Home
last modified time | relevance | path

Searched refs:secure (Results 1 – 25 of 691) sorted by relevance

12345678910>>...28

/external/grpc-grpc/tools/run_tests/performance/
Dscenario_config.py114 secure=True, argument
141 'security_params': _get_secargs(secure),
152 'security_params': _get_secargs(secure),
252 secure=False,
266 secure=False,
280 secure=False,
285 for secure in [True, False]:
286 secstr = 'secure' if secure else 'insecure'
288 if secure else [INPROC]) + [SCALABLE]
297 secure=secure,
[all …]
/external/rust/crates/grpcio-sys/grpc/tools/run_tests/performance/
Dscenario_config.py114 secure=True, argument
143 'security_params': _get_secargs(secure),
155 'security_params': _get_secargs(secure),
256 secure=False,
270 secure=False,
284 secure=False,
289 for secure in [True, False]:
290 secstr = 'secure' if secure else 'insecure'
291 smoketest_categories = ([SMOKETEST] if secure else [])
292 inproc_categories = ([INPROC] if not secure else [])
[all …]
/external/grpc-grpc/
DMakefile3242 # You can't build secure libraries if you don't have OpenSSL.
3812 # You can't build secure libraries if you don't have OpenSSL.
4179 # You can't build secure libraries if you don't have OpenSSL.
4504 # You can't build secure libraries if you don't have OpenSSL.
5152 # You can't build secure libraries if you don't have OpenSSL.
5191 # You can't build secure libraries if you don't have OpenSSL.
5484 # You can't build secure libraries if you don't have OpenSSL.
5553 # You can't build secure libraries if you don't have OpenSSL.
6059 # You can't build secure libraries if you don't have OpenSSL.
6130 # You can't build secure libraries if you don't have OpenSSL.
[all …]
/external/apache-http/src/org/apache/http/conn/routing/
DRouteTracker.java82 private boolean secure; field in RouteTracker
122 public final void connectTarget(boolean secure) { in connectTarget() argument
127 this.secure = secure; in connectTarget()
138 public final void connectProxy(HttpHost proxy, boolean secure) { in connectProxy() argument
147 this.secure = secure; in connectProxy()
157 public final void tunnelTarget(boolean secure) { in tunnelTarget() argument
165 this.secure = secure; in tunnelTarget()
178 public final void tunnelProxy(HttpHost proxy, boolean secure) { in tunnelProxy() argument
196 this.secure = secure; in tunnelProxy()
206 public final void layerProtocol(boolean secure) { in layerProtocol() argument
[all …]
DHttpRoute.java77 private final boolean secure; field in HttpRoute
102 boolean secure, in HttpRoute() argument
122 this.secure = secure; in HttpRoute()
142 boolean secure, TunnelType tunnelled, LayerType layered) { in HttpRoute() argument
143 this(local, target, toChain(proxies), secure, tunnelled, layered); in HttpRoute()
165 boolean secure, TunnelType tunnelled, LayerType layered) { in HttpRoute() argument
166 this(local, target, toChain(proxy), secure, tunnelled, layered); in HttpRoute()
180 public HttpRoute(HttpHost target, InetAddress local, boolean secure) { in HttpRoute() argument
181 this(local, target, null, secure, TunnelType.PLAIN, LayerType.PLAIN); in HttpRoute()
209 boolean secure) { in HttpRoute() argument
[all …]
/external/arm-trusted-firmware/docs/design/
Dinterrupt-framework-design.rst8 #. It should be possible to route interrupts meant to be handled by secure
9 software (Secure interrupts) to EL3, when execution is in non-secure state
13 that secure interrupts are under the control of the secure software with
15 intervention from non-secure software.
18 non-secure software (Non-secure interrupts) to the last executed exception
19 level in the normal world when the execution is in secure world at
22 approach should be governed by the secure software. This requirement
23 ensures that non-secure software is able to execute in tandem with the
24 secure software without overriding it.
39 #. Non-secure interrupt. This type of interrupt can be routed to EL3,
[all …]
/external/curl/tests/data/
Dtest3119 Set-Cookie: foobar=name; domain=anything.com; path=/ ; secure
23 Set-Cookie: sec1value=secure1 ; domain=127.0.0.1; path=/secure1/ ; secure
24 Set-Cookie: sec2value=secure2 ; domain=127.0.0.1; path=/secure2/ ; secure=
25 Set-Cookie: sec3value=secure3 ; domain=127.0.0.1; path=/secure3/ ; secure=
26 Set-Cookie: sec4value=secure4 ; secure=; domain=127.0.0.1; path=/secure4/ ;
27 Set-Cookie: sec5value=secure5 ; secure; domain=127.0.0.1; path=/secure5/ ;
28 Set-Cookie: sec6value=secure6 ; secure ; domain=127.0.0.1; path=/secure6/ ;
29 Set-Cookie: sec7value=secure7 ; secure ; domain=127.0.0.1; path=/secure7/ ;
30 Set-Cookie: sec8value=secure8 ; secure= ; domain=127.0.0.1; path=/secure8/ ;
31 Set-Cookie: secure=very1 ; secure=; domain=127.0.0.1; path=/secure9/;
[all …]
/external/arm-trusted-firmware/docs/components/
Dfirmware-update.rst23 This document describes the secure world FWU design. It is beyond its scope to
33 some parts of FWU to be implemented in other secure and normal world images.
