Home
last modified time | relevance | path

Searched refs:tee (Results 1 – 25 of 51) sorted by relevance

123

/system/sepolicy/vendor/
Dtee.te2 # trusted execution environment (tee) daemon
5 init_daemon_domain(tee)
7 allow tee self:global_capability_class_set { dac_override };
8 allow tee tee_device:chr_file rw_file_perms;
9 allow tee tee_data_file:dir rw_dir_perms;
10 allow tee tee_data_file:file create_file_perms;
11 allow tee self:netlink_socket create_socket_perms_no_ioctl;
12 allow tee self:netlink_generic_socket create_socket_perms_no_ioctl;
13 allow tee ion_device:chr_file r_file_perms;
14 r_dir_file(tee, sysfs_type)
[all …]
/system/sepolicy/public/
Dtee.te2 # trusted execution environment (tee) daemon
4 type tee, domain;
9 allow tee fingerprint_vendor_data_file:dir rw_dir_perms;
10 allow tee fingerprint_vendor_data_file:file create_file_perms;
/system/sepolicy/prebuilts/api/30.0/public/
Dtee.te2 # trusted execution environment (tee) daemon
4 type tee, domain;
9 allow tee fingerprint_vendor_data_file:dir rw_dir_perms;
10 allow tee fingerprint_vendor_data_file:file create_file_perms;
/system/sepolicy/prebuilts/api/28.0/public/
Dtee.te2 # trusted execution environment (tee) daemon
4 type tee, domain;
9 allow tee fingerprint_vendor_data_file:dir rw_dir_perms;
10 allow tee fingerprint_vendor_data_file:file create_file_perms;
/system/sepolicy/prebuilts/api/31.0/public/
Dtee.te2 # trusted execution environment (tee) daemon
4 type tee, domain;
9 allow tee fingerprint_vendor_data_file:dir rw_dir_perms;
10 allow tee fingerprint_vendor_data_file:file create_file_perms;
/system/sepolicy/prebuilts/api/29.0/public/
Dtee.te2 # trusted execution environment (tee) daemon
4 type tee, domain;
9 allow tee fingerprint_vendor_data_file:dir rw_dir_perms;
10 allow tee fingerprint_vendor_data_file:file create_file_perms;
/system/update_engine/sample_images/
Dgenerate_images.sh90 echo "foo" | sudo tee "${mntdir}"/dir1/dir2/file >/dev/null
91 echo "bar" | sudo tee "${mntdir}"/dir1/file >/dev/null
112 sudo tee "${mntdir}"/etc/update_engine.conf >/dev/null <<EOF
116 sudo tee "${mntdir}"/etc/lsb-release >/dev/null <<EOF
142 sudo tee "${mntdir}"/bin/postinst_example >/dev/null <<EOF
152 sudo tee "${mntdir}"/bin/postinst_fail3 >/dev/null <<EOF
157 sudo tee "${mntdir}"/bin/postinst_fail1 >/dev/null <<EOF
163 sudo tee "${mntdir}"/bin/postinst_suspend >/dev/null <<EOF
179 sudo tee "${mntdir}"/bin/postinst_progress >/dev/null <<EOF
190 sudo tee "${mntdir}"/bin/self_check_default_context >/dev/null <<EOF
[all …]
/system/sepolicy/prebuilts/api/27.0/public/
Dtee.te2 # trusted execution environment (tee) daemon
4 type tee, domain;
/system/sepolicy/prebuilts/api/26.0/public/
Dtee.te2 # trusted execution environment (tee) daemon
4 type tee, domain;
/system/libufdt/utils/tests/
Dmkdtimg_acpi_testdata.sh48 mkdtimg dump "$IMG" -b "$OUTDTB_CFG" | grep -v 'FDT' | tee "${OUTDIR}/cfg_create_acpi.dump"
56 mkdtimg dump "$IMG" -b "$OUTDTB" | grep -v 'FDT' | tee "${OUTDIR}/create_acpi.dump"
Dmkdtimg_testdata.sh46 mkdtimg dump "$IMG" -b "$OUTDTB_CFG" | tee "${OUTDIR}/cfg_create.dump"
58 mkdtimg dump "$IMG" -b "$OUTDTB" | tee "${OUTDIR}/create.dump"
/system/sepolicy/prebuilts/api/26.0/private/
Ddomain_deprecated.te99 -tee
105 -tee
177 -tee
216 -tee
229 -tee
242 -tee
/system/security/keystore2/src/
Dboot_level_keys.rs32 let tee = KeyMintDevice::get(SecurityLevel::TRUSTED_ENVIRONMENT) in get_preferred_km_instance_for_level_zero_key() localVariable
34 if tee.version() >= KeyMintDevice::KEY_MASTER_V4_1 { in get_preferred_km_instance_for_level_zero_key()
35 Ok(tee) in get_preferred_km_instance_for_level_zero_key()
43 _ => Ok(tee), in get_preferred_km_instance_for_level_zero_key()
/system/extras/tools/
Dgraph_lockdep_chains269 tee /tmp/${progname}.split |
280 tee /tmp/${progname}.input |
/system/core/bootstat/
Dboot_reason_test.sh815 echo 'healthd: battery l=2 ' | adb_su tee /dev/kmsg >/dev/null
829 echo 'healthd: battery l=2 ' | adb_su tee /dev/kmsg >/dev/null
915 echo c | adb_su tee /proc/sysrq-trigger >/dev/null
942 echo "SysRq : Trigger a crash : 'test'" | adb_su tee /dev/kmsg
943 echo c | adb_su tee /proc/sysrq-trigger >/dev/null
973 adb_su tee /dev/kmsg
/system/core/shell_and_utilities/
DREADME.md110 split stat strings swapoff swapon sync sysctl tac tail tar taskset tee
131 split stat strings swapoff swapon sync sysctl tac tail tar taskset tee
155 sysctl tac tail tar taskset tee time timeout **top** touch tr true truncate
181 tail tar taskset tee time timeout top touch tr true truncate tty ulimit
211 tac tail tar taskset tee time timeout top touch tr **traceroute** **traceroute6**
243 tee time timeout top touch tr traceroute traceroute6 true truncate
275 tac tail tar taskset tee **test** time timeout top touch tr traceroute
/system/sepolicy/prebuilts/api/29.0/private/
Ddomain.te267 tee
313 -tee
/system/sepolicy/prebuilts/api/30.0/private/
Ddomain.te307 tee
356 -tee
/system/apex/apexd/
DAndroid.bp324 "| cut -c 3-| tee $(out)"
335 "| cut -c 3-| tee $(out)"
/system/sepolicy/private/
Ddomain.te334 tee
391 -tee
/system/sepolicy/prebuilts/api/31.0/private/
Ddomain.te334 tee
391 -tee
/system/apex/shim/build/
DAndroid.bp66 cmd: "sha512sum -b /dev/null | cut -d' ' -f1 | tee $(out)",
275 cmd: "sha512sum -b $(in) | cut -d' ' -f1 | tee $(out)",
/system/sepolicy/prebuilts/api/28.0/private/compat/26.0/
D26.0.cil652 (typeattributeset tee_26_0 (tee))
/system/sepolicy/prebuilts/api/31.0/private/compat/26.0/
D26.0.cil676 (typeattributeset tee_26_0 (tee))
/system/sepolicy/prebuilts/api/27.0/private/compat/26.0/
D26.0.cil600 (typeattributeset tee_26_0 (tee))

123