Home
last modified time | relevance | path

Searched refs:secure (Results 1 – 15 of 15) sorted by relevance

/system/extras/tests/storage/
Dwipe_blkdev.c51 static int wipe_block_device(int fd, u64 len, int secure) in wipe_block_device() argument
59 if (secure) { in wipe_block_device()
68 secure ? "Secure" : "Nonsecure", errno); in wipe_block_device()
82 int secure = 0; in main() local
95 secure = 1; in main()
127 ret = wipe_block_device(fd, len, secure); in main()
/system/gatekeeper/include/gatekeeper/
Dgatekeeper.h129 bool secure) = 0;
141 virtual bool ClearFailureRecord(uint32_t uid, secure_id_t user_id, bool secure) = 0;
153 virtual bool WriteFailureRecord(uint32_t uid, failure_record_t *record, bool secure) = 0;
197 failure_record_t *record, bool secure);
208 failure_record_t *record, bool secure, GateKeeperMessage *response);
/system/netd/server/
DRouteController.h50 static int addInterfaceToVirtualNetwork(unsigned netId, const char* interface, bool secure,
52 static int removeInterfaceFromVirtualNetwork(unsigned netId, const char* interface, bool secure,
59 static int addUsersToVirtualNetwork(unsigned netId, const char* interface, bool secure,
61 static int removeUsersFromVirtualNetwork(unsigned netId, const char* interface, bool secure,
DRouteController.cpp491 bool secure, bool add) { in modifyVpnUidRangeRule() argument
500 if (secure) { in modifyVpnUidRangeRule()
518 WARN_UNUSED_RESULT int modifyVpnSystemPermissionRule(unsigned netId, uint32_t table, bool secure, in modifyVpnSystemPermissionRule() argument
529 uint32_t priority = secure ? RULE_PRIORITY_SECURE_VPN : RULE_PRIORITY_BYPASSABLE_VPN; in modifyVpnSystemPermissionRule()
791 const UidRanges& uidRanges, bool secure, bool add, in modifyVirtualNetwork() argument
799 if (int ret = modifyVpnUidRangeRule(table, range.first, range.second, secure, add)) { in modifyVirtualNetwork()
819 if (int ret = modifyVpnSystemPermissionRule(netId, table, secure, add)) { in modifyVirtualNetwork()
1035 bool secure, const UidRanges& uidRanges) { in addInterfaceToVirtualNetwork() argument
1036 if (int ret = modifyVirtualNetwork(netId, interface, uidRanges, secure, ACTION_ADD, in addInterfaceToVirtualNetwork()
1045 bool secure, const UidRanges& uidRanges) { in removeInterfaceFromVirtualNetwork() argument
[all …]
DVirtualNetwork.cpp26 VirtualNetwork::VirtualNetwork(unsigned netId, bool hasDns, bool secure) : in VirtualNetwork() argument
27 Network(netId), mHasDns(hasDns), mSecure(secure) { in VirtualNetwork()
DVirtualNetwork.h34 VirtualNetwork(unsigned netId, bool hasDns, bool secure);
DNetworkController.h65 int createVirtualNetwork(unsigned netId, bool hasDns, bool secure) WARN_UNUSED_RESULT;
DNetworkController.cpp338 int NetworkController::createVirtualNetwork(unsigned netId, bool hasDns, bool secure) { in createVirtualNetwork() argument
353 mNetworks[netId] = new VirtualNetwork(netId, hasDns, secure); in createVirtualNetwork()
DCommandListener.cpp1626 bool secure = atoi(argv[5]); in runCommand() local
1627 if (int ret = gCtls->netCtrl.createVirtualNetwork(netId, hasDns, secure)) { in runCommand()
/system/gatekeeper/
Dgatekeeper.cpp279 failure_record_t *record, bool secure, GateKeeperMessage *response) { in ThrottleRequest() argument
294 if (!WriteFailureRecord(uid, record, secure)) { in ThrottleRequest()
307 failure_record_t *record, bool secure) { in IncrementFailureRecord() argument
312 return WriteFailureRecord(uid, record, secure); in IncrementFailureRecord()
/system/core/fastboot/
Dfastboot_protocol.txt125 data. Required if the bootloader is "secure"
170 secure If the value is "yes", this is a secure
/system/sepolicy/
Dfile.te197 # /data/backup and /data/secure/backup
Dte_macros17 # Enable AT_SECURE, i.e. libc secure mode.
Dfile_contexts245 /data/secure/backup(/.*)? u:object_r:backup_data_file:s0
/system/core/rootdir/
Dinit.rc77 mkdir /mnt/secure 0700 root root
78 mkdir /mnt/secure/asec 0700 root root