Searched refs:allowed (Results 1 – 22 of 22) sorted by relevance
/device/google/cuttlefish/host/commands/secure_env/oemlock/ |
D | oemlock.cpp | 91 Result<void> OemLock::SetOemUnlockAllowedByCarrier(bool allowed) { in SetOemUnlockAllowedByCarrier() argument 92 CF_EXPECT(WriteFlag(storage_, kAllowedByCarrierBit, allowed)); in SetOemUnlockAllowedByCarrier() 96 Result<void> OemLock::SetOemUnlockAllowedByDevice(bool allowed) { in SetOemUnlockAllowedByDevice() argument 97 CF_EXPECT(WriteFlag(storage_, kAllowedByDeviceBit, allowed)); in SetOemUnlockAllowedByDevice()
|
D | oemlock.h | 41 Result<void> SetOemUnlockAllowedByCarrier(bool allowed); 42 Result<void> SetOemUnlockAllowedByDevice(bool allowed);
|
/device/google/contexthub/firmware/ |
D | CodingStandard.txt | 24 12. Do not use short. char is allowed for actual printable strings only. Use uint8_t/uint16_t/ 26 13. int/unsigned int is allowed only for simple loop iterators only (or, if you must, as a return t… 30 15. All structures shall be packed to avoid space waste, as the compiler is not allowed to pack the… 37 18. Absolutely no "double" types are allowed. Absolutely no passing of "float" vars through var-args
|
/device/google/cuttlefish/host/frontend/webrtc_operator/ |
D | Readme.md | 16 Additional endpoints are allowed and are up to the specific applications. 85 In an alternative flow, not supported by this implementation but allowed by the
|
/device/google/cuttlefish/guest/hals/keymint/rust/ |
D | android.hardware.security.keymint-service.rust.rc | 4 # The keymint service is not allowed to restart.
|
/device/google/gs201-sepolicy/whitechapel_pro/ |
D | hal_power_stats_default.te | 1 # allowed to access dislay stats sysfs node
|
/device/google/gs-common/edgetpu/sepolicy/ |
D | edgetpu_app_service.te | 20 # Applications are not allowed to open the EdgeTPU device directly.
|
/device/generic/goldfish-opengl/ |
D | BUILD.gn | 200 # Vulkan ICDs on Fuchsia are only allowed to depend on (parts of) libc
|
/device/generic/car/emulator/usbpt/bluetooth/usb_modeswitch/ |
D | LICENSE | 7 of this license document, but changing it is not allowed. 151 allowed only for noncommercial distribution and only if you
|
/device/generic/car/emulator/usbpt/usbip-service/ |
D | COPYING | 7 of this license document, but changing it is not allowed. 151 allowed only for noncommercial distribution and only if you
|
/device/google/cuttlefish/host/frontend/webrtc/html_client/ |
D | style.css | 317 cursor: not-allowed;
|
/device/google/coral/json-c/ |
D | ChangeLog | 34 * trailing char not allowed
|
D | Doxyfile | 278 # allowed. This is useful if you have classes or files whose names only differ 1107 # The MAX_DOT_GRAPH_WIDTH tag can be used to set the maximum allowed width
|
/device/google/redbull/json-c/ |
D | ChangeLog | 34 * trailing char not allowed
|
D | Doxyfile | 278 # allowed. This is useful if you have classes or files whose names only differ 1107 # The MAX_DOT_GRAPH_WIDTH tag can be used to set the maximum allowed width
|
/device/google/sunfish/json-c/ |
D | ChangeLog | 34 * trailing char not allowed
|
D | Doxyfile | 278 # allowed. This is useful if you have classes or files whose names only differ 1107 # The MAX_DOT_GRAPH_WIDTH tag can be used to set the maximum allowed width
|
/device/google/coral/ |
D | WCNSS_qcom_cfg.ini | 423 # set in bitmaps are allowed in probe request, all others removed while device is unassociated
|
/device/google/sunfish/ |
D | WCNSS_qcom_cfg.ini | 423 # set in bitmaps are allowed in probe request, all others removed while device is unassociated
|
/device/google/redbull/ |
D | WCNSS_qcom_cfg.ini | 439 # set in bitmaps are allowed in probe request, all others removed while device is unassociated
|
/device/google/cuttlefish_vmm/qemu/x86_64-linux-gnu/usr/share/qemu/ |
D | trace-events-all | 294 …hz_is_allowed(void *authz, const char *identity, bool allowed) "AuthZ %p check identity=%s allowed… 4560 tpm_tis_mmio_write_locty4(void) "Access to locality 4 only allowed from hardware"
|
/device/google/cuttlefish_vmm/qemu/aarch64-linux-gnu/usr/share/qemu/ |
D | trace-events-all | 294 …hz_is_allowed(void *authz, const char *identity, bool allowed) "AuthZ %p check identity=%s allowed… 4560 tpm_tis_mmio_write_locty4(void) "Access to locality 4 only allowed from hardware"
|