/external/grpc-grpc/tools/run_tests/performance/ |
D | scenario_config.py | 114 secure=True, argument 141 'security_params': _get_secargs(secure), 152 'security_params': _get_secargs(secure), 252 secure=False, 266 secure=False, 280 secure=False, 285 for secure in [True, False]: 286 secstr = 'secure' if secure else 'insecure' 288 if secure else [INPROC]) + [SCALABLE] 297 secure=secure, [all …]
|
/external/rust/crates/grpcio-sys/grpc/tools/run_tests/performance/ |
D | scenario_config.py | 114 secure=True, argument 143 'security_params': _get_secargs(secure), 155 'security_params': _get_secargs(secure), 256 secure=False, 270 secure=False, 284 secure=False, 289 for secure in [True, False]: 290 secstr = 'secure' if secure else 'insecure' 291 smoketest_categories = ([SMOKETEST] if secure else []) 292 inproc_categories = ([INPROC] if not secure else []) [all …]
|
/external/grpc-grpc/ |
D | Makefile | 3242 # You can't build secure libraries if you don't have OpenSSL. 3812 # You can't build secure libraries if you don't have OpenSSL. 4179 # You can't build secure libraries if you don't have OpenSSL. 4504 # You can't build secure libraries if you don't have OpenSSL. 5152 # You can't build secure libraries if you don't have OpenSSL. 5191 # You can't build secure libraries if you don't have OpenSSL. 5484 # You can't build secure libraries if you don't have OpenSSL. 5553 # You can't build secure libraries if you don't have OpenSSL. 6059 # You can't build secure libraries if you don't have OpenSSL. 6130 # You can't build secure libraries if you don't have OpenSSL. [all …]
|
/external/apache-http/src/org/apache/http/conn/routing/ |
D | RouteTracker.java | 82 private boolean secure; field in RouteTracker 122 public final void connectTarget(boolean secure) { in connectTarget() argument 127 this.secure = secure; in connectTarget() 138 public final void connectProxy(HttpHost proxy, boolean secure) { in connectProxy() argument 147 this.secure = secure; in connectProxy() 157 public final void tunnelTarget(boolean secure) { in tunnelTarget() argument 165 this.secure = secure; in tunnelTarget() 178 public final void tunnelProxy(HttpHost proxy, boolean secure) { in tunnelProxy() argument 196 this.secure = secure; in tunnelProxy() 206 public final void layerProtocol(boolean secure) { in layerProtocol() argument [all …]
|
D | HttpRoute.java | 77 private final boolean secure; field in HttpRoute 102 boolean secure, in HttpRoute() argument 122 this.secure = secure; in HttpRoute() 142 boolean secure, TunnelType tunnelled, LayerType layered) { in HttpRoute() argument 143 this(local, target, toChain(proxies), secure, tunnelled, layered); in HttpRoute() 165 boolean secure, TunnelType tunnelled, LayerType layered) { in HttpRoute() argument 166 this(local, target, toChain(proxy), secure, tunnelled, layered); in HttpRoute() 180 public HttpRoute(HttpHost target, InetAddress local, boolean secure) { in HttpRoute() argument 181 this(local, target, null, secure, TunnelType.PLAIN, LayerType.PLAIN); in HttpRoute() 209 boolean secure) { in HttpRoute() argument [all …]
|
/external/arm-trusted-firmware/docs/design/ |
D | interrupt-framework-design.rst | 8 #. It should be possible to route interrupts meant to be handled by secure 9 software (Secure interrupts) to EL3, when execution is in non-secure state 13 that secure interrupts are under the control of the secure software with 15 intervention from non-secure software. 18 non-secure software (Non-secure interrupts) to the last executed exception 19 level in the normal world when the execution is in secure world at 22 approach should be governed by the secure software. This requirement 23 ensures that non-secure software is able to execute in tandem with the 24 secure software without overriding it. 39 #. Non-secure interrupt. This type of interrupt can be routed to EL3, [all …]
|
/external/curl/tests/data/ |
