/external/perfetto/ |
README.chromium | 6 Security Critical: yes
|
/hardware/interfaces/light/2.0/default/ |
android.hardware.light@2.0-service.rc | 7 shutdown critical
|
/system/vold/ |
vold.rc | 7 shutdown critical
|
/tools/tradefederation/contrib/ |
README | 4 like tests, configs, preparers and etc. They are non-critical to the
|
README.txt | 4 like tests, configs, preparers and etc. They are non-critical to the
|
/prebuilts/go/darwin-x86/src/cmd/compile/internal/ssa/ |
critical.go | 7 // critical splits critical edges (those that go from a block with 9 // Regalloc wants a critical-edge-free CFG so it can implement phi values. 10 func critical(f *Func) { func 14 // need to split critical edges on newly constructed blocks 52 var d *Block // new block used to remove critical edge 57 // critical edges for this argument 59 // splitting doesn't necessarily remove the critical edge, 66 f.Warnl(p.Pos, "split critical edge") 77 f.Warnl(p.Pos, "split critical edge" [all...] |
/prebuilts/go/linux-x86/src/cmd/compile/internal/ssa/ |
critical.go | 7 // critical splits critical edges (those that go from a block with 9 // Regalloc wants a critical-edge-free CFG so it can implement phi values. 10 func critical(f *Func) { func 14 // need to split critical edges on newly constructed blocks 52 var d *Block // new block used to remove critical edge 57 // critical edges for this argument 59 // splitting doesn't necessarily remove the critical edge, 66 f.Warnl(p.Pos, "split critical edge") 77 f.Warnl(p.Pos, "split critical edge" [all...] |
/libcore/ojluni/src/main/java/sun/security/x509/ |
SubjectAlternativeNameExtension.java | 42 * be treated as being critical and the extension value itself (this is again 85 * The extension is marked non-critical. 99 * @param critical true if the extension is to be treated as critical. 103 public SubjectAlternativeNameExtension(Boolean critical, GeneralNames names) 107 this.critical = critical.booleanValue(); 113 * is marked non-critical. 117 critical = false; 124 * @param critical true if the extension is to be treated as critical [all...] |
IssuerAlternativeNameExtension.java | 42 * be treated as being critical and the extension value itself (this is again 88 this.critical = false; 96 * @param critical true if the extension is to be treated as critical. 100 public IssuerAlternativeNameExtension(Boolean critical, GeneralNames names) 104 this.critical = critical.booleanValue(); 113 critical = false; 120 * @param critical true if the extension is to be treated as critical [all...] |
CRLReasonCodeExtension.java | 36 * The reasonCode is a non-critical CRL entry extension that identifies 79 * @param critical true if the extension is to be treated as critical. 82 public CRLReasonCodeExtension(boolean critical, int reason) 85 this.critical = critical; 93 * @param critical true if the extension is to be treated as critical. 98 public CRLReasonCodeExtension(Boolean critical, Object value) 101 this.critical = critical.booleanValue() [all...] |
InvalidityDateExtension.java | 38 * The invalidity date is a non-critical CRL entry extension that 94 * @param critical true if the extension is to be treated as critical. 97 public InvalidityDateExtension(boolean critical, Date date) 100 this.critical = critical; 108 * @param critical true if the extension is to be treated as critical. 113 public InvalidityDateExtension(Boolean critical, Object value) 116 this.critical = critical.booleanValue() [all...] |
BasicConstraintsExtension.java | 89 * critical if the ca flag is true, false otherwise. 101 * @param critical true, if the extension should be marked critical 105 public BasicConstraintsExtension(Boolean critical, boolean ca, int len) 110 this.critical = critical.booleanValue(); 117 * @param critical flag indicating if extension is critical or not 122 public BasicConstraintsExtension(Boolean critical, Object value) 126 this.critical = critical.booleanValue() [all...] |
ExtendedKeyUsageExtension.java | 59 * either critical or non-critical.<p> 61 * If the extension is flagged critical, then the certificate MUST be 64 * If the extension is flagged non-critical, then it indicates the 73 * If a certificate contains both a critical key usage field and a 74 * critical extended key usage field, then both fields MUST be 163 * @param critical true if the extension is to be treated as critical. 166 public ExtendedKeyUsageExtension(Boolean critical, Vector<ObjectIdentifier> keyUsages) 170 this.critical = critical.booleanValue() [all...] |
