Home
last modified time | relevance | path

Searched refs:secure (Results 1 – 25 of 622) sorted by relevance

12345678910>>...25

/external/grpc-grpc/tools/run_tests/performance/
Dscenario_config.py114 secure=True, argument
141 'security_params': _get_secargs(secure),
152 'security_params': _get_secargs(secure),
252 secure=False,
266 secure=False,
280 secure=False,
285 for secure in [True, False]:
286 secstr = 'secure' if secure else 'insecure'
288 if secure else [INPROC]) + [SCALABLE]
297 secure=secure,
[all …]
/external/grpc-grpc/
DMakefile3242 # You can't build secure libraries if you don't have OpenSSL.
3812 # You can't build secure libraries if you don't have OpenSSL.
4179 # You can't build secure libraries if you don't have OpenSSL.
4504 # You can't build secure libraries if you don't have OpenSSL.
5152 # You can't build secure libraries if you don't have OpenSSL.
5191 # You can't build secure libraries if you don't have OpenSSL.
5484 # You can't build secure libraries if you don't have OpenSSL.
5553 # You can't build secure libraries if you don't have OpenSSL.
6059 # You can't build secure libraries if you don't have OpenSSL.
6130 # You can't build secure libraries if you don't have OpenSSL.
[all …]
/external/apache-http/src/org/apache/http/conn/routing/
DRouteTracker.java82 private boolean secure; field in RouteTracker
122 public final void connectTarget(boolean secure) { in connectTarget() argument
127 this.secure = secure; in connectTarget()
138 public final void connectProxy(HttpHost proxy, boolean secure) { in connectProxy() argument
147 this.secure = secure; in connectProxy()
157 public final void tunnelTarget(boolean secure) { in tunnelTarget() argument
165 this.secure = secure; in tunnelTarget()
178 public final void tunnelProxy(HttpHost proxy, boolean secure) { in tunnelProxy() argument
196 this.secure = secure; in tunnelProxy()
206 public final void layerProtocol(boolean secure) { in layerProtocol() argument
[all …]
DHttpRoute.java77 private final boolean secure; field in HttpRoute
102 boolean secure, in HttpRoute() argument
122 this.secure = secure; in HttpRoute()
142 boolean secure, TunnelType tunnelled, LayerType layered) { in HttpRoute() argument
143 this(local, target, toChain(proxies), secure, tunnelled, layered); in HttpRoute()
165 boolean secure, TunnelType tunnelled, LayerType layered) { in HttpRoute() argument
166 this(local, target, toChain(proxy), secure, tunnelled, layered); in HttpRoute()
180 public HttpRoute(HttpHost target, InetAddress local, boolean secure) { in HttpRoute() argument
181 this(local, target, null, secure, TunnelType.PLAIN, LayerType.PLAIN); in HttpRoute()
209 boolean secure) { in HttpRoute() argument
[all …]
/external/curl/tests/data/
Dtest3119 Set-Cookie: foobar=name; domain=anything.com; path=/ ; secure
23 Set-Cookie: sec1value=secure1 ; domain=127.0.0.1; path=/secure1/ ; secure
24 Set-Cookie: sec2value=secure2 ; domain=127.0.0.1; path=/secure2/ ; secure=
25 Set-Cookie: sec3value=secure3 ; domain=127.0.0.1; path=/secure3/ ; secure=
26 Set-Cookie: sec4value=secure4 ; secure=; domain=127.0.0.1; path=/secure4/ ;
27 Set-Cookie: sec5value=secure5 ; secure; domain=127.0.0.1; path=/secure5/ ;
28 Set-Cookie: sec6value=secure6 ; secure ; domain=127.0.0.1; path=/secure6/ ;
29 Set-Cookie: sec7value=secure7 ; secure ; domain=127.0.0.1; path=/secure7/ ;
30 Set-Cookie: sec8value=secure8 ; secure= ; domain=127.0.0.1; path=/secure8/ ;
31 Set-Cookie: secure=very1 ; secure=; domain=127.0.0.1; path=/secure9/;
[all …]
/external/u-boot/doc/
DREADME.ti-secure1 README on how boot images are created for secure TI devices
7 a secure device from TI, the initial public software image must be signed
11 from Texas Instruments. The tools used to generate boot images for secure
12 devices are part of a secure development package (SECDEV) that can be
17 The secure development package is access controlled due to NDA and export
31 warning is issued during the build to indicate that a final secure
38 This is called as part of the SPL/u-boot build process. As the secure
39 boot image formats and requirements differ between secure SOC from TI,
44 package for creating a bootable SPL image for secure TI devices.
