/external/nist-sip/java/javax/sip/address/ |
SipURI.java | 10 void setSecure(boolean secure);
|
/external/u-boot/arch/arm/cpu/armv7/ |
virt-v7.c | 6 * Routines to transition ARMv7 processors from secure into non-secure state 7 * and from non-secure SVC into HYP mode 15 #include <asm/secure.h> 102 * according to the spec one should not tinker with it in secure state 103 * in SVC mode. Do not try to read it once in non-secure state, 119 * from non-secure state. The first 32 interrupts are private per 128 * Relocate secure section before any cpu runs in secure ram. 129 * smp_kick_all_cpus may enable other cores and runs into secure [all...] |
nonsec_virt.S | 3 * code for switching cores into non-secure state and into HYP mode 20 /* the vector table for secure state and HYP mode */ 38 * secure monitor handler 41 * to non-secure state. 51 @ Obtain a secure stack 77 @ FIQ preserved for secure mode 102 movs pc, lr @ ERET to non-secure 137 * of the non-secure and HYP mode transition. The GIC distributor specific 153 * Switch a core to non-secure state. 156 * 2. allow coprocessor access in non-secure mode [all...] |
/external/u-boot/arch/arm/cpu/armv8/fsl-layerscape/ |
spl.c | 34 * In case of Secure Boot, the IBR configures the SMMU 35 * to allow only Secure transactions. 76 #error Need secure RAM for PPA 79 * Secure memory location is determined in dram_init_banksize(). 80 * gd->ram_size is deducted by the size of secure ram.
|
/external/u-boot/arch/arm/mach-at91/include/mach/ |
sama5_sfr.h | 20 u32 secure; /* 0x28: Security Configuration Register */ member in struct:atmel_sfr
|
/frameworks/av/drm/mediacas/plugins/clearkey/ |
ClearKeySessionLibrary.h | 40 bool secure,
|
ClearKeyCasPlugin.cpp | 381 bool secure, DescramblerPlugin::ScramblingControl scramblingControl, 384 if (secure) { 472 bool secure, 482 ALOGV("descramble: secure=%d, sctrl=%d, subSamples=%s, " 484 (int)secure, (int)scramblingControl, 496 secure, scramblingControl,
|
/frameworks/av/drm/mediadrm/plugins/clearkey/hidl/ |
CryptoPlugin.cpp | 46 bool secure, 62 secure, keyId, iv, mode, pattern, subSamples, source, offset, destination, 81 bool secure, 93 if (secure) { 95 "Secure decryption is not supported with ClearKey.");
|
/external/grpc-grpc/test/core/end2end/ |
gen_build_yaml.py | 27 'fullstack includes_proxy dns_resolver name_resolution secure platforms ci_mac tracing exclude_configs exclude_iomgrs large_writes enables_compression supports_compression is_inproc is_http2 supports_proxy_auth supports_write_buffering client_channel') 34 secure=True) variable 86 'needs_fullstack needs_dns needs_names proxyable secure traceable cpu_cost exclude_iomgrs large_writes flaky allows_compression needs_compression exclude_inproc needs_http2 needs_proxy_auth needs_write_buffering needs_client_channel') 103 'call_creds': default_test_options._replace(secure=True), 300 'secure': True, 315 'secure': False, 320 if not END2END_TESTS[t].secure], 349 'secure': False, 362 if not END2END_FIXTURES[f].secure 397 if not END2END_FIXTURES[f].secure [all...] |
/cts/apps/CtsVerifier/src/com/android/cts/verifier/bluetooth/ |
ConnectionAccessServerActivity.java | 109 boolean secure = false; 110 mChatService.start(secure);
|
/external/apache-http/src/org/apache/http/impl/cookie/ |
BasicClientCookie.java | 237 * @return <code>true</code> if this cookie should only be sent over secure connections. 245 * Sets the secure attribute of the cookie. 248 * using a secure protocol (https). This should only be set when 249 * the cookie's originating server used a secure protocol to set the 252 * @param secure The value of the secure attribute 256 public void setSecure (boolean secure) { 257 isSecure = secure; 374 /** My secure flag. */
|
/external/curl/docs/cmdline-opts/ |
anyauth.d | 7 secure one the remote site claims to support. This is done by first doing a
|
/external/grpc-grpc/test/core/surface/ |
server_test.cc | 107 void test_bind_server_to_addr(const char* host, bool secure) { 114 if (secure) {
|
/external/robolectric-shadows/shadows/framework/src/main/java/org/robolectric/shadows/ |
ShadowKeyguardManager.java | 137 public void setIsKeyguardSecure(boolean secure) { 138 isKeyguardSecure = secure;
|
/bionic/libc/kernel/uapi/linux/ |
isdn.h | 110 int secure; member in struct:__anon762
|
/device/linaro/bootloader/arm-trusted-firmware/plat/rockchip/rk3399/drivers/dram/ |
dram.c | 10 #include <secure.h>
|
/external/kernel-headers/original/uapi/linux/ |
isdn.h | 126 int secure; /* Flag: Secure */ member in struct:__anon25652
|
/external/perfetto/ui/ |
deploy | 90 secure: always
|
/external/u-boot/arch/arm/mach-imx/mx7/ |
psci-mx7.c | 9 #include <asm/secure.h>
|
/external/u-boot/board/freescale/common/ |
arm_sleep.c | 9 #error " Deep sleep needs non-secure mode support. " 11 #include <asm/secure.h>
|
/external/grpc-grpc/test/core/fling/ |
server.cc | 181 int secure = 0; local 197 gpr_cmdline_add_flag(cl, "secure", "Run with security?", &secure); 208 if (secure) {
|
/frameworks/av/drm/libmediadrm/ |
CryptoHal.cpp | 381 bool secure; local 390 secure = false; 394 secure = true; 412 hResult = mPluginV1_2->decrypt_1_2(secure, toHidlArray16(keyId), toHidlArray16(iv), 423 hResult = mPlugin->decrypt(secure, toHidlArray16(keyId), toHidlArray16(iv),
|
/external/webrtc/talk/session/media/ |
mediasession.cc | 681 if (!sdesc->GetTransportInfoByName(*it)->description.secure()) { [all...] |
/external/google-breakpad/src/common/windows/ |
http_upload.cc | 96 bool secure = false; local 98 secure = true; 124 DWORD http_open_flags = secure ? INTERNET_FLAG_SECURE : 0;
|
/external/grpc-grpc/src/csharp/Grpc.Core/ |
Channel.cs | 51 /// Port will default to 80 for an unsecure channel and to 443 for a secure channel. 54 /// <param name="credentials">Credentials to secure the channel.</param> 62 /// Port will default to 80 for an unsecure channel and to 443 for a secure channel. 65 /// <param name="credentials">Credentials to secure the channel.</param> 95 /// <param name="credentials">Credentials to secure the channel.</param> 106 /// <param name="credentials">Credentials to secure the channel.</param>
|