/system/connectivity/shill/supplicant/ |
D | wpa_supplicant_unittest.cc | 40 string subject; in TEST_F() local 45 property_map_, &subject, &depth)); in TEST_F() 46 EXPECT_EQ("", subject); in TEST_F() 51 string subject; in TEST_F() local 59 property_map_, &subject, &depth)); in TEST_F() 60 EXPECT_EQ("", subject); in TEST_F() 66 string subject; in TEST_F() local 73 property_map_, &subject, &depth)); in TEST_F() 74 EXPECT_EQ("", subject); in TEST_F() 80 string subject; in TEST_F() local [all …]
|
D | wpa_supplicant.cc | 167 string* subject, in ExtractRemoteCertification() argument 179 *subject = properties.GetString(WPASupplicant::kInterfacePropertySubject); in ExtractRemoteCertification()
|
D | wpa_supplicant.h | 163 std::string* subject,
|
/system/tpm/attestation/server/ |
D | pkcs11_key_store.cc | 352 std::string subject; in Register() local 355 if (!GetCertificateFields(certificate, &subject, &issuer, &serial_number)) { in Register() 369 {CKA_SUBJECT, string_as_array(&subject), subject.size()}, in Register() 416 std::string subject; in RegisterCertificate() local 419 if (!GetCertificateFields(certificate, &subject, &issuer, &serial_number)) { in RegisterCertificate() 433 {CKA_SUBJECT, string_as_array(&subject), subject.size()}, in RegisterCertificate() 615 std::string* subject, in GetCertificateFields() argument 621 if (!x509.get() || !x509->cert_info || !x509->cert_info->subject) { in GetCertificateFields() 626 int length = i2d_X509_NAME(x509->cert_info->subject, &subject_buffer); in GetCertificateFields() 632 subject->assign(reinterpret_cast<char*>(subject_buffer), length); in GetCertificateFields()
|
D | pkcs11_key_store.h | 108 std::string* subject,
|
/system/sepolicy/ |
D | mls | 21 # Process transition: Require equivalence unless the subject is trusted. 38 # the subject is trusted. Sockets inherit the range of their creator. 57 # the subject is trusted. Also, files should always be single-level. 68 # Subject must be equivalent to object unless the subject is trusted. 78 # Read operations: Subject must dominate object unless the subject 87 # subject or the object is trusted.
|
/system/connectivity/shill/ethernet/ |
D | ethernet.cc | 240 string subject; in Certification() local 242 if (WPASupplicant::ExtractRemoteCertification(properties, &subject, &depth)) { in Certification() 245 subject, depth)); in Certification() 386 void Ethernet::CertificationTask(const string& subject, uint32_t depth) { in CertificationTask() argument 389 service_->AddEAPCertification(subject, depth); in CertificationTask()
|
D | ethernet.h | 128 void CertificationTask(const std::string& subject, uint32_t depth);
|
D | ethernet_unittest.cc | 196 void TriggerCertification(const string& subject, uint32_t depth) { in TriggerCertification() argument 197 ethernet_->CertificationTask(subject, depth); in TriggerCertification()
|
/system/ca-certificates/ |
D | README.cacerts | 2 where "hash" is the subject hash produced by:
|
/system/extras/tests/net_test/ |
D | iproute.py | 389 subject = CommandSubject(command) 396 }[subject] 403 subject = CommandSubject(command) 404 if "ALL" not in self.NL_DEBUG and subject not in self.NL_DEBUG:
|
/system/connectivity/shill/shims/ |
D | crypto_util.cc | 224 x509->cert_info->subject, in VerifyCredentialsImpl()
|
/system/connectivity/shill/wifi/ |
D | wifi.cc | 1319 string subject; in CertificationTask() local 1321 if (WPASupplicant::ExtractRemoteCertification(properties, &subject, &depth)) { in CertificationTask() 1322 current_service_->AddEAPCertification(subject, depth); in CertificationTask()
|
/system/connectivity/shill/doc/ |
D | service-api.txt | 553 (WiFi only) The list of certificate subject names 564 RADIUS server certificate subject name must 565 contain. If the subject does not contain this 1029 OpenVPN, which specifies the X509 subject distinguished
|
/system/sepolicy/tools/fc_sort/ |
D | NOTICE | 191 original licensor to copy, distribute or modify the Program subject to
|
/system/tpm/trunks/generator/ |
D | raw_commands.txt | 993 to indicate that the command may result in an update of NV memory and be subject to rate 1398 c) If the object or NV Index is subject to DA protection, and the authorization is with an HMAC or 1402 An object is subject to DA protection if its noDA attribute is CLEAR. An NV Index is subject to 1809 This response indicates that authorizations for objects subject to DA protection 29905 … TPM may be implemented such that all TPM memory is non volatile and not subject to endurance issu…
|
D | raw_commands_fixed.txt | 993 to indicate that the command may result in an update of NV memory and be subject to rate 1398 c) If the object or NV Index is subject to DA protection, and the authorization is with an HMAC or 1402 An object is subject to DA protection if its noDA attribute is CLEAR. An NV Index is subject to 1809 This response indicates that authorizations for objects subject to DA protection 29916 … TPM may be implemented such that all TPM memory is non volatile and not subject to endurance issu…
|
D | raw_structures.txt | 5484 authorizations for objects subject to DA protection 8031 SET (1): The object is not subject to dictionary attack protections. 8032 CLEAR (0): The object is subject to dictionary attack protections.
|
D | raw_structures_fixed.txt | 5478 authorizations for objects subject to DA protection 8059 SET (1): The object is not subject to dictionary attack protections. 8060 CLEAR (0): The object is subject to dictionary attack protections.
|
/system/media/audio_utils/ |
D | Doxyfile.orig | 1033 # Note: The header is subject to change so you typically have to regenerate the
|
D | Doxyfile | 1033 # Note: The header is subject to change so you typically have to regenerate the
|