Home
last modified time | relevance | path

Searched full:secure (Results 1 – 25 of 3015) sorted by relevance

12345678910>>...121

/external/arm-trusted-firmware/docs/design/
Dinterrupt-framework-design.rst8 #. It should be possible to route interrupts meant to be handled by secure
9 software (Secure interrupts) to EL3, when execution is in non-secure state
11 the interrupt to either software in EL3 or Secure-EL1 depending upon the
13 that secure interrupts are under the control of the secure software with
15 intervention from non-secure software.
18 non-secure software (Non-secure interrupts) to the last executed exception
19 level in the normal world when the execution is in secure world at
21 knowledge of software executing in Secure-EL1/Secure-EL0. The choice of
22 approach should be governed by the secure software. This requirement
23 ensures that non-secure software is able to execute in tandem with the
[all …]
/external/grpc-grpc/tools/run_tests/performance/
Dscenario_config.py114 secure=True, argument
141 'security_params': _get_secargs(secure),
152 'security_params': _get_secargs(secure),
252 secure=False,
266 secure=False,
280 secure=False,
285 for secure in [True, False]:
286 secstr = 'secure' if secure else 'insecure'
288 if secure else [INPROC]) + [SCALABLE]
297 secure=secure,
[all …]
/external/robolectric/robolectric/src/test/java/org/robolectric/shadows/
DShadowSettingsTest.java9 import static android.provider.Settings.Secure.LOCATION_MODE;
10 import static android.provider.Settings.Secure.LOCATION_MODE_BATTERY_SAVING;
11 import static android.provider.Settings.Secure.LOCATION_MODE_HIGH_ACCURACY;
12 import static android.provider.Settings.Secure.LOCATION_MODE_OFF;
13 import static android.provider.Settings.Secure.LOCATION_MODE_SENSORS_ONLY;
25 import android.provider.Settings.Secure;
57 assertThat(Settings.Secure.getInt(contentResolver, "property", 0)).isEqualTo(0); in testSecureGetInt()
58 assertThat(Settings.Secure.getInt(contentResolver, "property", 2)).isEqualTo(2); in testSecureGetInt()
60 Settings.Secure.putInt(contentResolver, "property", 1); in testSecureGetInt()
61 assertThat(Settings.Secure.getInt(contentResolver, "property", 0)).isEqualTo(1); in testSecureGetInt()
[all …]
/external/rust/crates/grpcio-sys/grpc/tools/run_tests/performance/
Dscenario_config.py117 secure=True, argument
146 'security_params': _get_secargs(secure),
158 'security_params': _get_secargs(secure),
259 secure=False,
273 secure=False,
287 secure=False,
292 for secure in [True, False]:
293 secstr = 'secure' if secure else 'insecure'
294 smoketest_categories = ([SMOKETEST] if secure else [])
295 inproc_categories = ([INPROC] if not secure else [])
[all …]
/external/arm-trusted-firmware/services/spd/tspd/
Dtspd_main.c9 * This is the Secure Payload Dispatcher (SPD). The dispatcher is meant to be a
10 * plug-in component to the Secure Monitor, registered as a runtime service. The
11 * SPD is expected to be a functional extension of the Secure Payload (SP) that
12 * executes in Secure EL1. The Secure Monitor will delegate all SMCs targeting
14 * handle the request locally or delegate it to the Secure Payload. It is also
36 * Address of the entrypoint vector table in the Secure Payload. It is
42 * Array to keep track of per-cpu Secure Payload state
55 * This helper function handles Secure EL1 preemption. The preemption could be
56 * due Non Secure interrupts or EL3 interrupts. In both the cases we context
64 assert(handle == cm_get_context(SECURE)); in tspd_handle_sp_preemption()
[all …]
/external/arm-trusted-firmware/docs/components/
Dsecure-partition-manager-mm.rst1 Secure Partition Manager (MM)
7 Two implementations of a Secure Partition Manager co-exist in the TF-A codebase:
9 - SPM based on the FF-A specification (:ref:`Secure Partition Manager`).
