/freebsd/targets/pseudo/userland/secure/ |
H A D | Makefile.depend | 4 secure/lib/libcrypto \ 5 secure/lib/libcrypto/engines/lib4758cca \ 6 secure/lib/libcrypto/engines/libaep \ 7 secure/lib/libcrypto/engines/libatalla \ 8 secure/lib/libcrypto/engines/libcapi \ 9 secure/lib/libcrypto/engines/libchil \ 10 secure/lib/libcrypto/engines/libcswift \ 11 secure/lib/libcrypto/engines/libgost \ 12 secure/lib/libcrypto/engines/libnuron \ 13 secure/lib/libcrypto/engines/libsureware \ [all …]
|
/freebsd/sbin/init/ |
H A D | ttys | 19 # the specified port. If the word "secure" appears, this tty 26 console none unknown off secure 28 ttyv0 "/usr/libexec/getty Pc" xterm onifexists secure 30 ttyv1 "/usr/libexec/getty Pc" xterm onifexists secure 31 ttyv2 "/usr/libexec/getty Pc" xterm onifexists secure 32 ttyv3 "/usr/libexec/getty Pc" xterm onifexists secure 33 ttyv4 "/usr/libexec/getty Pc" xterm onifexists secure 34 ttyv5 "/usr/libexec/getty Pc" xterm onifexists secure 35 ttyv6 "/usr/libexec/getty Pc" xterm onifexists secure 36 ttyv7 "/usr/libexec/getty Pc" xterm onifexists secure [all …]
|
/freebsd/tools/tools/nanobsd/pcengines/Files/etc/ |
H A D | ttys | 22 # the specified port. If the word "secure" appears, this tty 29 console none unknown off secure 31 ttyv0 "/usr/libexec/getty Pc" xterm off secure 33 ttyv1 "/usr/libexec/getty Pc" xterm off secure 34 ttyv2 "/usr/libexec/getty Pc" xterm off secure 35 ttyv3 "/usr/libexec/getty Pc" xterm off secure 36 ttyv4 "/usr/libexec/getty Pc" xterm off secure 37 ttyv5 "/usr/libexec/getty Pc" xterm off secure 38 ttyv6 "/usr/libexec/getty Pc" xterm off secure 39 ttyv7 "/usr/libexec/getty Pc" xterm off secure [all …]
|
/freebsd/tools/tools/nanobsd/rescue/Files/etc/ |
H A D | ttys | 22 # the specified port. If the word "secure" appears, this tty 29 console none unknown off secure 31 ttyv0 "/usr/libexec/getty Pc" xterm on secure 33 ttyv1 "/usr/libexec/getty Pc" xterm on secure 34 ttyv2 "/usr/libexec/getty Pc" xterm on secure 35 ttyv3 "/usr/libexec/getty Pc" xterm off secure 36 ttyv4 "/usr/libexec/getty Pc" xterm off secure 37 ttyv5 "/usr/libexec/getty Pc" xterm off secure 38 ttyv6 "/usr/libexec/getty Pc" xterm off secure 39 ttyv7 "/usr/libexec/getty Pc" xterm off secure [all …]
|
/freebsd/sys/contrib/device-tree/Bindings/arm/ |
H A D | secure.txt | 15 can be supported by prefixing the property name with "secure-". So for 16 instance "secure-foo" would override "foo". For property names with 18 "vendor,secure-foo". If there is no "secure-" property then the Secure 21 validly have "secure-" versions; this list will be enlarged on a 26 still be processed unmodified by existing Non-secure software (and in 32 secure- bindings only need to be used where both the Secure and Normal 38 - secure-status : specifies whether the device is present and usable 39 in the secure world. The combination of this with "status" allows 41 specified. If "secure-status" is not specified it defaults to the 47 secure-status = "okay"; /* visible in both */ [all …]
|
/freebsd/sys/contrib/device-tree/Bindings/crypto/ |
H A D | inside-secure-safexcel.txt | 4 - compatible: Should be "inside-secure,safexcel-eip197b", 5 "inside-secure,safexcel-eip197d" or 6 "inside-secure,safexcel-eip97ies". 21 - "inside-secure,safexcel-eip197" is equivalent to 22 "inside-secure,safexcel-eip197b". 23 - "inside-secure,safexcel-eip97" is equivalent to 24 "inside-secure,safexcel-eip97ies". 29 compatible = "inside-secure,safexcel-eip197b";
|
/freebsd/crypto/openssl/crypto/ |
