/system/nvram/core/tests/ |
D | nvram_manager_test.cpp | 61 static uint32_t GetControlsMask(const Vector<nvram_control_t>& controls) { in GetControlsMask() argument 63 for (nvram_control_t control : controls) { in GetControlsMask() 249 ASSERT_TRUE(create_space_request.controls.Resize(5)); in TEST_F() 250 create_space_request.controls[0] = NV_CONTROL_BOOT_WRITE_LOCK; in TEST_F() 251 create_space_request.controls[1] = NV_CONTROL_BOOT_READ_LOCK; in TEST_F() 252 create_space_request.controls[2] = NV_CONTROL_WRITE_AUTHORIZATION; in TEST_F() 253 create_space_request.controls[3] = NV_CONTROL_READ_AUTHORIZATION; in TEST_F() 254 create_space_request.controls[4] = NV_CONTROL_WRITE_EXTEND; in TEST_F() 268 EXPECT_EQ(GetControlsMask(create_space_request.controls), in TEST_F() 269 GetControlsMask(get_space_info_response.controls)); in TEST_F() [all …]
|
/system/nvram/core/ |
D | nvram_manager.cpp | 51 Vector<nvram_control_t>* controls) { in GetControlsVector() argument 54 if (!controls->Resize(controls->size() + 1)) { in GetControlsVector() 58 (*controls)[controls->size() - 1] = static_cast<nvram_control_t>(control); in GetControlsVector() 225 uint32_t controls = 0; in CreateSpace() local 226 for (uint32_t control : request.controls) { in CreateSpace() 227 controls |= (1 << control); in CreateSpace() 229 if ((controls & ~kSupportedControlsMask) != 0) { in CreateSpace() 233 if ((controls & (1 << NV_CONTROL_PERSISTENT_WRITE_LOCK)) != 0 && in CreateSpace() 234 (controls & (1 << NV_CONTROL_BOOT_WRITE_LOCK)) != 0) { in CreateSpace() 238 if ((controls & (1 << NV_CONTROL_WRITE_EXTEND)) != 0 && in CreateSpace() [all …]
|
D | persistence.cpp | 92 MakeField(2, &NvramSpace::controls),
|
/system/nvram/messages/tests/ |
D | nvram_messages_test.cpp | 92 ASSERT_TRUE(request_payload.controls.Append(NV_CONTROL_BOOT_WRITE_LOCK)); in TEST() 93 ASSERT_TRUE(request_payload.controls.Append(NV_CONTROL_WRITE_EXTEND)); in TEST() 108 ASSERT_EQ(2UL, decoded_payload->controls.size()); in TEST() 109 EXPECT_EQ(NV_CONTROL_BOOT_WRITE_LOCK, decoded_payload->controls[0]); in TEST() 110 EXPECT_EQ(NV_CONTROL_WRITE_EXTEND, decoded_payload->controls[1]); in TEST() 153 ASSERT_TRUE(response_payload.controls.Append(NV_CONTROL_BOOT_WRITE_LOCK)); in TEST() 154 ASSERT_TRUE(response_payload.controls.Append(NV_CONTROL_BOOT_READ_LOCK)); in TEST() 155 ASSERT_TRUE(response_payload.controls.Append(NV_CONTROL_WRITE_EXTEND)); in TEST() 169 ASSERT_EQ(3U, decoded_payload->controls.size()); in TEST() 170 EXPECT_EQ(NV_CONTROL_BOOT_WRITE_LOCK, decoded_payload->controls[0]); in TEST() [all …]
|
/system/nvram/core/include/nvram/core/ |
D | persistence.h | 109 return (controls & (1 << control)) != 0; in HasControl() 117 uint32_t controls = 0; member
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | policy_capabilities | 1 # Enable new networking controls.
|
/system/sepolicy/prebuilts/api/28.0/private/ |
D | policy_capabilities | 1 # Enable new networking controls.
|
D | traced.te | 14 # the privileged process that controls it.
|
/system/sepolicy/prebuilts/api/27.0/private/ |
D | policy_capabilities | 1 # Enable new networking controls.
|
/system/nvram/hal/ |
D | nvram_device_adapter.cpp | 147 *list_size = std::min(get_space_info_response.controls.size(), in device_get_space_controls() 150 control_list[i] = get_space_info_response.controls[i]; in device_get_space_controls() 153 *list_size = get_space_info_response.controls.size(); in device_get_space_controls() 183 if (!create_space_request.controls.Resize(list_size)) { in device_create_space() 187 create_space_request.controls[i] = control_list[i]; in device_create_space()
|
/system/nvram/messages/include/nvram/messages/ |
D | nvram_messages.h | 66 Vector<nvram_control_t> controls; member 79 Vector<nvram_control_t> controls; member
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | policy_capabilities | 1 # Enable new networking controls.
|
D | traced.te | 18 # the privileged process that controls it.
|
/system/sepolicy/private/ |
D | policy_capabilities | 1 # Enable new networking controls.
|
D | traced.te | 18 # the privileged process that controls it.
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | policy_capabilities | 1 # Enable new networking controls.
|
/system/media/camera/docs/ |
D | CaptureRequestKeys.mako | 17 <%include file="CameraMetadataKeys.mako" args="java_class='CaptureRequest', xml_kind='controls'" />
|
D | ACameraMetadata.mako | 60 ${single_kind_keys("controls")}\
|
D | CameraMetadataEnums.mako | 92 ${single_kind_keys('controls','CaptureRequest')}\
|
D | CameraMetadataKeys.mako | 102 ##${single_kind_keys('CaptureRequestKeys', 'controls')}
|
/system/nvram/messages/ |
D | nvram_messages.cpp | 48 MakeField(3, &CreateSpaceRequest::controls), 64 MakeField(2, &GetSpaceInfoResponse::controls),
|
/system/sepolicy/prebuilts/api/30.0/public/ |
D | iorap_prefetcherd.te | 18 # Allow reading most files under / ignoring usual access controls.
|
D | iorap_inode2filename.te | 12 # Allow reading most files under / ignoring usual access controls.
|
/system/sepolicy/public/ |
D | iorap_prefetcherd.te | 18 # Allow reading most files under / ignoring usual access controls.
|
D | iorap_inode2filename.te | 12 # Allow reading most files under / ignoring usual access controls.
|