/packages/modules/Connectivity/framework/src/android/net/ |
D | BpfNetMapsUtils.java | 106 for (int chain : BpfNetMapsConstants.ALLOW_CHAINS) { 107 final long match = getMatchByFirewallChain(chain); 110 for (int chain : BpfNetMapsConstants.DENY_CHAINS) { 111 final long match = getMatchByFirewallChain(chain); 124 public static long getMatchByFirewallChain(final int chain) { in getMatchByFirewallChain() argument 125 switch (chain) { in getMatchByFirewallChain() 151 throw new ServiceSpecificException(EINVAL, "Invalid firewall chain: " + chain); in getMatchByFirewallChain() 161 public static boolean isFirewallAllowList(final int chain) { in isFirewallAllowList() argument 162 if (ALLOW_CHAINS.contains(chain) || METERED_ALLOW_CHAINS.contains(chain)) { in isFirewallAllowList() 164 } else if (DENY_CHAINS.contains(chain) || METERED_DENY_CHAINS.contains(chain)) { in isFirewallAllowList() [all …]
|
D | NetworkStackBpfNetMaps.java | 134 public boolean isChainEnabled(final int chain) { in isChainEnabled() argument 135 return BpfNetMapsUtils.isChainEnabled(mConfigurationMap, chain); in isChainEnabled() 149 public int getUidRule(final int chain, final int uid) { in getUidRule() argument 150 return BpfNetMapsUtils.getUidRule(mUidOwnerMap, chain, uid); in getUidRule()
|
D | IConnectivityManager.aidl | 245 void setUidFirewallRule(int chain, int uid, int rule); in setUidFirewallRule() argument 247 int getUidFirewallRule(int chain, int uid); in getUidFirewallRule() argument 249 void setFirewallChainEnabled(int chain, boolean enable); in setFirewallChainEnabled() argument 251 boolean getFirewallChainEnabled(int chain); in getFirewallChainEnabled() argument 253 void replaceFirewallChain(int chain, in int[] uids); in replaceFirewallChain() argument
|
/packages/modules/Virtualization/docs/ |
D | vm_remote_attestation.md | 35 entity responsible for verifying the [DICE chain][open-dice] of the RKP VM. This 41 DICE chain with the ones registered in the RKP database. Additionally, the server 43 certificates to determine the origin of the chain, confirming that it indeed 45 DICE chain validation, please refer to the [Remote Provisioning HAL][rkp-hal] 56 of each pVM's DICE chain by comparing it against its own DICE chain. This 76 RKP-backed certificate chain and an attested private key that is exclusively 77 known to the pVM. This certificate chain includes a leaf certificate covering 105 set to true only when all the DICE certificates in the pVM DICE chain are in 113 it, you only need to provide a valid VM DICE chain satisfying the following 116 - The DICE chain must have a UDS-rooted public key registered at the RKP factory. [all …]
|
D | updatable_vm.md | 15 chain(i.e., identities of a VM). VM seals its secrets using DICE policies, and Secretkeeper 45 Sealing Policy is a DICE policy on the DICE chain of the payload running in Microdroid. This is 79 entities with DICE chain that adheres to those policies can access the secrets.
