Home
last modified time | relevance | path

Searched full:secure (Results 1 – 25 of 1542) sorted by relevance

12345678910>>...62

/external/grpc-grpc/tools/run_tests/performance/
Dscenario_config.py114 secure=True, argument
141 'security_params': _get_secargs(secure),
152 'security_params': _get_secargs(secure),
252 secure=False,
266 secure=False,
280 secure=False,
285 for secure in [True, False]:
286 secstr = 'secure' if secure else 'insecure'
288 if secure else [INPROC]) + [SCALABLE]
297 secure=secure,
[all …]
/external/u-boot/doc/
DREADME.ti-secure1 README on how boot images are created for secure TI devices
4 Secure TI devices require a boot image that is authenticated by ROM
7 a secure device from TI, the initial public software image must be signed
11 from Texas Instruments. The tools used to generate boot images for secure
12 devices are part of a secure development package (SECDEV) that can be
17 The secure development package is access controlled due to NDA and export
31 warning is issued during the build to indicate that a final secure
38 This is called as part of the SPL/u-boot build process. As the secure
39 boot image formats and requirements differ between secure SOC from TI,
44 package for creating a bootable SPL image for secure TI devices.
[all …]
/external/apache-http/src/org/apache/http/conn/routing/
DRouteTracker.java81 /** Whether the route is secure. */
82 private boolean secure; field in RouteTracker
119 * @param secure <code>true</code> if the route is secure,
122 public final void connectTarget(boolean secure) { in connectTarget() argument
127 this.secure = secure; in connectTarget()
135 * @param secure <code>true</code> if the route is secure,
138 public final void connectProxy(HttpHost proxy, boolean secure) { in connectProxy() argument
147 this.secure = secure; in connectProxy()
154 * @param secure <code>true</code> if the route is secure,
157 public final void tunnelTarget(boolean secure) { in tunnelTarget() argument
[all …]
DHttpRoute.java76 /** Whether the route is (supposed to be) secure. */
77 private final boolean secure; field in HttpRoute
93 * @param secure <code>true</code> if the route is (to be) secure,
102 boolean secure, in HttpRoute() argument
122 this.secure = secure; in HttpRoute()
136 * @param secure <code>true</code> if the route is (to be) secure,
142 boolean secure, TunnelType tunnelled, LayerType layered) { in HttpRoute() argument
143 this(local, target, toChain(proxies), secure, tunnelled, layered); in HttpRoute()
155 * @param secure <code>true</code> if the route is (to be) secure,
165 boolean secure, TunnelType tunnelled, LayerType layered) { in HttpRoute() argument
[all …]
/external/curl/tests/data/
Dtest3119 Set-Cookie: foobar=name; domain=anything.com; path=/ ; secure
23 Set-Cookie: sec1value=secure1 ; domain=127.0.0.1; path=/secure1/ ; secure
24 Set-Cookie: sec2value=secure2 ; domain=127.0.0.1; path=/secure2/ ; secure=
25 Set-Cookie: sec3value=secure3 ; domain=127.0.0.1; path=/secure3/ ; secure=
26 Set-Cookie: sec4value=secure4 ; secure=; domain=127.0.0.1; path=/secure4/ ;
27 Set-Cookie: sec5value=secure5 ; secure; domain=127.0.0.1; path=/secure5/ ;
28 Set-Cookie: sec6value=secure6 ; secure ; domain=127.0.0.1; path=/secure6/ ;
29 Set-Cookie: sec7value=secure7 ; secure ; domain=127.0.0.1; path=/secure7/ ;
30 Set-Cookie: sec8value=secure8 ; secure= ; domain=127.0.0.1; path=/secure8/ ;
31 Set-Cookie: secure=very1 ; secure=; domain=127.0.0.1; path=/secure9/;
[all …]
Dtest156119 Set-Cookie: super=secret; domain=example.com; path=/1561; secure;
20 Set-Cookie: supersuper=secret; domain=example.com; path=/1561/login/; secure;
22 Set-Cookie: __Secure-SID=12346; Secure; Domain=example.com
23 Set-Cookie: supersupersuper=secret; __Secure-SID=12346; Secure; Domain=example.com
25 Set-Cookie: __Host-SID=22346; Secure
28 Set-Cookie: __Host-SID=22349; Secure; Domain=example.com; Path=/
29 Set-Cookie: __Host-SID=12346; Secure; Path=/
44 Set-Cookie: secureoverhttp=yes; domain=example.com; path=/1561; secure;
46 Set-Cookie: __Secure-SID=22346; Secure; Domain=example.com
48 Set-Cookie: __Host-SID=32346; Secure
[all …]
/external/u-boot/arch/arm/include/asm/
Domap_sec_common.h14 * Invoke secure ROM API on high-security (HS) device variants. It formats
21 * Invoke a secure ROM API on high-secure (HS) device variants that can be used
22 * to verify a secure blob by authenticating and optionally decrypting it. The
24 * into the blob during the signing/encryption step when the secure blob was
30 * Return the start of secure reserved RAM, if a default start address has
36 * Invoke a secure HAL API that allows configuration of the external memory
44 * Invoke a secure HAL API on high-secure (HS) device variants that reserves a
45 * region of external memory for secure world use, and protects it using memory
47 * memory that will be used for a secure world OS/TEE.
