Home
last modified time | relevance | path

Searched refs:subject (Results 1 – 24 of 24) sorted by relevance

/system/sepolicy/prebuilts/api/29.0/private/
Dmls9 # Process transition: Require equivalence unless the subject is trusted.
26 # the subject is trusted. Sockets inherit the range of their creator.
45 # the subject is trusted. Also, files should always be single-level.
56 # Subject must dominate object unless the subject is trusted.
73 # Read operations: Subject must dominate object unless the subject
82 # subject or the object is trusted.
/system/sepolicy/prebuilts/api/30.0/private/
Dmls9 # Process transition: Require equivalence unless the subject is trusted.
26 # the subject is trusted. Sockets inherit the range of their creator.
45 # the subject is trusted. Also, files should always be single-level.
56 # Subject must dominate object unless the subject is trusted.
73 # Read operations: Subject must dominate object unless the subject
82 # subject or the object is trusted.
/system/sepolicy/private/
Dmls9 # Process transition: Require equivalence unless the subject is trusted.
26 # the subject is trusted. Sockets inherit the range of their creator.
45 # the subject is trusted. Also, files should always be single-level.
63 # Subject must dominate object unless the subject is trusted.
81 # Read operations: Subject must dominate object unless the subject
91 # subject or the object is trusted.
/system/sepolicy/prebuilts/api/32.0/private/
Dmls9 # Process transition: Require equivalence unless the subject is trusted.
26 # the subject is trusted. Sockets inherit the range of their creator.
45 # the subject is trusted. Also, files should always be single-level.
63 # Subject must dominate object unless the subject is trusted.
81 # Read operations: Subject must dominate object unless the subject
91 # subject or the object is trusted.
/system/sepolicy/prebuilts/api/33.0/private/
Dmls9 # Process transition: Require equivalence unless the subject is trusted.
26 # the subject is trusted. Sockets inherit the range of their creator.
45 # the subject is trusted. Also, files should always be single-level.
63 # Subject must dominate object unless the subject is trusted.
81 # Read operations: Subject must dominate object unless the subject
91 # subject or the object is trusted.
/system/sepolicy/prebuilts/api/34.0/private/
Dmls9 # Process transition: Require equivalence unless the subject is trusted.
26 # the subject is trusted. Sockets inherit the range of their creator.
45 # the subject is trusted. Also, files should always be single-level.
63 # Subject must dominate object unless the subject is trusted.
81 # Read operations: Subject must dominate object unless the subject
91 # subject or the object is trusted.
/system/sepolicy/prebuilts/api/31.0/private/
Dmls9 # Process transition: Require equivalence unless the subject is trusted.
26 # the subject is trusted. Sockets inherit the range of their creator.
45 # the subject is trusted. Also, files should always be single-level.
63 # Subject must dominate object unless the subject is trusted.
81 # Read operations: Subject must dominate object unless the subject
91 # subject or the object is trusted.
/system/security/ondevice-signing/
DCertUtils.cpp59 static X509V3_CTX makeContext(X509* issuer, X509* subject) { in makeContext() argument
61 X509V3_set_ctx(&context, issuer, subject, nullptr, nullptr, 0); in makeContext()
179 const CertSubject& subject, EVP_PKEY* publicKey, in createCertificate() argument
194 ASN1_INTEGER_set(X509_get_serialNumber(x509.get()), subject.serialNumber); in createCertificate()
214 addNameEntry(subjectName, "CN", subject.commonName); in createCertificate()
296 const CertSubject& subject, const std::vector<uint8_t>& rsaPublicKey, in createLeafCertificate() argument
304 return createCertificate(subject, rsa_pkey.value().get(), signFunction, issuerCertPath, path); in createLeafCertificate()
/system/security/keystore2/src/crypto/
Dcrypto.cpp298 X509_NAME* subject = X509_get_subject_name(cert.get()); in extractSubjectFromCertificate() local
299 if (!subject) { in extractSubjectFromCertificate()
304 int subject_len = i2d_X509_NAME(subject, nullptr /* Don't copy the data */); in extractSubjectFromCertificate()
320 return i2d_X509_NAME(subject, &tmp); in extractSubjectFromCertificate()
Dcertificate_utils.cpp218 std::optional<std::reference_wrapper<const std::vector<uint8_t>>> subject, in makeCertRump() argument
254 auto subjectName = makeCommonName(subject); in makeCertRump()
291 std::optional<std::reference_wrapper<const std::vector<uint8_t>>> subject, in makeCert() argument
298 makeCertRump(serial, subject, activeDateTimeMilliSeconds, usageExpireDateTimeMilliSeconds); in makeCert()
/system/ca-certificates/
DREADME.cacerts2 where "hash" is the subject hash produced by:
/system/keymaster/km_openssl/
Dcertificate_utils.cpp160 keymaster_blob_t subject{}; in get_certificate_params() local
161 if (caller_params.GetTagValue(TAG_CERTIFICATE_SUBJECT, &subject) && subject.data_length) { in get_certificate_params()
162 return make_name_from_der(subject, &cert_params->subject_name); in get_certificate_params()
/system/security/ondevice-signing/include/
DCertUtils.h50 const CertSubject& subject, const std::vector<uint8_t>& publicKey,
/system/security/keystore2/src/crypto/include/
Dcertificate_utils.h97 std::optional<std::reference_wrapper<const std::vector<uint8_t>>> subject, //
/system/core/fs_mgr/
DNOTICE9 furnished to do so, subject to the following conditions:
/system/memory/libion/original-kernel-headers/linux/
DLICENSE180 copy, distribute or modify the Program subject to these terms and conditions.
329 subject to the following clarification and special exception to the GPL, but
331 the words "Oracle designates this particular file as subject to the "Classpath"
/system/bpfprogs/
DLICENSE180 copy, distribute or modify the Program subject to these terms and conditions.
329 subject to the following clarification and special exception to the GPL, but
331 the words "Oracle designates this particular file as subject to the "Classpath"
/system/keymint/tests/src/
Dlib.rs554 let subject_data = cert.tbs_certificate.subject.to_vec().unwrap(); in test_signing_cert_parse()
/system/security/keystore2/src/km_compat/
Dkm_compat.cpp1090 std::optional<std::reference_wrapper<const std::vector<uint8_t>>> subject; in makeCert() local
1092 subject = *blob; in makeCert()
1115 pkey, serial, subject, activation, expiration, false /* intentionally left blank */, in makeCert()
/system/keymint/ta/src/
Dcert.rs137 subject: RdnSequence::from_der(cert_subject)?, in tbs_certificate()
151 .subject in extract_subject()
/system/apex/docs/
DREADME.md245 the content in this section is subject to change.
/system/chre/pal/doc/
DDoxyfile1074 # Note: The header is subject to change so you typically have to regenerate the
/system/chre/chre_api/doc/
DDoxyfile1074 # Note: The header is subject to change so you typically have to regenerate the
/system/media/audio_utils/
DDoxyfile1152 # Note: The header is subject to change so you typically have to regenerate the