H A D | param_build.c | 27 int secure; member 53 int secure) in param_push() argument 65 if ((pd->secure = secure) != 0) in param_push() 203 int n, secure = 0; in OSSL_PARAM_BLD_push_BN_pad() local 223 secure = 1; in OSSL_PARAM_BLD_push_BN_pad() 229 pd = param_push(bld, key, sz, sz, OSSL_PARAM_UNSIGNED_INTEGER, secure); in OSSL_PARAM_BLD_push_BN_pad() 240 int secure; in OSSL_PARAM_BLD_push_utf8_string() local 248 secure = CRYPTO_secure_allocated(buf); in OSSL_PARAM_BLD_push_utf8_string() 249 pd = param_push(bld, key, bsize, bsize + 1, OSSL_PARAM_UTF8_STRING, secure); in OSSL_PARAM_BLD_push_utf8_string() 278 int secure; in OSSL_PARAM_BLD_push_octet_string() local [all …]
|
/freebsd/sys/contrib/device-tree/Bindings/iommu/ |
H A D | qcom,iommu.txt | 6 to non-secure vs secure interrupt line. 32 - qcom,iommu-secure-id : secure-id. 38 - "qcom,msm-iommu-v1-ns" : non-secure context bank 39 - "qcom,msm-iommu-v1-sec" : secure context bank 47 for routing of context bank irq's to secure vs non- 48 secure lines. (Ie. if the iommu contains secure 64 qcom,iommu-secure-id = <17>; 90 qcom,iommu-secure-id = <18>;
|
H A D | msm,iommu-v0.txt | 12 support secure mode two interrupts must be specified, for non-secure and 13 secure mode, in that order. For instances that don't support secure mode a
|
/freebsd/crypto/heimdal/lib/krb5/ |
H A D | verify_user.c | 41 krb5_boolean secure, in verify_common() argument 56 krb5_verify_init_creds_opt_set_ap_req_nofail(&vopt, secure); in verify_common() 95 opt->secure = TRUE; in krb5_verify_opt_init() 131 krb5_verify_opt_set_secure(krb5_verify_opt *opt, krb5_boolean secure) in krb5_verify_opt_set_secure() argument 133 opt->secure = secure; in krb5_verify_opt_set_secure() 179 OPT(keytab, NULL), vopt ? vopt->secure : TRUE, in verify_user_opt_int() 223 krb5_boolean secure, in krb5_verify_user() argument 231 krb5_verify_opt_set_secure(&opt, secure); in krb5_verify_user() 247 krb5_boolean secure, in krb5_verify_user_lrealm() argument 255 krb5_verify_opt_set_secure(&opt, secure); in krb5_verify_user_lrealm()
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | OPENSSL_secure_malloc.pod | 11 CRYPTO_secure_used - secure heap storage 45 information might be stored, OpenSSL supports the concept of a "secure heap." 50 If a secure heap is used, then private key B<BIGNUM> values are stored there. 54 CRYPTO_secure_malloc_init() creates the secure heap, with the specified 61 CRYPTO_secure_malloc_initialized() indicates whether or not the secure 65 to the process if all secure memory has been freed. 90 the memory if it was not allocated from the secure heap. 97 requested, in order to "round up" and reduce secure heap fragmentation. 99 OPENSSL_secure_allocated() tells if a pointer is allocated in the secure heap. 102 secure heap. [all …]
|
/freebsd/crypto/openssl/crypto/rand/ |
H A D | rand_pool.c | 22 RAND_POOL *ossl_rand_pool_new(int entropy_requested, int secure, in ossl_rand_pool_new() argument 26 size_t min_alloc_size = RAND_POOL_MIN_ALLOCATION(secure); in ossl_rand_pool_new() 40 if (secure) in ossl_rand_pool_new() 51 pool->secure = secure; in ossl_rand_pool_new() 106 if (pool->secure) in ossl_rand_pool_free() 221 if (pool->secure) in rand_pool_grow() 230 if (pool->secure) in rand_pool_grow()
|
/freebsd/crypto/openssl/include/crypto/ |
H A D | rand_pool.h | 60 # define RAND_POOL_MIN_ALLOCATION(secure) ((secure) ? 16 : 48) argument 76 int secure; /* 1: allocated on the secure heap, 0: otherwise */ member 85 RAND_POOL *ossl_rand_pool_new(int entropy_requested, int secure,
