| /external/dnsmasq/ |
| D | CHANGELOG.archive | 1 release 0.4 - initial public release 3 release 0.5 - added caching, removed compiler warning on linux PPC 5 release 0.6 - TCP handling: close socket and return to connect state if we 9 Added a patch from Cris Bailiff <c.bailiff@e-secure.com.au> 28 Fix bad bug resulting from not initialising value-result 29 address-length parameter to recvfrom() and accept() - it 39 (3) Time-to-live data from upstream server is read and 42 the -h option is given). 44 a file other than /etc/resolv.conf (-r option) this allows 47 give dnsmasq the option -r /etc/resolv.dnsmasq) [all …]
|
| D | CHANGELOG | 2 Add support for internationalised DNS. Non-ASCII characters 12 Add two more environment variables for lease-change scripts: 15 over-ridden by dhcp-host or dhcp-ignore-names directives. 20 Fix regression which broke echo of relay-agent 24 dhcp-boot parameters if it's specified as 25 dhcp-option-force. 27 Make the code to call scripts on lease-change compile-time 29 or building with "make COPTS=-DNO_SCRIPT". 40 Teach --conf-dir to take an option list of file suffices 45 Add new DHCP option named tftpserver-address, which [all …]
|
| /external/cronet/net/android/ |
| D | network_library.h | 2 // Use of this source code is governed by a BSD-style license that can be 25 #include "third_party/abseil-cpp/absl/types/optional.h" 29 // Get the list of user-added roots from Android. 30 // |roots| is a list of DER-encoded user-added roots from Android. 43 // Adds a certificate as a root trust certificate to the trust manager. 47 // Removes all root certificates added by |AddTestRootCertificate| calls. 69 // true, it suggests that use of data may incur extra costs. 73 // default data network. The method will return false if the captive portal 95 // Gets the DNS servers for the current default network and puts them in 97 // on the private DNS settings. `dns_over_tls_hostname` will only be non-empty [all …]
|
| /external/cronet/net/dns/ |
| D | dns_response.cc | 2 // Use of this source code is governed by a BSD-style license that can be 5 #include "net/dns/dns_response.h" 22 #include "net/dns/dns_names_util.h" 23 #include "net/dns/dns_query.h" 24 #include "net/dns/dns_response_result_extractor.h" 25 #include "net/dns/dns_util.h" 26 #include "net/dns/public/dns_protocol.h" 27 #include "net/dns/record_rdata.h" 28 #include "third_party/abseil-cpp/absl/types/optional.h" 103 DCHECK_EQ(owned_rdata.data(), rdata.data()); in SetOwnedRdata() [all …]
|
| D | dns_names_util.cc | 2 // Use of this source code is governed by a BSD-style license that can be 5 #include "net/dns/dns_names_util.h" 19 #include "net/dns/public/dns_protocol.h" 20 #include "third_party/abseil-cpp/absl/types/optional.h" 53 const char* buf = dotted_form_name.data(); in DottedNameToNetwork() 65 --n; in DottedNameToNetwork() 77 memcpy(name.data() + namelen, label, labellen); in DottedNameToNetwork() 96 memcpy(name.data() + namelen, label, labellen); in DottedNameToNetwork() 109 name[namelen++] = 0; // This is the root label (of length 0). in DottedNameToNetwork() 118 base::BigEndianReader reader(dns_network_wire_name.data(), in NetworkToDottedName() [all …]
|
