/system/extras/tests/storage/ |
D | wipe_blkdev.c | 51 static int wipe_block_device(int fd, u64 len, int secure) in wipe_block_device() argument 59 if (secure) { in wipe_block_device() 68 secure ? "Secure" : "Nonsecure", errno); in wipe_block_device() 82 int secure = 0; in main() local 95 secure = 1; in main() 127 ret = wipe_block_device(fd, len, secure); in main()
|
/system/gatekeeper/include/gatekeeper/ |
D | gatekeeper.h | 129 bool secure) = 0; 141 virtual bool ClearFailureRecord(uint32_t uid, secure_id_t user_id, bool secure) = 0; 153 virtual bool WriteFailureRecord(uint32_t uid, failure_record_t *record, bool secure) = 0; 197 failure_record_t *record, bool secure); 208 failure_record_t *record, bool secure, GateKeeperMessage *response);
|
/system/netd/server/ |
D | RouteController.h | 69 static int addInterfaceToVirtualNetwork(unsigned netId, const char* interface, bool secure, 71 static int removeInterfaceFromVirtualNetwork(unsigned netId, const char* interface, bool secure, 78 static int addUsersToVirtualNetwork(unsigned netId, const char* interface, bool secure, 80 static int removeUsersFromVirtualNetwork(unsigned netId, const char* interface, bool secure, 136 const UidRanges& uidRanges, bool secure, bool add,
|
D | RouteController.cpp | 481 bool secure, bool add) { in modifyVpnUidRangeRule() argument 490 if (secure) { in modifyVpnUidRangeRule() 508 WARN_UNUSED_RESULT int modifyVpnSystemPermissionRule(unsigned netId, uint32_t table, bool secure, in modifyVpnSystemPermissionRule() argument 519 uint32_t priority = secure ? RULE_PRIORITY_SECURE_VPN : RULE_PRIORITY_BYPASSABLE_VPN; in modifyVpnSystemPermissionRule() 786 bool secure, bool add, in modifyVirtualNetwork() argument 794 if (int ret = modifyVpnUidRangeRule(table, range.start, range.stop, secure, add)) { in modifyVirtualNetwork() 814 if (int ret = modifyVpnSystemPermissionRule(netId, table, secure, add)) { in modifyVirtualNetwork() 1003 bool secure, const UidRanges& uidRanges) { in addInterfaceToVirtualNetwork() argument 1004 if (int ret = modifyVirtualNetwork(netId, interface, uidRanges, secure, ACTION_ADD, in addInterfaceToVirtualNetwork() 1013 bool secure, const UidRanges& uidRanges) { in removeInterfaceFromVirtualNetwork() argument [all …]
|
D | VirtualNetwork.cpp | 31 VirtualNetwork::VirtualNetwork(unsigned netId, bool secure) : Network(netId), mSecure(secure) {} in VirtualNetwork() argument
|
D | VirtualNetwork.h | 37 VirtualNetwork(unsigned netId, bool secure);
|
D | NetworkController.h | 110 int createVirtualNetwork(unsigned netId, bool secure) WARN_UNUSED_RESULT;
|
D | NetworkController.cpp | 411 int NetworkController::createVirtualNetwork(unsigned netId, bool secure) { in createVirtualNetwork() argument 427 mNetworks[netId] = new VirtualNetwork(netId, secure); in createVirtualNetwork()
|
D | NdcDispatcher.cpp | 1057 bool secure = strtol(argv[4], nullptr, 2); in runCommand() local 1058 if (Status status = mNetd->networkCreateVpn(netId, secure); !status.isOk()) { in runCommand()
|
D | NetdNativeService.h | 67 binder::Status networkCreateVpn(int32_t netId, bool secure) override;
|
/system/sepolicy/prebuilts/api/28.0/private/ |
D | secure_element.te | 1 # secure element subsystem 12 # the secure element process, from a file in
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | secure_element.te | 1 # secure element subsystem 12 # the secure element process, from a file in
|
/system/sepolicy/private/ |
D | secure_element.te | 1 # secure element subsystem 12 # the secure element process, from a file in
|
/system/libsysprop/srcs/android/sysprop/ |
D | AdbProperties.sysprop | 19 api_name: "secure" 23 prop_name: "ro.adb.secure"
|
/system/gatekeeper/ |
D | gatekeeper.cpp | 293 failure_record_t *record, bool secure, GateKeeperMessage *response) { in ThrottleRequest() argument 308 if (!WriteFailureRecord(uid, record, secure)) { in ThrottleRequest() 321 failure_record_t *record, bool secure) { in IncrementFailureRecord() argument 326 return WriteFailureRecord(uid, record, secure); in IncrementFailureRecord()
|
/system/core/rootdir/ |
D | adb_debug.prop | 6 ro.adb.secure=0
|
/system/core/trusty/storage/tests/ |
D | Android.bp | 18 name: "secure-storage-unit-test",
|
/system/bt/doc/ |
D | pts_guide.md | 35 - `PTS_SecurePairOnly` enables secure connections only mode.
|
/system/core/ |
D | CleanSpec.mk | 69 $(call add-clean-step, rm -rf $(PRODUCT_OUT)/system/bin/secure-storage-unit-test)
|
/system/netd/server/aidl/netd/1/android/net/ |
D | INetd.aidl | 7 void networkCreateVpn(int netId, boolean secure); in networkCreateVpn() argument
|
/system/netd/server/binder/android/net/ |
D | INetd.aidl | 87 void networkCreateVpn(int netId, boolean secure); in networkCreateVpn() argument
|
/system/netd/server/aidl/netd/2/android/net/ |
D | INetd.aidl | 24 void networkCreateVpn(int netId, boolean secure); in networkCreateVpn() argument
|
/system/core/fastboot/fuzzy_fastboot/ |
D | README.md | 65 <var key="secure" assert="no|yes"/> 191 …o a bunch more testing. Make sure this hash is a cryptographically secure hash, as a non-secure one 211 <var key="secure" assert="no|yes"/>
|
/system/core/fastboot/ |
D | README.md | 179 secure If the value is "yes", this is a secure
|
/system/sepolicy/prebuilts/api/28.0/public/ |
D | property_contexts | 158 ro.adb.secure u:object_r:exported_secure_prop:s0 exact int 211 ro.secure u:object_r:exported_secure_prop:s0 exact int
|