/third_party/cmsis/Device/ARM/ARMCM55/Include/Template/ |
D | partition_ARMCM55.h | 3 * @brief CMSIS-CORE Initial Setup for Secure / Non-Secure Zones for Armv8.1-M Mainline 45 // <0=> All Memory is Secure 46 // <1=> All Memory is Non-Secure 48 // <i> When all Memory is Non-Secure (ALLNS is 1), IDAU can override memory map configuration. 59 // <i> - Secure and Non-Secure Callable 60 // <i> - Non-Secure 61 // <i>Note: All memory regions not configured by SAU are Secure 83 // <0=>Non-Secure 84 // <1=>Secure, Non-Secure Callable 109 // <0=>Non-Secure [all …]
|
/third_party/libwebsockets/lib/secure-streams/ |
D | CMakeLists.txt | 29 secure-streams/secure-streams.c 30 secure-streams/policy-common.c 31 secure-streams/system/captive-portal-detect/captive-portal-detect.c 32 secure-streams/protocols/ss-raw.c 36 secure-streams/policy-json.c 37 secure-streams/system/fetch-policy/fetch-policy.c 42 secure-streams/protocols/ss-h1.c 47 secure-streams/protocols/ss-h2.c 52 secure-streams/protocols/ss-ws.c 57 secure-streams/protocols/ss-mqtt.c [all …]
|
D | README.md | 1 # Secure Streams 3 Secure Streams is a networking api that strictly separates payload from any 10 The details about how the connections for different types of secure stream should 14 Both client and server networking can be handled using Secure Streams APIS. 18 ## Secure Streams CLIENT State lifecycle 22 Secure Streams are created using `lws_ss_create()`, after that they may acquire 23 underlying connections, and lose them, but the lifecycle of the Secure Stream 26 Once created, Secure Streams may attempt connections, these may fail and once 56 ## Secure Streams SERVER State lifecycle 60 You can also run servers defined using Secure Streams, the main difference is [all …]
|
/third_party/curl/tests/data/ |
D | test31 | 27 Set-Cookie: foobar=name; domain=anything.com; path=/ ; secure 31 Set-Cookie: sec1value=secure1 ; domain=test31.curl; path=/secure1/ ; secure 32 Set-Cookie: sec2value=secure2 ; domain=test31.curl; path=/secure2/ ; secure= 33 Set-Cookie: sec3value=secure3 ; domain=test31.curl; path=/secure3/ ; secure= 34 Set-Cookie: sec4value=secure4 ; secure=; domain=test31.curl; path=/secure4/ ; 35 Set-Cookie: sec5value=secure5 ; secure; domain=test31.curl; path=/secure5/ ; 36 Set-Cookie: sec6value=secure6 ; secure ; domain=test31.curl; path=/secure6/ ; 37 Set-Cookie: sec7value=secure7 ; secure ; domain=test31.curl; path=/secure7/ ; 38 Set-Cookie: sec8value=secure8 ; secure= ; domain=test31.curl; path=/secure8/ ; 39 Set-Cookie: secure=very1 ; secure=; domain=test31.curl; path=/secure9/; [all …]
|
D | test1561 | 19 Set-Cookie: super=secret; domain=example.com; path=/%TESTNUMBER; secure; 20 Set-Cookie: supersuper=secret; domain=example.com; path=/%TESTNUMBER/login/; secure; 22 Set-Cookie: __SecURE-SID=12346; Secure; Domain=example.com 23 Set-Cookie: supersupersuper=secret; __Secure-SID=12346; Secure; Domain=example.com 25 Set-Cookie: __Host-SID=22346; Secure 28 Set-Cookie: __Host-SID=22349; Secure; Domain=example.com; Path=/ 29 Set-Cookie: __Host-SID=12346; Secure; Path=/ 44 Set-Cookie: secureoverhttp=yes; domain=example.com; path=/%TESTNUMBER; secure; 46 Set-Cookie: __SecuRE-SID=22346; Secure; Domain=example.com 48 Set-Cookie: __Host-SID=32346; Secure [all …]
|
/third_party/libwebsockets/minimal-examples/secure-streams/minimal-secure-streams-smd/ |
