| /external/apache-http/src/org/apache/http/conn/routing/ |
| D | RouteTracker.java | 76 /** Whether the route is secure. */ 77 private boolean secure; field in RouteTracker 114 * @param secure <code>true</code> if the route is secure, 117 public final void connectTarget(boolean secure) { in connectTarget() argument 122 this.secure = secure; in connectTarget() 130 * @param secure <code>true</code> if the route is secure, 133 public final void connectProxy(HttpHost proxy, boolean secure) { in connectProxy() argument 142 this.secure = secure; in connectProxy() 149 * @param secure <code>true</code> if the route is secure, 152 public final void tunnelTarget(boolean secure) { in tunnelTarget() argument [all …]
|
| D | HttpRoute.java | 71 /** Whether the route is (supposed to be) secure. */ 72 private final boolean secure; field in HttpRoute 88 * @param secure <code>true</code> if the route is (to be) secure, 97 boolean secure, in HttpRoute() argument 117 this.secure = secure; in HttpRoute() 131 * @param secure <code>true</code> if the route is (to be) secure, 137 boolean secure, TunnelType tunnelled, LayerType layered) { in HttpRoute() argument 138 this(local, target, toChain(proxies), secure, tunnelled, layered); in HttpRoute() 150 * @param secure <code>true</code> if the route is (to be) secure, 160 boolean secure, TunnelType tunnelled, LayerType layered) { in HttpRoute() argument [all …]
|
| /external/chromium_org/chrome/test/functional/ |
| D | secure_shell.py | 16 """Tests for Secure Shell app. 26 """Install secure shell app at startup.""" 34 assert files, 'Secure Shell %s app missing in %s' % (channel, app_dir) 38 logging.debug('Using Secure shell app %s' % app_path) 42 """Install Secure Shell.""" 55 """Launch Secure Shell and verify basic connect/exit flow. 57 This basic flow also verifies that NaCl works since secure shell is based 67 msg='Secure shell login dialog did not show up') 72 msg='Did not find secure shell username dialog') 75 logging.info('Launched Secure Shell in %.2f secs' % (now - then)) [all …]
|
| /external/openssh/contrib/caldera/ |
| D | openssh.spec | 39 Summary : OpenSSH free Secure Shell (SSH) implementation. 40 Summary(de) : OpenSSH - freie Implementation der Secure Shell (SSH). 41 Summary(es) : OpenSSH implementaci�n libre de Secure Shell (SSH). 43 Summary(it) : Implementazione gratuita OpenSSH della Secure Shell. 44 Summary(pt) : Implementa��o livre OpenSSH do protocolo 'Secure Shell' (SSH). 45 Summary(pt_BR) : Implementa��o livre OpenSSH do protocolo Secure Shell (SSH). 70 Summary : OpenSSH Secure Shell protocol server (sshd). 71 Summary(de) : OpenSSH Secure Shell Protocol-Server (sshd). 72 Summary(es) : Servidor del protocolo OpenSSH Secure Shell (sshd). 74 Summary(it) : Server OpenSSH per il protocollo Secure Shell (sshd). [all …]
|
| /external/chromium_org/native_client_sdk/src/gonacl_appengine/ |
| D | app.yaml | 11 secure: always 16 secure: always 21 secure: always 25 secure: always 29 secure: always
|
| /external/chromium_org/third_party/WebKit/Source/platform/ |
| D | Cookie.h | 41 const String& path, double expires, bool httpOnly, bool secure, in Cookie() 49 , secure(secure) in Cookie() 60 bool secure; member 67 …tringHash::hash(key.name) + StringHash::hash(key.domain) + StringHash::hash(key.path) + key.secure; in hash() 72 return a.name == b.name && a.domain == b.domain && a.path == b.path && a.secure == b.secure; in equal()
|
| /external/chromium/webkit/glue/ |
| D | webcookie.cc | 12 secure(false), in WebCookie() 23 secure(c.IsSecure()), in WebCookie() 29 double expires, bool http_only, bool secure, bool session) in WebCookie() argument 36 secure(secure), in WebCookie()
|
| D | webcookie.h | 21 bool http_only, bool secure, bool session); 42 // Cookie secure param. 43 bool secure; member
|
| /external/apache-http/src/org/apache/http/conn/ |
| D | OperatedClientConnection.java | 76 * Indicates whether this connection is secure. 81 * @return <code>true</code> if this connection is secure, 135 * @param secure <code>true</code> if this connection is secure, for 137 * <code>false</code> if it is not secure 142 void openCompleted(boolean secure, HttpParams params) in openCompleted() argument 164 * @param secure <code>true</code> if this connection is now secure, 165 * <code>false</code> if it is not secure 169 boolean secure, HttpParams params) in update() argument
|
| D | ManagedClientConnection.java | 66 * Indicates whether this connection is secure. 70 * @return <code>true</code> if this connection is secure, 95 * Plain sockets may be considered secure, for example if they are 133 * @param secure <code>true</code> if the tunnel should be considered 134 * secure, <code>false</code> otherwise 139 void tunnelTarget(boolean secure, HttpParams params) in tunnelTarget() argument 158 * @param secure <code>true</code> if the connection should be 159 * considered secure, <code>false</code> otherwise 164 void tunnelProxy(HttpHost next, boolean secure, HttpParams params) in tunnelProxy() argument 175 * {@link #isSecure secure}.
