/external/autotest/client/site_tests/security_AccountsBaseline/ |
control | 7 DOC = "Enforces a whitelist of known user and group ID's."
|
/external/autotest/client/site_tests/security_DbusOwners/ |
control | 8 Enforces a whitelist of known, allowed Dbus interfaces owned by chronos
|
/external/autotest/client/site_tests/security_NetworkListeners/ |
control | 8 Enforces a whitelist of known, allowed processes with open network listens
|
/external/autotest/client/site_tests/security_OpenFDs/ |
control | 7 DOC = "Enforces a whitelist of open file descriptors expected in key processes."
|
/external/autotest/client/site_tests/security_ReservedPrivileges/ |
control | 8 Enforces a whitelist of known, allowed reserved privileged processes on the system
|
/external/autotest/client/site_tests/security_RootfsStatefulSymlinks/ |
control | 18 accounted for by the whitelist ('baseline').
|
/external/autotest/client/site_tests/security_SuidBinaries/ |
control | 8 Enforces a whitelist of known, allowed setuid/gid binaries on the system
|
/frameworks/av/services/mediacodec/minijail/ |
Android.mk | 17 # allow device specific additions to the syscall whitelist
|
/frameworks/av/services/mediaextractor/minijail/ |
Android.mk | 17 # allow device specific additions to the syscall whitelist
|
/frameworks/base/docs/html-intl/intl/ja/training/basics/network-ops/ |
data-saver.jd | 18 <a href="#request-whitelist">??????? ??????????</a> 134 <h3 id="request-whitelist"> 216 <code>$ adb shell cmd netpolicy add restrict-background-whitelist 226 <code>$ adb shell cmd netpolicy remove restrict-background-whitelist
|
/frameworks/base/docs/html-intl/intl/ko/training/basics/network-ops/ |
data-saver.jd | 18 <a href="#request-whitelist">?? ?? ?? ??</a> 134 <h3 id="request-whitelist"> 216 <code>$ adb shell cmd netpolicy add restrict-background-whitelist 226 <code>$ adb shell cmd netpolicy remove restrict-background-whitelist
|
/frameworks/base/docs/html-intl/intl/zh-cn/training/basics/network-ops/ |
data-saver.jd | 18 <a href="#request-whitelist">???????</a> 134 <h3 id="request-whitelist"> 216 <code>$ adb shell cmd netpolicy add restrict-background-whitelist 226 <code>$ adb shell cmd netpolicy remove restrict-background-whitelist
|
/frameworks/base/tests/LockTaskTests/res/values/ |
strings.xml | 18 Use SampleDeviceOwner app to set whitelist.</string>
|
/external/autotest/client/common_lib/cros/ |
policy.py | 21 roaming=None, whitelist=None, proxies=None): 36 @param whitelist: list of accounts that are allowed to log in. 66 if whitelist: 68 ownership.assert_users_on_whitelist(settings, whitelist) 73 new_users=None, roaming=None, whitelist=None, 86 @param whitelist: list of accounts that are allowed to log in. 112 if whitelist: 114 for user in whitelist:
|
/system/connectivity/shill/wifi/ |
wake_on_wifi_unittest.cc | 1227 vector<ByteString> whitelist; local 1355 vector<ByteString> whitelist; local 2245 vector<ByteString> whitelist; local 2255 vector<ByteString> whitelist; local 2264 vector<ByteString> whitelist; local 2273 vector<ByteString> whitelist; local 2313 vector<ByteString> whitelist; local 2322 vector<ByteString> whitelist; local 2337 vector<ByteString> whitelist; local 2363 vector<ByteString> whitelist; local 2390 vector<ByteString> whitelist; local 2418 vector<ByteString> whitelist; local 2447 vector<ByteString> whitelist; local 2476 vector<ByteString> whitelist; local 2505 vector<ByteString> whitelist; local 2530 vector<ByteString> whitelist; local 