D | CMakeLists.txt | 1 project(lws-minimal-secure-streams-smd C) 19 add_executable(${PROJECT_NAME} minimal-secure-streams-smd.c) 28 $<TARGET_FILE:lws-minimal-secure-streams-smd>) 31 add_test(NAME ss-smd COMMAND lws-minimal-secure-streams-smd) 35 … WORKING_DIRECTORY ${CMAKE_SOURCE_DIR}/minimal-examples/secure-streams/minimal-secure-streams-smd 42 $<TARGET_FILE:lws-minimal-secure-streams-smd> 47 $<TARGET_FILE:lws-minimal-secure-streams-smd> 52 $<TARGET_FILE:lws-minimal-secure-streams-smd> 56 add_test(NAME ss-smd-fi1 COMMAND lws-minimal-secure-streams-smd 59 add_test(NAME ss-smd-fi2 COMMAND lws-minimal-secure-streams-smd [all …]
|
/third_party/openssl/test/ |
D | secmemtest.c | 21 TEST_info("Secure memory is implemented."); in test_sec_mem() 24 /* s = non-secure 20 */ in test_sec_mem() 29 /* r = non-secure 20, s = non-secure 20 */ in test_sec_mem() 36 /* r = non-secure 20, p = secure 20, s = non-secure 20 */ in test_sec_mem() 38 /* 20 secure -> 32-byte minimum allocation unit */ in test_sec_mem() 44 /* r = non-secure 20, p = secure 20, q = non-secure 20, s = non-secure 20 */ in test_sec_mem() 50 /* r = non-secure 20, p = secure 20, q = non-secure 20, s = secure 20 */ in test_sec_mem() 52 /* 2 * 20 secure -> 64 bytes allocated */ in test_sec_mem() 57 /* 20 secure -> 32 bytes allocated */ in test_sec_mem() 62 /* should not complete, as secure memory is still allocated */ in test_sec_mem() [all …]
|
/third_party/EGL/extensions/EXT/ |
D | EGL_EXT_protected_surface.txt | 53 surface content is only accessible to secure accesses. Any attempt to access 86 secure memory region. Secure surfaces may be written to by client APIs 89 by non-secure devices in the system (including non-secure software 97 content can be accessed by secure or non-secure devices and can be copied 98 to any other surfaces. The definition of secure and non-secure access is 115 secure memory region. Secure surfaces may be written to by client APIs 118 by non-secure devices in the system (including non-secure software 124 content can be accessed by secure or non-secure devices and can be copied 125 to any other surfaces. The definition of secure and non-secure access is 176 image content is only accessible by secure devices in the system. A [all …]
|
/third_party/skia/third_party/externals/egl-registry/extensions/EXT/ |
D | EGL_EXT_protected_surface.txt | 53 surface content is only accessible to secure accesses. Any attempt to access 86 secure memory region. Secure surfaces may be written to by client APIs 89 by non-secure devices in the system (including non-secure software 97 content can be accessed by secure or non-secure devices and can be copied 98 to any other surfaces. The definition of secure and non-secure access is 115 secure memory region. Secure surfaces may be written to by client APIs 118 by non-secure devices in the system (including non-secure software 124 content can be accessed by secure or non-secure devices and can be copied 125 to any other surfaces. The definition of secure and non-secure access is 176 image content is only accessible by secure devices in the system. A [all …]
|
/third_party/libwebsockets/minimal-examples/secure-streams/minimal-secure-streams/ |
D | CMakeLists.txt | 1 project(lws-minimal-secure-streams C) 8 set(SAMP lws-minimal-secure-streams) 20 add_executable(${SAMP} minimal-secure-streams.c) 48 $<TARGET_FILE:lws-minimal-secure-streams>) 50 add_test(NAME ss-warmcat COMMAND lws-minimal-secure-streams) 55 … WORKING_DIRECTORY ${CMAKE_SOURCE_DIR}/minimal-examples/secure-streams/minimal-secure-streams 65 $<TARGET_FILE:lws-minimal-secure-streams> 70 $<TARGET_FILE:lws-minimal-secure-streams> 74 add_test(NAME ss-warmcat-fi1 COMMAND lws-minimal-secure-streams 77 add_test(NAME ss-warmcat-fi2 COMMAND lws-minimal-secure-streams [all …]
|
/third_party/mbedtls/library/ |
