Home
last modified time | relevance | path

Searched refs:policies (Results 1 – 17 of 17) sorted by relevance

/system/update_engine/update_manager/
Dpolicy_utils.h47 EvalStatus ConsultPolicies(const std::vector<Policy const*> policies, in ConsultPolicies() argument
54 for (auto policy : policies) { in ConsultPolicies()
/system/update_engine/
DREADME.md49 initiated), it first consults different device policies to see if the update
50 check is allowed. For example, device policies can prevent an update check
54 Once policies allow for the update check, the updater client sends a request to
146 In Chrome OS, devices are allowed to accept different policies from their
147 managing organizations. Some of these policies affect how/when updates should be
151 responsibility of loading such policies and making different decisions based on
152 them. For example, some policies may allow the act of checking for updates to
153 happen, while they prevent downloading the update payload. Or some policies
155 relates to the Chrome OS update policies should be contained within the
179 is managed by the enterprise device policies only.
[all …]
/system/sepolicy/prebuilts/api/30.0/public/
Dvold.te46 # Get/set file-based encryption policies on dirs in /data and adoptable storage,
55 # Only vold and init should ever set file-based encryption policies.
Dapp.te6 ### extend from this policy. Only policies which should apply to ALL
/system/sepolicy/public/
Dvold.te46 # Get/set file-based encryption policies on dirs in /data and adoptable storage,
55 # Only vold and init should ever set file-based encryption policies.
Dapp.te6 ### extend from this policy. Only policies which should apply to ALL
/system/core/logcat/
Devent.logtags123 # 70000 - 70199 reserved for PhoneWindowManager and other policies
/system/ca-certificates/files/
D3d441de8.089 CPS: http://www.pkioverheid.nl/policies/root-policy-G2
/system/sepolicy/
DREADME40 policies, policy generation, conditional file paths, etc. It is supported in
/system/extras/power_profile/camera_avg/
DLICENSE636 otherwise permitted by the Creative Commons policies published at
637 creativecommons.org/policies, Creative Commons does not authorize the
/system/sepolicy/prebuilts/api/26.0/private/
Dapp.te6 ### extend from this policy. Only policies which should apply to ALL
/system/sepolicy/prebuilts/api/28.0/public/
Dapp.te6 ### extend from this policy. Only policies which should apply to ALL
/system/sepolicy/prebuilts/api/27.0/private/
Dapp.te6 ### extend from this policy. Only policies which should apply to ALL
/system/sepolicy/prebuilts/api/29.0/public/
Dapp.te6 ### extend from this policy. Only policies which should apply to ALL
/system/sepolicy/prebuilts/api/30.0/private/compat/28.0/
D28.0.cil30 ;; mapping file compiles with vendor policies without exported_audio_prop type.
/system/sepolicy/private/compat/28.0/
D28.0.cil30 ;; mapping file compiles with vendor policies without exported_audio_prop type.
/system/sepolicy/prebuilts/api/29.0/private/compat/28.0/
D28.0.cil24 ;; mapping file compiles with vendor policies without exported_audio_prop type.