15 This document describes the latter implementation where the Secure Partition Manager
16 resides at EL3 and management services run from isolated Secure Partitions at S-EL0.
24 applications to provide security services like DRM, secure payment and
26 used by Non-secure world applications to access these services. A Trusted OS
38 centres and enterprise servers) the secure software stack typically does not
50 A **Secure Partition** is a software execution environment instantiated in
52 Since S-EL0 is an unprivileged Exception Level, a Secure Partition relies on
[all …]
Dfirmware-update.rst23 This document describes the secure world FWU design. It is beyond its scope to
33 some parts of FWU to be implemented in other secure and normal world images.
40 - Copying images from non-secure to secure memory
42 - Context switching between the normal and secure world during the FWU
45 - Other secure world FWU images handle platform initialization required by
48 interfaces to non-secure memory.
80 is permitted to request execution of a secure world FWU image (after
81 authentication). Secure world certificates and non-AP images are examples
83 - Secure or non-secure image. This indicates whether the image is
84 authenticated/executed in secure or non-secure memory.
[all …]
Dsecure-partition-manager.rst1 Secure Partition Manager
42 | SP | Secure Partition |
44 | SPD | Secure Payload Dispatcher |
46 | SPM | Secure Partition Manager |
54 | SWd | Secure World |
66 Two implementations of a Secure Partition Manager co-exist in the TF-A codebase:
76 - describes the FF-A implementation where the Secure Partition Manager
81 used as a reference code base for an S-EL2 secure firmware on
82 platforms implementing the FEAT_SEL2 (formerly Armv8.4 Secure EL2)
90 - The term SPMC refers to the S-EL2 component managing secure partitions in
[all …]
Dexception-handling.rst28 the purpose of facilitating context switch between Normal and Secure worlds,
62 rest of the handling to a dedicated software stack running at lower Secure
63 ELs. In this scheme, the handling spans various secure ELs.
66 processing of the error to dedicated software stack running at lower secure
70 maximally spans all ELs in both Secure and Normal worlds.
76 .. [#spd] Not to be confused with :ref:`Secure Payload Dispatcher
78 on behalf of Secure OS.
94 The platform is required to `partition`__ the Secure priority space into
95 priority levels as applicable for the Secure software stack. It then assigns the
147 - On GICv3 systems, when executing in S-EL1, pending Non-secure interrupts of
[all …]
/external/curl/tests/data/
Dtest3127 Set-Cookie: foobar=name; domain=anything.com; path=/ ; secure
31 Set-Cookie: sec1value=secure1 ; domain=test31.curl; path=/secure1/ ; secure
32 Set-Cookie: sec2value=secure2 ; domain=test31.curl; path=/secure2/ ; secure=
33 Set-Cookie: sec3value=secure3 ; domain=test31.curl; path=/secure3/ ; secure=
34 Set-Cookie: sec4value=secure4 ; secure=; domain=test31.curl; path=/secure4/ ;
35 Set-Cookie: sec5value=secure5 ; secure; domain=test31.curl; path=/secure5/ ;
36 Set-Cookie: sec6value=secure6 ; secure ; domain=test31.curl; path=/secure6/ ;
37 Set-Cookie: sec7value=secure7 ; secure ; domain=test31.curl; path=/secure7/ ;
38 Set-Cookie: sec8value=secure8 ; secure= ; domain=test31.curl; path=/secure8/ ;
39 Set-Cookie: secure=very1 ; secure=; domain=test31.curl; path=/secure9/;
[all …]
/external/arm-trusted-firmware/services/spd/tlkd/
Dtlkd_main.c9 * This is the Secure Payload Dispatcher (SPD). The dispatcher is meant to be a
