/system/extras/tests/storage/ |
D | wipe_blkdev.c | 51 static int wipe_block_device(int fd, u64 len, int secure) in wipe_block_device() argument 59 if (secure) { in wipe_block_device() 68 secure ? "Secure" : "Nonsecure", errno); in wipe_block_device() 82 int secure = 0; in main() local 95 secure = 1; in main() 127 ret = wipe_block_device(fd, len, secure); in main()
|
/system/core/trusty/confirmationui/ |
D | README | 3 To implement confirmationui a secure UI architecture is required. This entails a way 8 Confirmation feature when integrated into a secure UI architecture. 14 sufficiently secure IFF the end point is implemented on a trustworthy 15 secure input device. But since the endpoint is currently in the HAL 16 service itself this implementation is not secure. 18 NOTE that a secure input device end point needs a good source of entropy
|
D | Android.bp | 28 "android.hardware.confirmationui.not-so-secure-input", 78 name: "android.hardware.confirmationui.not-so-secure-input",
|
/system/gatekeeper/include/gatekeeper/ |
D | gatekeeper.h | 129 bool secure) = 0; 141 virtual bool ClearFailureRecord(uint32_t uid, secure_id_t user_id, bool secure) = 0; 153 virtual bool WriteFailureRecord(uint32_t uid, failure_record_t *record, bool secure) = 0; 197 failure_record_t *record, bool secure); 208 failure_record_t *record, bool secure, GateKeeperMessage *response);
|
/system/netd/server/ |
D | RouteController.h | 68 bool secure, const UidRanges& uidRanges); 70 const char* interface, bool secure, 78 bool secure, const UidRanges& uidRanges); 80 bool secure, const UidRanges& uidRanges); 138 const UidRanges& uidRanges, bool secure, bool add,
|
D | RouteController.cpp | 510 bool secure, bool add) { in modifyVpnUidRangeRule() argument 519 if (secure) { in modifyVpnUidRangeRule() 537 [[nodiscard]] static int modifyVpnSystemPermissionRule(unsigned netId, uint32_t table, bool secure, in modifyVpnSystemPermissionRule() argument 548 uint32_t priority = secure ? RULE_PRIORITY_SECURE_VPN : RULE_PRIORITY_BYPASSABLE_VPN; in modifyVpnSystemPermissionRule() 816 const UidRanges& uidRanges, bool secure, bool add, in modifyVirtualNetwork() argument 824 if (int ret = modifyVpnUidRangeRule(table, range.start, range.stop, secure, add)) { in modifyVirtualNetwork() 844 if (int ret = modifyVpnSystemPermissionRule(netId, table, secure, add)) { in modifyVirtualNetwork() 1076 bool secure, const UidRanges& uidRanges) { in addInterfaceToVirtualNetwork() argument 1077 if (int ret = modifyVirtualNetwork(netId, interface, uidRanges, secure, ACTION_ADD, in addInterfaceToVirtualNetwork() 1086 bool secure, const UidRanges& uidRanges) { in removeInterfaceFromVirtualNetwork() argument [all …]
|
D | VirtualNetwork.cpp | 31 VirtualNetwork::VirtualNetwork(unsigned netId, bool secure) : Network(netId), mSecure(secure) {} in VirtualNetwork() argument
|
D | VirtualNetwork.h | 35 VirtualNetwork(unsigned netId, bool secure);
|
D | NetworkController.h | 107 [[nodiscard]] int createVirtualNetwork(unsigned netId, bool secure);
|
D | NetworkController.cpp | 420 int NetworkController::createVirtualNetwork(unsigned netId, bool secure) { in createVirtualNetwork() argument 436 mNetworks[netId] = new VirtualNetwork(netId, secure); in createVirtualNetwork()
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | secure_element.te | 1 # secure element subsystem 12 # the secure element process, from a file in
|
/system/sepolicy/prebuilts/api/28.0/private/ |
D | secure_element.te | 1 # secure element subsystem 12 # the secure element process, from a file in
|
/system/sepolicy/private/ |
D | secure_element.te | 1 # secure element subsystem 12 # the secure element process, from a file in
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | secure_element.te | 1 # secure element subsystem 12 # the secure element process, from a file in
|
/system/libsysprop/srcs/android/sysprop/ |
D | AdbProperties.sysprop | 19 api_name: "secure" 23 prop_name: "ro.adb.secure"
|
/system/gatekeeper/ |
D | gatekeeper.cpp | 300 failure_record_t *record, bool secure, GateKeeperMessage *response) { in ThrottleRequest() argument 315 if (!WriteFailureRecord(uid, record, secure)) { in ThrottleRequest() 328 failure_record_t *record, bool secure) { in IncrementFailureRecord() argument 333 return WriteFailureRecord(uid, record, secure); in IncrementFailureRecord()
|
/system/core/rootdir/ |
D | adb_debug.prop | 6 ro.adb.secure=0
|
/system/libsysprop/srcs/api/ |
D | PlatformProperties-latest.txt | 4 api_name: "secure" 7 prop_name: "ro.adb.secure"
|
D | PlatformProperties-current.txt | 4 api_name: "secure" 7 prop_name: "ro.adb.secure"
|
/system/core/trusty/storage/tests/ |
D | Android.bp | 18 name: "secure-storage-unit-test",
|
/system/bt/doc/ |
D | pts_guide.md | 35 - `PTS_SecurePairOnly` enables secure connections only mode.
|
/system/core/ |
D | CleanSpec.mk | 69 $(call add-clean-step, rm -rf $(PRODUCT_OUT)/system/bin/secure-storage-unit-test)
|
/system/netd/server/aidl_api/netd_aidl_interface/1/android/net/ |
D | INetd.aidl | 7 void networkCreateVpn(int netId, boolean secure); in networkCreateVpn() argument
|
/system/netd/server/aidl_api/netd_aidl_interface/2/android/net/ |
D | INetd.aidl | 24 void networkCreateVpn(int netId, boolean secure); in networkCreateVpn() argument
|
/system/netd/server/aidl_api/netd_aidl_interface/3/android/net/ |
D | INetd.aidl | 25 void networkCreateVpn(int netId, boolean secure); in networkCreateVpn() argument
|