/aosp_15_r20/frameworks/base/packages/SettingsProvider/src/android/provider/settings/backup/ |
H A D | SecureSettings.java | 22 /** Information relating to the Secure settings which should be backed up */ 32 Settings.Secure.BUGREPORT_IN_POWER_MENU, 33 Settings.Secure.ALLOW_MOCK_LOCATION, 34 Settings.Secure.USB_MASS_STORAGE_ENABLED, // moved to global 35 Settings.Secure.ACCESSIBILITY_DISPLAY_INVERSION_ENABLED, 36 Settings.Secure.ACCESSIBILITY_DISPLAY_DALTONIZER, 37 Settings.Secure.ACCESSIBILITY_DISPLAY_DALTONIZER_ENABLED, 38 Settings.Secure.ACCESSIBILITY_DISPLAY_MAGNIFICATION_ENABLED, 39 Settings.Secure.ACCESSIBILITY_DISPLAY_MAGNIFICATION_NAVBAR_ENABLED, 40 Settings.Secure.ADAPTIVE_CHARGING_ENABLED, [all …]
|
/aosp_15_r20/frameworks/base/packages/SettingsProvider/src/android/provider/settings/validators/ |
H A D | SecureSettingsValidators.java | 40 import android.provider.Settings.Secure; 48 * Validators for the Secure Settings. 54 VALIDATORS.put(Secure.BUGREPORT_IN_POWER_MENU, BOOLEAN_VALIDATOR); in VALIDATORS.put() 55 VALIDATORS.put(Secure.ALLOW_MOCK_LOCATION, BOOLEAN_VALIDATOR); in VALIDATORS.put() 56 VALIDATORS.put(Secure.USB_MASS_STORAGE_ENABLED, BOOLEAN_VALIDATOR); in VALIDATORS.put() 57 VALIDATORS.put(Secure.ACCESSIBILITY_DISPLAY_INVERSION_ENABLED, BOOLEAN_VALIDATOR); in VALIDATORS.put() 59 Secure.ACCESSIBILITY_DISPLAY_DALTONIZER, in VALIDATORS.put() 61 VALIDATORS.put(Secure.ACCESSIBILITY_DISPLAY_DALTONIZER_ENABLED, BOOLEAN_VALIDATOR); in VALIDATORS.put() 62 VALIDATORS.put(Secure.ACCESSIBILITY_DISPLAY_MAGNIFICATION_ENABLED, BOOLEAN_VALIDATOR); in VALIDATORS.put() 64 Secure.ACCESSIBILITY_DISPLAY_MAGNIFICATION_NAVBAR_ENABLED, BOOLEAN_VALIDATOR); in VALIDATORS.put() [all …]
|
/aosp_15_r20/external/arm-trusted-firmware/docs/design/ |
H A D | interrupt-framework-design.rst | 8 #. It should be possible to route interrupts meant to be handled by secure 9 software (Secure interrupts) to EL3, when execution is in non-secure state 11 the interrupt to either software in EL3 or Secure-EL1 depending upon the 13 that secure interrupts are under the control of the secure software with 15 intervention from non-secure software. 18 non-secure software (Non-secure interrupts) to the last executed exception 19 level in the normal world when the execution is in secure world at 21 knowledge of software executing in Secure-EL1/Secure-EL0. The choice of 22 approach should be governed by the secure software. This requirement 23 ensures that non-secure software is able to execute in tandem with the [all …]
|
/aosp_15_r20/external/trusty/arm-trusted-firmware/docs/design/ |
D | interrupt-framework-design.rst | 8 #. It should be possible to route interrupts meant to be handled by secure 9 software (Secure interrupts) to EL3, when execution is in non-secure state 11 the interrupt to either software in EL3 or Secure-EL1 depending upon the 13 that secure interrupts are under the control of the secure software with 15 intervention from non-secure software. 18 non-secure software (Non-secure interrupts) to the last executed exception 19 level in the normal world when the execution is in secure world at 21 knowledge of software executing in Secure-EL1/Secure-EL0. The choice of 22 approach should be governed by the secure software. This requirement 23 ensures that non-secure software is able to execute in tandem with the [all …]
