/external/grpc-grpc/tools/run_tests/performance/ |
D | scenario_config.py | 114 secure=True, argument 141 'security_params': _get_secargs(secure), 152 'security_params': _get_secargs(secure), 252 secure=False, 266 secure=False, 280 secure=False, 285 for secure in [True, False]: 286 secstr = 'secure' if secure else 'insecure' 288 if secure else [INPROC]) + [SCALABLE] 297 secure=secure, [all …]
|
/external/u-boot/doc/ |
D | README.ti-secure | 1 README on how boot images are created for secure TI devices 4 Secure TI devices require a boot image that is authenticated by ROM 7 a secure device from TI, the initial public software image must be signed 11 from Texas Instruments. The tools used to generate boot images for secure 12 devices are part of a secure development package (SECDEV) that can be 17 The secure development package is access controlled due to NDA and export 31 warning is issued during the build to indicate that a final secure 38 This is called as part of the SPL/u-boot build process. As the secure 39 boot image formats and requirements differ between secure SOC from TI, 44 package for creating a bootable SPL image for secure TI devices. [all …]
|
/external/apache-http/src/org/apache/http/conn/routing/ |
D | RouteTracker.java | 81 /** Whether the route is secure. */ 82 private boolean secure; field in RouteTracker 119 * @param secure <code>true</code> if the route is secure, 122 public final void connectTarget(boolean secure) { in connectTarget() argument 127 this.secure = secure; in connectTarget() 135 * @param secure <code>true</code> if the route is secure, 138 public final void connectProxy(HttpHost proxy, boolean secure) { in connectProxy() argument 147 this.secure = secure; in connectProxy() 154 * @param secure <code>true</code> if the route is secure, 157 public final void tunnelTarget(boolean secure) { in tunnelTarget() argument [all …]
|
D | HttpRoute.java | 76 /** Whether the route is (supposed to be) secure. */ 77 private final boolean secure; field in HttpRoute 93 * @param secure <code>true</code> if the route is (to be) secure, 102 boolean secure, in HttpRoute() argument 122 this.secure = secure; in HttpRoute() 136 * @param secure <code>true</code> if the route is (to be) secure, 142 boolean secure, TunnelType tunnelled, LayerType layered) { in HttpRoute() argument 143 this(local, target, toChain(proxies), secure, tunnelled, layered); in HttpRoute() 155 * @param secure <code>true</code> if the route is (to be) secure, 165 boolean secure, TunnelType tunnelled, LayerType layered) { in HttpRoute() argument [all …]
|
/external/curl/tests/data/ |
D | test31 | 19 Set-Cookie: foobar=name; domain=anything.com; path=/ ; secure 23 Set-Cookie: sec1value=secure1 ; domain=127.0.0.1; path=/secure1/ ; secure 24 Set-Cookie: sec2value=secure2 ; domain=127.0.0.1; path=/secure2/ ; secure= 25 Set-Cookie: sec3value=secure3 ; domain=127.0.0.1; path=/secure3/ ; secure= 26 Set-Cookie: sec4value=secure4 ; secure=; domain=127.0.0.1; path=/secure4/ ; 27 Set-Cookie: sec5value=secure5 ; secure; domain=127.0.0.1; path=/secure5/ ; 28 Set-Cookie: sec6value=secure6 ; secure ; domain=127.0.0.1; path=/secure6/ ; 29 Set-Cookie: sec7value=secure7 ; secure ; domain=127.0.0.1; path=/secure7/ ; 30 Set-Cookie: sec8value=secure8 ; secure= ; domain=127.0.0.1; path=/secure8/ ; 31 Set-Cookie: secure=very1 ; secure=; domain=127.0.0.1; path=/secure9/; [all …]
|
D | test1561 | 19 Set-Cookie: super=secret; domain=example.com; path=/1561; secure; 20 Set-Cookie: supersuper=secret; domain=example.com; path=/1561/login/; secure; 22 Set-Cookie: __Secure-SID=12346; Secure; Domain=example.com 23 Set-Cookie: supersupersuper=secret; __Secure-SID=12346; Secure; Domain=example.com 25 Set-Cookie: __Host-SID=22346; Secure 28 Set-Cookie: __Host-SID=22349; Secure; Domain=example.com; Path=/ 29 Set-Cookie: __Host-SID=12346; Secure; Path=/ 44 Set-Cookie: secureoverhttp=yes; domain=example.com; path=/1561; secure; 46 Set-Cookie: __Secure-SID=22346; Secure; Domain=example.com 48 Set-Cookie: __Host-SID=32346; Secure [all …]