52 * Invoke a secure HAL API to lock the external memory firewall configurations.
[all …]
/external/robolectric-shadows/shadows/framework/src/main/java/org/robolectric/shadows/
DShadowSettings.java71 @Implements(value = Settings.Secure.class)
127 Settings.Secure.getString(cr, Settings.Secure.LOCATION_PROVIDERS_ALLOWED); in updateEnabledProviders()
139 return Settings.Secure.putString( in updateEnabledProviders()
140 cr, Settings.Secure.LOCATION_PROVIDERS_ALLOWED, newProviders); in updateEnabledProviders()
145 if (Settings.Secure.LOCATION_MODE.equals(name) in putInt()
150 Settings.Secure.class, in putInt()
157 Settings.Secure.class, in putInt()
166 if (Settings.Secure.LOCATION_MODE.equals(name) in getInt()
171 Settings.Secure.class, in getInt()
178 Settings.Secure.class, in getInt()
[all …]
/external/u-boot/arch/arm/cpu/armv8/
DKconfig44 menu "ARMv8 secure monitor firmware"
46 bool "Enable ARMv8 secure monitor firmware framework support"
50 This framework is aimed at making secure monitor firmware load
54 - Address of secure firmware.
55 - Address to hold the return address from secure firmware.
56 - Secure firmware FIT image related information.
58 - The target exception level that secure monitor firmware will
62 bool "Enable ARMv8 secure monitor firmware framework support for SPL"
69 bool "PSCI implementation in secure monitor firmware"
72 This config enables the ARMv8 PSCI implementation in secure monitor
[all …]
Dsec_firmware.c22 * Secure firmware load addr
23 * Flags used: 0x1 secure firmware has been loaded to secure memory
24 * 0x2 secure firmware is running
62 /* Verify secure firmware image */ in sec_firmware_get_data()
161 /* Verify secure firmware image */ in sec_firmware_check_copy_loadable()
173 /* Get load address, treated as load offset to secure memory */ in sec_firmware_check_copy_loadable()
179 /* Compute load address for loadable in secure memory */ in sec_firmware_check_copy_loadable()
183 /* Copy loadable to secure memory and flush dcache */ in sec_firmware_check_copy_loadable()
218 * to secure memory. Also load any loadable if present along with SEC
239 * The SEC Firmware must be stored in secure memory. in sec_firmware_load_image()
[all …]
/external/wayland-protocols/chromium.org/unstable/secure-output/
Dsecure-output-unstable-v1.xml27 <description summary="Protocol for providing secure output">
29 contents from appearing in screenshots or from being visible on non-secure
33 being visible on non-secure outputs, a client must first bind the global
34 interface "wp_secure_output" which, if a compositor supports secure output,
38 to be marked as only visible on secure outputs.
51 <description summary="secure output">
52 The global interface exposing secure output capabilities is used
55 as only visible on secure outputs.
59 <description summary="unbind from the secure output interface">
90 or be visible on non-secure outputs.
