Searched refs:secure (Results 1 - 10 of 10) sorted by relevance

/system/extras/tests/storage/
H A Dwipe_blkdev.c50 static int wipe_block_device(int fd, u64 len, int secure) argument
58 if (secure) {
67 secure ? "Secure" : "Nonsecure", errno);
81 int secure = 0; local
94 secure = 1;
126 ret = wipe_block_device(fd, len, secure);
/system/netd/server/
H A DRouteController.h50 static int addInterfaceToVirtualNetwork(unsigned netId, const char* interface, bool secure,
52 static int removeInterfaceFromVirtualNetwork(unsigned netId, const char* interface, bool secure,
59 static int addUsersToVirtualNetwork(unsigned netId, const char* interface, bool secure,
61 static int removeUsersFromVirtualNetwork(unsigned netId, const char* interface, bool secure,
H A DVirtualNetwork.h23 // A VirtualNetwork may be "secure" or not.
25 // A secure VPN is the usual type of VPN that grabs the default route (and thus all user traffic).
28 // A non-secure VPN ("bypassable" VPN) also grabs all user traffic by default. But all apps are
32 VirtualNetwork(unsigned netId, bool hasDns, bool secure);
H A DVirtualNetwork.cpp24 VirtualNetwork::VirtualNetwork(unsigned netId, bool hasDns, bool secure) : argument
25 Network(netId), mHasDns(hasDns), mSecure(secure) {
H A DRouteController.cpp465 bool secure, bool add) {
474 if (secure) {
492 WARN_UNUSED_RESULT int modifyVpnSystemPermissionRule(unsigned netId, uint32_t table, bool secure, argument
503 uint32_t priority = secure ? RULE_PRIORITY_SECURE_VPN : RULE_PRIORITY_BYPASSABLE_VPN;
702 const UidRanges& uidRanges, bool secure, bool add,
710 if (int ret = modifyVpnUidRangeRule(table, range.first, range.second, secure, add)) {
730 if (int ret = modifyVpnSystemPermissionRule(netId, table, secure, add)) {
926 bool secure, const UidRanges& uidRanges) {
927 if (int ret = modifyVirtualNetwork(netId, interface, uidRanges, secure, ACTION_ADD,
936 bool secure, cons
464 modifyVpnUidRangeRule(uint32_t table, uid_t uidStart, uid_t uidEnd, bool secure, bool add) argument
701 modifyVirtualNetwork(unsigned netId, const char* interface, const UidRanges& uidRanges, bool secure, bool add, bool modifyNonUidBasedRules) argument
925 addInterfaceToVirtualNetwork(unsigned netId, const char* interface, bool secure, const UidRanges& uidRanges) argument
935 removeInterfaceFromVirtualNetwork(unsigned netId, const char* interface, bool secure, const UidRanges& uidRanges) argument
958 addUsersToVirtualNetwork(unsigned netId, const char* interface, bool secure, const UidRanges& uidRanges) argument
964 removeUsersFromVirtualNetwork(unsigned netId, const char* interface, bool secure, const UidRanges& uidRanges) argument
[all...]
H A DNetworkController.h62 int createVirtualNetwork(unsigned netId, bool hasDns, bool secure) WARN_UNUSED_RESULT;
H A DNetworkController.cpp277 int NetworkController::createVirtualNetwork(unsigned netId, bool hasDns, bool secure) { argument
292 mNetworks[netId] = new VirtualNetwork(netId, hasDns, secure);
H A DCommandListener.cpp1474 // network create <netId> vpn <hasDns> <secure>
1482 bool secure = atoi(argv[5]); local
1483 if (int ret = sNetCtrl->createVirtualNetwork(netId, hasDns, secure)) {
/system/core/fastbootd/
H A DAndroid.mk36 secure.c \
/system/core/adb/
H A Dadb.c1267 int secure = 0;
1270 /* run adbd in secure mode if ro.secure is set and
1275 property_get("ro.secure", value, "1");
1277 // don't run as root if ro.secure is set...
1278 secure = 1;
1286 secure = 0;
1291 return secure;
1332 property_get("ro.adb.secure", value, "0");
1365 /* don't listen on a port (default 5037) if running in secure mod
[all...]

Completed in 626 milliseconds