/system/sepolicy/public/ |
servicemanager.te | 9 # created by other domains. It never passes its own references
|
tzdatacheck.te | 10 # clear that only these domains should modify the actual time zone rules data.
|
/cts/tests/tests/networksecurityconfig/networksecurityconfig-attributes/src/android/security/net/config/cts/ |
TestAttributes.java | 32 // Domains in a domain-config that do not specify the flag, should inherit from the 36 // Domains in a domain-config that explicitly allow cleartext.
|
/prebuilts/jdk/jdk9/darwin-x86/conf/security/ |
java.policy | 2 // This system policy file grants a set of default permissions to all domains 15 // default permissions granted to all domains
|
/prebuilts/jdk/jdk9/linux-x86/conf/security/ |
java.policy | 2 // This system policy file grants a set of default permissions to all domains 15 // default permissions granted to all domains
|
/system/sepolicy/prebuilts/api/28.0/private/ |
domain.te | 7 # with other UIDs to these whitelisted domains. 28 # Core domains are not permitted to use kernel interfaces which are not
|
webview_zygote.te | 6 # The webview_zygote needs to be able to transition domains. 26 # Switch SELinux context to app domains. 83 # Must not exec() a program without changing domains.
|
/system/sepolicy/private/ |
domain.te | 7 # with other UIDs to these whitelisted domains. 28 # Core domains are not permitted to use kernel interfaces which are not
|
/external/parameter-framework/upstream/test/xml-generator/ |
test.py | 44 def __init__(self, initialSettings=None, edds=[], domains=[]): 47 self.domains = domains 62 if testVector.domains: 63 self.command += ["--add-domains"] + testVector.domains
|
/system/sepolicy/tools/sepolicy-analyze/ |
README | 23 or - the domains that would in fact have different accesses to the 45 compiler). Domains with unconfineddomain will typically have such 48 PERMISSIVE DOMAINS (permissive) 51 Displays domains in the policy that are permissive, i.e. avc 52 denials are logged but not enforced for these domains. While 53 permissive domains can be helpful during development, they
|
/device/linaro/bootloader/arm-trusted-firmware/docs/ |
psci-pd-tree.rst | 17 populate a tree that describes the hierarchy of power domains in the 45 domains at higher levels. For example, only a core power domain can be identified 65 #. The first entry in the array specifies the number of power domains at the 68 the FVP has two cluster power domains at the highest level (1). 71 of power domains that are its direct children. 74 non-leaf power domains. 159 core power domains, for example, Juno and FVPs, the logic to convert an MPIDR to 166 used by the platform is not equal to the number of core power domains. 173 domain tree descriptor will not describe any core power domains which are 175 domains [all...] |
/external/parameter-framework/upstream/parameter/ |
ConfigurableElement.h | 71 // Belonging domains 77 // Matching check for no valid associated domains 80 // Owning domains 84 // Elements with no domains 89 * An element is rogue if it is disjoint with all domains. 223 // Belonging domains 234 // Associated configurable domains
|
ParameterMgr.cpp | 185 /// Domains 186 {"listDomains", &CParameterMgr::listDomainsCommandProcess, 0, "", "List configurable domains"}, 188 "Show all domains and configurations, including applicability conditions"}, 194 "Delete all configurable domains"}, 283 "Export domains to an XML file (provide an absolute path or relative" 286 "Import domains from an XML file (provide an absolute path or relative" 290 "Export domains including settings to XML file (provide an absolute path or relative" 298 "Import domains including settings from XML file (provide an absolute path or relative" 306 "Print domains including settings as XML"}, 310 "<xml configurable domains>", "Import domains including settings from XML string"} [all...] |
/prebuilts/go/darwin-x86/src/crypto/x509/ |