[all …]
/external/u-boot/drivers/crypto/fsl/
DKconfig13 Enable Freescale Secure Boot and Trusted Architecture
18 Secure boot and trust architecture compatible version 2
23 Secure boot and trust architecture compatible version 4
28 Secure boot and trust architecture compatible version 5
33 Secure boot and trust architecture compatible version 6
36 bool "Big-endian access to Freescale Secure Boot"
39 int "Freescale Secure Boot compatibility"
47 bool "Little-endian access to Freescale Secure Boot"
/external/robolectric-shadows/robolectric/src/test/java/org/robolectric/shadows/
DShadowSettingsTest.java10 import android.provider.Settings.Secure;
45 assertThat(Settings.Secure.getInt(contentResolver, "property", 0)).isEqualTo(0); in testSecureGetInt()
46 assertThat(Settings.Secure.getInt(contentResolver, "property", 2)).isEqualTo(2); in testSecureGetInt()
48 Settings.Secure.putInt(contentResolver, "property", 1); in testSecureGetInt()
49 assertThat(Settings.Secure.getInt(contentResolver, "property", 0)).isEqualTo(1); in testSecureGetInt()
51 Settings.Secure.putString(contentResolver, "property", "11"); in testSecureGetInt()
52 assertThat(Settings.Secure.getInt(contentResolver, "property", 0)).isEqualTo(11); in testSecureGetInt()
136 assertThat(Secure.getInt(context.getContentResolver(), Secure.ADB_ENABLED, 0)).isEqualTo(1); in testSetAdbEnabled_settingsSecure_true()
142 assertThat(Secure.getInt(context.getContentResolver(), Secure.ADB_ENABLED, 1)).isEqualTo(0); in testSetAdbEnabled_settingsSecure_false()
162 assertThat(Secure.getInt(context.getContentResolver(), Secure.INSTALL_NON_MARKET_APPS, 0)) in testSetInstallNonMarketApps_settingsSecure_true()
[all …]
/external/vboot_reference/firmware/2lib/include/
D2secdata.h5 * Secure non-volatile storage routines
31 /* Secure data area */
59 * Check the CRC of the secure storage context.
61 * Use this if reading from secure storage may be flaky, and you want to retry
72 * Create fresh data in the secure storage context.
74 * Use this only when initializing the secure storage context on a new machine
76 * (or any other API in this library) fails; that could allow the secure data
84 * Initialize the secure storage context and verify its CRC.
94 * Read a secure storage value.
106 * Write a secure storage value.
/external/u-boot/arch/arm/cpu/armv7/
Dvirt-v7.c6 * Routines to transition ARMv7 processors from secure into non-secure state
7 * and from non-secure SVC into HYP mode
15 #include <asm/secure.h>
102 * according to the spec one should not tinker with it in secure state in armv7_init_nonsec()
103 * in SVC mode. Do not try to read it once in non-secure state, in armv7_init_nonsec()
119 * from non-secure state. The first 32 interrupts are private per in armv7_init_nonsec()
128 * Relocate secure section before any cpu runs in secure ram. in armv7_init_nonsec()
129 * smp_kick_all_cpus may enable other cores and runs into secure in armv7_init_nonsec()
130 * ram, so need to relocate secure section before enabling other in armv7_init_nonsec()
Dnonsec_virt.S3 * code for switching cores into non-secure state and into HYP mode
20 /* the vector table for secure state and HYP mode */
38 * secure monitor handler
41 * to non-secure state.
51 @ Obtain a secure stack
77 @ FIQ preserved for secure mode
102 movs pc, lr @ ERET to non-secure
137 * of the non-secure and HYP mode transition. The GIC distributor specific
153 * Switch a core to non-secure state.
156 * 2. allow coprocessor access in non-secure modes
[all …]
DKconfig13 bool "Enable support for booting in non-secure mode" if EXPERT
17 Say Y here to enable support for booting in non-secure / SVC mode.
20 bool "Boot in secure mode by default" if EXPERT
24 Say Y here to boot in secure mode by default even if non-secure mode
26 suppport booting in non-secure mode. Only set this if you need it.
