/system/security/keystore/ |
H A D | KeymasterArguments.cpp | 24 namespace security { namespace in namespace:android 41 } // namespace security
|
H A D | OperationResult.cpp | 29 namespace security { namespace in namespace:android 59 } // namespace security
|
H A D | KeyAttestationApplicationId.cpp | 23 namespace security { namespace in namespace:android 47 } // namespace security
|
H A D | KeyAttestationPackageInfo.cpp | 23 namespace security { namespace in namespace:android 55 } // namespace security
|
H A D | KeystoreArguments.cpp | 24 namespace security { namespace in namespace:android 26 using ::android::security::KeystoreArg; 27 using ::android::security::KeystoreArguments; 60 } // namespace security
|
H A D | keystore_attestation_id.h | 24 namespace security { namespace in namespace:android 60 } // namespace security
|
H A D | keystore_aidl_hidl_marshalling_utils.cpp | 205 namespace security { namespace in namespace:android 256 } // namespace security
|
H A D | keystore_attestation_id.cpp | 31 #include <android/security/keymaster/BpKeyAttestationApplicationIdProvider.h> 32 #include <android/security/keymaster/IKeyAttestationApplicationIdProvider.h> 57 using ::android::security::keymaster::BpKeyAttestationApplicationIdProvider; 125 namespace security { namespace in namespace:android 128 using ::android::security::keymaster::KeyAttestationApplicationId; 129 using ::android::security::keymaster::KeyAttestationPackageInfo; 268 } // namespace security
|
/system/security/keystore/include/keystore/ |
H A D | ExportResult.h | 23 namespace security { namespace in namespace:android 37 } // namespace security
|
H A D | KeyCharacteristics.h | 24 namespace security { namespace in namespace:android 42 } // namespace security
|
H A D | KeymasterArguments.h | 23 namespace security { namespace in namespace:android 41 } // namespace security
|
H A D | KeymasterBlob.h | 21 namespace security { namespace in namespace:android 37 } // namespace security
|
H A D | KeymasterCertificateChain.h | 21 namespace security { namespace in namespace:android 39 } // namespace security
|
H A D | KeystoreArguments.h | 26 namespace security { namespace in namespace:android 39 } // namespace security
|
H A D | KeyAttestationApplicationId.h | 26 namespace security { namespace in namespace:android 51 } // namespace security
|
H A D | KeystoreArg.h | 23 namespace security { namespace in namespace:android 39 } // namespace security
|
H A D | OperationResult.h | 25 namespace security { namespace in namespace:android 43 } // namespace security
|
H A D | KeyAttestationPackageInfo.h | 29 namespace security { namespace in namespace:android 60 } // namespace security
|
H A D | utils.h | 11 namespace security { namespace in namespace:android 83 } // namespace security 88 struct iterator_traits<android::security::SharedNullableIterator<T, COLL>> {
|
/system/bt/stack/pan/ |
H A D | pan_utils.cc | 68 uint16_t security = 0; local 104 UINT16_TO_BE_FIELD(&security, 0x0001); 107 (uint8_t*)&security); 127 /* Register with Security Manager for the specific security level */
|
H A D | pan_api.cc | 118 * represent the security for roles PANU, 133 uint8_t security[3] = {PAN_PANU_SECURITY_LEVEL, PAN_GN_SECURITY_LEVEL, local 152 p_sec = security;
|
/system/core/logd/ |
H A D | LogTimes.cpp | 132 bool security = FlushCommand::hasSecurityLogs(client); local 155 logbuf.flushTo(client, start, nullptr, privileged, security, 160 security, FilterSecondPass, me);
|
/system/bt/btif/src/ |
H A D | btif_sock_l2cap.cc | 70 unsigned security; // security flags member in struct:l2cap_socket 273 unsigned security = 0; local 278 security |= is_server ? BTM_SEC_IN_ENCRYPT : BTM_SEC_OUT_ENCRYPT; 280 security |= is_server ? BTM_SEC_IN_AUTHENTICATE : BTM_SEC_OUT_AUTHENTICATE; 282 security |= is_server ? BTM_SEC_IN_MITM : BTM_SEC_OUT_MITM; 284 security |= BTM_SEC_IN_MIN_16_DIGIT_PIN; 293 sock->security = security; 435 accept_rs->security [all...] |
H A D | btif_sock_rfc.cc | 82 int security; member in struct:__anon605 188 int security = 0; local 190 security |= server ? BTM_SEC_IN_ENCRYPT : BTM_SEC_OUT_ENCRYPT; 192 security |= server ? BTM_SEC_IN_AUTHENTICATE : BTM_SEC_OUT_AUTHENTICATE; 194 security |= server ? BTM_SEC_IN_MITM : BTM_SEC_OUT_MITM; 196 security |= BTM_SEC_IN_MIN_16_DIGIT_PIN; 216 slot->security = security; 249 accept_rs->security = srv_rs->security; [all...] |
/system/bt/stack/gap/ |
H A D | gap_conn.cc | 157 * security - security flags 171 tL2CAP_ERTM_INFO* ertm_info, uint16_t security, 259 /* Register with Security Manager for the specific security level */ 261 security, p_ccb->psm, 0, 0)) { 299 /* mark security done flag, when security is not required */ 300 if ((security & (BTM_SEC_OUT_AUTHORIZE | BTM_SEC_OUT_AUTHENTICATE | 819 /* security failed - disconnect the channel */ 842 /* initiate security proces 168 GAP_ConnOpen(const char* p_serv_name, uint8_t service_id, bool is_server, const RawAddress* p_rem_bda, uint16_t psm, uint16_t le_mps, tL2CAP_CFG_INFO* p_cfg, tL2CAP_ERTM_INFO* ertm_info, uint16_t security, uint8_t chan_mode_mask, tGAP_CONN_CALLBACK* p_cb, tBT_TRANSPORT transport) argument [all...] |