/system/bt/gd/cert/ |
D | truth.py | 142 def assertThat(subject): argument 143 if type(subject) is bool: 144 return BooleanSubject(subject) 145 elif isinstance(subject, IEventStream): 146 return EventStreamSubject(subject) 147 elif isinstance(subject, timedelta): 148 return TimeDeltaSubject(subject) 150 return ObjectSubject(subject)
|
/system/sepolicy/prebuilts/api/27.0/private/ |
D | mls | 9 # Process transition: Require equivalence unless the subject is trusted. 26 # the subject is trusted. Sockets inherit the range of their creator. 45 # the subject is trusted. Also, files should always be single-level. 56 # Subject must be equivalent to object unless the subject is trusted. 66 # Read operations: Subject must dominate object unless the subject 75 # subject or the object is trusted.
|
/system/sepolicy/prebuilts/api/28.0/private/ |
D | mls | 9 # Process transition: Require equivalence unless the subject is trusted. 26 # the subject is trusted. Sockets inherit the range of their creator. 45 # the subject is trusted. Also, files should always be single-level. 56 # Subject must dominate object unless the subject is trusted. 66 # Read operations: Subject must dominate object unless the subject 75 # subject or the object is trusted.
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | mls | 9 # Process transition: Require equivalence unless the subject is trusted. 26 # the subject is trusted. Sockets inherit the range of their creator. 45 # the subject is trusted. Also, files should always be single-level. 56 # Subject must be equivalent to object unless the subject is trusted. 66 # Read operations: Subject must dominate object unless the subject 75 # subject or the object is trusted.
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | mls | 9 # Process transition: Require equivalence unless the subject is trusted. 26 # the subject is trusted. Sockets inherit the range of their creator. 45 # the subject is trusted. Also, files should always be single-level. 56 # Subject must dominate object unless the subject is trusted. 73 # Read operations: Subject must dominate object unless the subject 82 # subject or the object is trusted.
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | mls | 9 # Process transition: Require equivalence unless the subject is trusted. 26 # the subject is trusted. Sockets inherit the range of their creator. 45 # the subject is trusted. Also, files should always be single-level. 56 # Subject must dominate object unless the subject is trusted. 73 # Read operations: Subject must dominate object unless the subject 82 # subject or the object is trusted.
|
/system/sepolicy/prebuilts/api/31.0/private/ |
D | mls | 9 # Process transition: Require equivalence unless the subject is trusted. 26 # the subject is trusted. Sockets inherit the range of their creator. 45 # the subject is trusted. Also, files should always be single-level. 63 # Subject must dominate object unless the subject is trusted. 81 # Read operations: Subject must dominate object unless the subject 91 # subject or the object is trusted.
|
/system/sepolicy/private/ |
D | mls | 9 # Process transition: Require equivalence unless the subject is trusted. 26 # the subject is trusted. Sockets inherit the range of their creator. 45 # the subject is trusted. Also, files should always be single-level. 63 # Subject must dominate object unless the subject is trusted. 81 # Read operations: Subject must dominate object unless the subject 91 # subject or the object is trusted.
|
/system/ca-certificates/ |
D | README.cacerts | 2 where "hash" is the subject hash produced by:
|
/system/security/keystore2/src/crypto/ |
D | crypto.cpp | 298 X509_NAME* subject = X509_get_subject_name(cert.get()); in extractSubjectFromCertificate() local 299 if (!subject) { in extractSubjectFromCertificate() 304 int subject_len = i2d_X509_NAME(subject, nullptr /* Don't copy the data */); in extractSubjectFromCertificate() 320 return i2d_X509_NAME(subject, &tmp); in extractSubjectFromCertificate()
|
D | certificate_utils.cpp | 217 std::optional<std::reference_wrapper<const std::vector<uint8_t>>> subject, in makeCertRump() argument 253 auto subjectName = makeCommonName(subject); in makeCertRump() 290 std::optional<std::reference_wrapper<const std::vector<uint8_t>>> subject, in makeCert() argument 297 makeCertRump(serial, subject, activeDateTimeMilliSeconds, usageExpireDateTimeMilliSeconds); in makeCert()
|
/system/keymaster/km_openssl/ |
D | certificate_utils.cpp | 167 keymaster_blob_t subject{}; in get_certificate_params() local 168 if (caller_params.GetTagValue(TAG_CERTIFICATE_SUBJECT, &subject) && subject.data_length) { in get_certificate_params() 169 return make_name_from_der(subject, &cert_params->subject_name); in get_certificate_params()
|
/system/security/keystore2/src/crypto/include/ |
D | certificate_utils.h | 95 std::optional<std::reference_wrapper<const std::vector<uint8_t>>> subject, //
|
/system/extras/power_profile/camera_avg/ |
D | LICENSE | 230 original works of authorship and other material subject to copyright 244 material not subject to the license. This includes other CC- 284 a. Adapted Material means material subject to Copyright and Similar 328 i. Licensed Rights means the rights granted to You subject to the 339 other material subject to Copyright and Similar Rights by digital 450 Your exercise of the Licensed Rights is expressly made subject to the
|
/system/security/keystore2/src/km_compat/ |
D | km_compat.cpp | 981 std::optional<std::reference_wrapper<const std::vector<uint8_t>>> subject; in makeCert() local 983 subject = *blob; in makeCert() 1006 pkey, serial, subject, activation, expiration, false /* intentionally left blank */, in makeCert()
|
/system/apex/docs/ |
D | README.md | 245 the content in this section is subject to change.
|
/system/chre/chre_api/doc/ |
D | Doxyfile | 1074 # Note: The header is subject to change so you typically have to regenerate the
|
/system/chre/pal/doc/ |
D | Doxyfile | 1074 # Note: The header is subject to change so you typically have to regenerate the
|
/system/media/audio_utils/ |
D | Doxyfile | 1152 # Note: The header is subject to change so you typically have to regenerate the
|