Home
last modified time | relevance | path

Searched refs:subject (Results 1 – 19 of 19) sorted by relevance

/system/bt/gd/cert/
Dtruth.py142 def assertThat(subject): argument
143 if type(subject) is bool:
144 return BooleanSubject(subject)
145 elif isinstance(subject, IEventStream):
146 return EventStreamSubject(subject)
147 elif isinstance(subject, timedelta):
148 return TimeDeltaSubject(subject)
150 return ObjectSubject(subject)
/system/sepolicy/prebuilts/api/27.0/private/
Dmls9 # Process transition: Require equivalence unless the subject is trusted.
26 # the subject is trusted. Sockets inherit the range of their creator.
45 # the subject is trusted. Also, files should always be single-level.
56 # Subject must be equivalent to object unless the subject is trusted.
66 # Read operations: Subject must dominate object unless the subject
75 # subject or the object is trusted.
/system/sepolicy/prebuilts/api/28.0/private/
Dmls9 # Process transition: Require equivalence unless the subject is trusted.
26 # the subject is trusted. Sockets inherit the range of their creator.
45 # the subject is trusted. Also, files should always be single-level.
56 # Subject must dominate object unless the subject is trusted.
66 # Read operations: Subject must dominate object unless the subject
75 # subject or the object is trusted.
/system/sepolicy/prebuilts/api/26.0/private/
Dmls9 # Process transition: Require equivalence unless the subject is trusted.
26 # the subject is trusted. Sockets inherit the range of their creator.
45 # the subject is trusted. Also, files should always be single-level.
56 # Subject must be equivalent to object unless the subject is trusted.
66 # Read operations: Subject must dominate object unless the subject
75 # subject or the object is trusted.
/system/sepolicy/prebuilts/api/30.0/private/
Dmls9 # Process transition: Require equivalence unless the subject is trusted.
26 # the subject is trusted. Sockets inherit the range of their creator.
45 # the subject is trusted. Also, files should always be single-level.
56 # Subject must dominate object unless the subject is trusted.
73 # Read operations: Subject must dominate object unless the subject
82 # subject or the object is trusted.
/system/sepolicy/prebuilts/api/29.0/private/
Dmls9 # Process transition: Require equivalence unless the subject is trusted.
26 # the subject is trusted. Sockets inherit the range of their creator.
45 # the subject is trusted. Also, files should always be single-level.
56 # Subject must dominate object unless the subject is trusted.
73 # Read operations: Subject must dominate object unless the subject
82 # subject or the object is trusted.
/system/sepolicy/prebuilts/api/31.0/private/
Dmls9 # Process transition: Require equivalence unless the subject is trusted.
26 # the subject is trusted. Sockets inherit the range of their creator.
45 # the subject is trusted. Also, files should always be single-level.
63 # Subject must dominate object unless the subject is trusted.
81 # Read operations: Subject must dominate object unless the subject
91 # subject or the object is trusted.
/system/sepolicy/private/
Dmls9 # Process transition: Require equivalence unless the subject is trusted.
26 # the subject is trusted. Sockets inherit the range of their creator.
45 # the subject is trusted. Also, files should always be single-level.
63 # Subject must dominate object unless the subject is trusted.
81 # Read operations: Subject must dominate object unless the subject
91 # subject or the object is trusted.
/system/ca-certificates/
DREADME.cacerts2 where "hash" is the subject hash produced by:
/system/security/keystore2/src/crypto/
Dcrypto.cpp298 X509_NAME* subject = X509_get_subject_name(cert.get()); in extractSubjectFromCertificate() local
299 if (!subject) { in extractSubjectFromCertificate()
304 int subject_len = i2d_X509_NAME(subject, nullptr /* Don't copy the data */); in extractSubjectFromCertificate()
320 return i2d_X509_NAME(subject, &tmp); in extractSubjectFromCertificate()
Dcertificate_utils.cpp217 std::optional<std::reference_wrapper<const std::vector<uint8_t>>> subject, in makeCertRump() argument
253 auto subjectName = makeCommonName(subject); in makeCertRump()
290 std::optional<std::reference_wrapper<const std::vector<uint8_t>>> subject, in makeCert() argument
297 makeCertRump(serial, subject, activeDateTimeMilliSeconds, usageExpireDateTimeMilliSeconds); in makeCert()
/system/keymaster/km_openssl/
Dcertificate_utils.cpp167 keymaster_blob_t subject{}; in get_certificate_params() local
168 if (caller_params.GetTagValue(TAG_CERTIFICATE_SUBJECT, &subject) && subject.data_length) { in get_certificate_params()
169 return make_name_from_der(subject, &cert_params->subject_name); in get_certificate_params()
/system/security/keystore2/src/crypto/include/
Dcertificate_utils.h95 std::optional<std::reference_wrapper<const std::vector<uint8_t>>> subject, //
/system/extras/power_profile/camera_avg/
DLICENSE230 original works of authorship and other material subject to copyright
244 material not subject to the license. This includes other CC-
284 a. Adapted Material means material subject to Copyright and Similar
328 i. Licensed Rights means the rights granted to You subject to the
339 other material subject to Copyright and Similar Rights by digital
450 Your exercise of the Licensed Rights is expressly made subject to the
/system/security/keystore2/src/km_compat/
Dkm_compat.cpp981 std::optional<std::reference_wrapper<const std::vector<uint8_t>>> subject; in makeCert() local
983 subject = *blob; in makeCert()
1006 pkey, serial, subject, activation, expiration, false /* intentionally left blank */, in makeCert()
/system/apex/docs/
DREADME.md245 the content in this section is subject to change.
/system/chre/chre_api/doc/
DDoxyfile1074 # Note: The header is subject to change so you typically have to regenerate the
/system/chre/pal/doc/
DDoxyfile1074 # Note: The header is subject to change so you typically have to regenerate the
/system/media/audio_utils/
DDoxyfile1152 # Note: The header is subject to change so you typically have to regenerate the