Home
last modified time | relevance | path

Searched full:secure (Results 1 – 25 of 10915) sorted by relevance

12345678910>>...437

/aosp_15_r20/frameworks/base/packages/SettingsProvider/src/android/provider/settings/backup/
H A DSecureSettings.java22 /** Information relating to the Secure settings which should be backed up */
32 Settings.Secure.BUGREPORT_IN_POWER_MENU,
33 Settings.Secure.ALLOW_MOCK_LOCATION,
34 Settings.Secure.USB_MASS_STORAGE_ENABLED, // moved to global
35 Settings.Secure.ACCESSIBILITY_DISPLAY_INVERSION_ENABLED,
36 Settings.Secure.ACCESSIBILITY_DISPLAY_DALTONIZER,
37 Settings.Secure.ACCESSIBILITY_DISPLAY_DALTONIZER_ENABLED,
38 Settings.Secure.ACCESSIBILITY_DISPLAY_MAGNIFICATION_ENABLED,
39 Settings.Secure.ACCESSIBILITY_DISPLAY_MAGNIFICATION_NAVBAR_ENABLED,
40 Settings.Secure.ADAPTIVE_CHARGING_ENABLED,
[all …]
/aosp_15_r20/frameworks/base/packages/SettingsProvider/src/android/provider/settings/validators/
H A DSecureSettingsValidators.java40 import android.provider.Settings.Secure;
48 * Validators for the Secure Settings.
54 VALIDATORS.put(Secure.BUGREPORT_IN_POWER_MENU, BOOLEAN_VALIDATOR); in VALIDATORS.put()
55 VALIDATORS.put(Secure.ALLOW_MOCK_LOCATION, BOOLEAN_VALIDATOR); in VALIDATORS.put()
56 VALIDATORS.put(Secure.USB_MASS_STORAGE_ENABLED, BOOLEAN_VALIDATOR); in VALIDATORS.put()
57 VALIDATORS.put(Secure.ACCESSIBILITY_DISPLAY_INVERSION_ENABLED, BOOLEAN_VALIDATOR); in VALIDATORS.put()
59 Secure.ACCESSIBILITY_DISPLAY_DALTONIZER, in VALIDATORS.put()
61 VALIDATORS.put(Secure.ACCESSIBILITY_DISPLAY_DALTONIZER_ENABLED, BOOLEAN_VALIDATOR); in VALIDATORS.put()
62 VALIDATORS.put(Secure.ACCESSIBILITY_DISPLAY_MAGNIFICATION_ENABLED, BOOLEAN_VALIDATOR); in VALIDATORS.put()
64 Secure.ACCESSIBILITY_DISPLAY_MAGNIFICATION_NAVBAR_ENABLED, BOOLEAN_VALIDATOR); in VALIDATORS.put()
[all …]
/aosp_15_r20/external/arm-trusted-firmware/docs/design/
H A Dinterrupt-framework-design.rst8 #. It should be possible to route interrupts meant to be handled by secure
9 software (Secure interrupts) to EL3, when execution is in non-secure state
11 the interrupt to either software in EL3 or Secure-EL1 depending upon the
13 that secure interrupts are under the control of the secure software with
15 intervention from non-secure software.
18 non-secure software (Non-secure interrupts) to the last executed exception
19 level in the normal world when the execution is in secure world at
21 knowledge of software executing in Secure-EL1/Secure-EL0. The choice of
22 approach should be governed by the secure software. This requirement
23 ensures that non-secure software is able to execute in tandem with the
[all …]
/aosp_15_r20/external/trusty/arm-trusted-firmware/docs/design/
Dinterrupt-framework-design.rst8 #. It should be possible to route interrupts meant to be handled by secure
9 software (Secure interrupts) to EL3, when execution is in non-secure state
11 the interrupt to either software in EL3 or Secure-EL1 depending upon the
13 that secure interrupts are under the control of the secure software with
15 intervention from non-secure software.
18 non-secure software (Non-secure interrupts) to the last executed exception
19 level in the normal world when the execution is in secure world at
21 knowledge of software executing in Secure-EL1/Secure-EL0. The choice of
22 approach should be governed by the secure software. This requirement
23 ensures that non-secure software is able to execute in tandem with the
[all …]
/aosp_15_r20/frameworks/base/packages/SettingsProvider/test/src/android/provider/
H A DSettingsBackupTest.java643 Settings.Secure.ACCESSIBILITY_SOFT_KEYBOARD_MODE,