D | psa_crypto_se.h | 2 * PSA crypto support for secure element drivers 30 * for a secure element. 36 * The minimum location value for a secure element is 1, like on any 41 /** The base of the range of ITS file identifiers for secure element 52 /** The maximum number of registered secure element driver locations. */ 55 /** Unregister all secure element drivers. 63 /** Initialize all secure element drivers. 69 /** A structure that describes a registered secure element driver. 71 * A secure element driver table entry contains a pointer to the 76 /** Return the secure element driver information for a lifetime value. [all …]
|
/third_party/libwebsockets/minimal-examples/secure-streams/minimal-secure-streams-testsfail/ |
D | CMakeLists.txt | 1 project(lws-minimal-secure-streams-testsfail C) 8 set(SAMP lws-minimal-secure-streams-testsfail) 18 add_executable(${SAMP} minimal-secure-streams-testsfail.c) 26 $<TARGET_FILE:lws-minimal-secure-streams-testsfail>) 28 add_test(NAME ss-tf COMMAND lws-minimal-secure-streams-testsfail) 33 …WORKING_DIRECTORY ${CMAKE_SOURCE_DIR}/minimal-examples/secure-streams/minimal-secure-streams-tests… 52 sstfproxy $<TARGET_FILE:lws-minimal-secure-streams-proxy> 58 sstfproxy $<TARGET_FILE:lws-minimal-secure-streams-proxy> 69 $<TARGET_FILE:lws-minimal-secure-streams-testsfail-client> -i +${CTEST_SOCKET_PATH} -d1039) 71 …add_test(NAME sspc-minimaltf COMMAND lws-minimal-secure-streams-testsfail-client -i +${CTEST_SOCKE… [all …]
|
/third_party/libwebsockets/minimal-examples/secure-streams/minimal-secure-streams-threads/ |
D | CMakeLists.txt | 1 project(lws-minimal-secure-streams-threads C) 19 add_executable(${PROJECT_NAME} minimal-secure-streams-threads.c) 28 $<TARGET_FILE:lws-minimal-secure-streams-threads>) 31 add_test(NAME ss-threads COMMAND lws-minimal-secure-streams-threads) 35 …WORKING_DIRECTORY ${CMAKE_SOURCE_DIR}/minimal-examples/secure-streams/minimal-secure-streams-threa… 51 add_executable(${PROJECT_NAME}-client minimal-secure-streams-threads.c) 75 ssproxythreads_sspc $<TARGET_FILE:lws-minimal-secure-streams-proxy> 81 ssproxythreads_sspc $<TARGET_FILE:lws-minimal-secure-streams-proxy> 93 $<TARGET_FILE:lws-minimal-secure-streams-threads-client> -i +${CTEST_SOCKET_PATH}) 95 …add_test(NAME sspcthreads_sspc COMMAND lws-minimal-secure-streams-threads-client -i +${CTEST_SOCKE… [all …]
|
/third_party/cmsis/CMSIS/Core/Include/ |
D | cmsis_tiarmclang.h | 780 \brief Get Control Register (non-secure) 781 \details Returns the content of the non-secure Control Register when in secure mode. 782 \return non-secure Control Register value 808 \brief Set Control Register (non-secure) 809 \details Writes the given value to the non-secure Control Register when in secure state. 878 \brief Get Process Stack Pointer (non-secure) 879 …\details Returns the current value of the non-secure Process Stack Pointer (PSP) when in secure st… 905 \brief Set Process Stack Pointer (non-secure) 906 …\details Assigns the given value to the non-secure Process Stack Pointer (PSP) when in secure stat… 932 \brief Get Main Stack Pointer (non-secure) [all …]
|
D | cmsis_armclang.h | 780 \brief Get Control Register (non-secure) 781 \details Returns the content of the non-secure Control Register when in secure mode. 782 \return non-secure Control Register value 808 \brief Set Control Register (non-secure) 809 \details Writes the given value to the non-secure Control Register when in secure state. 878 \brief Get Process Stack Pointer (non-secure) 879 …\details Returns the current value of the non-secure Process Stack Pointer (PSP) when in secure st… 905 \brief Set Process Stack Pointer (non-secure) 906 …\details Assigns the given value to the non-secure Process Stack Pointer (PSP) when in secure stat… 932 \brief Get Main Stack Pointer (non-secure) [all …]
