/external/google-fruit/extras/dockerfiles/ |
D | ubuntu-17.10_custom.list | 1 deb [trusted=yes] http://ppa.launchpad.net/ubuntu-toolchain-r/test/ubuntu artful main 2 deb-src [trusted=yes] http://ppa.launchpad.net/ubuntu-toolchain-r/test/ubuntu artful main 3 deb [trusted=yes] http://apt.llvm.org/artful/ llvm-toolchain-artful main 4 deb-src [trusted=yes] http://apt.llvm.org/artful/ llvm-toolchain-artful main 5 deb [trusted=yes] http://apt.llvm.org/artful/ llvm-toolchain-artful-4.0 main 6 deb-src [trusted=yes] http://apt.llvm.org/artful/ llvm-toolchain-artful-4.0 main 7 deb [trusted=yes] http://apt.llvm.org/artful/ llvm-toolchain-artful-5.0 main 8 deb-src [trusted=yes] http://apt.llvm.org/artful/ llvm-toolchain-artful-5.0 main
|
D | ubuntu_arm-17.10_custom.list | 1 #deb [trusted=yes] http://ppa.launchpad.net/ubuntu-toolchain-r/test/ubuntu artful main 2 #deb-src [trusted=yes] http://ppa.launchpad.net/ubuntu-toolchain-r/test/ubuntu artful main 3 #deb [trusted=yes] http://apt.llvm.org/artful/ llvm-toolchain-artful main 4 #deb-src [trusted=yes] http://apt.llvm.org/artful/ llvm-toolchain-artful main 5 #deb [trusted=yes] http://apt.llvm.org/artful/ llvm-toolchain-artful-4.0 main 6 #deb-src [trusted=yes] http://apt.llvm.org/artful/ llvm-toolchain-artful-4.0 main 7 #deb [trusted=yes] http://apt.llvm.org/artful/ llvm-toolchain-artful-5.0 main 8 #deb-src [trusted=yes] http://apt.llvm.org/artful/ llvm-toolchain-artful-5.0 main
|
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/tls/ |
D | CertificateChainCleanerTest.java | 159 HeldCertificate trusted = new HeldCertificate.Builder() in chainGoesAllTheWayToSelfSignedRoot() local 165 .issuedBy(trusted) in chainGoesAllTheWayToSelfSignedRoot() 173 new RealTrustRootIndex(selfSigned.certificate, trusted.certificate)); in chainGoesAllTheWayToSelfSignedRoot() 174 assertEquals(list(certB, certA, trusted, selfSigned), in chainGoesAllTheWayToSelfSignedRoot() 176 assertEquals(list(certB, certA, trusted, selfSigned), in chainGoesAllTheWayToSelfSignedRoot() 177 council.clean(list(certB, certA, trusted))); in chainGoesAllTheWayToSelfSignedRoot() 178 assertEquals(list(certB, certA, trusted, selfSigned), in chainGoesAllTheWayToSelfSignedRoot() 179 council.clean(list(certB, certA, trusted, selfSigned))); in chainGoesAllTheWayToSelfSignedRoot() 186 HeldCertificate trusted = new HeldCertificate.Builder() in trustedRootNotSelfSigned() local 191 .issuedBy(trusted) in trustedRootNotSelfSigned() [all …]
|
/external/u-boot/doc/ |
D | README.armada-secureboot | 1 The trusted boot framework on Marvell Armada 38x 6 1. Overview of the trusted boot 15 1. Overview of the trusted boot 18 The Armada's trusted boot framework enables the SoC to cryptographically verify 48 image, which employs this trusted boot framework, the following tasks need to 61 The documentation of the trusted boot mode is contained in part 1, chapter 88 trusted boot (also known as "security header") 92 Trusted debug mode - A special mode for the trusted boot that allows 93 debugging of devices employing the trusted boot 124 For the trusted boot framework, a additional header is added to the boot image. [all …]
|
/external/curl/tests/data/ |
D | test234 | 9 --location-trusted 67 HTTP, proxy, site+proxy auth and Location: to new host using location-trusted 70 …t/that/page/234 -x %HOSTIP:%HTTPPORT --user iam:myself --proxy-user testing:this --location-trusted
|
D | test1088 | 10 --location-trusted 79 HTTP, proxy with --anyauth and Location: to new host using location-trusted 82 …t.is/we/want/that/page/10881000 -x %HOSTIP:%HTTPPORT --user iam:myself --location-trusted --anyauth
|
/external/u-boot/board/rockchip/evb_rk3328/ |
D | README | 31 > git clone https://github.com/ARM-software/arm-trusted-firmware.git 38 > cd arm-trusted-firmware 57 > cp arm-trusted-firmware/build/rk3328/release/bl31.bin rkbin/rk33
|
/external/autotest/server/cros/bluetooth/ |
D | bluetooth_device.py | 484 def set_trusted(self, address, trusted=True): argument 493 return self._proxy.set_trusted(address, trusted) 496 def pair_legacy_device(self, address, pin, trusted, timeout): argument 510 return self._proxy.pair_legacy_device(address, pin, trusted, timeout)
|
/external/perfetto/docs/ |
D | security-model.md | 13 The former is typically public, the latter is restricted only to trusted 17 Producers are never trusted. We assume they will try their best to DoS / crash / 40 Consumers are always trusted. They still shouldn't be able to crash or exploit 51 untrusted-and-unprivileged and trusted-and-more-privileged entities).