644 Settings.Secure.ACCESSIBILITY_SPEAK_PASSWORD, // Deprecated since O.
645 Settings.Secure.ALLOW_PRIMARY_GAIA_ACCOUNT_REMOVAL_FOR_TESTS,
646 Settings.Secure.ALLOWED_GEOLOCATION_ORIGINS,
647 Settings.Secure.ALWAYS_ON_VPN_APP,
648 Settings.Secure.ALWAYS_ON_VPN_LOCKDOWN,
649 Settings.Secure.ALWAYS_ON_VPN_LOCKDOWN_WHITELIST,
650 Settings.Secure.ANDROID_ID,
651 Settings.Secure.ANR_SHOW_BACKGROUND,
652 Settings.Secure.ASSISTANT,
[all …]
/aosp_15_r20/frameworks/base/packages/SettingsProvider/src/com/android/providers/settings/
H A DSettingsProtoDumpUtil.java1639 // The rest of the settings were moved to Settings.Secure or Settings.System, and are thus in dumpProtoGlobalSettingsLocked()
1712 Settings.Secure.ACCESSIBILITY_ENABLED, in dumpProtoSecureSettingsLocked()
1715 Settings.Secure.ENABLED_ACCESSIBILITY_SERVICES, in dumpProtoSecureSettingsLocked()
1718 Settings.Secure.ACCESSIBILITY_AUTOCLICK_ENABLED, in dumpProtoSecureSettingsLocked()
1721 Settings.Secure.ACCESSIBILITY_AUTOCLICK_DELAY, in dumpProtoSecureSettingsLocked()
1724 Settings.Secure.ACCESSIBILITY_BUTTON_TARGET_COMPONENT, in dumpProtoSecureSettingsLocked()
1727 Settings.Secure.ACCESSIBILITY_CAPTIONING_ENABLED, in dumpProtoSecureSettingsLocked()
1730 Settings.Secure.ACCESSIBILITY_CAPTIONING_LOCALE, in dumpProtoSecureSettingsLocked()
1733 Settings.Secure.ACCESSIBILITY_CAPTIONING_PRESET, in dumpProtoSecureSettingsLocked()
1736 Settings.Secure.ACCESSIBILITY_CAPTIONING_BACKGROUND_COLOR, in dumpProtoSecureSettingsLocked()
[all …]
/aosp_15_r20/external/trusty/arm-trusted-firmware/docs/components/
Dsecure-partition-manager-mm.rst1 Secure Partition Manager (MM)
7 This document describes the implementation where the Secure Partition Manager
8 resides at EL3 and management services run from isolated Secure Partitions at
17 applications to provide security services like DRM, secure payment and
19 used by Non-secure world applications to access these services. A Trusted OS
31 centres and enterprise servers) the secure software stack typically does not
43 A **Secure Partition** is a software execution environment instantiated in
45 Since S-EL0 is an unprivileged Exception Level, a Secure Partition relies on
47 resources. Essentially, it is a software sandbox in the Secure world that runs
57 Note that currently TF-A only supports handling one Secure Partition.
[all …]
Dsecure-partition-manager.rst1 Secure Partition Manager
49 | SP | Secure Partition |
51 | SPD | Secure Payload Dispatcher |
53 | SPM | Secure Partition Manager |
61 | SWd | Secure World |
73 Three implementations of a Secure Partition Manager co-exist in the TF-A
77 the secure world, managing multiple S-EL1 or S-EL0 partitions.
79 without virtualization in the secure world.
