Home
last modified time | relevance | path

Searched refs:secure (Results 1 – 25 of 46) sorted by relevance

12

/system/extras/tests/storage/
Dwipe_blkdev.c51 static int wipe_block_device(int fd, u64 len, int secure) in wipe_block_device() argument
59 if (secure) { in wipe_block_device()
68 secure ? "Secure" : "Nonsecure", errno); in wipe_block_device()
82 int secure = 0; in main() local
95 secure = 1; in main()
127 ret = wipe_block_device(fd, len, secure); in main()
/system/gatekeeper/include/gatekeeper/
Dgatekeeper.h129 bool secure) = 0;
141 virtual bool ClearFailureRecord(uint32_t uid, secure_id_t user_id, bool secure) = 0;
153 virtual bool WriteFailureRecord(uint32_t uid, failure_record_t *record, bool secure) = 0;
197 failure_record_t *record, bool secure);
208 failure_record_t *record, bool secure, GateKeeperMessage *response);
/system/netd/server/
DRouteController.h69 static int addInterfaceToVirtualNetwork(unsigned netId, const char* interface, bool secure,
71 static int removeInterfaceFromVirtualNetwork(unsigned netId, const char* interface, bool secure,
78 static int addUsersToVirtualNetwork(unsigned netId, const char* interface, bool secure,
80 static int removeUsersFromVirtualNetwork(unsigned netId, const char* interface, bool secure,
136 const UidRanges& uidRanges, bool secure, bool add,
DRouteController.cpp481 bool secure, bool add) { in modifyVpnUidRangeRule() argument
490 if (secure) { in modifyVpnUidRangeRule()
508 WARN_UNUSED_RESULT int modifyVpnSystemPermissionRule(unsigned netId, uint32_t table, bool secure, in modifyVpnSystemPermissionRule() argument
519 uint32_t priority = secure ? RULE_PRIORITY_SECURE_VPN : RULE_PRIORITY_BYPASSABLE_VPN; in modifyVpnSystemPermissionRule()
786 bool secure, bool add, in modifyVirtualNetwork() argument
794 if (int ret = modifyVpnUidRangeRule(table, range.start, range.stop, secure, add)) { in modifyVirtualNetwork()
814 if (int ret = modifyVpnSystemPermissionRule(netId, table, secure, add)) { in modifyVirtualNetwork()
1003 bool secure, const UidRanges& uidRanges) { in addInterfaceToVirtualNetwork() argument
1004 if (int ret = modifyVirtualNetwork(netId, interface, uidRanges, secure, ACTION_ADD, in addInterfaceToVirtualNetwork()
1013 bool secure, const UidRanges& uidRanges) { in removeInterfaceFromVirtualNetwork() argument
[all …]
DVirtualNetwork.cpp31 VirtualNetwork::VirtualNetwork(unsigned netId, bool secure) : Network(netId), mSecure(secure) {} in VirtualNetwork() argument
DVirtualNetwork.h37 VirtualNetwork(unsigned netId, bool secure);
DNetworkController.h110 int createVirtualNetwork(unsigned netId, bool secure) WARN_UNUSED_RESULT;
DNetworkController.cpp411 int NetworkController::createVirtualNetwork(unsigned netId, bool secure) { in createVirtualNetwork() argument
427 mNetworks[netId] = new VirtualNetwork(netId, secure); in createVirtualNetwork()
DNdcDispatcher.cpp1057 bool secure = strtol(argv[4], nullptr, 2); in runCommand() local
1058 if (Status status = mNetd->networkCreateVpn(netId, secure); !status.isOk()) { in runCommand()
DNetdNativeService.h67 binder::Status networkCreateVpn(int32_t netId, bool secure) override;
/system/sepolicy/prebuilts/api/28.0/private/
Dsecure_element.te1 # secure element subsystem
12 # the secure element process, from a file in
/system/sepolicy/prebuilts/api/29.0/private/
Dsecure_element.te1 # secure element subsystem
12 # the secure element process, from a file in
/system/sepolicy/private/
Dsecure_element.te1 # secure element subsystem
12 # the secure element process, from a file in
/system/libsysprop/srcs/android/sysprop/
DAdbProperties.sysprop19 api_name: "secure"
23 prop_name: "ro.adb.secure"
/system/gatekeeper/
Dgatekeeper.cpp293 failure_record_t *record, bool secure, GateKeeperMessage *response) { in ThrottleRequest() argument
308 if (!WriteFailureRecord(uid, record, secure)) { in ThrottleRequest()
321 failure_record_t *record, bool secure) { in IncrementFailureRecord() argument
326 return WriteFailureRecord(uid, record, secure); in IncrementFailureRecord()
/system/core/rootdir/
Dadb_debug.prop6 ro.adb.secure=0
/system/core/trusty/storage/tests/
DAndroid.bp18 name: "secure-storage-unit-test",
/system/bt/doc/
Dpts_guide.md35 - `PTS_SecurePairOnly` enables secure connections only mode.
/system/core/
DCleanSpec.mk69 $(call add-clean-step, rm -rf $(PRODUCT_OUT)/system/bin/secure-storage-unit-test)
/system/netd/server/aidl/netd/1/android/net/
DINetd.aidl7 void networkCreateVpn(int netId, boolean secure); in networkCreateVpn() argument
/system/netd/server/binder/android/net/
DINetd.aidl87 void networkCreateVpn(int netId, boolean secure); in networkCreateVpn() argument
/system/netd/server/aidl/netd/2/android/net/
DINetd.aidl24 void networkCreateVpn(int netId, boolean secure); in networkCreateVpn() argument
/system/core/fastboot/fuzzy_fastboot/
DREADME.md65 <var key="secure" assert="no|yes"/>
191 …o a bunch more testing. Make sure this hash is a cryptographically secure hash, as a non-secure one
211 <var key="secure" assert="no|yes"/>
/system/core/fastboot/
DREADME.md179 secure If the value is "yes", this is a secure
/system/sepolicy/prebuilts/api/28.0/public/
Dproperty_contexts158 ro.adb.secure u:object_r:exported_secure_prop:s0 exact int
211 ro.secure u:object_r:exported_secure_prop:s0 exact int

12