35 Say Y here to boot in hypervisor (HYP) mode when booting non-secure.
/external/u-boot/drivers/misc/
Dfsl_sec_mon.c27 * If initial state is check or Non-Secure, then set the Software in set_sec_mon_state_non_sec()
28 * Security Violation Bit and transition to Non-Secure State. in set_sec_mon_state_non_sec()
31 printf("SEC_MON state transitioning to Non Secure.\n"); in set_sec_mon_state_non_sec()
34 /* polling loop till SEC_MON is in Non Secure state */ in set_sec_mon_state_non_sec()
53 * If initial state is Trusted, Secure or Soft-Fail, then first set in set_sec_mon_state_non_sec()
83 * If SSM Soft Fail to Non-Secure State Transition in set_sec_mon_state_non_sec()
85 * transition to Non-Secure State. in set_sec_mon_state_non_sec()
89 printf("SEC_MON state transitioning to Non Secure.\n"); in set_sec_mon_state_non_sec()
92 /* polling loop till SEC_MON is in Non Secure*/ in set_sec_mon_state_non_sec()
111 printf("SEC_MON already in Non Secure state.\n"); in set_sec_mon_state_non_sec()
/external/kernel-headers/original/uapi/linux/
Dnfc.h67 * @NFC_CMD_ENABLE_SE: Enable the physical link to a specific secure element.
68 * Once enabled a secure element will handle card emulation mode, i.e.
69 * starting a poll from a device which has a secure element enabled means
71 * @NFC_CMD_DISABLE_SE: Disable the physical link to a specific secure element.
74 * @NFC_EVENT_SE_ADDED: Event emitted when a new secure element is discovered.
77 * @NFC_EVENT_SE_REMOVED: Event emitted when a secure element is removed from
79 * @NFC_EVENT_SE_CONNECTIVITY: This event is emitted whenever a secure element
87 * @NFC_CMD_GET_SE: Dump all discovered secure elements from an NFC controller.
88 * @NFC_CMD_SE_IO: Send/Receive APDUs to/from the selected secure element.
154 * @NFC_ATTR_SE: Available Secure Elements
[all …]
/external/u-boot/arch/arm/cpu/
Du-boot.lds22 * If CONFIG_ARMV7_SECURE_BASE is true, secure code will not
23 * bundle with u-boot, and code offsets are fixed. Secure zone
26 * address for secure code.
28 * If CONFIG_ARMV7_SECURE_BASE is undefined, the secure zone will
30 * were used in secure code. The absolute addresses of the secure
51 /* Align the secure section only if we're going to use it in situ */
103 "Error: secure section exceeds secure memory size");
108 /* Reset VMA but don't allocate space if we have secure SRAM */
/external/syzkaller/dashboard/app/
Dapp.yaml14 secure: always
18 secure: always
21 secure: always
24 secure: always
27 secure: always
31 secure: always
/external/u-boot/include/
Dfsl_sec.h114 u32 smpart; /* Secure Memory Partition Parameters */
115 u32 smvid; /* Secure Memory Version ID */
225 /* Secure Memory Offset varies accross versions */
228 /*Secure Memory Versioning */
233 /* Secure Memory Partition Owner register */
237 /* Secure memory partition 0 page 0 owner register */
239 /* Secure memory command register */
241 /* Secure memory command status register */
243 /* Secure memory access permissions register */
246 /* Secure memory access group 2 register */
[all …]
/external/python/cpython2/Doc/library/
Dsha.rst6 :synopsis: NIST's secure hash algorithm, SHA.
16 single: Secure Hash Algorithm
19 This module implements the interface to NIST's secure hash algorithm, known as
79 …`Secure Hash Standard <http://csrc.nist.gov/publications/fips/fips180-2/fips180-2withchangenotice.…
80 The Secure Hash Algorithm is defined by NIST document FIPS PUB 180-2: `Secure
85 `Cryptographic Toolkit (Secure Hashing) <http://csrc.nist.gov/CryptoToolkit/tkhash.html>`_
86 Links from NIST to various information on secure hashing.
/external/apache-http/src/org/apache/http/conn/
DOperatedClientConnection.java81 * Indicates whether this connection is secure.
86 * @return <code>true</code> if this connection is secure,
140 * @param secure <code>true</code> if this connection is secure, for
142 * <code>false</code> if it is not secure
147 void openCompleted(boolean secure, HttpParams params) in openCompleted() argument
169 * @param secure <code>true</code> if this connection is now secure,
170 * <code>false</code> if it is not secure
174 boolean secure, HttpParams params) in update() argument
/external/python/cpython2/Lib/
D_MozillaCookieJar.py70 domain, domain_specified, path, secure, expires, name, value = \
72 secure = (secure == "TRUE")
94 secure,
127 if cookie.secure: secure = "TRUE"
128 else: secure = "FALSE"
146 secure, expires, name, value])+

12345678910>>...62