Searched refs:security (Results 1 - 16 of 16) sorted by relevance

/seL4-l4v-master/seL4/src/arch/arm/machine/
H A Dgic_v2.c101 gic_dist->security[i >> 5] = 0xffffffff;
103 gic_dist->security[i >> 5] = 0;
120 gic_dist->security[0] = 0xffffffff;
123 gic_dist->security[0] = 0;
/seL4-l4v-master/isabelle/src/Pure/General/
H A Dsha1.scala11 import java.security.MessageDigest
/seL4-l4v-master/l4v/isabelle/src/Pure/General/
H A Dsha1.scala11 import java.security.MessageDigest
/seL4-l4v-master/l4v/spec/haskell/include/
H A Dgic.h15 uint32_t security[32]; /* [0x080, 0x100) */ member in struct:gic_dist_map_t
/seL4-l4v-master/isabelle/src/Doc/Tutorial/document/
H A Dprotocol.tex4 \index{protocols!security|(}
11 Communications security is an ancient art. Julius Caesar is said to have
15 incorporates security features. The envelope provides a degree of
40 Researchers are developing methods for proving the correctness of security
127 semantics of the system and to prove security properties using rule
H A Dpreface.tex29 devoted to an extended example: the verification of a security protocol.
/seL4-l4v-master/l4v/isabelle/src/Doc/Tutorial/document/
H A Dprotocol.tex4 \index{protocols!security|(}
11 Communications security is an ancient art. Julius Caesar is said to have
15 incorporates security features. The envelope provides a degree of
40 Researchers are developing methods for proving the correctness of security
127 semantics of the system and to prove security properties using rule
H A Dpreface.tex29 devoted to an extended example: the verification of a security protocol.
/seL4-l4v-master/seL4/include/arch/arm/arch/machine/
H A Dgic_v2.h54 uint32_t security[32]; /* [0x080, 0x100) */ member in struct:gic_dist_map
/seL4-l4v-master/HOL4/examples/Crypto/IDEA/
H A DideaScript.sml14 (*- security stuff start here -*)
/seL4-l4v-master/HOL4/examples/Crypto/MARS/
H A DMARSScript.sml8 http://www.research.ibm.com/security/mars.html
/seL4-l4v-master/HOL4/polyml/basis/
H A DWeak.sml68 security in the event that the compiler is sufficiently clever to
/seL4-l4v-master/seL4/manual/parts/
H A Dio.tex109 I/O devices capable of DMA present a security risk because the CPU's MMU
114 subverting security. To mitigate this threat, seL4 provides support for
H A Dthreads.tex33 Each thread belongs to exactly one security domain (see
/seL4-l4v-master/HOL4/examples/dev/sw/
H A DfunCall.sml457 (*security check*)
/seL4-l4v-master/HOL4/Manual/Translations/IT/Description/
H A Dtactics.tex211 \index{security, in goal directed proof|(}
233 \index{security, in goal directed proof|)}\index{validity, of tactics|)}.
534 can be represented as theorems of the \HOL{} system---security is

Completed in 288 milliseconds