|
/aosp_15_r20/frameworks/base/packages/SettingsProvider/test/src/android/provider/ |
H A D | SettingsBackupTest.java | 643 Settings.Secure.ACCESSIBILITY_SOFT_KEYBOARD_MODE, 644 Settings.Secure.ACCESSIBILITY_SPEAK_PASSWORD, // Deprecated since O. 645 Settings.Secure.ALLOW_PRIMARY_GAIA_ACCOUNT_REMOVAL_FOR_TESTS, 646 Settings.Secure.ALLOWED_GEOLOCATION_ORIGINS, 647 Settings.Secure.ALWAYS_ON_VPN_APP, 648 Settings.Secure.ALWAYS_ON_VPN_LOCKDOWN, 649 Settings.Secure.ALWAYS_ON_VPN_LOCKDOWN_WHITELIST, 650 Settings.Secure.ANDROID_ID, 651 Settings.Secure.ANR_SHOW_BACKGROUND, 652 Settings.Secure.ASSISTANT, [all …]
|
/aosp_15_r20/frameworks/base/packages/SettingsProvider/src/com/android/providers/settings/ |
H A D | SettingsProtoDumpUtil.java | 1639 // The rest of the settings were moved to Settings.Secure or Settings.System, and are thus in dumpProtoGlobalSettingsLocked() 1712 Settings.Secure.ACCESSIBILITY_ENABLED, in dumpProtoSecureSettingsLocked() 1715 Settings.Secure.ENABLED_ACCESSIBILITY_SERVICES, in dumpProtoSecureSettingsLocked() 1718 Settings.Secure.ACCESSIBILITY_AUTOCLICK_ENABLED, in dumpProtoSecureSettingsLocked() 1721 Settings.Secure.ACCESSIBILITY_AUTOCLICK_DELAY, in dumpProtoSecureSettingsLocked() 1724 Settings.Secure.ACCESSIBILITY_BUTTON_TARGET_COMPONENT, in dumpProtoSecureSettingsLocked() 1727 Settings.Secure.ACCESSIBILITY_CAPTIONING_ENABLED, in dumpProtoSecureSettingsLocked() 1730 Settings.Secure.ACCESSIBILITY_CAPTIONING_LOCALE, in dumpProtoSecureSettingsLocked() 1733 Settings.Secure.ACCESSIBILITY_CAPTIONING_PRESET, in dumpProtoSecureSettingsLocked() 1736 Settings.Secure.ACCESSIBILITY_CAPTIONING_BACKGROUND_COLOR, in dumpProtoSecureSettingsLocked() [all …]
|
/aosp_15_r20/external/trusty/arm-trusted-firmware/docs/components/ |
D | secure-partition-manager-mm.rst | 1 Secure Partition Manager (MM) 7 This document describes the implementation where the Secure Partition Manager 8 resides at EL3 and management services run from isolated Secure Partitions at 17 applications to provide security services like DRM, secure payment and 19 used by Non-secure world applications to access these services. A Trusted OS 31 centres and enterprise servers) the secure software stack typically does not 43 A **Secure Partition** is a software execution environment instantiated in 45 Since S-EL0 is an unprivileged Exception Level, a Secure Partition relies on 47 resources. Essentially, it is a software sandbox in the Secure world that runs 57 Note that currently TF-A only supports handling one Secure Partition. [all …]
|
D | secure-partition-manager.rst | 1 Secure Partition Manager 49 | SP | Secure Partition | 51 | SPD | Secure Payload Dispatcher | 53 | SPM | Secure Partition Manager | 61 | SWd | Secure World | 73 Three implementations of a Secure Partition Manager co-exist in the TF-A 77 the secure world, managing multiple S-EL1 or S-EL0 partitions. 79 without virtualization in the secure world. 90 reference code base for an S-EL2/SPMC secure firmware on platforms 98 - The term SPMC refers to the S-EL2 component managing secure partitions in [all …]
|
/aosp_15_r20/external/trusty/arm-trusted-firmware/services/spd/tspd/ |
