/cts/hostsidetests/appsecurity/test-apps/PermissionDeclareApp/src/com/android/cts/permissiondeclareapp/ |
PrivateContentProviderGranting.java | 29 * Empty content provider, all permissions are enforced in manifest
|
/cts/hostsidetests/appsecurity/test-apps/PermissionDeclareAppCompat/src/com/android/cts/permissiondeclareappcompat/ |
AmbiguousContentProvider.java | 29 * Empty content provider, all permissions are enforced in manifest
|
/cts/hostsidetests/devicepolicy/app/DeviceAdmin/src/com.android.cts.deviceadmin/ |
DeviceAdminTest.java | 59 // are enforced as DevicePolicyManagerService.resetPassword fails to do so at the
|
/cts/hostsidetests/devicepolicy/app/IntentSender/src/com/android/cts/intent/sender/ |
BasicContentProvider.java | 29 * Empty content provider, all permissions are enforced in manifest
|
/cts/tests/JobSchedulerSharedUid/jobperm/ |
AndroidManifest.xml | 33 provider which is enforced by the permission -->
|
/external/autotest/test_suites/ |
control.faft_dev | 16 operate on the DUT in 'dev' mode, where verified boot is not fully enforced.
|
/external/guava/guava/src/com/google/common/collect/ |
Constraint.java | 39 * is only enforced when elements are added.
|
/external/kernel-headers/original/uapi/linux/mmc/ |
ioctl.h | 70 * is enforced per ioctl call. For larger data transfers, use the normal
|
/external/webrtc/webrtc/base/ |
iosfilesystem.mm | 13 // (enforced by a lack of a header file).
|
/frameworks/native/libs/vr/libbufferhubqueue/include/private/dvr/ |
buffer_hub_queue_parcelable.h | 10 // TODO(b/72172820): Remove the workaround once we have enforced -Weverything
|
/packages/apps/PackageInstaller/res/values-watch/ |
strings.xml | 30 <!-- Summary of a permission switch when it's enforced by policy [CHAR LIMIT=17] -->
|
/cts/hostsidetests/devicepolicy/app/ManagedProfile/src/com/android/cts/managedprofile/ |
BluetoothSharingRestrictionTest.java | 50 * Tests that Bluetooth sharing activity gets disabled when the restriction is enforced. 75 private static void assertRestrictionEnforced(Context context, boolean enforced) { 77 assertEquals("Invalid restriction enforcement status", enforced,
|
OrganizationInfoTest.java | 47 assertEquals(color | 0xFF000000 /* opacity always enforced to 100% */,
|
/system/keymaster/android_keymaster/ |
android_keymaster_messages.cpp | 98 return key_blob_size(key_blob) + enforced.SerializedSize() + unenforced.SerializedSize(); 103 buf = enforced.Serialize(buf, end); 108 return deserialize_key_blob(&key_blob, buf_ptr, end) && enforced.Deserialize(buf_ptr, end) && 135 return enforced.SerializedSize() + unenforced.SerializedSize(); 139 buf = enforced.Serialize(buf, end); 145 return enforced.Deserialize(buf_ptr, end) && unenforced.Deserialize(buf_ptr, end); 359 return key_blob_size(key_blob) + enforced.SerializedSize() + unenforced.SerializedSize(); 364 buf = enforced.Serialize(buf, end); 369 return deserialize_key_blob(&key_blob, buf_ptr, end) && enforced.Deserialize(buf_ptr, end) && 676 return key_blob_size(key_blob) + enforced.SerializedSize() + unenforced.SerializedSize() [all...] |
android_keymaster.cpp | 229 response->enforced.Clear(); 232 &response->enforced, &response->unenforced); 251 response->enforced = move(key->hw_enforced()); 254 response->error = CheckVersionInfo(response->enforced, response->unenforced, *context_); 445 &response->enforced, &response->unenforced); 525 &response->enforced, &response->unenforced);
|
/system/keymaster/tests/ |
android_keymaster_messages_test.cpp | 145 rsp.enforced.Reinitialize(params, array_length(params)); 149 EXPECT_EQ(deserialized->enforced, rsp.enforced); 160 rsp.enforced.Reinitialize(params, array_length(params)); 164 EXPECT_EQ(0U, deserialized->enforced.size()); 187 msg.enforced.Reinitialize(params, array_length(params)); 191 EXPECT_EQ(msg.enforced, deserialized->enforced); 404 msg.enforced.Reinitialize(params, array_length(params)); 412 EXPECT_EQ(msg.enforced, deserialized->enforced) [all...] |
