/external/grpc-grpc/tools/run_tests/performance/ |
D | scenario_config.py | 114 secure=True, argument 141 'security_params': _get_secargs(secure), 152 'security_params': _get_secargs(secure), 252 secure=False, 266 secure=False, 280 secure=False, 285 for secure in [True, False]: 286 secstr = 'secure' if secure else 'insecure' 288 if secure else [INPROC]) + [SCALABLE] 297 secure=secure, [all …]
|
/external/grpc-grpc/ |
D | Makefile | 3242 # You can't build secure libraries if you don't have OpenSSL. 3812 # You can't build secure libraries if you don't have OpenSSL. 4179 # You can't build secure libraries if you don't have OpenSSL. 4504 # You can't build secure libraries if you don't have OpenSSL. 5152 # You can't build secure libraries if you don't have OpenSSL. 5191 # You can't build secure libraries if you don't have OpenSSL. 5484 # You can't build secure libraries if you don't have OpenSSL. 5553 # You can't build secure libraries if you don't have OpenSSL. 6059 # You can't build secure libraries if you don't have OpenSSL. 6130 # You can't build secure libraries if you don't have OpenSSL. [all …]
|
/external/apache-http/src/org/apache/http/conn/routing/ |
D | RouteTracker.java | 82 private boolean secure; field in RouteTracker 122 public final void connectTarget(boolean secure) { in connectTarget() argument 127 this.secure = secure; in connectTarget() 138 public final void connectProxy(HttpHost proxy, boolean secure) { in connectProxy() argument 147 this.secure = secure; in connectProxy() 157 public final void tunnelTarget(boolean secure) { in tunnelTarget() argument 165 this.secure = secure; in tunnelTarget() 178 public final void tunnelProxy(HttpHost proxy, boolean secure) { in tunnelProxy() argument 196 this.secure = secure; in tunnelProxy() 206 public final void layerProtocol(boolean secure) { in layerProtocol() argument [all …]
|
D | HttpRoute.java | 77 private final boolean secure; field in HttpRoute 102 boolean secure, in HttpRoute() argument 122 this.secure = secure; in HttpRoute() 142 boolean secure, TunnelType tunnelled, LayerType layered) { in HttpRoute() argument 143 this(local, target, toChain(proxies), secure, tunnelled, layered); in HttpRoute() 165 boolean secure, TunnelType tunnelled, LayerType layered) { in HttpRoute() argument 166 this(local, target, toChain(proxy), secure, tunnelled, layered); in HttpRoute() 180 public HttpRoute(HttpHost target, InetAddress local, boolean secure) { in HttpRoute() argument 181 this(local, target, null, secure, TunnelType.PLAIN, LayerType.PLAIN); in HttpRoute() 209 boolean secure) { in HttpRoute() argument [all …]
|
/external/curl/tests/data/ |
D | test31 | 19 Set-Cookie: foobar=name; domain=anything.com; path=/ ; secure 23 Set-Cookie: sec1value=secure1 ; domain=127.0.0.1; path=/secure1/ ; secure 24 Set-Cookie: sec2value=secure2 ; domain=127.0.0.1; path=/secure2/ ; secure= 25 Set-Cookie: sec3value=secure3 ; domain=127.0.0.1; path=/secure3/ ; secure= 26 Set-Cookie: sec4value=secure4 ; secure=; domain=127.0.0.1; path=/secure4/ ; 27 Set-Cookie: sec5value=secure5 ; secure; domain=127.0.0.1; path=/secure5/ ; 28 Set-Cookie: sec6value=secure6 ; secure ; domain=127.0.0.1; path=/secure6/ ; 29 Set-Cookie: sec7value=secure7 ; secure ; domain=127.0.0.1; path=/secure7/ ; 30 Set-Cookie: sec8value=secure8 ; secure= ; domain=127.0.0.1; path=/secure8/ ; 31 Set-Cookie: secure=very1 ; secure=; domain=127.0.0.1; path=/secure9/; [all …]
|
/external/u-boot/doc/ |