D | tspd_main.c | 9 * This is the Secure Payload Dispatcher (SPD). The dispatcher is meant to be a 10 * plug-in component to the Secure Monitor, registered as a runtime service. The 11 * SPD is expected to be a functional extension of the Secure Payload (SP) that 12 * executes in Secure EL1. The Secure Monitor will delegate all SMCs targeting 14 * handle the request locally or delegate it to the Secure Payload. It is also 36 * Address of the entrypoint vector table in the Secure Payload. It is 42 * Array to keep track of per-cpu Secure Payload state 55 * This helper function handles Secure EL1 preemption. The preemption could be 56 * due Non Secure interrupts or EL3 interrupts. In both the cases we context 64 assert(handle == cm_get_context(SECURE)); in tspd_handle_sp_preemption() [all …]
|
/aosp_15_r20/external/arm-trusted-firmware/services/spd/tspd/ |
H A D | tspd_main.c | 9 * This is the Secure Payload Dispatcher (SPD). The dispatcher is meant to be a 10 * plug-in component to the Secure Monitor, registered as a runtime service. The 11 * SPD is expected to be a functional extension of the Secure Payload (SP) that 12 * executes in Secure EL1. The Secure Monitor will delegate all SMCs targeting 14 * handle the request locally or delegate it to the Secure Payload. It is also 36 * Address of the entrypoint vector table in the Secure Payload. It is 42 * Array to keep track of per-cpu Secure Payload state 55 * This helper function handles Secure EL1 preemption. The preemption could be 56 * due Non Secure interrupts or EL3 interrupts. In both the cases we context 64 assert(handle == cm_get_context(SECURE)); in tspd_handle_sp_preemption() [all …]
|
/aosp_15_r20/frameworks/base/packages/SettingsLib/tests/robotests/src/com/android/settingslib/fuelgauge/ |
H A D | BatterySaverUtilsTest.java | 44 import android.provider.Settings.Secure; 81 Secure.putString(mMockResolver, Secure.LOW_POWER_WARNING_ACKNOWLEDGED, "null"); in setPowerSaveMode_enableWithWarning_firstCall_needConfirmationWarning() 82 Secure.putString(mMockResolver, Secure.EXTRA_LOW_POWER_WARNING_ACKNOWLEDGED, "null"); in setPowerSaveMode_enableWithWarning_firstCall_needConfirmationWarning() 83 Secure.putString(mMockResolver, Secure.LOW_POWER_MANUAL_ACTIVATION_COUNT, "null"); in setPowerSaveMode_enableWithWarning_firstCall_needConfirmationWarning() 95 assertEquals(-1, Secure.getInt(mMockResolver, Secure.LOW_POWER_WARNING_ACKNOWLEDGED, -1)); in setPowerSaveMode_enableWithWarning_firstCall_needConfirmationWarning() 97 Secure.getInt(mMockResolver, Secure.EXTRA_LOW_POWER_WARNING_ACKNOWLEDGED, -1)); in setPowerSaveMode_enableWithWarning_firstCall_needConfirmationWarning() 99 Secure.getInt(mMockResolver, Secure.LOW_POWER_MANUAL_ACTIVATION_COUNT, -2)); in setPowerSaveMode_enableWithWarning_firstCall_needConfirmationWarning() 105 Secure.putInt(mMockResolver, Secure.LOW_POWER_WARNING_ACKNOWLEDGED, 1); in setPowerSaveMode_enableWithWarning_secondCall_expectUpdateIntent() 106 Secure.putInt(mMockResolver, Secure.EXTRA_LOW_POWER_WARNING_ACKNOWLEDGED, 1); in setPowerSaveMode_enableWithWarning_secondCall_expectUpdateIntent() 107 Secure.putString(mMockResolver, Secure.LOW_POWER_MANUAL_ACTIVATION_COUNT, "null"); in setPowerSaveMode_enableWithWarning_secondCall_expectUpdateIntent() [all …]
|
/aosp_15_r20/external/mbedtls/docs/architecture/ |
