HomeSort by relevance Sort by last modified time
    Searched full:domains (Results 101 - 125 of 985) sorted by null

1 2 3 45 6 7 8 91011>>

  /system/sepolicy/public/
servicemanager.te 9 # created by other domains. It never passes its own references
tzdatacheck.te 10 # clear that only these domains should modify the actual time zone rules data.
  /cts/tests/tests/networksecurityconfig/networksecurityconfig-attributes/src/android/security/net/config/cts/
TestAttributes.java 32 // Domains in a domain-config that do not specify the flag, should inherit from the
36 // Domains in a domain-config that explicitly allow cleartext.
  /prebuilts/jdk/jdk9/darwin-x86/conf/security/
java.policy 2 // This system policy file grants a set of default permissions to all domains
15 // default permissions granted to all domains
  /prebuilts/jdk/jdk9/linux-x86/conf/security/
java.policy 2 // This system policy file grants a set of default permissions to all domains
15 // default permissions granted to all domains
  /system/sepolicy/prebuilts/api/28.0/private/
domain.te 7 # with other UIDs to these whitelisted domains.
28 # Core domains are not permitted to use kernel interfaces which are not
webview_zygote.te 6 # The webview_zygote needs to be able to transition domains.
26 # Switch SELinux context to app domains.
83 # Must not exec() a program without changing domains.
  /system/sepolicy/private/
domain.te 7 # with other UIDs to these whitelisted domains.
28 # Core domains are not permitted to use kernel interfaces which are not
  /external/parameter-framework/upstream/test/xml-generator/
test.py 44 def __init__(self, initialSettings=None, edds=[], domains=[]):
47 self.domains = domains
62 if testVector.domains:
63 self.command += ["--add-domains"] + testVector.domains
  /system/sepolicy/tools/sepolicy-analyze/
README 23 or - the domains that would in fact have different accesses to the
45 compiler). Domains with unconfineddomain will typically have such
48 PERMISSIVE DOMAINS (permissive)
51 Displays domains in the policy that are permissive, i.e. avc
52 denials are logged but not enforced for these domains. While
53 permissive domains can be helpful during development, they
  /device/linaro/bootloader/arm-trusted-firmware/docs/
psci-pd-tree.rst 17 populate a tree that describes the hierarchy of power domains in the
45 domains at higher levels. For example, only a core power domain can be identified
65 #. The first entry in the array specifies the number of power domains at the
68 the FVP has two cluster power domains at the highest level (1).
71 of power domains that are its direct children.
74 non-leaf power domains.
159 core power domains, for example, Juno and FVPs, the logic to convert an MPIDR to
166 used by the platform is not equal to the number of core power domains.
173 domain tree descriptor will not describe any core power domains which are
175 domains
    [all...]
  /external/parameter-framework/upstream/parameter/
ConfigurableElement.h 71 // Belonging domains
77 // Matching check for no valid associated domains
80 // Owning domains
84 // Elements with no domains
89 * An element is rogue if it is disjoint with all domains.
223 // Belonging domains
234 // Associated configurable domains
ParameterMgr.cpp 185 /// Domains
186 {"listDomains", &CParameterMgr::listDomainsCommandProcess, 0, "", "List configurable domains"},
188 "Show all domains and configurations, including applicability conditions"},
194 "Delete all configurable domains"},
283 "Export domains to an XML file (provide an absolute path or relative"
286 "Import domains from an XML file (provide an absolute path or relative"
290 "Export domains including settings to XML file (provide an absolute path or relative"
298 "Import domains including settings from XML file (provide an absolute path or relative"
306 "Print domains including settings as XML"},
310 "<xml configurable domains>", "Import domains including settings from XML string"}
    [all...]