10 * plug-in component to the Secure Monitor, registered as a runtime service. The
11 * SPD is expected to be a functional extension of the Secure Payload (SP) that
12 * executes in Secure EL1. The Secure Monitor will delegate all SMCs targeting
14 * handle the request locally or delegate it to the Secure Payload. It is also
37 * Per-cpu Secure Payload state
54 * Secure Payload Dispatcher's timer interrupt handler
69 * Disable the routing of NS interrupts from secure world to in tlkd_interrupt_handler()
72 disable_intr_rm_local(INTR_TYPE_S_EL1, SECURE); in tlkd_interrupt_handler()
78 /* Save non-secure state */ in tlkd_interrupt_handler()
[all …]
Dtlkd_common.c27 /* save secure context */ in tlkd_va_translate()
28 cm_el1_sysregs_context_save(SECURE); in tlkd_va_translate()
30 /* restore non-secure context */ in tlkd_va_translate()
33 /* switch NS bit to start using 64-bit, non-secure mappings */ in tlkd_va_translate()
61 /* Restore secure state */ in tlkd_va_translate()
64 /* restore secure context */ in tlkd_va_translate()
65 cm_el1_sysregs_context_restore(SECURE); in tlkd_va_translate()
67 /* switch NS bit to start using 32-bit, secure mappings */ in tlkd_va_translate()
68 write_scr(cm_get_scr_el3(SECURE)); in tlkd_va_translate()
76 * Given a secure payload entrypoint, register width, cpu id & pointer to a
[all …]
/external/arm-trusted-firmware/plat/xilinx/versal/pm_service/
Dpm_api_sys.c78 * @flag 0 - Call from secure source
79 * 1 - Call from non-secure source
96 * @flag 0 - Call from secure source
97 * 1 - Call from non-secure source
116 * @flag 0 - Call from secure source
117 * 1 - Call from non-secure source
155 * @flag 0 - Call from secure source
156 * 1 - Call from non-secure source
186 * @flag 0 - Call from secure source
187 * 1 - Call from non-secure source
[all …]
/external/libwebsockets/lib/secure-streams/
DCMakeLists.txt29 secure-streams/secure-streams.c
30 secure-streams/policy-common.c
31 secure-streams/system/captive-portal-detect/captive-portal-detect.c
32 secure-streams/protocols/ss-raw.c
36 secure-streams/policy-json.c
37 secure-streams/system/fetch-policy/fetch-policy.c
42 secure-streams/protocols/ss-h1.c
47 secure-streams/protocols/ss-h2.c
52 secure-streams/protocols/ss-ws.c
57 secure-streams/protocols/ss-mqtt.c
[all …]
/external/libwebsockets/minimal-examples/secure-streams/minimal-secure-streams-smd/
DCMakeLists.txt1 project(lws-minimal-secure-streams-smd C)
19 add_executable(${PROJECT_NAME} minimal-secure-streams-smd.c)
28 $<TARGET_FILE:lws-minimal-secure-streams-smd>)
31 add_test(NAME ss-smd COMMAND lws-minimal-secure-streams-smd)
35 … WORKING_DIRECTORY ${CMAKE_SOURCE_DIR}/minimal-examples/secure-streams/minimal-secure-streams-smd
42 $<TARGET_FILE:lws-minimal-secure-streams-smd>
47 $<TARGET_FILE:lws-minimal-secure-streams-smd>
52 $<TARGET_FILE:lws-minimal-secure-streams-smd>
56 add_test(NAME ss-smd-fi1 COMMAND lws-minimal-secure-streams-smd
59 add_test(NAME ss-smd-fi2 COMMAND lws-minimal-secure-streams-smd
[all …]
/external/arm-trusted-firmware/plat/renesas/common/include/registers/
Dcpg_registers.h36 /* Secure Module Stop Control Register 0 */
38 /* Secure Module Stop Control Register 1 */
40 /* Secure Module Stop Control Register 2 */
42 /* Secure Module Stop Control Register 3 */
44 /* Secure Module Stop Control Register 4 */
46 /* Secure Module Stop Control Register 5 */
48 /* Secure Module Stop Control Register 6 */
50 /* Secure Module Stop Control Register 7 */
52 /* Secure Module Stop Control Register 8 */
54 /* Secure Module Stop Control Register 9 */
