/aosp12/packages/apps/Car/DebuggingRestrictionController/server/ |
H A D | genkey.sh | 24 read validity 26 if [[ -z "$validity" ]] ; then 27 validity=365 29 echo "Using '$validity' days" 61 -sha256 -days "$validity" -set_serial 666 \
|
/aosp12/packages/apps/ImsServiceEntitlement/src/com/android/imsserviceentitlement/entitlement/ |
H A D | EntitlementConfiguration.java | 183 long validity = mXmlDoc.get( in entitlementValidation() local 190 if (version > 0 && validity > 0) { in entitlementValidation() 192 } else if (version > 0 && validity == 0) { in entitlementValidation() 194 } else if (version == 0 && validity == 0) { in entitlementValidation() 196 } else if (version == -1 && validity == -1) { in entitlementValidation() 198 } else if (version == -2 && validity == -2) { in entitlementValidation()
|
/aosp12/system/sepolicy/tools/ |
H A D | README | 16 A utility for checking the validity of a file_contexts or a 19 argument in order to check the validity of the security contexts 39 checking the validity of the configurations. Used as part of the
|
/aosp12/bionic/tools/versioner/tests/multiple_decl_mismatch/ |
H A D | expected_fail | 8 versioner: validity check failed
|
/aosp12/bionic/tools/versioner/tests/version_mismatch/ |
H A D | expected_fail | 8 versioner: validity check failed
|
/aosp12/hardware/interfaces/gnss/2.0/ |
H A D | types.hal | 25 * Flags indicating the validity of the fields in ElapsedRealtime. 43 * A set of flags indicating the validity of each field in this data structure.
|
/aosp12/bionic/tools/versioner/tests/multiple_definition/ |
H A D | expected_fail | 7 versioner: validity check failed
|
/aosp12/hardware/interfaces/oemlock/1.0/ |
H A D | IOemLock.hal | 42 * validity of this request in order to harden its security. 45 * @param signature to prove validity of this request or empty if not
|
/aosp12/frameworks/base/services/core/java/com/android/server/webkit/ |
H A D | WebViewUpdateServiceImpl.java | 694 int validity = validityResult(provider, systemUserPackageInfo); in dumpAllPackageInformationLocked() local 700 if (validity == VALIDITY_OK) { in dumpAllPackageInformationLocked() 712 getInvalidityReason(validity))); in dumpAllPackageInformationLocked()
|
/aosp12/system/media/camera/docs/ |
H A D | README.md | 7 C code, Java code, and even XML itself (as a round-trip validity check).
|
H A D | metadata-generate | 196 $thisdir/metadata-parser-validity-check || exit 1
|
/aosp12/system/sepolicy/prebuilts/api/27.0/public/ |
H A D | postinstall_dexopt.te | 45 # Check validity of SELinux context before use.
|
/aosp12/system/sepolicy/prebuilts/api/26.0/public/ |
H A D | postinstall_dexopt.te | 45 # Check validity of SELinux context before use.
|
/aosp12/system/sepolicy/prebuilts/api/28.0/public/ |
H A D | postinstall_dexopt.te | 47 # Check validity of SELinux context before use.
|
/aosp12/system/sepolicy/prebuilts/api/30.0/private/ |
H A D | postinstall_dexopt.te | 61 # Check validity of SELinux context before use.
|
/aosp12/system/sepolicy/prebuilts/api/29.0/private/ |
H A D | postinstall_dexopt.te | 61 # Check validity of SELinux context before use.
|
H A D | app_zygote.te | 42 # Check validity of SELinux context before use.
|
/aosp12/system/sepolicy/prebuilts/api/31.0/private/ |
H A D | postinstall_dexopt.te | 74 # Check validity of SELinux context before use.
|
/aosp12/system/sepolicy/prebuilts/api/32.0/private/ |
H A D | postinstall_dexopt.te | 74 # Check validity of SELinux context before use.
|
/aosp12/system/sepolicy/private/ |
H A D | postinstall_dexopt.te | 74 # Check validity of SELinux context before use.
|
/aosp12/system/sepolicy/prebuilts/api/26.0/private/ |
H A D | webview_zygote.te | 48 # Check validity of SELinux context before use.
|
H A D | zygote.te | 70 # Check validity of SELinux context before use.
|
/aosp12/system/sepolicy/prebuilts/api/27.0/private/ |
H A D | webview_zygote.te | 52 # Check validity of SELinux context before use.
|
H A D | zygote.te | 70 # Check validity of SELinux context before use.
|
/aosp12/system/sepolicy/prebuilts/api/28.0/private/ |
H A D | webview_zygote.te | 56 # Check validity of SELinux context before use.
|