|
/packages/modules/Connectivity/tests/cts/net/src/android/net/cts/ |
D | ConnectivityManagerTest.java | 3498 final boolean expectBlock, final int chain) throws Exception { 3513 + " chain=" + chain 3514 + " chainEnabled=" + mCm.getFirewallChainEnabled(chain) 3516 + " uidFirewallRule=" + mCm.getUidFirewallRule(chain, uid)); 3524 + " chain=" + chain 3525 + " chainEnabled=" + mCm.getFirewallChainEnabled(chain) 3527 + " uidFirewallRule=" + mCm.getUidFirewallRule(chain, uid)); 3539 private void doTestFirewallBlocking(final int chain, final boolean isAllowList) { 3546 final boolean wasChainEnabled = mCm.getFirewallChainEnabled(chain); 3547 final int previousUidFirewallRule = mCm.getUidFirewallRule(chain, myUid); [all …]
|
/packages/modules/NeuralNetworks/runtime/test/specs/AIDL_V3/ |
D | reverse.mod.py | 17 from itertools import chain 54 output_data = list(chain(range(12,24), range(0,12))), 63 output_data = list(chain(range(8,12), range(4,8), range(0,4), 73 output_data = list(chain(rrange(3,-1), rrange(7,3), rrange(11,7),
|
/packages/modules/Connectivity/tests/unit/java/com/android/server/ |
D | BpfNetMapsTest.java | 205 for (final int chain: chains) { in getMatch() 206 match |= BpfNetMapsUtils.getMatchByFirewallChain(chain); in getMatch() 214 for (final int chain: FIREWALL_CHAINS) { in doTestIsChainEnabled() 215 final String testCase = "EnabledChains: " + enableChains + " CheckedChain: " + chain; in doTestIsChainEnabled() 216 if (enableChains.contains(chain)) { in doTestIsChainEnabled() 218 mBpfNetMaps.isChainEnabled(chain)); in doTestIsChainEnabled() 221 mBpfNetMaps.isChainEnabled(chain)); in doTestIsChainEnabled() 274 for (final int chain: testChains) { in doTestSetChildChain() 275 expectedMatch |= BpfNetMapsUtils.getMatchByFirewallChain(chain); in doTestSetChildChain() 280 for (final int chain: testChains) { in doTestSetChildChain() [all …]
|
/packages/apps/Car/DebuggingRestrictionController/app/src/main/java/com/android/car/debuggingrestrictioncontroller/auth/ |
D | SelfSignedTrustManager.java | 67 public void checkClientTrusted(X509Certificate[] chain, String authType) in checkClientTrusted() argument 69 trustManager.checkClientTrusted(chain, authType); in checkClientTrusted() 72 public void checkServerTrusted(X509Certificate[] chain, String authType) in checkServerTrusted() argument 74 trustManager.checkServerTrusted(chain, authType); in checkServerTrusted()
|
/packages/modules/Virtualization/virtualizationservice/ |
D | Android.bp | 88 // The chain originates from a CTS test for Keymint, with the Keymint certificate 91 // The certificate chain begins with a leaf certificate obtained from RKP and ends 92 // with a root certificate. Each certificate in the chain possesses a signature that 93 // is signed by the private key of the subsequent certificate in the chain.
|
/packages/modules/Connectivity/tests/unit/java/android/net/ |
D | NetworkStackBpfNetMapsTest.kt | 77 private fun doTestIsChainEnabled(chain: Int) { in getConfigurationMap() 80 U32(getMatchByFirewallChain(chain)) in getConfigurationMap() 82 assertTrue(bpfNetMapsReader.isChainEnabled(chain)) in getConfigurationMap() 84 assertFalse(bpfNetMapsReader.isChainEnabled(chain)) in getConfigurationMap() 122 private fun mockChainEnabled(chain: Int, enabled: Boolean) { in mockChainEnabled() 125 config or getMatchByFirewallChain(chain) in mockChainEnabled() 127 config and getMatchByFirewallChain(chain).inv() in mockChainEnabled()
|
/packages/modules/Permission/PermissionController/src/com/android/permissioncontroller/permission/ui/model/v31/ |
D | ReviewOngoingUsageViewModel.kt | 531 for (chain in proxyChains) { in <lambda>() constant 533 if (getPackageAttr(chain[chain.size - 1]) !in appUsages) { in <lambda>() 538 if (chain.size == 1) { in <lambda>() 543 for ((idx, opAccess) in chain.withIndex()) { in <lambda>() 551 if (idx == chain.size - 1) { in <lambda>() 558 chain.subList(idx + 1, chain.size).all { in <lambda>()
|
/packages/modules/Bluetooth/system/gd/rust/linux/utils/src/ |
D | adv_parser.rs | 61 .chain( in extract_service_uuids() 66 .chain( in extract_service_uuids() 90 .chain(iterate_adv_data(bytes, SERVICE_DATA_32_BIT_UUID).filter_map(|slice| { in extract_service_data() 95 .chain(iterate_adv_data(bytes, SERVICE_DATA_128_BIT_UUID).filter_map(|slice| { in extract_service_data()