| D | dns_query.cc | 2 // Use of this source code is governed by a BSD-style license that can be 5 #include "net/dns/dns_query.h" 15 #include "net/dns/dns_names_util.h" 16 #include "net/dns/opt_record_rdata.h" 17 #include "net/dns/public/dns_protocol.h" 18 #include "net/dns/record_rdata.h" 19 #include "third_party/abseil-cpp/absl/types/optional.h" 28 // https://tools.ietf.org/html/rfc6891#section-6.1.2 31 // https://tools.ietf.org/html/rfc6891#section-6.2.5 43 return rdata == nullptr ? 0 : kOptRRFixedSize + rdata->buf().size(); in OptRecordSize() [all …]
|
| /external/cronet/third_party/boringssl/src/pki/testdata/verify_certificate_chain_unittest/many-names/ |
| D | toomany-dns-excluded.pem | 1 [Created by: ./generate-chains.py] 3 A chain containing a large number of excluded DNS name 4 constraints and DNS names, above the limit. 7 Data: 19 RSA Public-Key: (2048 bit) 47 CA Issuers - URI:http://url-for-aia/Intermediate.cer 52 URI:http://url-for-crl/Intermediate.crl 59 …DNS:t0.test, DNS:t1.test, DNS:t2.test, DNS:t3.test, DNS:t4.test, DNS:t5.test, DNS:t6.test, DNS:t7.… 76 -----BEGIN CERTIFICATE----- 330 -----END CERTIFICATE----- [all …]
|
| D | toomany-dns-permitted.pem | 1 [Created by: ./generate-chains.py] 3 A chain containing a large number of permitted DNS name 4 constraints and DNS names, above the limit. 7 Data: 19 RSA Public-Key: (2048 bit) 47 CA Issuers - URI:http://url-for-aia/Intermediate.cer 52 URI:http://url-for-crl/Intermediate.crl 59 …DNS:t0.test, DNS:t1.test, DNS:t2.test, DNS:t3.test, DNS:t4.test, DNS:t5.test, DNS:t6.test, DNS:t7.… 76 -----BEGIN CERTIFICATE----- 330 -----END CERTIFICATE----- [all …]
|
| D | toomany-all-types.pem | 1 [Created by: ./generate-chains.py] 7 Data: 19 RSA Public-Key: (2048 bit) 47 CA Issuers - URI:http://url-for-aia/Intermediate.cer 52 URI:http://url-for-crl/Intermediate.crl 59 …DNS:t0.test, DNS:t1.test, DNS:t2.test, DNS:t3.test, DNS:t4.test, DNS:t5.test, DNS:t6.test, DNS:t7.… 76 -----BEGIN CERTIFICATE----- 349 -----END CERTIFICATE----- 352 Data: 357 Issuer: CN=Root [all …]
|
| /external/cronet/net/data/verify_certificate_chain_unittest/many-names/ |
| D | toomany-dns-permitted.pem | 1 [Created by: generate-chains.py] 3 A chain containing a large number of permitted DNS name 4 constraints and DNS names, above the limit. 7 Data: 19 RSA Public-Key: (2048 bit) 47 CA Issuers - URI:http://url-for-aia/Intermediate.cer 52 URI:http://url-for-crl/Intermediate.crl 59 …DNS:t0.test, DNS:t1.test, DNS:t2.test, DNS:t3.test, DNS:t4.test, DNS:t5.test, DNS:t6.test, DNS:t7.… 76 -----BEGIN CERTIFICATE----- 330 -----END CERTIFICATE----- [all …]
|
| D | toomany-dns-excluded.pem | 1 [Created by: generate-chains.py] 3 A chain containing a large number of excluded DNS name 4 constraints and DNS names, above the limit. 7 Data: 19 RSA Public-Key: (2048 bit) 47 CA Issuers - URI:http://url-for-aia/Intermediate.cer 52 URI:http://url-for-crl/Intermediate.crl 59 …DNS:t0.test, DNS:t1.test, DNS:t2.test, DNS:t3.test, DNS:t4.test, DNS:t5.test, DNS:t6.test, DNS:t7.… 76 -----BEGIN CERTIFICATE----- 330 -----END CERTIFICATE----- [all …]
|
| /external/cronet/net/data/ |
| D | test_bundle_data.filelist | 2 # Use of this source code is governed by a BSD-style license that can be 7 data/cache_tests/bad_entry/contents.txt 8 data/cache_tests/bad_entry/data_0 9 data/cache_tests/bad_entry/data_1 10 data/cache_tests/bad_entry/data_2 11 data/cache_tests/bad_entry/data_3 12 data/cache_tests/bad_entry/index 13 data/cache_tests/bad_rankings/contents.txt 14 data/cache_tests/bad_rankings/data_0 15 data/cache_tests/bad_rankings/data_1 [all …]
|
| /external/rust/crates/webpki/src/ |