|
D | cmsis_armclang_ltm.h | 768 \brief Get Control Register (non-secure) 769 \details Returns the content of the non-secure Control Register when in secure mode. 770 \return non-secure Control Register value 796 \brief Set Control Register (non-secure) 797 \details Writes the given value to the non-secure Control Register when in secure state. 866 \brief Get Process Stack Pointer (non-secure) 867 …\details Returns the current value of the non-secure Process Stack Pointer (PSP) when in secure st… 893 \brief Set Process Stack Pointer (non-secure) 894 …\details Assigns the given value to the non-secure Process Stack Pointer (PSP) when in secure stat… 920 \brief Get Main Stack Pointer (non-secure) [all …]
|
/third_party/libwebsockets/minimal-examples/secure-streams/minimal-secure-streams-stress/ |
D | CMakeLists.txt | 1 project(lws-minimal-secure-streams-stress C) 8 set(SAMP lws-minimal-secure-streams-stress) 19 add_executable(${SAMP} minimal-secure-streams.c) 47 $<TARGET_FILE:lws-minimal-secure-streams-stress> -c 4 --budget 5) 49 add_test(NAME ssstress-warmcat COMMAND lws-minimal-secure-streams-stress -c 4 --budget 5) 54 …WORKING_DIRECTORY ${CMAKE_SOURCE_DIR}/minimal-examples/secure-streams/minimal-secure-streams-stress 76 ssstressproxy $<TARGET_FILE:lws-minimal-secure-streams-proxy> 82 ssstressproxy $<TARGET_FILE:lws-minimal-secure-streams-proxy> 94 … $<TARGET_FILE:lws-minimal-secure-streams-stress-client> -i +${CTEST_SOCKET_PATH} -c 4 --budget 5) 96 …add_test(NAME sspc-minimalstress COMMAND lws-minimal-secure-streams-stress-client -i +${CTEST_SOCK… [all …]
|
/third_party/libwebsockets/minimal-examples/secure-streams/minimal-secure-streams-blob/ |
D | CMakeLists.txt | 1 project(lws-minimal-secure-streams-blob C) 8 set(SAMP lws-minimal-secure-streams-blob) 19 add_executable(${SAMP} minimal-secure-streams.c) 47 $<TARGET_FILE:lws-minimal-secure-streams>) 49 add_test(NAME ssblob-warmcat COMMAND lws-minimal-secure-streams) 54 … WORKING_DIRECTORY ${CMAKE_SOURCE_DIR}/minimal-examples/secure-streams/minimal-secure-streams 76 ssblobproxy $<TARGET_FILE:lws-minimal-secure-streams-proxy> 82 ssblobproxy $<TARGET_FILE:lws-minimal-secure-streams-proxy> 94 $<TARGET_FILE:lws-minimal-secure-streams-client> -i +${CTEST_SOCKET_PATH}) 96 … add_test(NAME sspcblob-minimal COMMAND lws-minimal-secure-streams-client -i +${CTEST_SOCKET_PATH}) [all …]
|
/third_party/libwebsockets/minimal-examples/secure-streams/minimal-secure-streams-perf/ |
D | CMakeLists.txt | 1 project(lws-minimal-secure-streams-perf C) 8 set(SAMP lws-minimal-secure-streams-perf) 18 add_executable(${SAMP} minimal-secure-streams.c) 46 $<TARGET_FILE:lws-minimal-secure-streams-perf>) 48 add_test(NAME ssperf-warmcat COMMAND lws-minimal-secure-streams-perf) 53 … WORKING_DIRECTORY ${CMAKE_SOURCE_DIR}/minimal-examples/secure-streams/minimal-secure-streams 75 ssperfproxy $<TARGET_FILE:lws-minimal-secure-streams-proxy> 81 ssperfproxy $<TARGET_FILE:lws-minimal-secure-streams-proxy> 93 $<TARGET_FILE:lws-minimal-secure-streams-perf-client> -i +${CTEST_SOCKET_PATH}) 95 …add_test(NAME ssperfpc-minimal COMMAND lws-minimal-secure-streams-perf-client -i +${CTEST_SOCKET_P… [all …]
|
/third_party/libwebsockets/minimal-examples/secure-streams/minimal-secure-streams-hugeurl/ |
D | CMakeLists.txt | 1 project(lws-minimal-secure-streams-hugeurl C) 8 set(SAMP lws-minimal-secure-streams-hugeurl) 18 add_executable(${SAMP} minimal-secure-streams.c) 46 $<TARGET_FILE:lws-minimal-secure-streams-hugeurl>) 48 add_test(NAME ss-warmcat-hurl COMMAND lws-minimal-secure-streams-hugeurl) 53 … WORKING_DIRECTORY ${CMAKE_SOURCE_DIR}/minimal-examples/secure-streams/minimal-secure-streams 75 ssproxy-hurl $<TARGET_FILE:lws-minimal-secure-streams-proxy> 81 ssproxy-hurl $<TARGET_FILE:lws-minimal-secure-streams-proxy> 93 $<TARGET_FILE:lws-minimal-secure-streams-client> -i +${CTEST_SOCKET_PATH}) 95 …add_test(NAME sspc-minimal-hurl COMMAND lws-minimal-secure-streams-client -i +${CTEST_SOCKET_PATH}) [all …]