D | test31 | 19 Set-Cookie: foobar=name; domain=anything.com; path=/ ; secure 23 Set-Cookie: sec1value=secure1 ; domain=127.0.0.1; path=/secure1/ ; secure 24 Set-Cookie: sec2value=secure2 ; domain=127.0.0.1; path=/secure2/ ; secure= 25 Set-Cookie: sec3value=secure3 ; domain=127.0.0.1; path=/secure3/ ; secure= 26 Set-Cookie: sec4value=secure4 ; secure=; domain=127.0.0.1; path=/secure4/ ; 27 Set-Cookie: sec5value=secure5 ; secure; domain=127.0.0.1; path=/secure5/ ; 28 Set-Cookie: sec6value=secure6 ; secure ; domain=127.0.0.1; path=/secure6/ ; 29 Set-Cookie: sec7value=secure7 ; secure ; domain=127.0.0.1; path=/secure7/ ; 30 Set-Cookie: sec8value=secure8 ; secure= ; domain=127.0.0.1; path=/secure8/ ; 31 Set-Cookie: secure=very1 ; secure=; domain=127.0.0.1; path=/secure9/; [all …]
|
/external/arm-trusted-firmware/docs/components/ |
D | firmware-update.rst | 23 This document describes the secure world FWU design. It is beyond its scope to 33 some parts of FWU to be implemented in other secure and normal world images. 40 - Copying images from non-secure to secure memory 42 - Context switching between the normal and secure world during the FWU 45 - Other secure world FWU images handle platform initialization required by 48 interfaces to non-secure memory. 80 is permitted to request execution of a secure world FWU image (after 83 - Secure or non-secure image. This indicates whether the image is 84 authenticated/executed in secure or non-secure memory. 101 transitions are shown in the diagram below. Note that secure images have a more [all …]
|
/external/python/cpython2/Lib/ |
D | _MozillaCookieJar.py | 70 domain, domain_specified, path, secure, expires, name, value = \ 72 secure = (secure == "TRUE") 94 secure, 127 if cookie.secure: secure = "TRUE" 128 else: secure = "FALSE" 146 secure, expires, name, value])+
|
/external/apache-http/src/org/apache/http/cookie/ |
D | CookieOrigin.java | 53 private final boolean secure; field in CookieOrigin 55 public CookieOrigin(final String host, int port, final String path, boolean secure) { in CookieOrigin() argument 79 this.secure = secure; in CookieOrigin() 95 return this.secure; in isSecure() 102 if (this.secure) { in toString()
|
/external/arm-trusted-firmware/tools/marvell/doimage/secure/ |
D | sec_img_8K.cfg | 3 kak_key_file = "tools/doimage/secure/kak_priv_pem.key"; 8 csk_key_file = ["tools/doimage/secure/csk_priv_pem0.key", 9 "tools/doimage/secure/csk_priv_pem1.key", 10 "tools/doimage/secure/csk_priv_pem2.key", 11 "tools/doimage/secure/csk_priv_pem3.key", 18 aes_key_file = "tools/doimage/secure/aes_key.txt";
|
D | sec_img_7K.cfg | 3 kak_key_file = "tools/doimage/secure/kak_priv_pem.key"; 8 csk_key_file = ["tools/doimage/secure/csk_priv_pem0.key", 9 "tools/doimage/secure/csk_priv_pem1.key", 10 "tools/doimage/secure/csk_priv_pem2.key", 11 "tools/doimage/secure/csk_priv_pem3.key", 18 aes_key_file = "tools/doimage/secure/aes_key.txt";
|
/external/arm-trusted-firmware/docs/security_advisories/ |
D | security-advisory-tfv-2.rst | 5 | Title | Enabled secure self-hosted invasive debug interface can | 6 | | allow normal world to panic secure world | 18 | Impact | Denial of Service (secure world panic) | 25 The ``MDCR_EL3.SDD`` bit controls AArch64 secure self-hosted invasive debug 28 entrypoint code, which enables debug exceptions from the secure world. This can 32 normal world attacker to induce a panic in the secure world. 35 from the secure world. 42 secure self-hosted invasive debug enablement. TF assigns these bits to ``00`` 45 secure privileged invasive debug is enabled by the authentication interface, at
|
D | security-advisory-tfv-5.rst | 6 | | secure world timing information | 18 | Impact | Leakage of sensitive secure world timing information | 32 bit is set to zero, the cycle counter (when enabled) counts during secure world 36 normal and secure worlds, normal world code can set ``PMCR_EL0.DP`` to zero to 37 cause leakage of secure world timing information. This register should be added 45 sensible default values in the secure context.
