Searched refs:policies (Results 1 – 17 of 17) sorted by relevance
/system/update_engine/update_manager/ |
D | policy_utils.h | 47 EvalStatus ConsultPolicies(const std::vector<Policy const*> policies, in ConsultPolicies() argument 54 for (auto policy : policies) { in ConsultPolicies()
|
/system/update_engine/ |
D | README.md | 49 initiated), it first consults different device policies to see if the update 50 check is allowed. For example, device policies can prevent an update check 54 Once policies allow for the update check, the updater client sends a request to 146 In Chrome OS, devices are allowed to accept different policies from their 147 managing organizations. Some of these policies affect how/when updates should be 151 responsibility of loading such policies and making different decisions based on 152 them. For example, some policies may allow the act of checking for updates to 153 happen, while they prevent downloading the update payload. Or some policies 155 relates to the Chrome OS update policies should be contained within the 179 is managed by the enterprise device policies only. [all …]
|
/system/sepolicy/prebuilts/api/30.0/public/ |
D | vold.te | 46 # Get/set file-based encryption policies on dirs in /data and adoptable storage, 55 # Only vold and init should ever set file-based encryption policies.
|
D | app.te | 6 ### extend from this policy. Only policies which should apply to ALL
|
/system/sepolicy/public/ |
D | vold.te | 46 # Get/set file-based encryption policies on dirs in /data and adoptable storage, 55 # Only vold and init should ever set file-based encryption policies.
|
D | app.te | 6 ### extend from this policy. Only policies which should apply to ALL
|
/system/core/logcat/ |
D | event.logtags | 123 # 70000 - 70199 reserved for PhoneWindowManager and other policies
|
/system/ca-certificates/files/ |
D | 3d441de8.0 | 89 CPS: http://www.pkioverheid.nl/policies/root-policy-G2
|
/system/sepolicy/ |
D | README | 40 policies, policy generation, conditional file paths, etc. It is supported in
|
/system/extras/power_profile/camera_avg/ |
D | LICENSE | 636 otherwise permitted by the Creative Commons policies published at 637 creativecommons.org/policies, Creative Commons does not authorize the
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | app.te | 6 ### extend from this policy. Only policies which should apply to ALL
|
/system/sepolicy/prebuilts/api/28.0/public/ |
D | app.te | 6 ### extend from this policy. Only policies which should apply to ALL
|
/system/sepolicy/prebuilts/api/27.0/private/ |
D | app.te | 6 ### extend from this policy. Only policies which should apply to ALL
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | app.te | 6 ### extend from this policy. Only policies which should apply to ALL
|
/system/sepolicy/prebuilts/api/30.0/private/compat/28.0/ |
D | 28.0.cil | 30 ;; mapping file compiles with vendor policies without exported_audio_prop type.
|
/system/sepolicy/private/compat/28.0/ |
D | 28.0.cil | 30 ;; mapping file compiles with vendor policies without exported_audio_prop type.
|
/system/sepolicy/prebuilts/api/29.0/private/compat/28.0/ |
D | 28.0.cil | 24 ;; mapping file compiles with vendor policies without exported_audio_prop type.
|