65 <OUTPUT_FILE> is the full path and filename of the final secure
[all …]
/external/python/cpython2/Lib/
D_MozillaCookieJar.py70 domain, domain_specified, path, secure, expires, name, value = \
72 secure = (secure == "TRUE")
94 secure,
127 if cookie.secure: secure = "TRUE"
128 else: secure = "FALSE"
146 secure, expires, name, value])+
/external/apache-http/src/org/apache/http/cookie/
DCookieOrigin.java53 private final boolean secure; field in CookieOrigin
55 public CookieOrigin(final String host, int port, final String path, boolean secure) { in CookieOrigin() argument
79 this.secure = secure; in CookieOrigin()
95 return this.secure; in isSecure()
102 if (this.secure) { in toString()
/external/grpc-grpc/test/core/end2end/
Dgenerate_tests.bzl24 name_resolution=True, secure=True, tracing=False, argument
33 secure=secure,
68 'h2_ssl': fixture_options(secure=True),
69 … 'h2_local': fixture_options(secure=True, dns_resolver=False, platforms=['linux', 'mac', 'posix']),
70 'h2_ssl_proxy': fixture_options(includes_proxy=True, secure=True),
81 proxyable=True, secure=False, traceable=False, argument
90 secure=secure,
106 'call_creds': test_options(secure=True),
/external/u-boot/arch/arm/cpu/armv7/
DKconfig13 bool "Enable support for booting in non-secure mode" if EXPERT
17 Say Y here to enable support for booting in non-secure / SVC mode.
20 bool "Boot in secure mode by default" if EXPERT
24 Say Y here to boot in secure mode by default even if non-secure mode
26 suppport booting in non-secure mode. Only set this if you need it.
35 Say Y here to boot in hypervisor (HYP) mode when booting non-secure.
/external/u-boot/arch/arm/cpu/
Du-boot.lds22 * If CONFIG_ARMV7_SECURE_BASE is true, secure code will not
26 * address for secure code.
28 * If CONFIG_ARMV7_SECURE_BASE is undefined, the secure zone will
30 * were used in secure code. The absolute addresses of the secure
51 /* Align the secure section only if we're going to use it in situ */
103 "Error: secure section exceeds secure memory size");
108 /* Reset VMA but don't allocate space if we have secure SRAM */
/external/u-boot/arch/arm/mach-omap2/
Dutils.c56 const char *secure; in omap_set_fastboot_secure() local
61 secure = "EMU"; in omap_set_fastboot_secure()
64 secure = "HS"; in omap_set_fastboot_secure()
67 secure = "GP"; in omap_set_fastboot_secure()
70 secure = NULL; in omap_set_fastboot_secure()
74 env_set("fastboot.secure", secure); in omap_set_fastboot_secure()
/external/apache-http/src/org/apache/http/impl/conn/
DAbstractPoolEntry.java203 public void tunnelTarget(boolean secure, HttpParams params) in tunnelTarget() argument
223 secure, params); in tunnelTarget()
224 this.tracker.tunnelTarget(secure); in tunnelTarget()
244 public void tunnelProxy(HttpHost next, boolean secure, HttpParams params) in tunnelProxy() argument
263 this.connection.update(null, next, secure, params); in tunnelProxy()
264 this.tracker.tunnelProxy(next, secure); in tunnelProxy()
DAbstractPooledConnAdapter.java129 public void tunnelTarget(boolean secure, HttpParams params) in tunnelTarget() argument
133 poolEntry.tunnelTarget(secure, params); in tunnelTarget()
138 public void tunnelProxy(HttpHost next, boolean secure, HttpParams params) in tunnelProxy() argument
142 poolEntry.tunnelProxy(next, secure, params); in tunnelProxy()
DDefaultHttpRoutePlanner.java115 final boolean secure = schm.isLayered(); in determineRoute()
118 route = new HttpRoute(target, local, secure); in determineRoute()
120 route = new HttpRoute(target, local, proxy, secure); in determineRoute()
DDefaultClientConnection.java127 public void openCompleted(boolean secure, HttpParams params) throws IOException { in openCompleted() argument
133 this.connSecure = secure; in openCompleted()
215 boolean secure, HttpParams params) in update() argument
233 connSecure = secure; in update()
/external/u-boot/arch/arm/cpu/armv8/
DKconfig44 menu "ARMv8 secure monitor firmware"
46 bool "Enable ARMv8 secure monitor firmware framework support"
50 This framework is aimed at making secure monitor firmware load
54 - Address of secure firmware.