|
/external/python/cpython2/Doc/library/ |
D | restricted.rst | 15 segregation of trusted and untrusted code. The framework is based on the notion 16 that trusted Python code (a *supervisor*) can create a "padded cell' (or 20 trusted code. The term "restricted execution" is favored over "safe-Python" 27 presented to trusted code. Therefore no special interfaces need to be learned
|
/external/autotest/client/cros/bluetooth/ |
D | bluetooth_device_xmlrpc_server.py | 911 def _set_trusted_by_device(self, device, trusted=True): argument 922 properties.Set(self.BLUEZ_DEVICE_IFACE, 'Trusted', trusted) 932 def _set_trusted_by_path(self, device_path, trusted=True): argument 944 return self._set_trusted_by_device(device, trusted) 953 def set_trusted(self, address, trusted=True): argument 964 return self._set_trusted_by_device(device, trusted) 973 def pair_legacy_device(self, address, pin, trusted, timeout=60): argument 1010 if trusted: 1011 self._set_trusted_by_path(device_path, trusted=True)
|
/external/autotest/server/site_tests/bluetooth_AdapterPairing/ |
D | bluetooth_AdapterPairing.py | 91 self.test_pairing(device.address, device.pin, trusted=True) 169 self.test_pairing(device.address, device.pin, trusted=True)
|
/external/syzkaller/sys/linux/ |
D | xattr.txt | 31 xattr_prefix = "system.", "trusted.", "security.", "user.", "btrfs.", "osx.", "os2." 33 …name", "com.apple.FinderInfo", "com.apple.system.Security", "user.syz", "trusted.syz", "security.e…
|
/external/u-boot/board/rockchip/evb_rk3399/ |
D | README | 34 > git clone https://github.com/ARM-software/arm-trusted-firmware.git 41 > cd arm-trusted-firmware 92 > cp arm-trusted-firmware/build/rk3399/release/bl31.elf rkbin/rk33
|
/external/u-boot/cmd/mvebu/ |
D | bubt.c | 62 u32 trusted; member 542 u32 trusted = hdr->trusted; in check_image_header() local 545 if (trusted == 1) { in check_image_header()
|
/external/python/cpython2/Lib/ |
D | rexec.py | 539 trusted = [] 544 trusted.append(a) 546 if trusted: 547 r.ok_builtin_modules = r.ok_builtin_modules + tuple(trusted)
|
/external/u-boot/board/theobroma-systems/lion_rk3368/ |
D | README | 6 > git clone git://git.theobroma-systems.com/arm-trusted-firmware.git 7 > cd arm-trusted-firmware
|
D | fit_spl_atf.its | 28 os = "arm-trusted-firmware";
|
/external/perfetto/protos/perfetto/trace/ |
D | trusted_packet.proto | 20 // for the presence of the trusted fields below, we can use proto3 as a way to 37 // This proto contains trusted fields of TracePacket which may only be generated
|
/external/curl/docs/cmdline-opts/ |
D | location-trusted.d | 1 Long: location-trusted
|
/external/u-boot/board/theobroma-systems/puma_rk3399/ |
D | README | 32 > git clone git://git.theobroma-systems.com/arm-trusted-firmware.git 38 > cd arm-trusted-firmware
|
/external/syzkaller/pkg/report/testdata/gvisor/report/ |
D | 10 | 3 request_key(&(0x7f0000005e80)='trusted\x00', &(0x7f0000005ec0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000…
|
/external/grpc-grpc/third_party/nanopb/docs/ |
D | security.rst | 23 Division of trusted and untrusted data 25 The following data is regarded as **trusted**. It must be under the control of
|
/external/nanopb-c/docs/ |
D | security.rst | 23 Division of trusted and untrusted data 25 The following data is regarded as **trusted**. It must be under the control of
|
/external/u-boot/arch/arm/mach-mvebu/ |
D | Kconfig | 216 bool "Build image for trusted boot" 220 Build an image that employs the ARMADA SoC's trusted boot framework
|