D | README.ti-secure | 1 README on how boot images are created for secure TI devices 7 a secure device from TI, the initial public software image must be signed 11 from Texas Instruments. The tools used to generate boot images for secure 12 devices are part of a secure development package (SECDEV) that can be 17 The secure development package is access controlled due to NDA and export 31 warning is issued during the build to indicate that a final secure 38 This is called as part of the SPL/u-boot build process. As the secure 39 boot image formats and requirements differ between secure SOC from TI, 44 package for creating a bootable SPL image for secure TI devices. 65 <OUTPUT_FILE> is the full path and filename of the final secure [all …]
|
/external/python/cpython2/Lib/ |
D | _MozillaCookieJar.py | 70 domain, domain_specified, path, secure, expires, name, value = \ 72 secure = (secure == "TRUE") 94 secure, 127 if cookie.secure: secure = "TRUE" 128 else: secure = "FALSE" 146 secure, expires, name, value])+
|
/external/apache-http/src/org/apache/http/cookie/ |
D | CookieOrigin.java | 53 private final boolean secure; field in CookieOrigin 55 public CookieOrigin(final String host, int port, final String path, boolean secure) { in CookieOrigin() argument 79 this.secure = secure; in CookieOrigin() 95 return this.secure; in isSecure() 102 if (this.secure) { in toString()
|
/external/grpc-grpc/test/core/end2end/ |
D | generate_tests.bzl | 24 name_resolution=True, secure=True, tracing=False, argument 33 secure=secure, 68 'h2_ssl': fixture_options(secure=True), 69 … 'h2_local': fixture_options(secure=True, dns_resolver=False, platforms=['linux', 'mac', 'posix']), 70 'h2_ssl_proxy': fixture_options(includes_proxy=True, secure=True), 81 proxyable=True, secure=False, traceable=False, argument 90 secure=secure, 106 'call_creds': test_options(secure=True),
|
/external/u-boot/arch/arm/cpu/armv7/ |
D | Kconfig | 13 bool "Enable support for booting in non-secure mode" if EXPERT 17 Say Y here to enable support for booting in non-secure / SVC mode. 20 bool "Boot in secure mode by default" if EXPERT 24 Say Y here to boot in secure mode by default even if non-secure mode 26 suppport booting in non-secure mode. Only set this if you need it. 35 Say Y here to boot in hypervisor (HYP) mode when booting non-secure.
|
/external/u-boot/arch/arm/cpu/ |
D | u-boot.lds | 22 * If CONFIG_ARMV7_SECURE_BASE is true, secure code will not 26 * address for secure code. 28 * If CONFIG_ARMV7_SECURE_BASE is undefined, the secure zone will 30 * were used in secure code. The absolute addresses of the secure 51 /* Align the secure section only if we're going to use it in situ */ 103 "Error: secure section exceeds secure memory size"); 108 /* Reset VMA but don't allocate space if we have secure SRAM */
|
/external/u-boot/arch/arm/mach-omap2/ |
D | utils.c | 56 const char *secure; in omap_set_fastboot_secure() local 61 secure = "EMU"; in omap_set_fastboot_secure() 64 secure = "HS"; in omap_set_fastboot_secure() 67 secure = "GP"; in omap_set_fastboot_secure() 70 secure = NULL; in omap_set_fastboot_secure() 74 env_set("fastboot.secure", secure); in omap_set_fastboot_secure()
|
/external/apache-http/src/org/apache/http/impl/conn/ |
D | AbstractPoolEntry.java | 203 public void tunnelTarget(boolean secure, HttpParams params) in tunnelTarget() argument 223 secure, params); in tunnelTarget() 224 this.tracker.tunnelTarget(secure); in tunnelTarget() 244 public void tunnelProxy(HttpHost next, boolean secure, HttpParams params) in tunnelProxy() argument 263 this.connection.update(null, next, secure, params); in tunnelProxy() 264 this.tracker.tunnelProxy(next, secure); in tunnelProxy()
|
D | AbstractPooledConnAdapter.java | 129 public void tunnelTarget(boolean secure, HttpParams params) in tunnelTarget() argument 133 poolEntry.tunnelTarget(secure, params); in tunnelTarget() 138 public void tunnelProxy(HttpHost next, boolean secure, HttpParams params) in tunnelProxy() argument 142 poolEntry.tunnelProxy(next, secure, params); in tunnelProxy()
|
