Home
last modified time | relevance | path

Searched refs:secure (Results 1 – 25 of 58) sorted by relevance

123

/system/extras/tests/storage/
Dwipe_blkdev.c51 static int wipe_block_device(int fd, u64 len, int secure) in wipe_block_device() argument
59 if (secure) { in wipe_block_device()
68 secure ? "Secure" : "Nonsecure", errno); in wipe_block_device()
82 int secure = 0; in main() local
95 secure = 1; in main()
127 ret = wipe_block_device(fd, len, secure); in main()
/system/core/trusty/confirmationui/
DREADME3 To implement confirmationui a secure UI architecture is required. This entails a way
8 Confirmation feature when integrated into a secure UI architecture.
14 sufficiently secure IFF the end point is implemented on a trustworthy
15 secure input device. But since the endpoint is currently in the HAL
16 service itself this implementation is not secure.
18 NOTE that a secure input device end point needs a good source of entropy
DAndroid.bp28 "android.hardware.confirmationui.not-so-secure-input",
78 name: "android.hardware.confirmationui.not-so-secure-input",
/system/gatekeeper/include/gatekeeper/
Dgatekeeper.h129 bool secure) = 0;
141 virtual bool ClearFailureRecord(uint32_t uid, secure_id_t user_id, bool secure) = 0;
153 virtual bool WriteFailureRecord(uint32_t uid, failure_record_t *record, bool secure) = 0;
197 failure_record_t *record, bool secure);
208 failure_record_t *record, bool secure, GateKeeperMessage *response);
/system/netd/server/
DRouteController.h68 bool secure, const UidRanges& uidRanges);
70 const char* interface, bool secure,
78 bool secure, const UidRanges& uidRanges);
80 bool secure, const UidRanges& uidRanges);
138 const UidRanges& uidRanges, bool secure, bool add,
DRouteController.cpp510 bool secure, bool add) { in modifyVpnUidRangeRule() argument
519 if (secure) { in modifyVpnUidRangeRule()
537 [[nodiscard]] static int modifyVpnSystemPermissionRule(unsigned netId, uint32_t table, bool secure, in modifyVpnSystemPermissionRule() argument
548 uint32_t priority = secure ? RULE_PRIORITY_SECURE_VPN : RULE_PRIORITY_BYPASSABLE_VPN; in modifyVpnSystemPermissionRule()
816 const UidRanges& uidRanges, bool secure, bool add, in modifyVirtualNetwork() argument
824 if (int ret = modifyVpnUidRangeRule(table, range.start, range.stop, secure, add)) { in modifyVirtualNetwork()
844 if (int ret = modifyVpnSystemPermissionRule(netId, table, secure, add)) { in modifyVirtualNetwork()
1076 bool secure, const UidRanges& uidRanges) { in addInterfaceToVirtualNetwork() argument
1077 if (int ret = modifyVirtualNetwork(netId, interface, uidRanges, secure, ACTION_ADD, in addInterfaceToVirtualNetwork()
1086 bool secure, const UidRanges& uidRanges) { in removeInterfaceFromVirtualNetwork() argument
[all …]
DVirtualNetwork.cpp31 VirtualNetwork::VirtualNetwork(unsigned netId, bool secure) : Network(netId), mSecure(secure) {} in VirtualNetwork() argument
DVirtualNetwork.h35 VirtualNetwork(unsigned netId, bool secure);
DNetworkController.h107 [[nodiscard]] int createVirtualNetwork(unsigned netId, bool secure);
DNetworkController.cpp420 int NetworkController::createVirtualNetwork(unsigned netId, bool secure) { in createVirtualNetwork() argument
436 mNetworks[netId] = new VirtualNetwork(netId, secure); in createVirtualNetwork()
/system/sepolicy/prebuilts/api/29.0/private/
Dsecure_element.te1 # secure element subsystem
12 # the secure element process, from a file in
/system/sepolicy/prebuilts/api/28.0/private/
Dsecure_element.te1 # secure element subsystem
12 # the secure element process, from a file in
/system/sepolicy/private/
Dsecure_element.te1 # secure element subsystem
12 # the secure element process, from a file in
/system/sepolicy/prebuilts/api/30.0/private/
Dsecure_element.te1 # secure element subsystem
12 # the secure element process, from a file in
/system/libsysprop/srcs/android/sysprop/
DAdbProperties.sysprop19 api_name: "secure"
23 prop_name: "ro.adb.secure"
/system/gatekeeper/
Dgatekeeper.cpp300 failure_record_t *record, bool secure, GateKeeperMessage *response) { in ThrottleRequest() argument
315 if (!WriteFailureRecord(uid, record, secure)) { in ThrottleRequest()
328 failure_record_t *record, bool secure) { in IncrementFailureRecord() argument
333 return WriteFailureRecord(uid, record, secure); in IncrementFailureRecord()
/system/core/rootdir/
Dadb_debug.prop6 ro.adb.secure=0
/system/libsysprop/srcs/api/
DPlatformProperties-latest.txt4 api_name: "secure"
7 prop_name: "ro.adb.secure"
DPlatformProperties-current.txt4 api_name: "secure"
7 prop_name: "ro.adb.secure"
/system/core/trusty/storage/tests/
DAndroid.bp18 name: "secure-storage-unit-test",
/system/bt/doc/
Dpts_guide.md35 - `PTS_SecurePairOnly` enables secure connections only mode.
/system/core/
DCleanSpec.mk69 $(call add-clean-step, rm -rf $(PRODUCT_OUT)/system/bin/secure-storage-unit-test)
/system/netd/server/aidl_api/netd_aidl_interface/1/android/net/
DINetd.aidl7 void networkCreateVpn(int netId, boolean secure); in networkCreateVpn() argument
/system/netd/server/aidl_api/netd_aidl_interface/2/android/net/
DINetd.aidl24 void networkCreateVpn(int netId, boolean secure); in networkCreateVpn() argument
/system/netd/server/aidl_api/netd_aidl_interface/3/android/net/
DINetd.aidl25 void networkCreateVpn(int netId, boolean secure); in networkCreateVpn() argument

123