[all …]
/external/arm-trusted-firmware/services/spd/opteed/
Dopteed_main.c9 * This is the Secure Payload Dispatcher (SPD). The dispatcher is meant to be a
10 * plug-in component to the Secure Monitor, registered as a runtime service. The
11 * SPD is expected to be a functional extension of the Secure Payload (SP) that
12 * executes in Secure EL1. The Secure Monitor will delegate all SMCs targeting
14 * handle the request locally or delegate it to the Secure Payload. It is also
67 /* Save the non-secure context before entering the OPTEE */ in opteed_sel1_interrupt_handler()
73 assert(&optee_ctx->cpu_ctx == cm_get_context(SECURE)); in opteed_sel1_interrupt_handler()
75 cm_set_elr_el3(SECURE, (uint64_t)&optee_vector_table->fiq_entry); in opteed_sel1_interrupt_handler()
76 cm_el1_sysregs_context_restore(SECURE); in opteed_sel1_interrupt_handler()
77 cm_set_next_eret_context(SECURE); in opteed_sel1_interrupt_handler()
[all …]
/external/arm-trusted-firmware/bl31/
Dehf.c37 * Convert index into secure priority using the platform-defined priority bits
47 /* Returns whether given priority is in secure priority range */
96 * This API is expected to be invoked before restoring context (Secure or
97 * Non-secure) in preparation for the respective dispatch.
163 * This API is expected to be invoked after saving context (Secure or
164 * Non-secure), having concluded the respective dispatch.
221 * After leaving Non-secure world, stash current Non-secure Priority Mask, and
222 * set Priority Mask to the highest Non-secure priority so that Non-secure
223 * interrupts cannot preempt Secure execution.
225 * If the current running priority is in the secure range, or if there are
[all …]
/external/arm-trusted-firmware/docs/about/
Dfeatures.rst14 - Initialization of the secure world, for example exception vectors, control
28 - SMC (Secure Monitor Call) handling, conforming to the `SMC Calling
35 for example an AArch32 Secure OS.
37 - A minimal AArch32 Secure Payload (*SP_MIN*) to demonstrate |PSCI| library
40 - Secure Monitor library code such as world switching, EL1 context management
42 When a Secure-EL1 Payload (SP) is present, for example a Secure OS, the
43 AArch64 EL3 Runtime Software must be integrated with a Secure Payload
46 - A Test SP and SPD to demonstrate AArch64 Secure Monitor functionality and SP
49 - SPDs for the `OP-TEE Secure OS`_, `NVIDIA Trusted Little Kernel`_
50 and `Trusty Secure OS`_.
[all …]
/external/libwebsockets/minimal-examples/secure-streams/minimal-secure-streams/
DCMakeLists.txt1 project(lws-minimal-secure-streams C)
8 set(SAMP lws-minimal-secure-streams)
20 add_executable(${SAMP} minimal-secure-streams.c)
48 $<TARGET_FILE:lws-minimal-secure-streams>)
50 add_test(NAME ss-warmcat COMMAND lws-minimal-secure-streams)
55 … WORKING_DIRECTORY ${CMAKE_SOURCE_DIR}/minimal-examples/secure-streams/minimal-secure-streams
65 $<TARGET_FILE:lws-minimal-secure-streams>
70 $<TARGET_FILE:lws-minimal-secure-streams>
74 add_test(NAME ss-warmcat-fi1 COMMAND lws-minimal-secure-streams
77 add_test(NAME ss-warmcat-fi2 COMMAND lws-minimal-secure-streams
[all …]
/external/robolectric/shadows/framework/src/main/java/org/robolectric/shadows/
DShadowSettings.java11 import static android.provider.Settings.Secure.LOCATION_MODE_OFF;
20 import android.provider.Settings.Secure;
137 @Implements(value = Settings.Secure.class)
147 SECURE_DEFAULTS.put(Secure.LOCATION_MODE, Optional.of(Secure.LOCATION_MODE_HIGH_ACCURACY)); in SECURE_DEFAULTS.put()
148 SECURE_DEFAULTS.put(Secure.LOCATION_PROVIDERS_ALLOWED, Optional.of("gps,network")); in SECURE_DEFAULTS.put()
