Searched refs:secure (Results 1 - 17 of 17) sorted by path

/system/extras/tests/storage/
H A Dwipe_blkdev.c51 static int wipe_block_device(int fd, u64 len, int secure) argument
59 if (secure) {
68 secure ? "Secure" : "Nonsecure", errno);
82 int secure = 0; local
95 secure = 1;
127 ret = wipe_block_device(fd, len, secure);
/system/gatekeeper/
H A Dgatekeeper.cpp285 failure_record_t *record, bool secure, GateKeeperMessage *response) {
300 if (!WriteFailureRecord(uid, record, secure)) {
313 failure_record_t *record, bool secure) {
318 return WriteFailureRecord(uid, record, secure);
284 ThrottleRequest(uint32_t uid, uint64_t timestamp, failure_record_t *record, bool secure, GateKeeperMessage *response) argument
312 IncrementFailureRecord(uint32_t uid, secure_id_t user_id, uint64_t timestamp, failure_record_t *record, bool secure) argument
/system/gatekeeper/include/gatekeeper/
H A Dgatekeeper.h120 * The failure record should be written to hardware-backed secure storage, such as
123 * If 'secure' is false, password is operating in a fallback mode. Implementations
124 * may store the failure record in memory or in non-secure storage if this value is false.
129 bool secure) = 0;
134 * Must be persisted in secure storage if the target device supports it.
136 * If 'secure' is false, password is operating in a fallback mode. Implementations
137 * may store the failure record in memory or in non-secure storage if this value is false.
141 virtual bool ClearFailureRecord(uint32_t uid, secure_id_t user_id, bool secure) = 0;
146 * Must be persisted in secure storage if the target device supports it.
148 * If 'secure' i
[all...]
/system/netd/server/
H A DCommandListener.cpp1372 // network create <netId> vpn <hasDns> <secure>
1380 bool secure = atoi(argv[5]); local
1381 if (int ret = gCtls->netCtrl.createVirtualNetwork(netId, hasDns, secure)) {
H A DNetdNativeService.cpp191 binder::Status NetdNativeService::networkCreateVpn(int32_t netId, bool hasDns, bool secure) { argument
193 int ret = gCtls->netCtrl.createVirtualNetwork(netId, hasDns, secure);
H A DNetdNativeService.h49 binder::Status networkCreateVpn(int32_t netId, bool hasDns, bool secure) override;
H A DNetworkController.cpp415 int NetworkController::createVirtualNetwork(unsigned netId, bool hasDns, bool secure) { argument
431 mNetworks[netId] = new VirtualNetwork(netId, hasDns, secure);
H A DNetworkController.h103 int createVirtualNetwork(unsigned netId, bool hasDns, bool secure) WARN_UNUSED_RESULT;
H A DRouteController.cpp473 bool secure, bool add) {
482 if (secure) {
500 WARN_UNUSED_RESULT int modifyVpnSystemPermissionRule(unsigned netId, uint32_t table, bool secure, argument
511 uint32_t priority = secure ? RULE_PRIORITY_SECURE_VPN : RULE_PRIORITY_BYPASSABLE_VPN;
783 bool secure, bool add,
791 if (int ret = modifyVpnUidRangeRule(table, range.getStart(), range.getStop(), secure, add))
812 if (int ret = modifyVpnSystemPermissionRule(netId, table, secure, add)) {
1001 bool secure, const UidRanges& uidRanges) {
1002 if (int ret = modifyVirtualNetwork(netId, interface, uidRanges, secure, ACTION_ADD,
1011 bool secure, cons
472 modifyVpnUidRangeRule(uint32_t table, uid_t uidStart, uid_t uidEnd, bool secure, bool add) argument
781 modifyVirtualNetwork(unsigned netId, const char* interface, const UidRanges& uidRanges, bool secure, bool add, bool modifyNonUidBasedRules) argument
1000 addInterfaceToVirtualNetwork(unsigned netId, const char* interface, bool secure, const UidRanges& uidRanges) argument
1010 removeInterfaceFromVirtualNetwork(unsigned netId, const char* interface, bool secure, const UidRanges& uidRanges) argument
1041 addUsersToVirtualNetwork(unsigned netId, const char* interface, bool secure, const UidRanges& uidRanges) argument
1047 removeUsersFromVirtualNetwork(unsigned netId, const char* interface, bool secure, const UidRanges& uidRanges) argument
[all...]
H A DRouteController.h66 static int addInterfaceToVirtualNetwork(unsigned netId, const char* interface, bool secure,
68 static int removeInterfaceFromVirtualNetwork(unsigned netId, const char* interface, bool secure,
75 static int addUsersToVirtualNetwork(unsigned netId, const char* interface, bool secure,
77 static int removeUsersFromVirtualNetwork(unsigned netId, const char* interface, bool secure,
133 const UidRanges& uidRanges, bool secure, bool add,
H A DVirtualNetwork.cpp29 VirtualNetwork::VirtualNetwork(unsigned netId, bool hasDns, bool secure) : argument
30 Network(netId), mHasDns(hasDns), mSecure(secure) {
H A DVirtualNetwork.h28 // A VirtualNetwork may be "secure" or not.
30 // A secure VPN is the usual type of VPN that grabs the default route (and thus all user traffic).
33 // A non-secure VPN ("bypassable" VPN) also grabs all user traffic by default. But all apps are
37 VirtualNetwork(unsigned netId, bool hasDns, bool secure);
/system/netd/server/binder/android/net/
H A DINetd.aidl83 * @param secure whether unprivileged apps are allowed to bypass the VPN.
88 void networkCreateVpn(int netId, boolean hasDns, boolean secure);
152 * of secure VPN.
162 * which is not secure VPN by adding rules, {@code false} to remove existing rules.
/system/sepolicy/prebuilts/api/26.0/private/
H A Dfile_contexts320 /data/secure/backup(/.*)? u:object_r:backup_data_file:s0
/system/sepolicy/prebuilts/api/27.0/private/
H A Dfile_contexts327 /data/secure/backup(/.*)? u:object_r:backup_data_file:s0
/system/sepolicy/prebuilts/api/28.0/private/
H A Dfile_contexts364 /data/secure/backup(/.*)? u:object_r:backup_data_file:s0
/system/sepolicy/private/
H A Dfile_contexts364 /data/secure/backup(/.*)? u:object_r:backup_data_file:s0

Completed in 350 milliseconds