|
| /external/apache-http/src/org/apache/http/cookie/ |
| D | CookieOrigin.java | 48 private final boolean secure; field in CookieOrigin 50 public CookieOrigin(final String host, int port, final String path, boolean secure) { in CookieOrigin() argument 74 this.secure = secure; in CookieOrigin() 90 return this.secure; in isSecure() 97 if (this.secure) { in toString() 98 buffer.append("(secure)"); in toString()
|
| D | SetCookie.java | 91 * Sets the secure attribute of the cookie. 94 * using a secure protocol (https). This should only be set when 95 * the cookie's originating server used a secure protocol to set the 98 * @param secure The value of the secure attribute 102 void setSecure (boolean secure); in setSecure() argument
|
| /external/chromium_org/third_party/WebKit/public/platform/ |
| D | WebCookie.h | 45 , secure(false) in WebCookie() 51 const WebString& path, double expires, bool httpOnly, bool secure, bool session) in WebCookie() 58 , secure(secure) in WebCookie() 69 bool secure; member
|
| /external/chromium_org/net/cookies/ |
| D | canonical_cookie_unittest.cc | 103 // Test creating secure cookies. RFC 6265 allows insecure urls to set secure in TEST() 106 CanonicalCookie::Create(url, "A=2; Secure", creation_time, options)); in TEST() 186 bool secure(false); in TEST() local 193 last_access_time, secure, httponly, in TEST() 201 last_access_time, secure, httponly, in TEST() 210 secure, httponly, in TEST() 219 secure, httponly, in TEST() 235 secure, httponly, in TEST() 242 last_access_time, secure, httponly, in TEST() 251 last_access_time, secure, httponly, in TEST() [all …]
|
| /external/openssh/ |
| D | ssh.1 | 10 .\" called by a name other than "ssh" or "Secure Shell". 72 and provide secure encrypted communications between 75 can also be forwarded over the secure channel. 157 It is believed to be secure. 159 is a fast block cipher; it appears very secure and is much faster than 195 connection is forwarded over the secure channel, and the application 309 connection is forwarded over the secure channel, and a connection is 494 connection is forwarded over the secure channel, and a connection is 546 of SSH as a secure transport for other applications (eg.\& 579 over the secure channel. [all …]
|
| D | ssh.0 | 17 and rsh, and provide secure encrypted communications between two 19 TCP ports can also be forwarded over the secure channel. 73 different keys. It is believed to be secure. blowfish is a fast 74 block cipher; it appears very secure and is much faster than 89 the secure channel, and the application protocol is then used to 160 the secure channel, and a connection is made to host port 296 connection is forwarded over the secure channel, and a connection 325 facilitate the use of SSH as a secure transport for other 345 forwarded to host on port over the secure channel. Implies -N, 535 Forwarding of arbitrary TCP connections over the secure channel can be [all …]
|
| /external/apache-http/src/org/apache/http/impl/conn/ |
| D | AbstractPoolEntry.java | 192 * @param secure <code>true</code> if the tunnel should be 193 * considered secure, <code>false</code> otherwise 198 public void tunnelTarget(boolean secure, HttpParams params) in tunnelTarget() argument 218 secure, params); in tunnelTarget() 219 this.tracker.tunnelTarget(secure); in tunnelTarget() 233 * @param secure <code>true</code> if the tunnel should be 234 * considered secure, <code>false</code> otherwise 239 public void tunnelProxy(HttpHost next, boolean secure, HttpParams params) in tunnelProxy() argument 258 this.connection.update(null, next, secure, params); in tunnelProxy() 259 this.tracker.tunnelProxy(next, secure); in tunnelProxy()
|
| /external/chromium/net/base/ |
| D | ssl_false_start_blacklist.txt | 3235 secure-access.cne-siar.gov.uk 3236 secure.3creditreportsinstantly.com 3237 secure.aceinsurance.com.au 3238 secure.anzmoneymanager.com 3239 secure.asce.org 3240 secure.astepsdiv.com 3241 secure.atriacom.com 3242 secure.atv.com 3243 secure.bybox.com 3244 secure.cambrianc.on.ca [all …]