H A D | psa-storage-resilience.md | 34 …)` for a key destruction). This also holds for an opaque key stored in a secure element that does … 38 * [Key management for stateful secure element keys](#designing-key-management-for-secure-element-ke… 44 ## Designing key management for secure element keys 46 …secure element key” to mean a key stored in a stateful secure element, i.e. a secure element that … 48 ### Assumptions on stateful secure elements 50 **Assumption: driver calls for key management in stateful secure elements are atomic and committing… 52 (For stateless secure elements, this assumption is vacuously true.) 56 For a secure element key, key management requires a commitment on both sites. For example, consider… 58 1. The core sends a request to the secure element to create a key. 59 2. The secure element modifies its key store to create the key. [all …]
|
/aosp_15_r20/external/openthread/third_party/mbedtls/repo/docs/architecture/ |
H A D | psa-storage-resilience.md | 34 …)` for a key destruction). This also holds for an opaque key stored in a secure element that does … 38 * [Key management for stateful secure element keys](#designing-key-management-for-secure-element-ke… 44 ## Designing key management for secure element keys 46 …secure element key” to mean a key stored in a stateful secure element, i.e. a secure element that … 48 ### Assumptions on stateful secure elements 50 **Assumption: driver calls for key management in stateful secure elements are atomic and committing… 52 (For stateless secure elements, this assumption is vacuously true.) 56 For a secure element key, key management requires a commitment on both sites. For example, consider… 58 1. The core sends a request to the secure element to create a key. 59 2. The secure element modifies its key store to create the key. [all …]
|
/aosp_15_r20/external/arm-trusted-firmware/docs/components/ |
H A D | secure-partition-manager-mm.rst | 1 Secure Partition Manager (MM) 7 Two implementations of a Secure Partition Manager co-exist in the TF-A codebase: 9 - SPM based on the FF-A specification (:ref:`Secure Partition Manager`). 15 This document describes the latter implementation where the Secure Partition Manager 16 resides at EL3 and management services run from isolated Secure Partitions at S-EL0. 24 applications to provide security services like DRM, secure payment and 26 used by Non-secure world applications to access these services. A Trusted OS 38 centres and enterprise servers) the secure software stack typically does not 50 A **Secure Partition** is a software execution environment instantiated in 52 Since S-EL0 is an unprivileged Exception Level, a Secure Partition relies on [all …]
|
H A D | secure-partition-manager.rst | 1 Secure Partition Manager 42 | SP | Secure Partition | 44 | SPD | Secure Payload Dispatcher | 46 | SPM | Secure Partition Manager | 54 | SWd | Secure World | 66 Two implementations of a Secure Partition Manager co-exist in the TF-A codebase: 76 - describes the FF-A implementation where the Secure Partition Manager 81 used as a reference code base for an S-EL2 secure firmware on 82 platforms implementing the FEAT_SEL2 (formerly Armv8.4 Secure EL2) 90 - The term SPMC refers to the S-EL2 component managing secure partitions in [all …]
|
/aosp_15_r20/external/rust/android-crates-io/crates/grpcio-sys/grpc/tools/run_tests/performance/ |
