Searched refs:upgrade (Results 1 – 19 of 19) sorted by relevance
30 // adbd apex with INT_MAX version code, to allow for upgrade/rollback testing.
88 pip3 install --user --upgrade virtualenv > /dev/null 2>&1
160 upgrade = -2, enumerator
400 case KeymasterSignResult::upgrade: in keymaster_sign_object()1735 int upgrade = 0; in test_mount_encrypted_fs() local1821 upgrade = 1; in test_mount_encrypted_fs()1824 upgrade = 1; in test_mount_encrypted_fs()1827 if (upgrade) { in test_mount_encrypted_fs()
356 return KeymasterSignResult::upgrade; in keymaster_sign_object_for_cryptfs_scrypt()
39 in /data (as could happen if the device has just received an OTA upgrade).136 ICU upgrade, which currently requires a major version increment: Android uses
49 ro.lmk.critical_upgrade: enables upgrade to critical level. Default = false
121 # Allow shell to mock an OTA using persist.pm.mock-upgrade
65 persist.pm.mock-upgrade u:object_r:mock_ota_prop:s0
1226 bool upgrade; /* true, to upgrade the link key */ member1239 tBTM_SP_UPGRADE upgrade; /* BTM_SP_UPGRADE_EVT */ member
88 # Allow shell to mock an OTA using persist.pm.mock-upgrade
13 upgrade.
68 persist.pm.mock-upgrade u:object_r:mock_ota_prop:s0
2629 bta_dm_co_lk_upgrade(p_data->upgrade.bd_addr, &p_data->upgrade.upgrade); in bta_dm_sp_cback()
1636 evt_data.upgrade = true; in btm_sec_check_upgrade()1641 BTM_TRACE_DEBUG("evt_data.upgrade:0x%x", evt_data.upgrade); in btm_sec_check_upgrade()1642 if (evt_data.upgrade) { in btm_sec_check_upgrade()
154 Useful for upgrade processes that require upgrading
1005 # during upgrade by recovery.
1012 # during upgrade by recovery.
785 # Set SELinux security contexts on upgrade or policy update.