90 reference code base for an S-EL2/SPMC secure firmware on platforms
98 - The term SPMC refers to the S-EL2 component managing secure partitions in
[all …]
/aosp_15_r20/external/trusty/arm-trusted-firmware/services/spd/tspd/
Dtspd_main.c9 * This is the Secure Payload Dispatcher (SPD). The dispatcher is meant to be a
10 * plug-in component to the Secure Monitor, registered as a runtime service. The
11 * SPD is expected to be a functional extension of the Secure Payload (SP) that
12 * executes in Secure EL1. The Secure Monitor will delegate all SMCs targeting
14 * handle the request locally or delegate it to the Secure Payload. It is also
36 * Address of the entrypoint vector table in the Secure Payload. It is
42 * Array to keep track of per-cpu Secure Payload state
55 * This helper function handles Secure EL1 preemption. The preemption could be
56 * due Non Secure interrupts or EL3 interrupts. In both the cases we context
64 assert(handle == cm_get_context(SECURE)); in tspd_handle_sp_preemption()
[all …]
/aosp_15_r20/external/arm-trusted-firmware/services/spd/tspd/
H A Dtspd_main.c9 * This is the Secure Payload Dispatcher (SPD). The dispatcher is meant to be a
10 * plug-in component to the Secure Monitor, registered as a runtime service. The
11 * SPD is expected to be a functional extension of the Secure Payload (SP) that
12 * executes in Secure EL1. The Secure Monitor will delegate all SMCs targeting
14 * handle the request locally or delegate it to the Secure Payload. It is also
36 * Address of the entrypoint vector table in the Secure Payload. It is
42 * Array to keep track of per-cpu Secure Payload state
55 * This helper function handles Secure EL1 preemption. The preemption could be
56 * due Non Secure interrupts or EL3 interrupts. In both the cases we context
64 assert(handle == cm_get_context(SECURE)); in tspd_handle_sp_preemption()
[all …]
/aosp_15_r20/frameworks/base/packages/SettingsLib/tests/robotests/src/com/android/settingslib/fuelgauge/
H A DBatterySaverUtilsTest.java44 import android.provider.Settings.Secure;
81 Secure.putString(mMockResolver, Secure.LOW_POWER_WARNING_ACKNOWLEDGED, "null"); in setPowerSaveMode_enableWithWarning_firstCall_needConfirmationWarning()
82 Secure.putString(mMockResolver, Secure.EXTRA_LOW_POWER_WARNING_ACKNOWLEDGED, "null"); in setPowerSaveMode_enableWithWarning_firstCall_needConfirmationWarning()
83 Secure.putString(mMockResolver, Secure.LOW_POWER_MANUAL_ACTIVATION_COUNT, "null"); in setPowerSaveMode_enableWithWarning_firstCall_needConfirmationWarning()
95 assertEquals(-1, Secure.getInt(mMockResolver, Secure.LOW_POWER_WARNING_ACKNOWLEDGED, -1)); in setPowerSaveMode_enableWithWarning_firstCall_needConfirmationWarning()
97 Secure.getInt(mMockResolver, Secure.EXTRA_LOW_POWER_WARNING_ACKNOWLEDGED, -1)); in setPowerSaveMode_enableWithWarning_firstCall_needConfirmationWarning()
99 Secure.getInt(mMockResolver, Secure.LOW_POWER_MANUAL_ACTIVATION_COUNT, -2)); in setPowerSaveMode_enableWithWarning_firstCall_needConfirmationWarning()
105 Secure.putInt(mMockResolver, Secure.LOW_POWER_WARNING_ACKNOWLEDGED, 1); in setPowerSaveMode_enableWithWarning_secondCall_expectUpdateIntent()
106 Secure.putInt(mMockResolver, Secure.EXTRA_LOW_POWER_WARNING_ACKNOWLEDGED, 1); in setPowerSaveMode_enableWithWarning_secondCall_expectUpdateIntent()
107 Secure.putString(mMockResolver, Secure.LOW_POWER_MANUAL_ACTIVATION_COUNT, "null"); in setPowerSaveMode_enableWithWarning_secondCall_expectUpdateIntent()
[all …]
/aosp_15_r20/external/mbedtls/docs/architecture/
H A Dpsa-storage-resilience.md34 …)` for a key destruction). This also holds for an opaque key stored in a secure element that does …
38 * [Key management for stateful secure element keys](#designing-key-management-for-secure-element-ke…
44 ## Designing key management for secure element keys
46secure element key” to mean a key stored in a stateful secure element, i.e. a secure element that …
48 ### Assumptions on stateful secure elements
50 **Assumption: driver calls for key management in stateful secure elements are atomic and committing…
52 (For stateless secure elements, this assumption is vacuously true.)
56 For a secure element key, key management requires a commitment on both sites. For example, consider…
58 1. The core sends a request to the secure element to create a key.
59 2. The secure element modifies its key store to create the key.
[all …]
/aosp_15_r20/external/openthread/third_party/mbedtls/repo/docs/architecture/
H A Dpsa-storage-resilience.md34 …)` for a key destruction). This also holds for an opaque key stored in a secure element that does …
38 * [Key management for stateful secure element keys](#designing-key-management-for-secure-element-ke…
44 ## Designing key management for secure element keys
46secure element key” to mean a key stored in a stateful secure element, i.e. a secure element that …
48 ### Assumptions on stateful secure elements
50 **Assumption: driver calls for key management in stateful secure elements are atomic and committing…
52 (For stateless secure elements, this assumption is vacuously true.)
56 For a secure element key, key management requires a commitment on both sites. For example, consider…
58 1. The core sends a request to the secure element to create a key.
59 2. The secure element modifies its key store to create the key.
[all …]
/aosp_15_r20/external/arm-trusted-firmware/docs/components/
H A Dsecure-partition-manager-mm.rst1 Secure Partition Manager (MM)
7 Two implementations of a Secure Partition Manager co-exist in the TF-A codebase:
9 - SPM based on the FF-A specification (:ref:`Secure Partition Manager`).