| D | end_entity.rs | 1 // Copyright 2015-2021 Brian Smith. 11 // WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN 23 /// An end-entity certificate. 44 /// client is identified by one or more DNS hostnames.) 49 /// Although it would be less error-prone to combine all these steps into a 53 /// before application data is sent and before received application data is 57 /// operation) for the same DER-encoded ASN.1 certificate bytes. 65 /// Parse the ASN.1 DER-encoded X.509 encoding of the certificate 67 fn try_from(cert_der: &'a [u8]) -> Result<Self, Self::Error> { in try_from() 78 pub(super) fn inner(&self) -> &cert::Cert { in inner() [all …]
|
| /external/python/cpython2/Doc/library/ |
| D | ssl.rst | 1 :mod:`ssl` --- TLS/SSL wrapper for socket objects 19 -------------- 23 sockets, both client-side and server-side. This module uses the OpenSSL 38 Don't use this module without reading the :ref:`ssl-security`. Doing so 48 :class:`socket.socket` type, and provides a socket-like wrapper that also 49 encrypts and decrypts the data going over the socket with SSL. It supports 60 ------------------------------------ 66 higher-level encryption and authentication layer that's superimposed on the 98 A subclass of :exc:`SSLError` raised by a :ref:`non-blocking SSL socket 99 <ssl-nonblocking>` when trying to read or write data, but more data needs [all …]
|
| /external/cronet/third_party/boringssl/src/pki/testdata/verify_certificate_chain_unittest/many-names/out/ |
| D | Intermediate_5.pem | 2 Data: 7 Issuer: CN=Root 14 RSA Public-Key: (2048 bit) 42 CA Issuers - URI:http://url-for-aia/Root.cer 47 URI:http://url-for-crl/Root.crl 55 DNS:t0.test 56 DNS:t1.test 57 DNS:t2.test 58 DNS:t3.test 59 DNS:t4.test [all …]
|
| D | Intermediate_2.pem | 2 Data: 7 Issuer: CN=Root 14 RSA Public-Key: (2048 bit) 42 CA Issuers - URI:http://url-for-aia/Root.cer 47 URI:http://url-for-crl/Root.crl 55 DNS:x0.test 56 DNS:x1.test 57 DNS:x2.test 58 DNS:x3.test 59 DNS:x4.test [all …]
|
| D | 3CE5FC818859A85016C17FD7E52AE5967FC2F6F8.pem | 2 Data: 7 Issuer: CN=Root 14 RSA Public-Key: (2048 bit) 42 CA Issuers - URI:http://url-for-aia/Root.cer 47 URI:http://url-for-crl/Root.crl 55 DNS:x0.test 56 DNS:x1.test 57 DNS:x2.test 58 DNS:x3.test 59 DNS:x4.test [all …]
|
| D | 3CE5FC818859A85016C17FD7E52AE5967FC2F6FB.pem | 2 Data: 7 Issuer: CN=Root 14 RSA Public-Key: (2048 bit) 42 CA Issuers - URI:http://url-for-aia/Root.cer 47 URI:http://url-for-crl/Root.crl 55 DNS:t0.test 56 DNS:t1.test 57 DNS:t2.test 58 DNS:t3.test 59 DNS:t4.test [all …]
|
| /external/cronet/net/base/ |
| D | features.h | 2 // Use of this source code is governed by a BSD-style license that can be 22 // https://vasilvv.github.io/tls-alps/draft-vvv-tls-alps.html and 23 // https://vasilvv.github.io/httpbis-alps/draft-vvv-httpbis-alps.html. 29 // When kCapReferrerToOriginOnCrossOrigin is enabled, HTTP referrers on cross- 33 // Support for altering the parameters used for DNS transaction timeout. See 43 // Enables querying HTTPS DNS records that will affect results from HostResolver 48 // Param to control whether or not HostResolver, when using Secure DNS, will 64 // Any param is ignored if zero, and if one of min/max is non-zero with a zero 66 // is no timeout specific to HTTPS transactions, only the regular DNS query 87 // Update protocol using ALPN information in HTTPS DNS records. [all …]
|