/hardware/interfaces/keymaster/3.0/ |
types.hal | 37 * Tags that must be semantically enforced by hardware and software implementations. 61 /** Other hardware-enforced. */ 66 * Tags that should be semantically enforced by hardware if possible and will otherwise be 67 * enforced by software (keystore). 227 * either the hardware-enforced or software-enforced list for a key, indicating whether the key is 228 * hardware or software-based. Specifically, a key with GENERATED in the hardware-enforced list is
|
/bionic/ |
android-changes-for-ndk-developers.md | 120 ## Private API (Enforced for API level >= 24) 123 non-NDK platform libraries. Starting with API 24 this rule is enforced and 125 rule is enforced by the dynamic linker, so non-public libraries 187 ## Missing Section Headers (Enforced for API level >= 24) 206 ## Text Relocations (Enforced for API level >= 23) 255 ## Invalid DT_NEEDED Entries (Enforced for API level >= 23) 294 ## Missing SONAME (Enforced for API level >= 23) 329 ## Writable and Executable Segments (Enforced for API level >= 26) 335 flags should be mutually exclusive. This wasn't historically enforced, 347 ## Invalid ELF header/section headers (Enforced for API level >= 26 [all...] |
/hardware/libhardware/include/hardware/ |
keymaster_defs.h | 51 * Tags that must be semantically enforced by hardware and software implementations. 75 /* Other hardware-enforced. */ 80 * Tags that should be semantically enforced by hardware if possible and will otherwise be 81 * enforced by software (keystore). 267 * in either the hardware-enforced or software-enforced list for a key, indicating whether the key 269 * hardware-enforced list is guaranteed never to have existed outide the secure hardware. 330 * control restrictions. The parameters are divided into two categories, those that are enforced by 332 * enforced array must NULL. Hardware implementations must enforce everything in the enforced [all...] |
/external/robolectric-shadows/processor/ |
README.md | 21 There are a number of usages and constraints implicit in Robolectric's annotation model which if violated will introduce bugs. Many of these cannot be expressed using the simple type system in the annotations themselves. Testing for violations of these constraints at present is enforced by unit tests such as `RobolectricWiringTest`. 25 Constraints currently enforced by RAP are: 33 Eventually it should be possible to migrate all of the relevant unit tests (such as `RobolectricWiringTest`) to RAP so that all the relevant constraints are enforced by the compiler.
|
/frameworks/av/media/libaudioprocessing/include/media/ |
AudioResamplerPublic.h | 35 // audio sample rate and the target rate when upsampling. It is loosely enforced by 41 // speeds supported by the system. These are enforced by the system and values outside this range 53 // pitch shifting supported by the system. These are not enforced by the system and values
|
/art/libdexfile/dex/ |
string_reference.h | 55 // Use the string order enforced by the dex file verifier.
|
/cts/tests/JobSchedulerSharedUid/jobperm/src/android/jobscheduler/cts/shareduid/jobperm/ |
JobPermProvider.java | 33 * Empty content provider, all permissions are enforced in manifest
|
/cts/tests/tests/permission2/src/android/permission2/cts/ |
ContactsProviderTest.java | 27 * Verify that deprecated contacts permissions are not enforced.
|
/developers/samples/android/admin/AppRestrictionEnforcer/ |
template-params.xml | 71 enforced on another app.
|