Home
last modified time | relevance | path

Searched refs:upgrade (Results 1 – 19 of 19) sorted by relevance

/system/core/adb/apex/
DAndroid.bp30 // adbd apex with INT_MAX version code, to allow for upgrade/rollback testing.
/system/bt/gd/cert/
Dset_up_virtualenv.sh88 pip3 install --user --upgrade virtualenv > /dev/null 2>&1
/system/vold/
DKeymaster.h160 upgrade = -2, enumerator
Dcryptfs.cpp400 case KeymasterSignResult::upgrade: in keymaster_sign_object()
1735 int upgrade = 0; in test_mount_encrypted_fs() local
1821 upgrade = 1; in test_mount_encrypted_fs()
1824 upgrade = 1; in test_mount_encrypted_fs()
1827 if (upgrade) { in test_mount_encrypted_fs()
DKeymaster.cpp356 return KeymasterSignResult::upgrade; in keymaster_sign_object_for_cryptfs_scrypt()
/system/timezone/
DREADME.android39 in /data (as could happen if the device has just received an OTA upgrade).
136 ICU upgrade, which currently requires a major version increment: Android uses
/system/memory/lmkd/
DREADME.md49 ro.lmk.critical_upgrade: enables upgrade to critical level. Default = false
/system/sepolicy/private/
Dshell.te121 # Allow shell to mock an OTA using persist.pm.mock-upgrade
Dproperty_contexts65 persist.pm.mock-upgrade u:object_r:mock_ota_prop:s0
/system/bt/stack/include/
Dbtm_api_types.h1226 bool upgrade; /* true, to upgrade the link key */ member
1239 tBTM_SP_UPGRADE upgrade; /* BTM_SP_UPGRADE_EVT */ member
/system/sepolicy/prebuilts/api/30.0/public/
Dshell.te88 # Allow shell to mock an OTA using persist.pm.mock-upgrade
/system/core/adb/
DSERVICES.TXT13 upgrade.
/system/sepolicy/prebuilts/api/30.0/private/
Dproperty_contexts68 persist.pm.mock-upgrade u:object_r:mock_ota_prop:s0
/system/bt/bta/dm/
Dbta_dm_act.cc2629 bta_dm_co_lk_upgrade(p_data->upgrade.bd_addr, &p_data->upgrade.upgrade); in bta_dm_sp_cback()
/system/bt/stack/btm/
Dbtm_sec.cc1636 evt_data.upgrade = true; in btm_sec_check_upgrade()
1641 BTM_TRACE_DEBUG("evt_data.upgrade:0x%x", evt_data.upgrade); in btm_sec_check_upgrade()
1642 if (evt_data.upgrade) { in btm_sec_check_upgrade()
/system/core/fastboot/
DREADME.md154 Useful for upgrade processes that require upgrading
/system/sepolicy/prebuilts/api/27.0/public/
Ddomain.te1005 # during upgrade by recovery.
/system/sepolicy/prebuilts/api/26.0/public/
Ddomain.te1012 # during upgrade by recovery.
/system/core/rootdir/
Dinit.rc785 # Set SELinux security contexts on upgrade or policy update.