|
/external/u-boot/arch/arm/include/asm/ |
D | omap_sec_common.h | 14 * Invoke secure ROM API on high-security (HS) device variants. It formats 21 * Invoke a secure ROM API on high-secure (HS) device variants that can be used 22 * to verify a secure blob by authenticating and optionally decrypting it. The 24 * into the blob during the signing/encryption step when the secure blob was 30 * Return the start of secure reserved RAM, if a default start address has 36 * Invoke a secure HAL API that allows configuration of the external memory 44 * Invoke a secure HAL API on high-secure (HS) device variants that reserves a 45 * region of external memory for secure world use, and protects it using memory 47 * memory that will be used for a secure world OS/TEE. 52 * Invoke a secure HAL API to lock the external memory firewall configurations. [all …]
|
/external/robolectric-shadows/shadows/framework/src/main/java/org/robolectric/shadows/ |
D | ShadowSettings.java | 71 @Implements(value = Settings.Secure.class) 127 Settings.Secure.getString(cr, Settings.Secure.LOCATION_PROVIDERS_ALLOWED); in updateEnabledProviders() 139 return Settings.Secure.putString( in updateEnabledProviders() 140 cr, Settings.Secure.LOCATION_PROVIDERS_ALLOWED, newProviders); in updateEnabledProviders() 145 if (Settings.Secure.LOCATION_MODE.equals(name) in putInt() 150 Settings.Secure.class, in putInt() 157 Settings.Secure.class, in putInt() 166 if (Settings.Secure.LOCATION_MODE.equals(name) in getInt() 171 Settings.Secure.class, in getInt() 178 Settings.Secure.class, in getInt() [all …]
|
/external/u-boot/arch/arm/cpu/armv8/ |
D | Kconfig | 44 menu "ARMv8 secure monitor firmware" 46 bool "Enable ARMv8 secure monitor firmware framework support" 50 This framework is aimed at making secure monitor firmware load 54 - Address of secure firmware. 55 - Address to hold the return address from secure firmware. 56 - Secure firmware FIT image related information. 58 - The target exception level that secure monitor firmware will 62 bool "Enable ARMv8 secure monitor firmware framework support for SPL" 69 bool "PSCI implementation in secure monitor firmware" 72 This config enables the ARMv8 PSCI implementation in secure monitor [all …]
|
D | sec_firmware.c | 22 * Secure firmware load addr 23 * Flags used: 0x1 secure firmware has been loaded to secure memory 24 * 0x2 secure firmware is running 62 /* Verify secure firmware image */ in sec_firmware_get_data() 161 /* Verify secure firmware image */ in sec_firmware_check_copy_loadable() 173 /* Get load address, treated as load offset to secure memory */ in sec_firmware_check_copy_loadable() 179 /* Compute load address for loadable in secure memory */ in sec_firmware_check_copy_loadable() 183 /* Copy loadable to secure memory and flush dcache */ in sec_firmware_check_copy_loadable() 218 * to secure memory. Also load any loadable if present along with SEC 239 * The SEC Firmware must be stored in secure memory. in sec_firmware_load_image() [all …]
|
/external/wayland-protocols/chromium.org/unstable/secure-output/ |
D | secure-output-unstable-v1.xml | 27 <description summary="Protocol for providing secure output"> 29 contents from appearing in screenshots or from being visible on non-secure 33 being visible on non-secure outputs, a client must first bind the global 34 interface "wp_secure_output" which, if a compositor supports secure output, 38 to be marked as only visible on secure outputs. 51 <description summary="secure output"> 52 The global interface exposing secure output capabilities is used 55 as only visible on secure outputs. 59 <description summary="unbind from the secure output interface"> 90 or be visible on non-secure outputs. [all …]
|
/external/u-boot/drivers/crypto/fsl/ |