|
/external/grpc-grpc/test/core/end2end/ |
D | generate_tests.bzl | 24 name_resolution=True, secure=True, tracing=False, argument 33 secure=secure, 68 'h2_ssl': fixture_options(secure=True), 69 … 'h2_local': fixture_options(secure=True, dns_resolver=False, platforms=['linux', 'mac', 'posix']), 70 'h2_ssl_proxy': fixture_options(includes_proxy=True, secure=True), 81 proxyable=True, secure=False, traceable=False, argument 90 secure=secure, 106 'call_creds': test_options(secure=True),
|
/external/libwebsockets/minimal-examples/secure-streams/minimal-secure-streams-alexa/ |
D | README.md | 1 # lws secure streams alexa 3 This demonstrates AVS Alexa usage using secure streams. It connects to AVS, 33 Enter the minimal example dir for secure-streams-alexa and make the sample 36 $ cd ./minimal-examples/secure-streams/minimal-secure-streams-alexa 44 $ ./lws-minimal-secure-streams-alexa 45 [2019/10/16 16:22:01:1097] U: LWS secure streams - Alex voice test [-d<verb>]
|
/external/exoplayer/tree/library/core/src/main/java/com/google/android/exoplayer2/video/ |
D | DummySurface.java | 48 public final boolean secure; field in DummySurface 82 public static DummySurface newInstanceV17(Context context, boolean secure) { in newInstanceV17() argument 83 Assertions.checkState(!secure || isSecureSupported(context)); in newInstanceV17() 85 return thread.init(secure ? secureMode : SECURE_MODE_NONE); in newInstanceV17() 88 private DummySurface(DummySurfaceThread thread, SurfaceTexture surfaceTexture, boolean secure) { in DummySurface() argument 91 this.secure = secure; in DummySurface()
|
/external/apache-http/src/org/apache/http/impl/conn/ |
D | AbstractPoolEntry.java | 203 public void tunnelTarget(boolean secure, HttpParams params) in tunnelTarget() argument 223 secure, params); in tunnelTarget() 224 this.tracker.tunnelTarget(secure); in tunnelTarget() 244 public void tunnelProxy(HttpHost next, boolean secure, HttpParams params) in tunnelProxy() argument 263 this.connection.update(null, next, secure, params); in tunnelProxy() 264 this.tracker.tunnelProxy(next, secure); in tunnelProxy()
|
D | AbstractPooledConnAdapter.java | 129 public void tunnelTarget(boolean secure, HttpParams params) in tunnelTarget() argument 133 poolEntry.tunnelTarget(secure, params); in tunnelTarget() 138 public void tunnelProxy(HttpHost next, boolean secure, HttpParams params) in tunnelProxy() argument 142 poolEntry.tunnelProxy(next, secure, params); in tunnelProxy()
|
/external/rust/crates/grpcio/ |
D | Cargo.toml.orig | 33 default = ["protobuf-codec", "secure", "use-bindgen"] 36 secure = ["grpcio-sys/secure"] 37 openssl = ["secure", "grpcio-sys/openssl"] 38 openssl-vendored = ["secure", "grpcio-sys/openssl-vendored"]
|
D | Cargo.toml | 60 default = ["protobuf-codec", "secure", "use-bindgen"] 62 openssl = ["secure", "grpcio-sys/openssl"] 63 openssl-vendored = ["secure", "grpcio-sys/openssl-vendored"] 66 secure = ["grpcio-sys/secure"]
|
/external/libwebsockets/minimal-examples/secure-streams/ |
D | README.md | 10 minimal-secure-streams|Minimal secure streams client / proxy example 11 minimal-secure-streams-tx|Proxy used for client-tx test below 12 minimal-secure-streams-client-tx|Secure streams client showing tx and rx
|
/external/arm-trusted-firmware/docs/getting_started/ |
D | psci-lib-integration-guide.rst | 9 at the highest secure privileged mode, which is EL3 in AArch64 or Secure SVC/ 10 Monitor mode in AArch32, and provides runtime services to the non-secure world. 36 #. Call ``psci_prepare_next_non_secure_ctx()`` to initialize the non-secure CPU 39 #. Get the non-secure ``cpu_context_t`` for the current CPU by calling 40 ``cm_get_context()`` , then programming the registers in the non-secure 41 context and exiting to non-secure world. If the EL3 Runtime Software needs 42 additional configuration to be set for non-secure context, like routing 43 FIQs to the secure world, the values of the registers can be modified prior 56 initializes/restores the non-secure CPU context as well. 76 PSCI library is in charge of initializing/restoring the non-secure CPU system [all …]
|
/external/llvm-project/llvm/test/CodeGen/ARM/ |
D | cmse-errors.ll | 12 ; CHECK: error: {{.*}}test1{{.*}}: secure entry function would return value through pointer 18 ; CHECK: error: {{.*}}test2{{.*}}: secure entry function requires arguments on stack 25 ; CHECK: error: {{.*}}test3{{.*}}: call to non-secure function would require passing arguments on s… 35 ; CHECK: error: {{.*}}test4{{.*}}: call to non-secure function would return value through pointer 55 ; CHECK: error: {{.*}}test5{{.*}}: secure entry function must not be variadic 62 ; CHECK: error: {{.*}}test6{{.*}}: call to non-secure function would require passing arguments on s…
|
/external/libdrm/tests/amdgpu/ |
D | security_tests.c | 156 const int secure) in amdgpu_sdma_lcopy() argument 160 packet[0] = htole32(secure << 18 | 1); in amdgpu_sdma_lcopy() 194 int secure) in amdgpu_bo_lcopy() argument 202 size, secure); in amdgpu_bo_lcopy() 208 secure == 1); in amdgpu_bo_lcopy() 226 int secure) in amdgpu_bo_move() argument 252 secure == 1); in amdgpu_bo_move()
|