|
D | array_utils.rs | 9 v.iter().chain(std::iter::repeat(&0)).take(S).cloned().collect::<Vec<u8>>().try_into().unwrap()
|
/packages/modules/Virtualization/libs/dice/sample_inputs/tests/ |
D | api_test.rs | 143 let chain = dice::Chain::from_cbor(&session, dice_artifacts.bcc().unwrap())?; in cdi_leaf_priv_corresponds_to_leaf_public_key_in_dice_chain() localVariable 144 let public_key = chain.leaf().subject_public_key(); in cdi_leaf_priv_corresponds_to_leaf_public_key_in_dice_chain()
|
/packages/modules/Virtualization/libs/dice/open_dice/src/ |
D | bcc.rs | 190 let mut chain: *const u8 = ptr::null(); in bcc_handover_parse() localVariable 201 &mut chain, in bcc_handover_parse() 209 let bcc = sub_slice(handover, chain, chain_size).ok(); in bcc_handover_parse()
|
/packages/modules/Virtualization/vm_payload/src/ |
D | lib.rs | 225 let chain = unwrap_or_abort(try_get_dice_attestation_chain()); in AVmPayload_getDiceAttestationChain() localVariable 231 unsafe { ptr::copy_nonoverlapping(chain.as_ptr(), data, std::cmp::min(chain.len(), size)) }; in AVmPayload_getDiceAttestationChain() 233 chain.len() in AVmPayload_getDiceAttestationChain()
|
/packages/modules/Virtualization/service_vm/comm/src/ |
D | client_vm_csr.cddl | 4 DiceCertChain, ; The DICE chain containing measurement of the client VM. See 21 ; It will be included in the certificate chain in the
|
/packages/modules/Wifi/service/java/com/android/server/wifi/hotspot2/ |
D | OsuServerConnection.java | 612 public void checkClientTrusted(X509Certificate[] chain, String authType) in checkClientTrusted() argument 620 public void checkServerTrusted(X509Certificate[] chain, String authType) in checkServerTrusted() argument 628 mDelegate.checkServerTrusted(chain, authType); in checkServerTrusted() 629 mServerCerts = Arrays.asList(chain); in checkServerTrusted() 634 for (X509Certificate cert : chain) { in checkServerTrusted()
|
/packages/modules/RemoteKeyProvisioning/app/src/com/android/rkpdapp/provisioner/ |
D | Provisioner.java | 168 for (byte[] chain : certChains) { in associateCertsWithKeys() 169 X509Certificate[] certChain = X509Utils.formatX509Certs(chain); in associateCertsWithKeys() 180 provisionedKeys.add(key.generateProvisionedKey(chain, in associateCertsWithKeys()
|
/packages/modules/AdServices/adservices/service-core/java/com/android/adservices/service/measurement/ |
D | MeasurementHttpClient.java | 116 public void checkClientTrusted(X509Certificate[] chain, String authType) { } in getUnsafeSslSocketFactory() 117 public void checkServerTrusted(X509Certificate[] chain, String authType) { } in getUnsafeSslSocketFactory()
|
/packages/modules/Wifi/framework/java/android/net/wifi/hotspot2/ |
D | ConfigParser.java | 473 Certificate[] chain = ks.getCertificateChain(alias); in parsePkcs12() local 474 if (chain != null) { in parsePkcs12() 476 for (Certificate certificate : chain) { in parsePkcs12()
|
/packages/modules/Virtualization/microdroid_manager/src/ |
D | dice.rs | 131 .chain(&instance_data.extra_apks_data) in build_subcomponent_list() 134 apks.chain(apexes).collect() in build_subcomponent_list()
|
/packages/modules/Virtualization/pvmfw/ |
D | README.md | 156 | {First blob: DICE chain} | 192 - entry 0 must point to a valid DICE chain handover (see below) 235 The format of the DICE chain entry mentioned above, compatible with the 242 3 : DiceCertChain, ; Android DICE chain 247 next-stage secret, and a certificate chain, intended for pVM attestation. Note 258 software stack of the device, incomplete implementations may root the DICE chain 387 - a reserved memory node containing the produced DICE chain: 466 As a quick prototyping solution, a valid DICE chain (such as this [test
|
/packages/modules/Virtualization/service_vm/client_vm_csr/src/ |
D | lib.rs | 184 let chain = dice::Chain::from_cbor(&session, &csr.dice_cert_chain)?; in csr_and_private_key_have_correct_format() localVariable 185 let public_key = chain.leaf().subject_public_key(); in csr_and_private_key_have_correct_format()
|