55 - Address to hold the return address from secure firmware.
58 - The target exception level that secure monitor firmware will
62 bool "Enable ARMv8 secure monitor firmware framework support for SPL"
69 bool "PSCI implementation in secure monitor firmware"
72 This config enables the ARMv8 PSCI implementation in secure monitor
77 bool "ARMv8 secure monitor firmware ERET address byteorder swap"
[all …]
/external/webrtc/webrtc/base/
Dhttpcommon_unittest.cc26 EXPECT_FALSE(url.secure()); in TEST()
40 EXPECT_FALSE(url.secure()); in TEST()
51 EXPECT_FALSE(url.secure()); in TEST()
63 EXPECT_FALSE(url.secure()); in TEST()
105 EXPECT_TRUE(url.secure()); in TEST()
115 EXPECT_TRUE(url.secure()); in TEST()
Dhttprequest.h53 bool secure() { return secure_; } in secure() function
54 void set_secure(bool secure) { secure_ = secure; } in set_secure() argument
/external/u-boot/board/xilinx/zynqmp/
DKconfig11 Enable ZynqMP specific commands like "zynqmp secure"
12 which is used for zynqmp secure image verification.
13 The secure image is a xilinx specific BOOT.BIN with
/external/libese/tools/ese_ls_provision/
DREADME.md3 Runs on Android host and uploads scripts to the secure element loader service.
7 PN80T and later secure elements include a "loader service" which runs signed, encrypted scripts to
8 perform high-privilege operations like installing and deleting applets in a secure way. The result
12 them to the secure element.
/external/u-boot/board/technexion/pico-imx7d/
DREADME53 The NXP 4.1 kernel boots only in secure boot mode on mx7.
55 Follow the next steps to enable secure boot:
61 -> [*] Enable support for booting in non-secure mode
62 -> [*] Boot in secure mode by default
/external/curl/lib/
Dcookie.c439 bool secure) /* TRUE if connection is over secure origin */ in Curl_cookie_add() argument
569 if(secure || !c->running) { in Curl_cookie_add()
570 co->secure = TRUE; in Curl_cookie_add()
860 co->secure = FALSE; in Curl_cookie_add()
862 if(secure || c->running) in Curl_cookie_add()
863 co->secure = TRUE; in Curl_cookie_add()
911 if(!co->secure) { in Curl_cookie_add()
921 if(co->secure && co->path && strcmp(co->path, "/") == 0 && !co->tailmatch) in Curl_cookie_add()
989 if(clist->secure && !co->secure && !secure) { in Curl_cookie_add()
1273 d->secure = src->secure; in dup_cookie()
[all …]
/external/wayland-protocols/chromium.org/
DREADME.chromium34 …wayland-scanner code < unstable/secure-output/secure-output-unstable-v1.xml > protocol/secure-outp…
35 …wayland-scanner server-header < unstable/secure-output/secure-output-unstable-v1.xml > include/pro…
36 …wayland-scanner client-header < unstable/secure-output/secure-output-unstable-v1.xml > include/pro…
/external/grpc-grpc/src/objective-c/GRPCClient/private/
DGRPCChannel.m135 secure:(BOOL)secure
142 if (secure && !credentials) {
149 if (secure) {
180 return [[GRPCChannel alloc] initWithHost:host secure:YES credentials:NULL channelArgs:NULL];
187 secure:YES
193 return [[GRPCChannel alloc] initWithHost:host secure:NO credentials:NULL channelArgs:channelArgs];

12345678910>>...25