2729 conf[63] = 0; // null terminate in btif_dm_get_smp_config() 2731 pch = strtok(conf, ","); in btif_dm_get_smp_config()
|
/system/sepolicy/tools/sepolicy-analyze/ |
D | README | 78 [-w] [-d] [-f neverallows.conf] | [-n "neverallow string"] 81 from the neverallows.conf file or a given string, which contain neverallow 82 statements in the same format as the SELinux policy.conf file, i.e. after 84 policy.conf file as the neverallows.conf file and sepolicy-analyze will 102 a full policy.conf file and output them in a more easily parsed format.
|
/system/extras/ext4_utils/ |
D | Android.mk | 107 LOCAL_MODULE := mke2fs.conf 115 LOCAL_MODULE := mke2fs.conf
|
/system/bt/main/ |
D | Android.bp | 76 "bt_did.conf", 77 "bt_stack.conf",
|
/system/core/fs_mgr/ |
D | Android.mk | 24 LOCAL_REQUIRED_MODULES := mke2fs mke2fs.conf e2fsdroid
|
/system/bt/doc/ |
D | btsnoop_net.md | 6 This feature is enabled by setting `BtSnoopLogOutput=true` in `bt_stack.conf`.
|
D | directory_layout.md | 16 * conf - *Configuration* - Various configuration text files.
|
/system/sepolicy/prebuilts/api/26.0/public/ |
D | dhcp.te | 17 # For /proc/sys/net/ipv4/conf/*/promote_secondaries
|
/system/sepolicy/public/ |
D | dhcp.te | 17 # For /proc/sys/net/ipv4/conf/*/promote_secondaries
|
/system/update_engine/ |
D | Android.mk | 817 LOCAL_MODULE := ue_unittest_update_engine.conf 820 LOCAL_MODULE_STEM := update_engine.conf 821 LOCAL_SRC_FILES := update_engine.conf 902 ue_unittest_update_engine.conf \
|
/system/extras/perfprofd/tests/ |
D | perfprofd_test.cc | 728 I: config file path set to $NATIVE_TESTS/perfprofd_test/perfprofd.conf in TEST_F() 784 I: config file path set to $NATIVE_TESTS/perfprofd_test/perfprofd.conf in TEST_F() 854 I: config file path set to $NATIVE_TESTS/perfprofd_test/perfprofd.conf in TEST_F()
|
/system/core/rootdir/ |
D | init.rc | 148 write /proc/sys/net/ipv4/conf/all/accept_redirects 0 149 write /proc/sys/net/ipv6/conf/all/accept_redirects 0 407 # Fix the access permissions and group ownership for 'bt_config.conf' 408 chmod 0660 /data/misc/bluedroid/bt_config.conf 409 chown bluetooth bluetooth /data/misc/bluedroid/bt_config.conf 430 # give system access to wpa_supplicant.conf for backup and restore 431 chmod 0660 /data/misc/wifi/wpa_supplicant.conf
|
/system/update_engine/sample_images/ |
D | generate_images.sh | 109 sudo tee "${mntdir}"/etc/update_engine.conf >/dev/null <<EOF
|