D | scenario_config.py | 118 secure=True, argument 147 'security_params': _get_secargs(secure), 159 'security_params': _get_secargs(secure), 267 secure=False, 283 secure=False, 297 secure=False, 313 secure=False, 318 for secure in [True, False]: 319 secstr = 'secure' if secure else 'insecure' 320 smoketest_categories = ([SMOKETEST] if secure else []) [all …]
|
/aosp_15_r20/external/grpc-grpc/tools/run_tests/performance/ |
H A D | scenario_config.py | 128 secure=True, argument 158 "security_params": _get_secargs(secure), 170 "security_params": _get_secargs(secure), 284 secure=False, 302 secure=False, 318 secure=False, 336 secure=False, 343 for secure in [True, False]: 344 secstr = "secure" if secure else "insecure" 345 smoketest_categories = [SMOKETEST] if secure else [] [all …]
|
/aosp_15_r20/cts/common/device-side/bedstead/nene/src/test/java/com/android/bedstead/nene/settings/ |
H A D | SecureSettingsTest.kt | 42 TestApis.settings().secure().reset() in <lambda>() 48 TestApis.settings().secure().putInt(KEY, INT_VALUE) in <lambda>() 50 Truth.assertThat(Settings.Secure.getInt(context.contentResolver, KEY)) in <lambda>() 58 TestApis.settings().secure().putInt(context.contentResolver, KEY, INT_VALUE) in <lambda>() 60 Truth.assertThat(Settings.Secure.getInt(context.contentResolver, KEY)) in <lambda>() 68 TestApis.settings().secure().putInt( in <lambda>() 76 TestApis.settings().secure().putInt(TestApis.users().instrumented(), KEY, INT_VALUE) in <lambda>() 78 Truth.assertThat(Settings.Secure.getInt(context.contentResolver, KEY)) in <lambda>() 87 TestApis.settings().secure().putInt(deviceState.secondaryUser(), KEY, INT_VALUE) in <lambda>() 90 Truth.assertThat(Settings.Secure.getInt( in <lambda>() [all …]
|
/aosp_15_r20/external/robolectric/robolectric/src/test/java/org/robolectric/shadows/ |
H A D | ShadowSettingsTest.java | 6 import static android.provider.Settings.Secure.LOCATION_MODE; 7 import static android.provider.Settings.Secure.LOCATION_MODE_BATTERY_SAVING; 8 import static android.provider.Settings.Secure.LOCATION_MODE_HIGH_ACCURACY; 9 import static android.provider.Settings.Secure.LOCATION_MODE_OFF; 10 import static android.provider.Settings.Secure.LOCATION_MODE_SENSORS_ONLY; 23 import android.provider.Settings.Secure; 56 assertThat(Settings.Secure.getInt(contentResolver, "property", 0)).isEqualTo(0); in testSecureGetInt() 57 assertThat(Settings.Secure.getInt(contentResolver, "property", 2)).isEqualTo(2); in testSecureGetInt() 59 Settings.Secure.putInt(contentResolver, "property", 1); in testSecureGetInt() 60 assertThat(Settings.Secure.getInt(contentResolver, "property", 0)).isEqualTo(1); in testSecureGetInt() [all …]
|
/aosp_15_r20/packages/apps/TvSettings/Settings/src/com/android/tv/settings/system/development/ |
D | CaptionCustomFragment.java | 200 final String typeface = Settings.Secure.getString(getContext().getContentResolver(), in getCaptionsFontFamily() 201 Settings.Secure.ACCESSIBILITY_CAPTIONING_TYPEFACE); in getCaptionsFontFamily() 207 Settings.Secure.putString(getContext().getContentResolver(), in setCaptionsFontFamily() 208 Settings.Secure.ACCESSIBILITY_CAPTIONING_TYPEFACE, null); in setCaptionsFontFamily() 210 Settings.Secure.putString(getContext().getContentResolver(), in setCaptionsFontFamily() 211 Settings.Secure.ACCESSIBILITY_CAPTIONING_TYPEFACE, fontFamily); in setCaptionsFontFamily() 216 return Integer.toHexString(Settings.Secure.getInt(getContext().getContentResolver(), in getCaptionsTextColor() 217 Settings.Secure.ACCESSIBILITY_CAPTIONING_FOREGROUND_COLOR, 0) & 0x00ffffff); in getCaptionsTextColor() 222 final int alpha = Settings.Secure.getInt(getContext().getContentResolver(), in setCaptionsTextColor() 223 Settings.Secure.ACCESSIBILITY_CAPTIONING_FOREGROUND_COLOR, 0xff000000) & 0xff000000; in setCaptionsTextColor() [all …]