  /prebuilts/go/darwin-x86/src/crypto/x509/
root_cgo_darwin.go 21 // It lacks support for admin & user cert domains.
85 // Get certificates from all domains, not just System, this lets
88 SecTrustSettingsDomain domains[] = { kSecTrustSettingsDomainSystem,
92 int numDomains = sizeof(domains)/sizeof(SecTrustSettingsDomain);
106 OSStatus err = SecTrustSettingsCopyCertificates(domains[i], &certs);
132 // Trust may be stored in any of the domains. According to Apple's
138 err = SecTrustSettingsCopyTrustSettings(cert, domains[k], &domainTrustSettings);
  /prebuilts/go/linux-x86/src/crypto/x509/
root_cgo_darwin.go 21 // It lacks support for admin & user cert domains.
85 // Get certificates from all domains, not just System, this lets
88 SecTrustSettingsDomain domains[] = { kSecTrustSettingsDomainSystem,
92 int numDomains = sizeof(domains)/sizeof(SecTrustSettingsDomain);
106 OSStatus err = SecTrustSettingsCopyCertificates(domains[i], &certs);
132 // Trust may be stored in any of the domains. According to Apple's
138 err = SecTrustSettingsCopyTrustSettings(cert, domains[k], &domainTrustSettings);
  /external/mesa3d/src/gallium/drivers/radeon/
r600_buffer_common.c 119 res->domains = RADEON_DOMAIN_GTT;
127 res->domains = RADEON_DOMAIN_GTT;
138 res->domains = RADEON_DOMAIN_VRAM;
156 res->domains = RADEON_DOMAIN_GTT;
157 else if (res->domains & RADEON_DOMAIN_VRAM)
164 res->domains = RADEON_DOMAIN_VRAM;
175 res->domains == RADEON_DOMAIN_VRAM)
176 res->domains = RADEON_DOMAIN_VRAM_GTT;
185 if (res->domains & RADEON_DOMAIN_VRAM)
187 else if (res->domains & RADEON_DOMAIN_GTT
    [all...]
  /compatibility/cdd/9_security-model/
9_7_kernel-security-features.md 68 * [C-1-3] MUST configure all domains in enforcing mode. No permissive mode
69 domains are allowed, including domains specific to a device/vendor.
73 for both AOSP SELinux domains as well as device/vendor specific domains.
  /frameworks/base/tests/net/java/android/net/
StaticIpConfigurationTest.java 56 assertNull(s.domains);
71 s.domains = "google.com";
117 s.domains = "example.com";
130 s.domains = "foo";
180 s.domains = "google.com";
  /external/v8/tools/
callstats.py 256 # Disambiguate domains, if needed.
258 domains = {}
273 if domain not in domains:
274 domains[domain] = entry
276 if not isinstance(domains[domain], int):
277 domains[domain][2] = 1
278 domains[domain] = 1
279 domains[domain] += 1
280 entry[2] = domains[domain]
478 domains = {
    [all...]
  /device/linaro/bootloader/arm-trusted-firmware/plat/arm/css/drivers/scp/
css_pm_scpi.c 46 * Helper function to turn off a CPU power domain and its parent power domains
56 * Helper function to turn ON a CPU power domain and its parent power domains
62 * SCP takes care of powering up parent power domains so we
  /device/linaro/bootloader/arm-trusted-firmware/plat/mediatek/mt8173/include/
mt8173_def.h 109 /* Local power state for power domains in Run state. */
111 /* Local power state for retention. Valid only for CPU power domains */
114 * domains
  /external/parameter-framework/upstream/test/functional-tests/include/
ConfigFiles.hpp 51 mDomainsFile(format(mDomainsTemplate, {{"domains", config.domains}})),
118 {domains}
  /packages/apps/Settings/tests/robotests/src/com/android/settings/applications/appinfo/
InstantAppDomainsPreferenceControllerTest.java 98 final ArraySet<String> domains = new ArraySet<>(); local
99 domains.add(domain[0]);
102 new IntentFilterVerificationInfo("Package1", domains);
  /system/sepolicy/prebuilts/api/26.0/private/
webview_zygote.te 6 # The webview_zygote needs to be able to transition domains.
26 # Switch SELinux context to app domains.
63 # Must not exec() a program without changing domains.
  /system/sepolicy/prebuilts/api/27.0/private/
webview_zygote.te 6 # The webview_zygote needs to be able to transition domains.
26 # Switch SELinux context to app domains.
67 # Must not exec() a program without changing domains.

Completed in 1066 milliseconds

1 2 3 45 6 7 8 91011>>