Searched refs:trusted (Results 1 – 25 of 50) sorted by relevance
12
9 # Process transition: Require equivalence unless the subject is trusted.13 # Process read operations: No read up unless trusted.17 # Process write operations: Require equivalence unless trusted.26 # the subject is trusted. Sockets inherit the range of their creator.31 # is trusted.36 # is trusted.45 # the subject is trusted. Also, files should always be single-level.56 # Subject must be equivalent to object unless the subject is trusted.67 # or the object is trusted.75 # subject or the object is trusted.
142 # Only trusted components of Android should be registering
9 # Process transition: Require equivalence unless the subject is trusted.13 # Process read operations: No read up unless trusted.17 # Process write operations: Require equivalence unless trusted.26 # the subject is trusted. Sockets inherit the range of their creator.31 # is trusted.36 # is trusted.45 # the subject is trusted. Also, files should always be single-level.56 # Subject must dominate object unless the subject is trusted.67 # or the object is trusted.75 # subject or the object is trusted.
9 # Process transition: Require equivalence unless the subject is trusted.13 # Process read operations: No read up unless trusted.17 # Process write operations: Require equivalence unless trusted.26 # the subject is trusted. Sockets inherit the range of their creator.31 # is trusted.36 # is trusted.45 # the subject is trusted. Also, files should always be single-level.56 # Subject must dominate object unless the subject is trusted.74 # or the object is trusted.82 # subject or the object is trusted.
33 # Allow loading and deleting shared libraries created by trusted system
26 # Only trusted components of Android should be registering44 # Shared libraries created by trusted components within an app home
28 # Only trusted components of Android should be registering45 # Shared libraries created by trusted components within an app home
2 # trusted execution environment (tee) daemon
4 to display the confirmation dialog driven by a reduced trusted computing base, typically5 a trusted execution environment (TEE), without having to rely on Linux and the Android
152 # Vendor init can perform operations on trusted and security Extended Attributes
153 bool trusted = SocketPeerIsTrusted(ctx->control_socket_.get()); in adbconnection_client_new() local154 if (!trusted) { in adbconnection_client_new()
9 require a trusted storage location for critical data that an attacker can't24 trusted execution environment. It is also the basis for the testing NVRAM HAL
34 # String to be prefixed to device name during trusted device enrollment.