| D | net_error_list.h | 2 // Use of this source code is governed by a BSD-style license that can be 8 // no-include-guard-because-multiply-included 15 // 0- 99 System related errors 16 // 100-199 Connection related errors 17 // 200-299 Certificate errors 18 // 300-399 HTTP errors 19 // 400-499 Cache errors 20 // 500-599 ? 21 // 600-699 FTP errors 22 // 700-799 Certificate manager errors [all …]
|
| /external/aws-sdk-java-v2/services/fsx/src/main/resources/codegen-resources/ |
| D | service-2.json | 4 "apiVersion":"2018-03-01", 13 "uid":"fsx-2018-03-01" 29 …DNS) aliases with an existing Amazon FSx for Windows File Server file system. A file system can ha… 46 …data repository task if that task is in either the <code>PENDING</code> or <code>EXECUTING</code> … 70 …-Region copy) or within the same Amazon Web Services Region (in-Region copy). You can have up to f… 87 …\"https://docs.aws.amazon.com/fsx/latest/OpenZFSGuide/on-demand-replication.html\">on-demand data … 108 …data repository</p> </li> </ul> <p>For more information about backups, see the following:</p> <ul>… 127 …data repository association (DRA). A data repository association is a link between a directory on … 147 …data repository task. A <code>CreateDataRepositoryTask</code> operation will fail if a data reposi… 190 …tem's lifecycle state is still <code>CREATING</code>. You can check the file-system creation statu… [all …]
|
| /external/mdnsresponder/mDNSCore/ |
| D | DNSCommon.c | 1 /* -*- Mode: C; tab-width: 4 -*- 3 * Copyright (c) 2002-2003 Apple Computer, Inc. All rights reserved. 9 * http://www.apache.org/licenses/LICENSE-2.0 29 // -- domain labels have an initial length byte, not a terminating null character 35 #pragma mark - Program Constants 39 mDNSexport const mDNSInterfaceID mDNSInterfaceMark = (mDNSInterfaceID)-1; 40 mDNSexport const mDNSInterfaceID mDNSInterface_LocalOnly = (mDNSInterfaceID)-2; 41 mDNSexport const mDNSInterfaceID mDNSInterface_Unicast = (mDNSInterfaceID)-3; 42 mDNSexport const mDNSInterfaceID mDNSInterface_P2P = (mDNSInterfaceID)-4; 45 // Multicast DNS, using the same packet formats, naming syntax, and record types as Multicast DNS, … [all …]
|
| /external/cronet/third_party/boringssl/src/pki/testdata/ssl/certificates/ |
| D | test_names.pem | 1 -----BEGIN PRIVATE KEY----- 28 -----END PRIVATE KEY----- 30 Data: 35 Issuer: C=US, ST=California, L=Mountain View, O=Test CA, CN=Test Root CA 42 Public-Key: (2048 bit) 73 …DNS:a.test, DNS:*.a.test, DNS:b.test, DNS:*.b.test, DNS:c.test, DNS:*.c.test, DNS:d.test, DNS:*.d.… 91 -----BEGIN CERTIFICATE----- 114 -----END CERTIFICATE-----
|
| /external/cronet/net/data/ssl/certificates/ |
| D | test_names.pem | 1 -----BEGIN PRIVATE KEY----- 28 -----END PRIVATE KEY----- 30 Data: 35 Issuer: C=US, ST=California, L=Mountain View, O=Test CA, CN=Test Root CA 42 Public-Key: (2048 bit) 73 …DNS:a.test, DNS:*.a.test, DNS:b.test, DNS:*.b.test, DNS:c.test, DNS:*.c.test, DNS:d.test, DNS:*.d.… 91 -----BEGIN CERTIFICATE----- 114 -----END CERTIFICATE-----
|
| /external/cronet/third_party/boringssl/src/crypto/x509/ |
| D | x509_test.cc | 11 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION 49 -----BEGIN CERTIFICATE----- 64 -----END CERTIFICATE----- 68 -----BEGIN CERTIFICATE----- 82 -----END CERTIFICATE----- 86 -----BEGIN CERTIFICATE----- 100 -----END CERTIFICATE----- 104 -----BEGIN CERTIFICATE----- 118 -----END CERTIFICATE----- 122 -----BEGIN CERTIFICATE----- [all …]
|