150 SECURE_DEFAULTS.put(Secure.LOCATION_MODE, Optional.of(Secure.LOCATION_MODE_SENSORS_ONLY)); in SECURE_DEFAULTS.put()
151 SECURE_DEFAULTS.put(Secure.LOCATION_PROVIDERS_ALLOWED, Optional.of("gps")); in SECURE_DEFAULTS.put()
153 SECURE_DEFAULTS.put(Secure.LOCATION_MODE, Optional.of(Secure.LOCATION_MODE_BATTERY_SAVING)); in SECURE_DEFAULTS.put()
154 SECURE_DEFAULTS.put(Secure.LOCATION_PROVIDERS_ALLOWED, Optional.of("network")); in SECURE_DEFAULTS.put()
156 SECURE_DEFAULTS.put(Secure.LOCATION_MODE, Optional.of(LOCATION_MODE_OFF)); in SECURE_DEFAULTS.put()
[all …]
/external/arm-trusted-firmware/docs/getting_started/
Dpsci-lib-integration-guide.rst9 at the highest secure privileged mode, which is EL3 in AArch64 or Secure SVC/
10 Monitor mode in AArch32, and provides runtime services to the non-secure world.
11 The runtime service request is made via SMC (Secure Monitor Call) and the call
13 include Trusted OS functionality. A minimal AArch32 Secure Payload, SP-MIN, is
36 #. Call ``psci_prepare_next_non_secure_ctx()`` to initialize the non-secure CPU
39 #. Get the non-secure ``cpu_context_t`` for the current CPU by calling
40 ``cm_get_context()`` , then programming the registers in the non-secure
41 context and exiting to non-secure world. If the EL3 Runtime Software needs
42 additional configuration to be set for non-secure context, like routing
43 FIQs to the secure world, the values of the registers can be modified prior
[all …]
/external/apache-http/src/org/apache/http/conn/routing/
DRouteTracker.java81 /** Whether the route is secure. */
82 private boolean secure; field in RouteTracker
119 * @param secure <code>true</code> if the route is secure,
122 public final void connectTarget(boolean secure) { in connectTarget() argument
127 this.secure = secure; in connectTarget()
135 * @param secure <code>true</code> if the route is secure,
138 public final void connectProxy(HttpHost proxy, boolean secure) { in connectProxy() argument
147 this.secure = secure; in connectProxy()
154 * @param secure <code>true</code> if the route is secure,
157 public final void tunnelTarget(boolean secure) { in tunnelTarget() argument
[all …]
/external/mbedtls/library/
Dpsa_crypto_se.h2 * PSA crypto support for secure element drivers
30 * for a secure element.
36 * The minimum location value for a secure element is 1, like on any
41 /** The base of the range of ITS file identifiers for secure element
52 /** The maximum number of registered secure element driver locations. */
55 /** Unregister all secure element drivers.
63 /** Initialize all secure element drivers.
69 /** A structure that describes a registered secure element driver.
71 * A secure element driver table entry contains a pointer to the
76 /** Return the secure element driver information for a lifetime value.
[all …]
/external/openthread/third_party/mbedtls/repo/library/
Dpsa_crypto_se.h2 * PSA crypto support for secure element drivers
34 * for a secure element.
40 * The minimum location value for a secure element is 1, like on any
45 /** The base of the range of ITS file identifiers for secure element
56 /** The maximum number of registered secure element driver locations. */
59 /** Unregister all secure element drivers.
67 /** Initialize all secure element drivers.
73 /** A structure that describes a registered secure element driver.
75 * A secure element driver table entry contains a pointer to the
80 /** Return the secure element driver information for a lifetime value.
[all …]

12345678910>>...121