Searched refs:owned (Results 1 – 17 of 17) sorted by relevance
/system/core/libsysutils/include/sysutils/ |
D | SocketClient.h | 34 SocketClient(int sock, bool owned); 35 SocketClient(int sock, bool owned, bool useCmdNum); 78 void init(int socket, bool owned, bool useCmdNum);
|
/system/core/libsysutils/src/ |
D | SocketClient.cpp | 33 SocketClient::SocketClient(int socket, bool owned) { in SocketClient() argument 34 init(socket, owned, false); in SocketClient() 37 SocketClient::SocketClient(int socket, bool owned, bool useCmdNum) { in SocketClient() argument 38 init(socket, owned, useCmdNum); in SocketClient() 41 void SocketClient::init(int socket, bool owned, bool useCmdNum) { in init() argument 43 mSocketOwned = owned; in init()
|
/system/core/logd/ |
D | logd.rc | 19 write /dev/event-log-tags "# content owned by logd
|
/system/sepolicy/public/ |
D | vdc.te | 17 # vdc information is written to shell owned bugreport files
|
D | netd.te | 14 # triggered by chmod on a directory or file owned by a group other
|
D | kernel.te | 100 # the kernel should not be accessing files owned by other users.
|
D | attributes | 130 # All socket devices owned by core domain components
|
D | domain.te | 628 # Vendor domains are not permitted to initiate create/open sockets owned by core domains 655 # Core domains are not permitted to create/open sockets owned by vendor domains 925 # write access to shell owned directories. The /data/local/tmp
|
/system/tpm/attestation/common/ |
D | common.proto | 23 // A certificate intended for enterprise-owned devices. It has the following 30 // A certificate intended for enterprise-owned user accounts. It has the
|
/system/tpm/tpm_manager/client/ |
D | tpm_ownership_dbus_proxy_test.cc | 78 EXPECT_TRUE(reply.owned()); in TEST_F()
|
/system/tpm/tpm_manager/server/ |
D | tpm_manager_service_test.cc | 158 EXPECT_TRUE(reply.owned()); in TEST_F() 176 EXPECT_TRUE(reply.owned()); in TEST_F() 196 EXPECT_TRUE(reply.owned()); in TEST_F()
|
D | binder_service_test.cc | 108 EXPECT_TRUE(reply.owned()); in TEST_F()
|
D | dbus_service_test.cc | 126 EXPECT_TRUE(reply.owned()); in TEST_F()
|
/system/tpm/tpm_manager/common/ |
D | tpm_manager.proto | 210 // Whether the TPM has been owned. 211 optional bool owned = 3; field
|
D | print_tpm_manager_proto.cc | 681 base::StringAppendF(&output, "%s", value.owned() ? "true" : "false"); in GetProtoDebugStringWithIndent()
|
/system/sepolicy/private/ |
D | app.te | 424 # Write to system-owned parts of /data.
|
/system/core/init/ |
D | README.md | 358 owned by the root user and root group. If provided, the mode, owner and group
|