40 - Copying images from non-secure to secure memory
42 - Context switching between the normal and secure world during the FWU
45 - Other secure world FWU images handle platform initialization required by
48 interfaces to non-secure memory.
80 is permitted to request execution of a secure world FWU image (after
83 - Secure or non-secure image. This indicates whether the image is
84 authenticated/executed in secure or non-secure memory.
101 transitions are shown in the diagram below. Note that secure images have a more
[all …]
/external/python/cpython2/Lib/
D_MozillaCookieJar.py70 domain, domain_specified, path, secure, expires, name, value = \
72 secure = (secure == "TRUE")
94 secure,
127 if cookie.secure: secure = "TRUE"
128 else: secure = "FALSE"
146 secure, expires, name, value])+
/external/apache-http/src/org/apache/http/cookie/
DCookieOrigin.java53 private final boolean secure; field in CookieOrigin
55 public CookieOrigin(final String host, int port, final String path, boolean secure) { in CookieOrigin() argument
79 this.secure = secure; in CookieOrigin()
95 return this.secure; in isSecure()
102 if (this.secure) { in toString()
/external/arm-trusted-firmware/tools/marvell/doimage/secure/
Dsec_img_8K.cfg3 kak_key_file = "tools/doimage/secure/kak_priv_pem.key";
8 csk_key_file = ["tools/doimage/secure/csk_priv_pem0.key",
9 "tools/doimage/secure/csk_priv_pem1.key",
10 "tools/doimage/secure/csk_priv_pem2.key",
11 "tools/doimage/secure/csk_priv_pem3.key",
18 aes_key_file = "tools/doimage/secure/aes_key.txt";
Dsec_img_7K.cfg3 kak_key_file = "tools/doimage/secure/kak_priv_pem.key";
8 csk_key_file = ["tools/doimage/secure/csk_priv_pem0.key",
9 "tools/doimage/secure/csk_priv_pem1.key",
10 "tools/doimage/secure/csk_priv_pem2.key",
11 "tools/doimage/secure/csk_priv_pem3.key",
18 aes_key_file = "tools/doimage/secure/aes_key.txt";
/external/arm-trusted-firmware/docs/security_advisories/
Dsecurity-advisory-tfv-2.rst5 | Title | Enabled secure self-hosted invasive debug interface can |
6 | | allow normal world to panic secure world |
18 | Impact | Denial of Service (secure world panic) |
25 The ``MDCR_EL3.SDD`` bit controls AArch64 secure self-hosted invasive debug
28 entrypoint code, which enables debug exceptions from the secure world. This can
32 normal world attacker to induce a panic in the secure world.
35 from the secure world.
42 secure self-hosted invasive debug enablement. TF assigns these bits to ``00``
45 secure privileged invasive debug is enabled by the authentication interface, at
Dsecurity-advisory-tfv-5.rst6 | | secure world timing information |
18 | Impact | Leakage of sensitive secure world timing information |
32 bit is set to zero, the cycle counter (when enabled) counts during secure world
36 normal and secure worlds, normal world code can set ``PMCR_EL0.DP`` to zero to
37 cause leakage of secure world timing information. This register should be added
45 sensible default values in the secure context.