CertificatePoliciesExtension.java | 43 * critical, the path validation software MUST be able to interpret this 119 * @param critical true if the extension is to be treated as critical. 122 public CertificatePoliciesExtension(Boolean critical, 126 this.critical = critical.booleanValue(); 133 * @param critical true if the extension is to be treated as critical. 138 public CertificatePoliciesExtension(Boolean critical, Object value) 141 this.critical = critical.booleanValue() [all...] |
PolicyConstraintsExtension.java | 107 * extension is marked non-critical. 122 * @param critical true if the extension is to be treated as critical. 126 public PolicyConstraintsExtension(Boolean critical, int require, int inhibit) 131 this.critical = critical.booleanValue(); 138 * @param critical true if the extension is to be treated as critical. 143 public PolicyConstraintsExtension(Boolean critical, Object value) 146 this.critical = critical.booleanValue() [all...] |
/cts/hostsidetests/devicepolicy/app/DeviceAndProfileOwner/scripts/ |
ca.conf | 116 basicConstraints = critical, CA:true 117 keyUsage = critical, digitalSignature, cRLSign, keyCertSign 123 basicConstraints = critical, CA:true, pathlen:0 124 keyUsage = critical, digitalSignature, cRLSign, keyCertSign 133 keyUsage = critical, nonRepudiation, digitalSignature, keyEncipherment 143 keyUsage = critical, digitalSignature, keyEncipherment 155 keyUsage = critical, digitalSignature 156 extendedKeyUsage = critical, OCSPSigning
|
/compatibility/cdd/9_security-model/ |
9_14_automotive-system-isolation.md | 3 Android Automotive devices are expected to exchange data with critical vehicle
|
/device/google/vrservices/vrcore/sepolicy/ |
seapp_contexts | 3 # A fallback in case vrcore is missing something critical that untrusted_app provides.
|
/libcore/ojluni/src/main/java/java/security/cert/ |
X509Extension.java | 44 * critical or non-critical. A certificate/CRL-using system (an application 46 * encounters a critical extension it does not recognize. A non-critical 55 * critical BOOLEAN DEFAULT FALSE, 73 * Check if there is a critical extension that is not supported. 75 * @return {@code true} if a critical extension is found that is 82 * CRITICAL in the certificate/CRL managed by the object 85 * Here is sample code to get a Set of critical extensions from an 96 * System.out.println("Set of critical extensions:") [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
PKIXPolicyNode.java | 19 protected boolean critical; field in class:PKIXPolicyNode 42 critical = _critical; 89 return critical; 99 critical = _critical; 156 critical);
|
/prebuilts/jdk/jdk8/darwin-x86/sample/dtrace/hotspot_jni/ |
CriticalSection.d | 42 * The script inspect a JNI application for Critical Section violations. 44 * Critical section is the space between calls to JNI methods: 48 * Inside a critical section, native code must not call other JNI functions, 69 SAMPLE_NAME = "critical section violation checks"; 89 printf("\nJNI call %s made from JNI critical region '%s'\n", 101 printf("\nSystem call %s made in JNI critical region '%s'\n", 132 printf("%d critical section violations have been discovered\n",
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x509/ |
Extension.java | 183 private boolean critical; field in class:Extension 188 ASN1Boolean critical, 191 this(extnId, critical.isTrue(), value); 196 boolean critical, 199 this(extnId, critical, new DEROctetString(value)); 204 boolean critical, 208 this.critical = critical; 217 this.critical = false; 223 this.critical = ASN1Boolean.getInstance(seq.getObjectAt(1)).isTrue() [all...] |
/external/llvm/test/CodeGen/X86/ |
critical-anti-dep-breaker.ll | 1 ; RUN: llc < %s -mtriple=x86_64-unknown-linux-gnu -relocation-model=pic -post-RA-scheduler=1 -break-anti-dependencies=critical | FileCheck %s 4 ; The critical-anti-dependency-breaker must not use register def information from a kill inst. 7 ; The post-RA-scheduler and critical-anti-dependency breaker can eliminate that hazard using R10.
|
/prebuilts/clang/host/darwin-x86/clang-4053586/prebuilt_include/llvm/include/llvm/Transforms/Utils/ |
BreakCriticalEdges.h | 1 //===- BreakCriticalEdges.h - Critical Edge Elimination Pass --------------===// 10 // BreakCriticalEdges pass - Break all of the critical edges in the CFG by 12 // cannot deal with critical edges. For this usage, the structure type is
|
/prebuilts/clang/host/darwin-x86/clang-4393122/include/llvm/Transforms/Utils/ |
BreakCriticalEdges.h | 1 //===- BreakCriticalEdges.h - Critical Edge Elimination Pass --------------===// 10 // BreakCriticalEdges pass - Break all of the critical edges in the CFG by 12 // cannot deal with critical edges. For this usage, the structure type is
|