root_cgo_darwin.go | 21 // It lacks support for admin & user cert domains. 85 // Get certificates from all domains, not just System, this lets 88 SecTrustSettingsDomain domains[] = { kSecTrustSettingsDomainSystem, 92 int numDomains = sizeof(domains)/sizeof(SecTrustSettingsDomain); 106 OSStatus err = SecTrustSettingsCopyCertificates(domains[i], &certs); 132 // Trust may be stored in any of the domains. According to Apple's 138 err = SecTrustSettingsCopyTrustSettings(cert, domains[k], &domainTrustSettings);
|
/prebuilts/go/linux-x86/src/crypto/x509/ |
root_cgo_darwin.go | 21 // It lacks support for admin & user cert domains. 85 // Get certificates from all domains, not just System, this lets 88 SecTrustSettingsDomain domains[] = { kSecTrustSettingsDomainSystem, 92 int numDomains = sizeof(domains)/sizeof(SecTrustSettingsDomain); 106 OSStatus err = SecTrustSettingsCopyCertificates(domains[i], &certs); 132 // Trust may be stored in any of the domains. According to Apple's 138 err = SecTrustSettingsCopyTrustSettings(cert, domains[k], &domainTrustSettings);
|
/external/mesa3d/src/gallium/drivers/radeon/ |
r600_buffer_common.c | 119 res->domains = RADEON_DOMAIN_GTT; 127 res->domains = RADEON_DOMAIN_GTT; 138 res->domains = RADEON_DOMAIN_VRAM; 156 res->domains = RADEON_DOMAIN_GTT; 157 else if (res->domains & RADEON_DOMAIN_VRAM) 164 res->domains = RADEON_DOMAIN_VRAM; 175 res->domains == RADEON_DOMAIN_VRAM) 176 res->domains = RADEON_DOMAIN_VRAM_GTT; 185 if (res->domains & RADEON_DOMAIN_VRAM) 187 else if (res->domains & RADEON_DOMAIN_GTT [all...] |
/compatibility/cdd/9_security-model/ |
9_7_kernel-security-features.md | 68 * [C-1-3] MUST configure all domains in enforcing mode. No permissive mode 69 domains are allowed, including domains specific to a device/vendor. 73 for both AOSP SELinux domains as well as device/vendor specific domains.
|
/frameworks/base/tests/net/java/android/net/ |
StaticIpConfigurationTest.java | 56 assertNull(s.domains); 71 s.domains = "google.com"; 117 s.domains = "example.com"; 130 s.domains = "foo"; 180 s.domains = "google.com";
|
/external/v8/tools/ |
callstats.py | 256 # Disambiguate domains, if needed. 258 domains = {} 273 if domain not in domains: 274 domains[domain] = entry 276 if not isinstance(domains[domain], int): 277 domains[domain][2] = 1 278 domains[domain] = 1 279 domains[domain] += 1 280 entry[2] = domains[domain] 478 domains = { [all...] |
/device/linaro/bootloader/arm-trusted-firmware/plat/arm/css/drivers/scp/ |
css_pm_scpi.c | 46 * Helper function to turn off a CPU power domain and its parent power domains 56 * Helper function to turn ON a CPU power domain and its parent power domains 62 * SCP takes care of powering up parent power domains so we
|
/device/linaro/bootloader/arm-trusted-firmware/plat/mediatek/mt8173/include/ |
mt8173_def.h | 109 /* Local power state for power domains in Run state. */ 111 /* Local power state for retention. Valid only for CPU power domains */ 114 * domains
|
/external/parameter-framework/upstream/test/functional-tests/include/ |
ConfigFiles.hpp | 51 mDomainsFile(format(mDomainsTemplate, {{"domains", config.domains}})), 118 {domains}
|
/packages/apps/Settings/tests/robotests/src/com/android/settings/applications/appinfo/ |
InstantAppDomainsPreferenceControllerTest.java | 98 final ArraySet<String> domains = new ArraySet<>(); local 99 domains.add(domain[0]); 102 new IntentFilterVerificationInfo("Package1", domains);
|
/system/sepolicy/prebuilts/api/26.0/private/ |
webview_zygote.te | 6 # The webview_zygote needs to be able to transition domains. 26 # Switch SELinux context to app domains. 63 # Must not exec() a program without changing domains.
|
/system/sepolicy/prebuilts/api/27.0/private/ |
webview_zygote.te | 6 # The webview_zygote needs to be able to transition domains. 26 # Switch SELinux context to app domains. 67 # Must not exec() a program without changing domains.
|