|
/third_party/libwebsockets/minimal-examples/secure-streams/minimal-secure-streams-sigv4/ |
D | CMakeLists.txt | 1 project(lws-minimal-secure-streams-sigv4 C) 8 set(SAMP lws-minimal-secure-streams-sigv4) 26 $<TARGET_FILE:lws-minimal-secure-streams-sigv4>) 28 add_test(NAME ss-sigv4 COMMAND lws-minimal-secure-streams-sigv4) 33 … WORKING_DIRECTORY ${CMAKE_SOURCE_DIR}/minimal-examples/secure-streams/minimal-secure-streams-sigv4 52 ssproxysigv4 $<TARGET_FILE:lws-minimal-secure-streams-proxy> 58 ssproxysigv4 $<TARGET_FILE:lws-minimal-secure-streams-proxy> 70 $<TARGET_FILE:lws-minimal-secure-streams-sigv4-client> -i +${CTEST_SOCKET_PATH}) 72 … add_test(NAME sspc-sigv4 COMMAND lws-minimal-secure-streams-sigv4-client -i +${CTEST_SOCKET_PATH}) 75 … WORKING_DIRECTORY ${CMAKE_SOURCE_DIR}/minimal-examples/secure-streams/minimal-secure-streams-sigv4
|
/third_party/openssl/doc/man3/ |
D | OPENSSL_secure_malloc.pod | 11 CRYPTO_secure_used - secure heap storage 45 information might be stored, OpenSSL supports the concept of a "secure heap." 50 If a secure heap is used, then private key B<BIGNUM> values are stored there. 54 CRYPTO_secure_malloc_init() creates the secure heap, with the specified 61 CRYPTO_secure_malloc_initialized() indicates whether or not the secure 65 to the process if all secure memory has been freed. 89 the memory if it was not allocated from the secure heap. 95 requested, in order to "round up" and reduce secure heap fragmentation. 97 OPENSSL_secure_allocated() tells if a pointer is allocated in the secure heap. 100 secure heap. [all …]
|
/third_party/libwebsockets/minimal-examples/secure-streams/ |
D | README.md | 1 # Secure Streams 3 Secure Streams is a client API that strictly decouples the policy for connections 10 minimal-secure-streams|Minimal secure streams client / proxy example 11 minimal-secure-streams-tx|Proxy used for client-tx test below 12 minimal-secure-streams-client-tx|Secure streams client showing tx and rx
|
/third_party/libwebsockets/minimal-examples/secure-streams/minimal-secure-streams-client-tx/ |
D | CMakeLists.txt | 1 project(lws-minimal-secure-streams-client-tx C) 8 set(SAMP lws-minimal-secure-streams-client-tx) 9 set(SRCS minimal-secure-streams-client-tx.c) 40 ssproxyctx $<TARGET_FILE:lws-minimal-secure-streams-proxy> 46 ssproxyctx $<TARGET_FILE:lws-minimal-secure-streams-proxy> 58 $<TARGET_FILE:lws-minimal-secure-streams-client-tx> -i +${CTEST_SOCKET_PATH}) 60 …add_test(NAME sspc-minimaltx COMMAND lws-minimal-secure-streams-client-tx -i +${CTEST_SOCKET_PATH}) 63 …WORKING_DIRECTORY ${CMAKE_SOURCE_DIR}/minimal-examples/secure-streams/minimal-secure-streams-clien…
|
/third_party/libdrm/tests/amdgpu/ |
D | security_tests.c | 51 /* --------------------- Secure bounce test ------------------------ * 53 * The secure bounce test tests that we can evict a TMZ buffer, 64 * This buffer A is then secure copied into buffer B which is also 70 * Then, we use another secure copy of buffer B back to buffer A. 82 #define SECURE_BOUNCE_TEST_STR "secure bounce" 156 const int secure) in amdgpu_sdma_lcopy() argument 160 packet[0] = htole32(secure << 18 | 1); in amdgpu_sdma_lcopy() 184 * @secure: Set to 1 to perform secure copy, 0 for clear 194 int secure) in amdgpu_bo_lcopy() argument 202 size, secure); in amdgpu_bo_lcopy() [all …]
|