D | Kconfig | 13 Enable Freescale Secure Boot and Trusted Architecture 18 Secure boot and trust architecture compatible version 2 23 Secure boot and trust architecture compatible version 4 28 Secure boot and trust architecture compatible version 5 33 Secure boot and trust architecture compatible version 6 36 bool "Big-endian access to Freescale Secure Boot" 39 int "Freescale Secure Boot compatibility" 47 bool "Little-endian access to Freescale Secure Boot"
|
/external/robolectric-shadows/robolectric/src/test/java/org/robolectric/shadows/ |
D | ShadowSettingsTest.java | 10 import android.provider.Settings.Secure; 45 assertThat(Settings.Secure.getInt(contentResolver, "property", 0)).isEqualTo(0); in testSecureGetInt() 46 assertThat(Settings.Secure.getInt(contentResolver, "property", 2)).isEqualTo(2); in testSecureGetInt() 48 Settings.Secure.putInt(contentResolver, "property", 1); in testSecureGetInt() 49 assertThat(Settings.Secure.getInt(contentResolver, "property", 0)).isEqualTo(1); in testSecureGetInt() 51 Settings.Secure.putString(contentResolver, "property", "11"); in testSecureGetInt() 52 assertThat(Settings.Secure.getInt(contentResolver, "property", 0)).isEqualTo(11); in testSecureGetInt() 136 assertThat(Secure.getInt(context.getContentResolver(), Secure.ADB_ENABLED, 0)).isEqualTo(1); in testSetAdbEnabled_settingsSecure_true() 142 assertThat(Secure.getInt(context.getContentResolver(), Secure.ADB_ENABLED, 1)).isEqualTo(0); in testSetAdbEnabled_settingsSecure_false() 162 assertThat(Secure.getInt(context.getContentResolver(), Secure.INSTALL_NON_MARKET_APPS, 0)) in testSetInstallNonMarketApps_settingsSecure_true() [all …]
|
/external/vboot_reference/firmware/2lib/include/ |
D | 2secdata.h | 5 * Secure non-volatile storage routines 31 /* Secure data area */ 59 * Check the CRC of the secure storage context. 61 * Use this if reading from secure storage may be flaky, and you want to retry 72 * Create fresh data in the secure storage context. 74 * Use this only when initializing the secure storage context on a new machine 76 * (or any other API in this library) fails; that could allow the secure data 84 * Initialize the secure storage context and verify its CRC. 94 * Read a secure storage value. 106 * Write a secure storage value.
|
/external/u-boot/arch/arm/cpu/armv7/ |
D | virt-v7.c | 6 * Routines to transition ARMv7 processors from secure into non-secure state 7 * and from non-secure SVC into HYP mode 15 #include <asm/secure.h> 102 * according to the spec one should not tinker with it in secure state in armv7_init_nonsec() 103 * in SVC mode. Do not try to read it once in non-secure state, in armv7_init_nonsec() 119 * from non-secure state. The first 32 interrupts are private per in armv7_init_nonsec() 128 * Relocate secure section before any cpu runs in secure ram. in armv7_init_nonsec() 129 * smp_kick_all_cpus may enable other cores and runs into secure in armv7_init_nonsec() 130 * ram, so need to relocate secure section before enabling other in armv7_init_nonsec()
|
D | nonsec_virt.S | 3 * code for switching cores into non-secure state and into HYP mode 20 /* the vector table for secure state and HYP mode */ 38 * secure monitor handler 41 * to non-secure state. 51 @ Obtain a secure stack 77 @ FIQ preserved for secure mode 102 movs pc, lr @ ERET to non-secure 137 * of the non-secure and HYP mode transition. The GIC distributor specific 153 * Switch a core to non-secure state. 156 * 2. allow coprocessor access in non-secure modes [all …]
|
D | Kconfig | 13 bool "Enable support for booting in non-secure mode" if EXPERT 17 Say Y here to enable support for booting in non-secure / SVC mode. 20 bool "Boot in secure mode by default" if EXPERT 24 Say Y here to boot in secure mode by default even if non-secure mode 26 suppport booting in non-secure mode. Only set this if you need it. 35 Say Y here to boot in hypervisor (HYP) mode when booting non-secure.