|
/aosp_15_r20/external/arm-trusted-firmware/plat/xilinx/versal/pm_service/ |
H A D | pm_api_sys.c | 78 * @flag 0 - Call from secure source 79 * 1 - Call from non-secure source 96 * @flag 0 - Call from secure source 97 * 1 - Call from non-secure source 116 * @flag 0 - Call from secure source 117 * 1 - Call from non-secure source 155 * @flag 0 - Call from secure source 156 * 1 - Call from non-secure source 186 * @flag 0 - Call from secure source 187 * 1 - Call from non-secure source [all …]
|
/aosp_15_r20/external/coreboot/src/mainboard/cavium/cn8100_sff_evb/ |
H A D | devicetree.cb | 8 register "secure" = "0" 11 register "secure" = "0" 15 register "secure" = "0" 19 register "secure" = "1" 23 register "secure" = "1" 27 register "secure" = "1" 31 register "secure" = "0" 35 register "secure" = "0" 39 register "secure" = "0" 43 register "secure" = "1" [all …]
|
/aosp_15_r20/external/coreboot/src/mainboard/opencellular/elgon/ |
H A D | devicetree.cb | 8 register "secure" = "0" 11 register "secure" = "0" 15 register "secure" = "0" 19 register "secure" = "1" 23 register "secure" = "1" 27 register "secure" = "1" 31 register "secure" = "0" 35 register "secure" = "0" 39 register "secure" = "0" 43 register "secure" = "1" [all …]
|
/aosp_15_r20/external/arm-trusted-firmware/services/spd/tlkd/ |
H A D | tlkd_main.c | 9 * This is the Secure Payload Dispatcher (SPD). The dispatcher is meant to be a 10 * plug-in component to the Secure Monitor, registered as a runtime service. The 11 * SPD is expected to be a functional extension of the Secure Payload (SP) that 12 * executes in Secure EL1. The Secure Monitor will delegate all SMCs targeting 14 * handle the request locally or delegate it to the Secure Payload. It is also 37 * Per-cpu Secure Payload state 54 * Secure Payload Dispatcher's timer interrupt handler 69 * Disable the routing of NS interrupts from secure world to in tlkd_interrupt_handler() 72 disable_intr_rm_local(INTR_TYPE_S_EL1, SECURE); in tlkd_interrupt_handler() 78 /* Save non-secure state */ in tlkd_interrupt_handler() [all …]
|
/aosp_15_r20/external/trusty/arm-trusted-firmware/services/spd/tlkd/ |
D | tlkd_main.c | 9 * This is the Secure Payload Dispatcher (SPD). The dispatcher is meant to be a 10 * plug-in component to the Secure Monitor, registered as a runtime service. The 11 * SPD is expected to be a functional extension of the Secure Payload (SP) that 12 * executes in Secure EL1. The Secure Monitor will delegate all SMCs targeting 14 * handle the request locally or delegate it to the Secure Payload. It is also 37 * Per-cpu Secure Payload state 54 * Secure Payload Dispatcher's timer interrupt handler 69 * Disable the routing of NS interrupts from secure world to in tlkd_interrupt_handler() 72 disable_intr_rm_local(INTR_TYPE_S_EL1, SECURE); in tlkd_interrupt_handler() 78 /* Save non-secure state */ in tlkd_interrupt_handler() [all …]
|