15 This document describes the latter implementation where the Secure Partition Manager
16 resides at EL3 and management services run from isolated Secure Partitions at S-EL0.
24 applications to provide security services like DRM, secure payment and
26 used by Non-secure world applications to access these services. A Trusted OS
38 centres and enterprise servers) the secure software stack typically does not
50 A **Secure Partition** is a software execution environment instantiated in
52 Since S-EL0 is an unprivileged Exception Level, a Secure Partition relies on
[all …]
H A Dsecure-partition-manager.rst1 Secure Partition Manager
42 | SP | Secure Partition |
44 | SPD | Secure Payload Dispatcher |
46 | SPM | Secure Partition Manager |
54 | SWd | Secure World |
66 Two implementations of a Secure Partition Manager co-exist in the TF-A codebase:
76 - describes the FF-A implementation where the Secure Partition Manager
81 used as a reference code base for an S-EL2 secure firmware on
82 platforms implementing the FEAT_SEL2 (formerly Armv8.4 Secure EL2)
90 - The term SPMC refers to the S-EL2 component managing secure partitions in
[all …]
/aosp_15_r20/external/rust/android-crates-io/crates/grpcio-sys/grpc/tools/run_tests/performance/
Dscenario_config.py118 secure=True, argument
147 'security_params': _get_secargs(secure),
159 'security_params': _get_secargs(secure),
267 secure=False,
283 secure=False,
297 secure=False,
313 secure=False,
318 for secure in [True, False]:
319 secstr = 'secure' if secure else 'insecure'
320 smoketest_categories = ([SMOKETEST] if secure else [])
[all …]
/aosp_15_r20/external/grpc-grpc/tools/run_tests/performance/
H A Dscenario_config.py128 secure=True, argument
158 "security_params": _get_secargs(secure),
170 "security_params": _get_secargs(secure),
284 secure=False,
302 secure=False,
318 secure=False,
336 secure=False,
343 for secure in [True, False]:
344 secstr = "secure" if secure else "insecure"
345 smoketest_categories = [SMOKETEST] if secure else []
[all …]
/aosp_15_r20/cts/common/device-side/bedstead/nene/src/test/java/com/android/bedstead/nene/settings/
H A DSecureSettingsTest.kt42 TestApis.settings().secure().reset() in <lambda>()
48 TestApis.settings().secure().putInt(KEY, INT_VALUE) in <lambda>()
50 Truth.assertThat(Settings.Secure.getInt(context.contentResolver, KEY)) in <lambda>()
58 TestApis.settings().secure().putInt(context.contentResolver, KEY, INT_VALUE) in <lambda>()
60 Truth.assertThat(Settings.Secure.getInt(context.contentResolver, KEY)) in <lambda>()
68 TestApis.settings().secure().putInt( in <lambda>()
76 TestApis.settings().secure().putInt(TestApis.users().instrumented(), KEY, INT_VALUE) in <lambda>()
78 Truth.assertThat(Settings.Secure.getInt(context.contentResolver, KEY)) in <lambda>()
87 TestApis.settings().secure().putInt(deviceState.secondaryUser(), KEY, INT_VALUE) in <lambda>()
90 Truth.assertThat(Settings.Secure.getInt( in <lambda>()
[all …]
/aosp_15_r20/external/robolectric/robolectric/src/test/java/org/robolectric/shadows/
H A DShadowSettingsTest.java6 import static android.provider.Settings.Secure.LOCATION_MODE;
7 import static android.provider.Settings.Secure.LOCATION_MODE_BATTERY_SAVING;
8 import static android.provider.Settings.Secure.LOCATION_MODE_HIGH_ACCURACY;
9 import static android.provider.Settings.Secure.LOCATION_MODE_OFF;
10 import static android.provider.Settings.Secure.LOCATION_MODE_SENSORS_ONLY;
23 import android.provider.Settings.Secure;
56 assertThat(Settings.Secure.getInt(contentResolver, "property", 0)).isEqualTo(0); in testSecureGetInt()
57 assertThat(Settings.Secure.getInt(contentResolver, "property", 2)).isEqualTo(2); in testSecureGetInt()
59 Settings.Secure.putInt(contentResolver, "property", 1); in testSecureGetInt()
60 assertThat(Settings.Secure.getInt(contentResolver, "property", 0)).isEqualTo(1); in testSecureGetInt()
[all …]
/aosp_15_r20/packages/apps/TvSettings/Settings/src/com/android/tv/settings/system/development/
