Home
last modified time | relevance | path

Searched refs:conf (Results 1 – 20 of 20) sorted by relevance

/system/sepolicy/
DAndroid.mk229 reqd_policy_mask.conf := $(intermediates)/reqd_policy_mask.conf
230 $(reqd_policy_mask.conf): PRIVATE_MLS_SENS := $(MLS_SENS)
231 $(reqd_policy_mask.conf): PRIVATE_MLS_CATS := $(MLS_CATS)
232 $(reqd_policy_mask.conf): PRIVATE_TGT_ARCH := $(my_target_arch)
233 $(reqd_policy_mask.conf): PRIVATE_TGT_WITH_ASAN := $(with_asan)
234 $(reqd_policy_mask.conf): PRIVATE_ADDITIONAL_M4DEFS := $(LOCAL_ADDITIONAL_M4DEFS)
235 $(reqd_policy_mask.conf): PRIVATE_FULL_TREBLE := $(PRODUCT_FULL_TREBLE)
236 $(reqd_policy_mask.conf): $(call build_policy, $(sepolicy_build_files), $(REQD_MASK_POLICY))
237 $(transform-policy-to-conf)
242 $(reqd_policy_mask.cil): $(reqd_policy_mask.conf) $(HOST_OUT_EXECUTABLES)/checkpolicy
[all …]
Ddefinitions.mk3 define transform-policy-to-conf
15 .KATI_READONLY := transform-policy-to-conf
DREADME29 Reviewing out/target/product/<device>/obj/ETC/sepolicy_intermediates/policy.conf
46 * keys.conf
72 Details of the configuration file (keys.conf) can be found in the subsection
73 keys.conf. This tool is also responsible for stripping the comments and
76 keys.conf
77 The keys.conf file is used for controlling the mapping of "tags" found in
92 organization and may need to extract the pem file for the insertkeys/keys.conf tools.
97 After extracting the pem, you can rename it, and configure keys.conf and
/system/update_engine/update_manager/
Dupdate_manager.conf.example3 # Normally this file is loaded from /etc/update_manager.conf. If
7 # /mnt/stateful_partition/etc/update_manager.conf
10 # /etc/update_manager.conf.
/system/bt/conf/
DAndroid.mk8 LOCAL_MODULE := bt_stack.conf
18 LOCAL_MODULE := bt_did.conf
/system/core/libcutils/
Dfs_config.cpp119 static const char* conf[][2] = { variable
248 if (asprintf(&name, "%.*s%s", (int)len, target_out_path, conf[which][dir]) != -1) { in fs_config_open()
254 fd = TEMP_FAILURE_RETRY(open(conf[which][dir], O_RDONLY | O_BINARY)); in fs_config_open()
316 for (which = 0; which < (sizeof(conf) / sizeof(conf[0])); ++which) { in fs_config()
327 ALOGE("%s len is corrupted", conf[which][dir]); in fs_config()
332 ALOGE("%s out of memory", conf[which][dir]); in fs_config()
337 ALOGE("%s prefix is truncated", conf[which][dir]); in fs_config()
343 ALOGE("%s is corrupted", conf[which][dir]); in fs_config()
/system/bt/btif/src/
Dbtif_config.cc463 static void btif_config_remove_unpaired(config_t* conf) { in btif_config_remove_unpaired() argument
464 CHECK(conf != NULL); in btif_config_remove_unpaired()
470 const config_section_node_t* snode = config_section_begin(conf); in btif_config_remove_unpaired()
471 while (snode != config_section_end(conf)) { in btif_config_remove_unpaired()
474 if (!config_has_key(conf, section, "LinkKey") && in btif_config_remove_unpaired()
475 !config_has_key(conf, section, "LE_KEY_PENC") && in btif_config_remove_unpaired()
476 !config_has_key(conf, section, "LE_KEY_PID") && in btif_config_remove_unpaired()
477 !config_has_key(conf, section, "LE_KEY_PCSRK") && in btif_config_remove_unpaired()
478 !config_has_key(conf, section, "LE_KEY_LENC") && in btif_config_remove_unpaired()
479 !config_has_key(conf, section, "LE_KEY_LCSRK")) { in btif_config_remove_unpaired()
[all …]
Dbtif_dm.cc2723 char conf[64]; in btif_dm_get_smp_config() local
2728 strncpy(conf, recv, 64); in btif_dm_get_smp_config()
2729 conf[63] = 0; // null terminate in btif_dm_get_smp_config()
2731 pch = strtok(conf, ","); in btif_dm_get_smp_config()
/system/sepolicy/tools/sepolicy-analyze/
DREADME78 [-w] [-d] [-f neverallows.conf] | [-n "neverallow string"]
81 from the neverallows.conf file or a given string, which contain neverallow
82 statements in the same format as the SELinux policy.conf file, i.e. after
84 policy.conf file as the neverallows.conf file and sepolicy-analyze will
102 a full policy.conf file and output them in a more easily parsed format.
/system/extras/ext4_utils/
DAndroid.mk107 LOCAL_MODULE := mke2fs.conf
115 LOCAL_MODULE := mke2fs.conf
/system/bt/main/
DAndroid.bp76 "bt_did.conf",
77 "bt_stack.conf",
/system/core/fs_mgr/
DAndroid.mk24 LOCAL_REQUIRED_MODULES := mke2fs mke2fs.conf e2fsdroid
/system/bt/doc/
Dbtsnoop_net.md6 This feature is enabled by setting `BtSnoopLogOutput=true` in `bt_stack.conf`.
Ddirectory_layout.md16 * conf - *Configuration* - Various configuration text files.
/system/sepolicy/prebuilts/api/26.0/public/
Ddhcp.te17 # For /proc/sys/net/ipv4/conf/*/promote_secondaries
/system/sepolicy/public/
Ddhcp.te17 # For /proc/sys/net/ipv4/conf/*/promote_secondaries
/system/update_engine/
DAndroid.mk817 LOCAL_MODULE := ue_unittest_update_engine.conf
820 LOCAL_MODULE_STEM := update_engine.conf
821 LOCAL_SRC_FILES := update_engine.conf
902 ue_unittest_update_engine.conf \
/system/extras/perfprofd/tests/
Dperfprofd_test.cc728 I: config file path set to $NATIVE_TESTS/perfprofd_test/perfprofd.conf in TEST_F()
784 I: config file path set to $NATIVE_TESTS/perfprofd_test/perfprofd.conf in TEST_F()
854 I: config file path set to $NATIVE_TESTS/perfprofd_test/perfprofd.conf in TEST_F()
/system/core/rootdir/
Dinit.rc148 write /proc/sys/net/ipv4/conf/all/accept_redirects 0
149 write /proc/sys/net/ipv6/conf/all/accept_redirects 0
407 # Fix the access permissions and group ownership for 'bt_config.conf'
408 chmod 0660 /data/misc/bluedroid/bt_config.conf
409 chown bluetooth bluetooth /data/misc/bluedroid/bt_config.conf
430 # give system access to wpa_supplicant.conf for backup and restore
431 chmod 0660 /data/misc/wifi/wpa_supplicant.conf
/system/update_engine/sample_images/
Dgenerate_images.sh109 sudo tee "${mntdir}"/etc/update_engine.conf >/dev/null <<EOF