|
| /external/chromium_org/chrome/browser/managed_mode/ |
| D | managed_mode_url_filter_unittest.cc | 82 list.push_back("http://secure.com"); in TEST_F() 83 list.push_back("ftp://secure.com"); in TEST_F() 84 list.push_back("ws://secure.com"); in TEST_F() 88 EXPECT_TRUE(IsURLWhitelisted("http://secure.com")); in TEST_F() 89 EXPECT_TRUE(IsURLWhitelisted("http://secure.com/whatever")); in TEST_F() 90 EXPECT_TRUE(IsURLWhitelisted("ftp://secure.com/")); in TEST_F() 91 EXPECT_TRUE(IsURLWhitelisted("ws://secure.com")); in TEST_F() 92 EXPECT_FALSE(IsURLWhitelisted("https://secure.com/")); in TEST_F() 93 EXPECT_FALSE(IsURLWhitelisted("wss://secure.com")); in TEST_F() 94 EXPECT_TRUE(IsURLWhitelisted("http://www.secure.com")); in TEST_F() [all …]
|
| /external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/provider/crypto/ |
| D | SHA1ImplTest.java | 35 * The input data and results of computing are defined in Secure Hash Standard, 68 // values defined in examples in Secure Hash Standard in testOneBlockMessage() 75 words[0] = 0x61626380; // constants from Secure Hash Standard in testOneBlockMessage() 106 // values defined in examples in Secure Hash Standard in testMultiBlockMessage() 109 // string defined in examples in Secure Hash Standard in testMultiBlockMessage() 130 // values defined in examples in Secure Hash Standard in testLongMessage() 164 * implements alternative algorithm described in the SECURE HASH STANDARD 168 // constants defined in Secure Hash Standard in alternateHash() 209 // computation defined in Secure Hash Standard in alternateHash()
|
| /external/apache-http/src/org/apache/http/impl/cookie/ |
| D | BasicClientCookie.java | 232 * @return <code>true</code> if this cookie should only be sent over secure connections. 240 * Sets the secure attribute of the cookie. 243 * using a secure protocol (https). This should only be set when 244 * the cookie's originating server used a secure protocol to set the 247 * @param secure The value of the secure attribute 251 public void setSecure (boolean secure) { in setSecure() argument 252 isSecure = secure; in setSecure() 369 /** My secure flag. */
|
| /external/chromium_org/components/autofill/content/browser/wallet/ |
| D | wallet_service_url_unittest.cc | 21 EXPECT_EQ("https://wallet-web.sandbox.google.com/online-secure/v2/u/1/" in TEST() 32 EXPECT_EQ("https://wallet-web.sandbox.google.com/online-secure/v2/u/2/" in TEST() 41 EXPECT_EQ("https://wallet-web.sandbox.google.com/online-secure/v2/u/1/" in TEST() 56 EXPECT_EQ("https://wallet.google.com/online-secure/v2/u/1/" in TEST() 66 EXPECT_EQ("https://wallet.google.com/online-secure/v2/u/4/" in TEST() 75 EXPECT_EQ("https://wallet.google.com/online-secure/v2/u/1/" in TEST()
|
| /external/chromium_org/chrome/android/java/src/org/chromium/chrome/browser/identity/ |
| D | SettingsSecureBasedIdentificationGenerator.java | 17 * Unique identificator implementation that uses the Settings.Secure.ANDROID_ID field and MD5 44 return Settings.Secure.getString(mContext.getContentResolver(), Settings.Secure.ANDROID_ID); in getAndroidId()
|
| /external/chromium_org/third_party/libjingle/source/talk/base/ |
| D | httpcommon_unittest.cc | 43 EXPECT_FALSE(url.secure()); in TEST() 57 EXPECT_FALSE(url.secure()); in TEST() 68 EXPECT_FALSE(url.secure()); in TEST() 80 EXPECT_FALSE(url.secure()); in TEST() 122 EXPECT_TRUE(url.secure()); in TEST() 132 EXPECT_TRUE(url.secure()); in TEST()
|
| /external/apache-http/src/org/apache/http/conn/scheme/ |
| D | SocketFactory.java | 106 * Checks whether a socket provides a secure connection. 112 * As a rule of thumb, plain sockets are not secure and 113 * TLS/SSL sockets are secure. However, there may be 116 * could be considered secure. On the other hand, a 123 * should be considered secure, or
|