Home
last modified time | relevance | path

Searched refs:trusted (Results 1 – 25 of 50) sorted by relevance

12

/system/sepolicy/prebuilts/api/26.0/private/
Dmls9 # Process transition: Require equivalence unless the subject is trusted.
13 # Process read operations: No read up unless trusted.
17 # Process write operations: Require equivalence unless trusted.
26 # the subject is trusted. Sockets inherit the range of their creator.
31 # is trusted.
36 # is trusted.
45 # the subject is trusted. Also, files should always be single-level.
56 # Subject must be equivalent to object unless the subject is trusted.
67 # or the object is trusted.
75 # subject or the object is trusted.
Dpriv_app.te142 # Only trusted components of Android should be registering
/system/sepolicy/prebuilts/api/27.0/private/
Dmls9 # Process transition: Require equivalence unless the subject is trusted.
13 # Process read operations: No read up unless trusted.
17 # Process write operations: Require equivalence unless trusted.
26 # the subject is trusted. Sockets inherit the range of their creator.
31 # is trusted.
36 # is trusted.
45 # the subject is trusted. Also, files should always be single-level.
56 # Subject must be equivalent to object unless the subject is trusted.
67 # or the object is trusted.
75 # subject or the object is trusted.
/system/sepolicy/prebuilts/api/28.0/private/
Dmls9 # Process transition: Require equivalence unless the subject is trusted.
13 # Process read operations: No read up unless trusted.
17 # Process write operations: Require equivalence unless trusted.
26 # the subject is trusted. Sockets inherit the range of their creator.
31 # is trusted.
36 # is trusted.
45 # the subject is trusted. Also, files should always be single-level.
56 # Subject must dominate object unless the subject is trusted.
67 # or the object is trusted.
75 # subject or the object is trusted.
/system/sepolicy/prebuilts/api/29.0/private/
Dmls9 # Process transition: Require equivalence unless the subject is trusted.
13 # Process read operations: No read up unless trusted.
17 # Process write operations: Require equivalence unless trusted.
26 # the subject is trusted. Sockets inherit the range of their creator.
31 # is trusted.
36 # is trusted.
45 # the subject is trusted. Also, files should always be single-level.
56 # Subject must dominate object unless the subject is trusted.
74 # or the object is trusted.
82 # subject or the object is trusted.
Dephemeral_app.te33 # Allow loading and deleting shared libraries created by trusted system
Dapp_neverallows.te26 # Only trusted components of Android should be registering
44 # Shared libraries created by trusted components within an app home
/system/sepolicy/private/
Dmls9 # Process transition: Require equivalence unless the subject is trusted.
13 # Process read operations: No read up unless trusted.
17 # Process write operations: Require equivalence unless trusted.
26 # the subject is trusted. Sockets inherit the range of their creator.
31 # is trusted.
36 # is trusted.
45 # the subject is trusted. Also, files should always be single-level.
56 # Subject must dominate object unless the subject is trusted.
74 # or the object is trusted.
82 # subject or the object is trusted.
Dephemeral_app.te33 # Allow loading and deleting shared libraries created by trusted system
Dapp_neverallows.te28 # Only trusted components of Android should be registering
45 # Shared libraries created by trusted components within an app home
/system/sepolicy/prebuilts/api/30.0/private/
Dmls9 # Process transition: Require equivalence unless the subject is trusted.
13 # Process read operations: No read up unless trusted.
17 # Process write operations: Require equivalence unless trusted.
26 # the subject is trusted. Sockets inherit the range of their creator.
31 # is trusted.
36 # is trusted.
45 # the subject is trusted. Also, files should always be single-level.
56 # Subject must dominate object unless the subject is trusted.
74 # or the object is trusted.
82 # subject or the object is trusted.
Dephemeral_app.te33 # Allow loading and deleting shared libraries created by trusted system
Dapp_neverallows.te28 # Only trusted components of Android should be registering
45 # Shared libraries created by trusted components within an app home
/system/sepolicy/prebuilts/api/26.0/public/
Dtee.te2 # trusted execution environment (tee) daemon
/system/sepolicy/prebuilts/api/27.0/public/
Dtee.te2 # trusted execution environment (tee) daemon
/system/core/trusty/confirmationui/
DREADME4 to display the confirmation dialog driven by a reduced trusted computing base, typically
5 a trusted execution environment (TEE), without having to rely on Linux and the Android
/system/sepolicy/prebuilts/api/30.0/public/
Dtee.te2 # trusted execution environment (tee) daemon
/system/sepolicy/public/
Dtee.te2 # trusted execution environment (tee) daemon
/system/sepolicy/prebuilts/api/29.0/public/
Dtee.te2 # trusted execution environment (tee) daemon
/system/sepolicy/prebuilts/api/28.0/public/
Dtee.te2 # trusted execution environment (tee) daemon
Dvendor_init.te152 # Vendor init can perform operations on trusted and security Extended Attributes
/system/core/adb/libs/adbconnection/
Dadbconnection_client.cpp153 bool trusted = SocketPeerIsTrusted(ctx->control_socket_.get()); in adbconnection_client_new() local
154 if (!trusted) { in adbconnection_client_new()
/system/sepolicy/vendor/
Dtee.te2 # trusted execution environment (tee) daemon
/system/nvram/
DREADME.md9 require a trusted storage location for critical data that an attacker can't
24 trusted execution environment. It is also the basis for the testing NVRAM HAL
/system/libsysprop/srcs/android/sysprop/
DCarProperties.sysprop34 # String to be prefixed to device name during trusted device enrollment.

12