|
/external/u-boot/drivers/misc/ |
D | fsl_sec_mon.c | 27 * If initial state is check or Non-Secure, then set the Software in set_sec_mon_state_non_sec() 28 * Security Violation Bit and transition to Non-Secure State. in set_sec_mon_state_non_sec() 31 printf("SEC_MON state transitioning to Non Secure.\n"); in set_sec_mon_state_non_sec() 34 /* polling loop till SEC_MON is in Non Secure state */ in set_sec_mon_state_non_sec() 53 * If initial state is Trusted, Secure or Soft-Fail, then first set in set_sec_mon_state_non_sec() 83 * If SSM Soft Fail to Non-Secure State Transition in set_sec_mon_state_non_sec() 85 * transition to Non-Secure State. in set_sec_mon_state_non_sec() 89 printf("SEC_MON state transitioning to Non Secure.\n"); in set_sec_mon_state_non_sec() 92 /* polling loop till SEC_MON is in Non Secure*/ in set_sec_mon_state_non_sec() 111 printf("SEC_MON already in Non Secure state.\n"); in set_sec_mon_state_non_sec()
|
/external/kernel-headers/original/uapi/linux/ |
D | nfc.h | 67 * @NFC_CMD_ENABLE_SE: Enable the physical link to a specific secure element. 68 * Once enabled a secure element will handle card emulation mode, i.e. 69 * starting a poll from a device which has a secure element enabled means 71 * @NFC_CMD_DISABLE_SE: Disable the physical link to a specific secure element. 74 * @NFC_EVENT_SE_ADDED: Event emitted when a new secure element is discovered. 77 * @NFC_EVENT_SE_REMOVED: Event emitted when a secure element is removed from 79 * @NFC_EVENT_SE_CONNECTIVITY: This event is emitted whenever a secure element 87 * @NFC_CMD_GET_SE: Dump all discovered secure elements from an NFC controller. 88 * @NFC_CMD_SE_IO: Send/Receive APDUs to/from the selected secure element. 154 * @NFC_ATTR_SE: Available Secure Elements [all …]
|
/external/u-boot/arch/arm/cpu/ |
D | u-boot.lds | 22 * If CONFIG_ARMV7_SECURE_BASE is true, secure code will not 23 * bundle with u-boot, and code offsets are fixed. Secure zone 26 * address for secure code. 28 * If CONFIG_ARMV7_SECURE_BASE is undefined, the secure zone will 30 * were used in secure code. The absolute addresses of the secure 51 /* Align the secure section only if we're going to use it in situ */ 103 "Error: secure section exceeds secure memory size"); 108 /* Reset VMA but don't allocate space if we have secure SRAM */
|
/external/syzkaller/dashboard/app/ |
D | app.yaml | 14 secure: always 18 secure: always 21 secure: always 24 secure: always 27 secure: always 31 secure: always
|
/external/u-boot/include/ |
D | fsl_sec.h | 114 u32 smpart; /* Secure Memory Partition Parameters */ 115 u32 smvid; /* Secure Memory Version ID */ 225 /* Secure Memory Offset varies accross versions */ 228 /*Secure Memory Versioning */ 233 /* Secure Memory Partition Owner register */ 237 /* Secure memory partition 0 page 0 owner register */ 239 /* Secure memory command register */ 241 /* Secure memory command status register */ 243 /* Secure memory access permissions register */ 246 /* Secure memory access group 2 register */ [all …]
|
/external/python/cpython2/Doc/library/ |
D | sha.rst | 6 :synopsis: NIST's secure hash algorithm, SHA. 16 single: Secure Hash Algorithm 19 This module implements the interface to NIST's secure hash algorithm, known as 79 …`Secure Hash Standard <http://csrc.nist.gov/publications/fips/fips180-2/fips180-2withchangenotice.… 80 The Secure Hash Algorithm is defined by NIST document FIPS PUB 180-2: `Secure 85 `Cryptographic Toolkit (Secure Hashing) <http://csrc.nist.gov/CryptoToolkit/tkhash.html>`_ 86 Links from NIST to various information on secure hashing.
|
/external/apache-http/src/org/apache/http/conn/ |
D | OperatedClientConnection.java | 81 * Indicates whether this connection is secure. 86 * @return <code>true</code> if this connection is secure, 140 * @param secure <code>true</code> if this connection is secure, for 142 * <code>false</code> if it is not secure 147 void openCompleted(boolean secure, HttpParams params) in openCompleted() argument 169 * @param secure <code>true</code> if this connection is now secure, 170 * <code>false</code> if it is not secure 174 boolean secure, HttpParams params) in update() argument
|
/external/python/cpython2/Lib/ |
D | _MozillaCookieJar.py | 70 domain, domain_specified, path, secure, expires, name, value = \ 72 secure = (secure == "TRUE") 94 secure, 127 if cookie.secure: secure = "TRUE" 128 else: secure = "FALSE" 146 secure, expires, name, value])+
|