/system/extras/tests/storage/ |
H A D | wipe_blkdev.c | 51 static int wipe_block_device(int fd, u64 len, int secure) argument 59 if (secure) { 68 secure ? "Secure" : "Nonsecure", errno); 82 int secure = 0; local 95 secure = 1; 127 ret = wipe_block_device(fd, len, secure);
|
/system/core/trusty/storage/tests/ |
H A D | Android.mk | 20 LOCAL_MODULE := secure-storage-unit-test
|
/system/netd/server/ |
H A D | RouteController.h | 54 static int addInterfaceToVirtualNetwork(unsigned netId, const char* interface, bool secure, 56 static int removeInterfaceFromVirtualNetwork(unsigned netId, const char* interface, bool secure, 63 static int addUsersToVirtualNetwork(unsigned netId, const char* interface, bool secure, 65 static int removeUsersFromVirtualNetwork(unsigned netId, const char* interface, bool secure,
|
H A D | VirtualNetwork.h | 28 // A VirtualNetwork may be "secure" or not. 30 // A secure VPN is the usual type of VPN that grabs the default route (and thus all user traffic). 33 // A non-secure VPN ("bypassable" VPN) also grabs all user traffic by default. But all apps are 37 VirtualNetwork(unsigned netId, bool hasDns, bool secure);
|
H A D | VirtualNetwork.cpp | 29 VirtualNetwork::VirtualNetwork(unsigned netId, bool hasDns, bool secure) : argument 30 Network(netId), mHasDns(hasDns), mSecure(secure) {
|
H A D | RouteController.cpp | 451 bool secure, bool add) { 460 if (secure) { 478 WARN_UNUSED_RESULT int modifyVpnSystemPermissionRule(unsigned netId, uint32_t table, bool secure, argument 489 uint32_t priority = secure ? RULE_PRIORITY_SECURE_VPN : RULE_PRIORITY_BYPASSABLE_VPN; 749 const UidRanges& uidRanges, bool secure, bool add, 757 if (int ret = modifyVpnUidRangeRule(table, range.getStart(), range.getStop(), secure, add)) 778 if (int ret = modifyVpnSystemPermissionRule(netId, table, secure, add)) { 967 bool secure, const UidRanges& uidRanges) { 968 if (int ret = modifyVirtualNetwork(netId, interface, uidRanges, secure, ACTION_ADD, 977 bool secure, cons 450 modifyVpnUidRangeRule(uint32_t table, uid_t uidStart, uid_t uidEnd, bool secure, bool add) argument 748 modifyVirtualNetwork(unsigned netId, const char* interface, const UidRanges& uidRanges, bool secure, bool add, bool modifyNonUidBasedRules) argument 966 addInterfaceToVirtualNetwork(unsigned netId, const char* interface, bool secure, const UidRanges& uidRanges) argument 976 removeInterfaceFromVirtualNetwork(unsigned netId, const char* interface, bool secure, const UidRanges& uidRanges) argument 1007 addUsersToVirtualNetwork(unsigned netId, const char* interface, bool secure, const UidRanges& uidRanges) argument 1013 removeUsersFromVirtualNetwork(unsigned netId, const char* interface, bool secure, const UidRanges& uidRanges) argument [all...] |
H A D | NetworkController.h | 70 int createVirtualNetwork(unsigned netId, bool hasDns, bool secure) WARN_UNUSED_RESULT;
|
H A D | NetworkController.cpp | 348 int NetworkController::createVirtualNetwork(unsigned netId, bool hasDns, bool secure) { argument 363 mNetworks[netId] = new VirtualNetwork(netId, hasDns, secure);
|
H A D | CommandListener.cpp | 1440 // network create <netId> vpn <hasDns> <secure> 1448 bool secure = atoi(argv[5]); local 1449 if (int ret = gCtls->netCtrl.createVirtualNetwork(netId, hasDns, secure)) {
|
/system/gatekeeper/include/gatekeeper/ |
H A D | gatekeeper.h | 120 * The failure record should be written to hardware-backed secure storage, such as 123 * If 'secure' is false, password is operating in a fallback mode. Implementations 124 * may store the failure record in memory or in non-secure storage if this value is false. 129 bool secure) = 0; 134 * Must be persisted in secure storage if the target device supports it. 136 * If 'secure' is false, password is operating in a fallback mode. Implementations 137 * may store the failure record in memory or in non-secure storage if this value is false. 141 virtual bool ClearFailureRecord(uint32_t uid, secure_id_t user_id, bool secure) = 0; 146 * Must be persisted in secure storage if the target device supports it. 148 * If 'secure' i [all...] |
/system/gatekeeper/ |
H A D | gatekeeper.cpp | 285 failure_record_t *record, bool secure, GateKeeperMessage *response) { 300 if (!WriteFailureRecord(uid, record, secure)) { 313 failure_record_t *record, bool secure) { 318 return WriteFailureRecord(uid, record, secure); 284 ThrottleRequest(uint32_t uid, uint64_t timestamp, failure_record_t *record, bool secure, GateKeeperMessage *response) argument 312 IncrementFailureRecord(uint32_t uid, secure_id_t user_id, uint64_t timestamp, failure_record_t *record, bool secure) argument
|
/system/sepolicy/private/ |
H A D | file_contexts | 320 /data/secure/backup(/.*)? u:object_r:backup_data_file:s0
|