|
/freebsd/crypto/openssl/ |
H A D | FREEBSD-upgrade | 71 secure/lib/libcrypto/Makefile.inc and 82 $ cd secure/lib/libcrypto 103 $ find openssl-X.Y.Z/doc/man/man1 -name '*.1' -exec cp {} secure/usr.bin/openssl/man/ \; 104 $ find openssl-X.Y.Z/doc/man/man3 -name '*.3' -exec cp {} secure/lib/libcrypto/man/man3/ \; 105 $ find openssl-X.Y.Z/doc/man/man5 -name '*.5' -exec cp {} secure/lib/libcrypto/man/man5/ \; 106 $ find openssl-X.Y.Z/doc/man/man7 -name '*.7' -exec cp {} secure/lib/libcrypto/man/man7/ \; 107 $ grep -nrF usr/local secure/lib/libcrypto/man secure/usr.bin/openssl/man 109 $ git commit --amend secure/lib/libcrypto/man secure/usr.bin/openssl/man
|
/freebsd/sys/contrib/device-tree/Bindings/nvmem/ |
H A D | amlogic-efuse.txt | 7 - secure-monitor: phandle to the secure-monitor node 20 secure-monitor = <&sm>; 35 sm: secure-monitor {
|
/freebsd/secure/usr.bin/openssl/ |
H A D | Makefile.depend | 11 secure/lib/libcrypto \ 12 secure/lib/libcrypto/openssl.amd64 \ 13 secure/lib/libssl \
|
/freebsd/libexec/fingerd/ |
H A D | fingerd.c | 62 int p[2], debug, kflag, logging, pflag, secure; in main() local 68 debug = logging = kflag = pflag = secure = 0; in main() 87 secure = 1; in main() 146 if (secure && ap == &av[4]) { in main() 155 if (secure && strchr(*ap, '@')) { in main()
|
/freebsd/sys/contrib/device-tree/Bindings/rng/ |
H A D | omap_rng.txt | 9 - "inside-secure,safexcel-eip76" for SoCs with EIP76 IP block 14 Used for "ti,omap4-rng" and "inside-secure,safexcel-eip76" 16 "inside-secure,safexcel-eip76" compatible, the second clock is 34 compatible = "inside-secure,safexcel-eip76";
|
/freebsd/kerberos5/ |
H A D | Makefile | 7 secure/lib/libssh secure/usr.bin/ssh secure/usr.sbin/sshd
|
/freebsd/usr.sbin/bsdconfig/security/include/ |
H A D | messages.subr | 34 msg_highly_secure_mode="Highly secure mode" 37 msg_network_secure_mode="Network secure mode" 45 …secure mode system flags may not be overridden by the root user,\naccess to direct kernel memory i…
|
H A D | securelevel.hlp | 21 2 Highly secure mode - same as secure mode, plus disks may not 32 3 Network secure mode - same as highly secure mode, plus IP
|
/freebsd/sys/contrib/device-tree/src/arm64/tesla/ |
H A D | fsd.dtsi | 378 interrupts = <GIC_SPI 438 IRQ_TYPE_LEVEL_HIGH>, /* Global secure fault */ 379 <GIC_SPI 439 IRQ_TYPE_LEVEL_HIGH>, /* Global non-secure fault */ 380 <GIC_SPI 451 IRQ_TYPE_LEVEL_HIGH>, /* Combined secure interrupt */ 381 <GIC_SPI 450 IRQ_TYPE_LEVEL_HIGH>, /* Combined non-secure interrupt */ 386 /* Per context non-secure context interrupts, 0-3 interrupts */ 398 interrupts = <GIC_SPI 321 IRQ_TYPE_LEVEL_HIGH>, /* Global secure fault */ 399 <GIC_SPI 322 IRQ_TYPE_LEVEL_HIGH>, /* Global non-secure fault */ 400 <GIC_SPI 346 IRQ_TYPE_LEVEL_HIGH>, /* Combined secure interrupt */ 401 <GIC_SPI 345 IRQ_TYPE_LEVEL_HIGH>, /* Combined non-secure interrupt */ 410 /* Per context non-secure context interrupts, 0-7 interrupts */ [all …]
|
/freebsd/lib/libldns/ |
H A D | Makefile.depend | 10 secure/lib/libcrypto \ 11 secure/lib/libssl \
|
/freebsd/sys/contrib/device-tree/Bindings/soc/rockchip/ |
H A D | grf.txt | 7 - GRF, used for general non-secure system, 8 - SGRF, used for general secure system, 14 - GRF, used for general non-secure system, 15 - SGRF, used for general secure system,
|
/freebsd/sys/contrib/device-tree/src/arm64/arm/ |
H A D | corstone1000.dtsi | 145 secure-status = "okay"; /* secure-world-only */ 157 secure-status = "okay"; /* secure-world-only */
|