2558 vector<ByteString> whitelist; local 2588 vector<ByteString> whitelist; local 2618 vector<ByteString> whitelist; local 2645 vector<ByteString> whitelist; local 2675 vector<ByteString> whitelist; local 2700 vector<ByteString> whitelist; local 2708 vector<ByteString> whitelist; local 2722 vector<ByteString> whitelist; local 2776 vector<ByteString> whitelist; local 2983 vector<ByteString> whitelist; local 3002 vector<ByteString> whitelist; local 3018 vector<ByteString> whitelist; local 3220 vector<ByteString> whitelist; local 3236 vector<ByteString> whitelist; local 3323 vector<ByteString> whitelist; local 3378 vector<ByteString> whitelist; local 3395 vector<ByteString> whitelist; local [all...] |
/system/netd/server/ |
FirewallController.cpp | 85 if (ftype == WHITELIST) { 92 // Set this after calling disableFirewall(), since it defaults to WHITELIST there 101 mFirewallType = WHITELIST; 227 return WHITELIST; 231 return WHITELIST; 246 if (firewallType == WHITELIST) { 295 return replaceUidChain(childChain, type == WHITELIST, uids); 319 // Always whitelist system UIDs. 324 // Whitelist or blacklist the specified UIDs. 330 // If it's a whitelist chain, add a default DROP at the end. This is not necessary for [all...] |
/external/autotest/client/site_tests/login_OwnershipApi/ |
login_OwnershipApi.py | 65 whitelist=(ownership.TESTUSER, 82 whitelist=(ownership.TESTUSER, 'a@b.c'), 90 whitelist=(ownership.TESTUSER,
|
/external/libchrome/crypto/ |
symmetric_key_nss.cc | 26 // Whitelist supported key sizes to avoid accidentaly relying on 55 // Whitelist supported key sizes to avoid accidentaly relying on 103 // Whitelist supported key sizes to avoid accidentaly relying on
|
symmetric_key_openssl.cc | 30 // Whitelist supported key sizes to avoid accidentaly relying on 60 // Whitelist supported key sizes to avoid accidentaly relying on 88 // Whitelist supported key sizes to avoid accidentaly relying on
|
/external/libchrome/sandbox/linux/syscall_broker/ |
broker_policy.h | 29 // whitelist. EACCESS would be a typical value. 44 // whitelist. For paranoia a caller should then use |file_to_access|. See 57 // whitelist. For paranoia, a caller should then use |file_to_open| rather
|
/frameworks/base/core/java/android/app/ |
BroadcastOptions.java | 36 * How long to temporarily put an app on the power whitelist when executing this broadcast 72 * power whitelist when this broadcast is being delivered to it. 73 * @param duration The duration in milliseconds; 0 means to not place on whitelist.
|
/frameworks/base/services/core/java/com/android/server/location/ |
LocationBlacklist.java | 70 if (D) Slog.d(TAG, "whitelist: " + Arrays.toString(mWhitelist)); 83 * (package name matches blacklist, and does not match whitelist) 103 * Return true if any of packages are in whitelist
|
/frameworks/base/tools/aapt2/xml/ |
XmlActionExecutor.cpp | 68 if (policy == XmlActionExecutorPolicy::Whitelist) { 86 if (policy == XmlActionExecutorPolicy::Whitelist) { 100 if (policy == XmlActionExecutorPolicy::Whitelist) {
|
/prebuilts/go/darwin-x86/src/cmd/vet/ |
composite.go | 10 "cmd/vet/whitelist" 89 // Convert the package name to an import path, and compare to a whitelist. 96 if *compositeWhiteList && whitelist.UnkeyedLiteral[typeName] {
|
/prebuilts/go/linux-x86/src/cmd/vet/ |
composite.go | 10 "cmd/vet/whitelist" 89 // Convert the package name to an import path, and compare to a whitelist. 96 if *compositeWhiteList && whitelist.UnkeyedLiteral[typeName] {
|