/external/grpc-grpc/test/core/end2end/
Dgenerate_tests.bzl24 name_resolution=True, secure=True, tracing=False, argument
33 secure=secure,
68 'h2_ssl': fixture_options(secure=True),
69 … 'h2_local': fixture_options(secure=True, dns_resolver=False, platforms=['linux', 'mac', 'posix']),
70 'h2_ssl_proxy': fixture_options(includes_proxy=True, secure=True),
81 proxyable=True, secure=False, traceable=False, argument
90 secure=secure,
106 'call_creds': test_options(secure=True),
/external/libwebsockets/minimal-examples/secure-streams/minimal-secure-streams-alexa/
DREADME.md1 # lws secure streams alexa
3 This demonstrates AVS Alexa usage using secure streams. It connects to AVS,
33 Enter the minimal example dir for secure-streams-alexa and make the sample
36 $ cd ./minimal-examples/secure-streams/minimal-secure-streams-alexa
44 $ ./lws-minimal-secure-streams-alexa
45 [2019/10/16 16:22:01:1097] U: LWS secure streams - Alex voice test [-d<verb>]
/external/exoplayer/tree/library/core/src/main/java/com/google/android/exoplayer2/video/
DDummySurface.java48 public final boolean secure; field in DummySurface
82 public static DummySurface newInstanceV17(Context context, boolean secure) { in newInstanceV17() argument
83 Assertions.checkState(!secure || isSecureSupported(context)); in newInstanceV17()
85 return thread.init(secure ? secureMode : SECURE_MODE_NONE); in newInstanceV17()
88 private DummySurface(DummySurfaceThread thread, SurfaceTexture surfaceTexture, boolean secure) { in DummySurface() argument
91 this.secure = secure; in DummySurface()
/external/apache-http/src/org/apache/http/impl/conn/
DAbstractPoolEntry.java203 public void tunnelTarget(boolean secure, HttpParams params) in tunnelTarget() argument
223 secure, params); in tunnelTarget()
224 this.tracker.tunnelTarget(secure); in tunnelTarget()
244 public void tunnelProxy(HttpHost next, boolean secure, HttpParams params) in tunnelProxy() argument
263 this.connection.update(null, next, secure, params); in tunnelProxy()
264 this.tracker.tunnelProxy(next, secure); in tunnelProxy()
DAbstractPooledConnAdapter.java129 public void tunnelTarget(boolean secure, HttpParams params) in tunnelTarget() argument
133 poolEntry.tunnelTarget(secure, params); in tunnelTarget()
138 public void tunnelProxy(HttpHost next, boolean secure, HttpParams params) in tunnelProxy() argument
142 poolEntry.tunnelProxy(next, secure, params); in tunnelProxy()
/external/rust/crates/grpcio/
DCargo.toml.orig33 default = ["protobuf-codec", "secure", "use-bindgen"]
36 secure = ["grpcio-sys/secure"]
37 openssl = ["secure", "grpcio-sys/openssl"]
38 openssl-vendored = ["secure", "grpcio-sys/openssl-vendored"]
DCargo.toml60 default = ["protobuf-codec", "secure", "use-bindgen"]
62 openssl = ["secure", "grpcio-sys/openssl"]
63 openssl-vendored = ["secure", "grpcio-sys/openssl-vendored"]
66 secure = ["grpcio-sys/secure"]
/external/libwebsockets/minimal-examples/secure-streams/
DREADME.md10 minimal-secure-streams|Minimal secure streams client / proxy example
11 minimal-secure-streams-tx|Proxy used for client-tx test below
12 minimal-secure-streams-client-tx|Secure streams client showing tx and rx
/external/arm-trusted-firmware/docs/getting_started/
Dpsci-lib-integration-guide.rst9 at the highest secure privileged mode, which is EL3 in AArch64 or Secure SVC/
10 Monitor mode in AArch32, and provides runtime services to the non-secure world.
36 #. Call ``psci_prepare_next_non_secure_ctx()`` to initialize the non-secure CPU
39 #. Get the non-secure ``cpu_context_t`` for the current CPU by calling
40 ``cm_get_context()`` , then programming the registers in the non-secure
41 context and exiting to non-secure world. If the EL3 Runtime Software needs
42 additional configuration to be set for non-secure context, like routing
43 FIQs to the secure world, the values of the registers can be modified prior
56 initializes/restores the non-secure CPU context as well.
76 PSCI library is in charge of initializing/restoring the non-secure CPU system
[all …]
/external/llvm-project/llvm/test/CodeGen/ARM/
Dcmse-errors.ll12 ; CHECK: error: {{.*}}test1{{.*}}: secure entry function would return value through pointer
18 ; CHECK: error: {{.*}}test2{{.*}}: secure entry function requires arguments on stack
25 ; CHECK: error: {{.*}}test3{{.*}}: call to non-secure function would require passing arguments on s…
35 ; CHECK: error: {{.*}}test4{{.*}}: call to non-secure function would return value through pointer
55 ; CHECK: error: {{.*}}test5{{.*}}: secure entry function must not be variadic
62 ; CHECK: error: {{.*}}test6{{.*}}: call to non-secure function would require passing arguments on s…
/external/libdrm/tests/amdgpu/
Dsecurity_tests.c156 const int secure) in amdgpu_sdma_lcopy() argument
160 packet[0] = htole32(secure << 18 | 1); in amdgpu_sdma_lcopy()
194 int secure) in amdgpu_bo_lcopy() argument
202 size, secure); in amdgpu_bo_lcopy()
208 secure == 1); in amdgpu_bo_lcopy()
226 int secure) in amdgpu_bo_move() argument
252 secure == 1); in amdgpu_bo_move()

12345678910>>...28