DCaptionCustomFragment.java200 final String typeface = Settings.Secure.getString(getContext().getContentResolver(), in getCaptionsFontFamily()
201 Settings.Secure.ACCESSIBILITY_CAPTIONING_TYPEFACE); in getCaptionsFontFamily()
207 Settings.Secure.putString(getContext().getContentResolver(), in setCaptionsFontFamily()
208 Settings.Secure.ACCESSIBILITY_CAPTIONING_TYPEFACE, null); in setCaptionsFontFamily()
210 Settings.Secure.putString(getContext().getContentResolver(), in setCaptionsFontFamily()
211 Settings.Secure.ACCESSIBILITY_CAPTIONING_TYPEFACE, fontFamily); in setCaptionsFontFamily()
216 return Integer.toHexString(Settings.Secure.getInt(getContext().getContentResolver(), in getCaptionsTextColor()
217 Settings.Secure.ACCESSIBILITY_CAPTIONING_FOREGROUND_COLOR, 0) & 0x00ffffff); in getCaptionsTextColor()
222 final int alpha = Settings.Secure.getInt(getContext().getContentResolver(), in setCaptionsTextColor()
223 Settings.Secure.ACCESSIBILITY_CAPTIONING_FOREGROUND_COLOR, 0xff000000) & 0xff000000; in setCaptionsTextColor()
[all …]
/aosp_15_r20/external/arm-trusted-firmware/plat/xilinx/versal/pm_service/
H A Dpm_api_sys.c78 * @flag 0 - Call from secure source
79 * 1 - Call from non-secure source
96 * @flag 0 - Call from secure source
97 * 1 - Call from non-secure source
116 * @flag 0 - Call from secure source
117 * 1 - Call from non-secure source
155 * @flag 0 - Call from secure source
156 * 1 - Call from non-secure source
186 * @flag 0 - Call from secure source
187 * 1 - Call from non-secure source
[all …]
/aosp_15_r20/external/coreboot/src/mainboard/cavium/cn8100_sff_evb/
H A Ddevicetree.cb8 register "secure" = "0"
11 register "secure" = "0"
15 register "secure" = "0"
19 register "secure" = "1"
23 register "secure" = "1"
27 register "secure" = "1"
31 register "secure" = "0"
35 register "secure" = "0"
39 register "secure" = "0"
43 register "secure" = "1"
[all …]
/aosp_15_r20/external/coreboot/src/mainboard/opencellular/elgon/
H A Ddevicetree.cb8 register "secure" = "0"
11 register "secure" = "0"
15 register "secure" = "0"
19 register "secure" = "1"
23 register "secure" = "1"
27 register "secure" = "1"
31 register "secure" = "0"
35 register "secure" = "0"
39 register "secure" = "0"
43 register "secure" = "1"
[all …]
/aosp_15_r20/external/arm-trusted-firmware/services/spd/tlkd/
H A Dtlkd_main.c9 * This is the Secure Payload Dispatcher (SPD). The dispatcher is meant to be a
10 * plug-in component to the Secure Monitor, registered as a runtime service. The
11 * SPD is expected to be a functional extension of the Secure Payload (SP) that
12 * executes in Secure EL1. The Secure Monitor will delegate all SMCs targeting
14 * handle the request locally or delegate it to the Secure Payload. It is also
37 * Per-cpu Secure Payload state
54 * Secure Payload Dispatcher's timer interrupt handler
69 * Disable the routing of NS interrupts from secure world to in tlkd_interrupt_handler()
72 disable_intr_rm_local(INTR_TYPE_S_EL1, SECURE); in tlkd_interrupt_handler()
78 /* Save non-secure state */ in tlkd_interrupt_handler()
[all …]
/aosp_15_r20/external/trusty/arm-trusted-firmware/services/spd/tlkd/
Dtlkd_main.c9 * This is the Secure Payload Dispatcher (SPD). The dispatcher is meant to be a
10 * plug-in component to the Secure Monitor, registered as a runtime service. The
11 * SPD is expected to be a functional extension of the Secure Payload (SP) that
12 * executes in Secure EL1. The Secure Monitor will delegate all SMCs targeting
14 * handle the request locally or delegate it to the Secure Payload. It is also
37 * Per-cpu Secure Payload state
54 * Secure Payload Dispatcher's timer interrupt handler
69 * Disable the routing of NS interrupts from secure world to in tlkd_interrupt_handler()
72 disable_intr_rm_local(INTR_TYPE_S_EL1, SECURE); in tlkd_interrupt_handler()
78 /* Save non-secure state */ in tlkd_interrupt_handler()
[all …]

12345678910>>...437