/system/sepolicy/prebuilts/api/29.0/private/ |
D | mls | 9 # Process transition: Require equivalence unless the subject is trusted. 26 # the subject is trusted. Sockets inherit the range of their creator. 45 # the subject is trusted. Also, files should always be single-level. 56 # Subject must dominate object unless the subject is trusted. 73 # Read operations: Subject must dominate object unless the subject 82 # subject or the object is trusted.
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | mls | 9 # Process transition: Require equivalence unless the subject is trusted. 26 # the subject is trusted. Sockets inherit the range of their creator. 45 # the subject is trusted. Also, files should always be single-level. 56 # Subject must dominate object unless the subject is trusted. 73 # Read operations: Subject must dominate object unless the subject 82 # subject or the object is trusted.
|
/system/sepolicy/private/ |
D | mls | 9 # Process transition: Require equivalence unless the subject is trusted. 26 # the subject is trusted. Sockets inherit the range of their creator. 45 # the subject is trusted. Also, files should always be single-level. 63 # Subject must dominate object unless the subject is trusted. 81 # Read operations: Subject must dominate object unless the subject 91 # subject or the object is trusted.
|
/system/sepolicy/prebuilts/api/32.0/private/ |
D | mls | 9 # Process transition: Require equivalence unless the subject is trusted. 26 # the subject is trusted. Sockets inherit the range of their creator. 45 # the subject is trusted. Also, files should always be single-level. 63 # Subject must dominate object unless the subject is trusted. 81 # Read operations: Subject must dominate object unless the subject 91 # subject or the object is trusted.
|
/system/sepolicy/prebuilts/api/33.0/private/ |
D | mls | 9 # Process transition: Require equivalence unless the subject is trusted. 26 # the subject is trusted. Sockets inherit the range of their creator. 45 # the subject is trusted. Also, files should always be single-level. 63 # Subject must dominate object unless the subject is trusted. 81 # Read operations: Subject must dominate object unless the subject 91 # subject or the object is trusted.
|
/system/sepolicy/prebuilts/api/34.0/private/ |
D | mls | 9 # Process transition: Require equivalence unless the subject is trusted. 26 # the subject is trusted. Sockets inherit the range of their creator. 45 # the subject is trusted. Also, files should always be single-level. 63 # Subject must dominate object unless the subject is trusted. 81 # Read operations: Subject must dominate object unless the subject 91 # subject or the object is trusted.
|
/system/sepolicy/prebuilts/api/31.0/private/ |
D | mls | 9 # Process transition: Require equivalence unless the subject is trusted. 26 # the subject is trusted. Sockets inherit the range of their creator. 45 # the subject is trusted. Also, files should always be single-level. 63 # Subject must dominate object unless the subject is trusted. 81 # Read operations: Subject must dominate object unless the subject 91 # subject or the object is trusted.
|
/system/security/ondevice-signing/ |
D | CertUtils.cpp | 59 static X509V3_CTX makeContext(X509* issuer, X509* subject) { in makeContext() argument 61 X509V3_set_ctx(&context, issuer, subject, nullptr, nullptr, 0); in makeContext() 179 const CertSubject& subject, EVP_PKEY* publicKey, in createCertificate() argument 194 ASN1_INTEGER_set(X509_get_serialNumber(x509.get()), subject.serialNumber); in createCertificate() 214 addNameEntry(subjectName, "CN", subject.commonName); in createCertificate() 296 const CertSubject& subject, const std::vector<uint8_t>& rsaPublicKey, in createLeafCertificate() argument 304 return createCertificate(subject, rsa_pkey.value().get(), signFunction, issuerCertPath, path); in createLeafCertificate()
|
/system/security/keystore2/src/crypto/ |
D | crypto.cpp | 298 X509_NAME* subject = X509_get_subject_name(cert.get()); in extractSubjectFromCertificate() local 299 if (!subject) { in extractSubjectFromCertificate() 304 int subject_len = i2d_X509_NAME(subject, nullptr /* Don't copy the data */); in extractSubjectFromCertificate() 320 return i2d_X509_NAME(subject, &tmp); in extractSubjectFromCertificate()
|
D | certificate_utils.cpp | 218 std::optional<std::reference_wrapper<const std::vector<uint8_t>>> subject, in makeCertRump() argument 254 auto subjectName = makeCommonName(subject); in makeCertRump() 291 std::optional<std::reference_wrapper<const std::vector<uint8_t>>> subject, in makeCert() argument 298 makeCertRump(serial, subject, activeDateTimeMilliSeconds, usageExpireDateTimeMilliSeconds); in makeCert()
|
/system/ca-certificates/ |
D | README.cacerts | 2 where "hash" is the subject hash produced by:
|
/system/keymaster/km_openssl/ |
D | certificate_utils.cpp | 160 keymaster_blob_t subject{}; in get_certificate_params() local 161 if (caller_params.GetTagValue(TAG_CERTIFICATE_SUBJECT, &subject) && subject.data_length) { in get_certificate_params() 162 return make_name_from_der(subject, &cert_params->subject_name); in get_certificate_params()
|
/system/security/ondevice-signing/include/ |
D | CertUtils.h | 50 const CertSubject& subject, const std::vector<uint8_t>& publicKey,
|
/system/security/keystore2/src/crypto/include/ |
D | certificate_utils.h | 97 std::optional<std::reference_wrapper<const std::vector<uint8_t>>> subject, //
|
/system/core/fs_mgr/ |
D | NOTICE | 9 furnished to do so, subject to the following conditions:
|
/system/memory/libion/original-kernel-headers/linux/ |
D | LICENSE | 180 copy, distribute or modify the Program subject to these terms and conditions. 329 subject to the following clarification and special exception to the GPL, but 331 the words "Oracle designates this particular file as subject to the "Classpath"
|
/system/bpfprogs/ |
D | LICENSE | 180 copy, distribute or modify the Program subject to these terms and conditions. 329 subject to the following clarification and special exception to the GPL, but 331 the words "Oracle designates this particular file as subject to the "Classpath"
|
/system/keymint/tests/src/ |
D | lib.rs | 554 let subject_data = cert.tbs_certificate.subject.to_vec().unwrap(); in test_signing_cert_parse()
|
/system/security/keystore2/src/km_compat/ |
D | km_compat.cpp | 1090 std::optional<std::reference_wrapper<const std::vector<uint8_t>>> subject; in makeCert() local 1092 subject = *blob; in makeCert() 1115 pkey, serial, subject, activation, expiration, false /* intentionally left blank */, in makeCert()
|
/system/keymint/ta/src/ |
D | cert.rs | 137 subject: RdnSequence::from_der(cert_subject)?, in tbs_certificate() 151 .subject in extract_subject()
|
/system/apex/docs/ |
D | README.md | 245 the content in this section is subject to change.
|
/system/chre/pal/doc/ |
D | Doxyfile | 1074 # Note: The header is subject to change so you typically have to regenerate the
|
/system/chre/chre_api/doc/ |
D | Doxyfile | 1074 # Note: The header is subject to change so you typically have to regenerate the
|
/system/media/audio_utils/ |
D | Doxyfile | 1152 # Note: The header is subject to change so you typically have to regenerate the
|