D | DefaultHttpRoutePlanner.java | 115 final boolean secure = schm.isLayered(); in determineRoute() 118 route = new HttpRoute(target, local, secure); in determineRoute() 120 route = new HttpRoute(target, local, proxy, secure); in determineRoute()
|
D | DefaultClientConnection.java | 127 public void openCompleted(boolean secure, HttpParams params) throws IOException { in openCompleted() argument 133 this.connSecure = secure; in openCompleted() 215 boolean secure, HttpParams params) in update() argument 233 connSecure = secure; in update()
|
/external/u-boot/arch/arm/cpu/armv8/ |
D | Kconfig | 44 menu "ARMv8 secure monitor firmware" 46 bool "Enable ARMv8 secure monitor firmware framework support" 50 This framework is aimed at making secure monitor firmware load 54 - Address of secure firmware. 55 - Address to hold the return address from secure firmware. 58 - The target exception level that secure monitor firmware will 62 bool "Enable ARMv8 secure monitor firmware framework support for SPL" 69 bool "PSCI implementation in secure monitor firmware" 72 This config enables the ARMv8 PSCI implementation in secure monitor 77 bool "ARMv8 secure monitor firmware ERET address byteorder swap" [all …]
|
/external/webrtc/webrtc/base/ |
D | httpcommon_unittest.cc | 26 EXPECT_FALSE(url.secure()); in TEST() 40 EXPECT_FALSE(url.secure()); in TEST() 51 EXPECT_FALSE(url.secure()); in TEST() 63 EXPECT_FALSE(url.secure()); in TEST() 105 EXPECT_TRUE(url.secure()); in TEST() 115 EXPECT_TRUE(url.secure()); in TEST()
|
D | httprequest.h | 53 bool secure() { return secure_; } in secure() function 54 void set_secure(bool secure) { secure_ = secure; } in set_secure() argument
|
/external/u-boot/board/xilinx/zynqmp/ |
D | Kconfig | 11 Enable ZynqMP specific commands like "zynqmp secure" 12 which is used for zynqmp secure image verification. 13 The secure image is a xilinx specific BOOT.BIN with
|
/external/libese/tools/ese_ls_provision/ |
D | README.md | 3 Runs on Android host and uploads scripts to the secure element loader service. 7 PN80T and later secure elements include a "loader service" which runs signed, encrypted scripts to 8 perform high-privilege operations like installing and deleting applets in a secure way. The result 12 them to the secure element.
|
/external/u-boot/board/technexion/pico-imx7d/ |
D | README | 53 The NXP 4.1 kernel boots only in secure boot mode on mx7. 55 Follow the next steps to enable secure boot: 61 -> [*] Enable support for booting in non-secure mode 62 -> [*] Boot in secure mode by default
|
/external/curl/lib/ |
D | cookie.c | 439 bool secure) /* TRUE if connection is over secure origin */ in Curl_cookie_add() argument 569 if(secure || !c->running) { in Curl_cookie_add() 570 co->secure = TRUE; in Curl_cookie_add() 860 co->secure = FALSE; in Curl_cookie_add() 862 if(secure || c->running) in Curl_cookie_add() 863 co->secure = TRUE; in Curl_cookie_add() 911 if(!co->secure) { in Curl_cookie_add() 921 if(co->secure && co->path && strcmp(co->path, "/") == 0 && !co->tailmatch) in Curl_cookie_add() 989 if(clist->secure && !co->secure && !secure) { in Curl_cookie_add() 1273 d->secure = src->secure; in dup_cookie() [all …]
|
/external/wayland-protocols/chromium.org/ |
D | README.chromium | 34 …wayland-scanner code < unstable/secure-output/secure-output-unstable-v1.xml > protocol/secure-outp… 35 …wayland-scanner server-header < unstable/secure-output/secure-output-unstable-v1.xml > include/pro… 36 …wayland-scanner client-header < unstable/secure-output/secure-output-unstable-v1.xml > include/pro…
|
/external/grpc-grpc/src/objective-c/GRPCClient/private/ |
D | GRPCChannel.m | 135 secure:(BOOL)secure 142 if (secure && !credentials) { 149 if (secure) { 180 return [[GRPCChannel alloc] initWithHost:host secure:YES credentials:NULL channelArgs:NULL]; 187 secure:YES 193 return [[GRPCChannel alloc] initWithHost:host secure:NO credentials:NULL channelArgs:channelArgs];
|