Home
last modified time | relevance | path

Searched full:secure (Results 1 – 25 of 987) sorted by relevance

12345678910>>...40

/external/apache-http/src/org/apache/http/conn/routing/
DRouteTracker.java81 /** Whether the route is secure. */
82 private boolean secure; field in RouteTracker
119 * @param secure <code>true</code> if the route is secure,
122 public final void connectTarget(boolean secure) { in connectTarget() argument
127 this.secure = secure; in connectTarget()
135 * @param secure <code>true</code> if the route is secure,
138 public final void connectProxy(HttpHost proxy, boolean secure) { in connectProxy() argument
147 this.secure = secure; in connectProxy()
154 * @param secure <code>true</code> if the route is secure,
157 public final void tunnelTarget(boolean secure) { in tunnelTarget() argument
[all …]
DHttpRoute.java76 /** Whether the route is (supposed to be) secure. */
77 private final boolean secure; field in HttpRoute
93 * @param secure <code>true</code> if the route is (to be) secure,
102 boolean secure, in HttpRoute() argument
122 this.secure = secure; in HttpRoute()
136 * @param secure <code>true</code> if the route is (to be) secure,
142 boolean secure, TunnelType tunnelled, LayerType layered) { in HttpRoute() argument
143 this(local, target, toChain(proxies), secure, tunnelled, layered); in HttpRoute()
155 * @param secure <code>true</code> if the route is (to be) secure,
165 boolean secure, TunnelType tunnelled, LayerType layered) { in HttpRoute() argument
[all …]
/external/curl/tests/data/
Dtest3119 Set-Cookie: foobar=name; domain=anything.com; path=/ ; secure
23 Set-Cookie: sec1value=secure1 ; domain=127.0.0.1; path=/secure1/ ; secure
24 Set-Cookie: sec2value=secure2 ; domain=127.0.0.1; path=/secure2/ ; secure=
25 Set-Cookie: sec3value=secure3 ; domain=127.0.0.1; path=/secure3/ ; secure=
26 Set-Cookie: sec4value=secure4 ; secure=; domain=127.0.0.1; path=/secure4/ ;
27 Set-Cookie: sec5value=secure5 ; secure; domain=127.0.0.1; path=/secure5/ ;
28 Set-Cookie: sec6value=secure6 ; secure ; domain=127.0.0.1; path=/secure6/ ;
29 Set-Cookie: sec7value=secure7 ; secure ; domain=127.0.0.1; path=/secure7/ ;
30 Set-Cookie: sec8value=secure8 ; secure= ; domain=127.0.0.1; path=/secure8/ ;
31 Set-Cookie: secure=very1 ; secure=; domain=127.0.0.1; path=/secure9/;
[all …]
/external/vboot_reference/firmware/2lib/include/
D2secdata.h5 * Secure non-volatile storage routines
31 /* Secure data area */
59 * Check the CRC of the secure storage context.
61 * Use this if reading from secure storage may be flaky, and you want to retry
72 * Create fresh data in the secure storage context.
74 * Use this only when initializing the secure storage context on a new machine
76 * (or any other API in this library) fails; that could allow the secure data
84 * Initialize the secure storage context and verify its CRC.
94 * Read a secure storage value.
106 * Write a secure storage value.
/external/kernel-headers/original/uapi/linux/
Dnfc.h67 * @NFC_CMD_ENABLE_SE: Enable the physical link to a specific secure element.
68 * Once enabled a secure element will handle card emulation mode, i.e.
69 * starting a poll from a device which has a secure element enabled means
71 * @NFC_CMD_DISABLE_SE: Disable the physical link to a specific secure element.
74 * @NFC_EVENT_SE_ADDED: Event emitted when a new secure element is discovered.
77 * @NFC_EVENT_SE_REMOVED: Event emitted when a secure element is removed from
79 * @NFC_EVENT_SE_CONNECTIVITY: This event is emitted whenever a secure element
87 * @NFC_CMD_GET_SE: Dump all discovered secure elements from an NFC controller.
88 * @NFC_CMD_SE_IO: Send/Receive APDUs to/from the selected secure element.
152 * @NFC_ATTR_SE: Available Secure Elements
[all …]
/external/python/cpython2/Doc/library/
Dsha.rst6 :synopsis: NIST's secure hash algorithm, SHA.
16 single: Secure Hash Algorithm
19 This module implements the interface to NIST's secure hash algorithm, known as
79 …`Secure Hash Standard <http://csrc.nist.gov/publications/fips/fips180-2/fips180-2withchangenotice.…
80 The Secure Hash Algorithm is defined by NIST document FIPS PUB 180-2: `Secure
85 `Cryptographic Toolkit (Secure Hashing) <http://csrc.nist.gov/CryptoToolkit/tkhash.html>`_
86 Links from NIST to various information on secure hashing.
Dhashlib.rst1 :mod:`hashlib` --- Secure hashes and message digests
5 :synopsis: Secure hash and message digest algorithms.
14 single: secure hash algorithm, SHA1, SHA224, SHA256, SHA384, SHA512
20 This module implements a common interface to many different secure hash and
21 message digest algorithms. Included are the FIPS secure hash algorithms SHA1,
23 algorithm (defined in Internet :rfc:`1321`). The terms secure hash and message
25 modern term is secure hash.
159 Key derivation and key stretching algorithms are designed for secure password
205 The FIPS 180-2 publication on Secure Hash Algorithms.
/external/python/cpython2/Lib/
D_MozillaCookieJar.py70 domain, domain_specified, path, secure, expires, name, value = \
72 secure = (secure == "TRUE")
94 secure,
127 if cookie.secure: secure = "TRUE"
128 else: secure = "FALSE"
146 secure, expires, name, value])+
/external/apache-http/src/org/apache/http/conn/
DOperatedClientConnection.java81 * Indicates whether this connection is secure.
86 * @return <code>true</code> if this connection is secure,
140 * @param secure <code>true</code> if this connection is secure, for
142 * <code>false</code> if it is not secure
147 void openCompleted(boolean secure, HttpParams params) in openCompleted() argument
169 * @param secure <code>true</code> if this connection is now secure,
170 * <code>false</code> if it is not secure
174 boolean secure, HttpParams params) in update() argument
DManagedClientConnection.java71 * Indicates whether this connection is secure.
75 * @return <code>true</code> if this connection is secure,
100 * Plain sockets may be considered secure, for example if they are
138 * @param secure <code>true</code> if the tunnel should be considered
139 * secure, <code>false</code> otherwise
144 void tunnelTarget(boolean secure, HttpParams params) in tunnelTarget() argument
163 * @param secure <code>true</code> if the connection should be
164 * considered secure, <code>false</code> otherwise
169 void tunnelProxy(HttpHost next, boolean secure, HttpParams params) in tunnelProxy() argument
180 * {@link #isSecure secure}.
/external/python/cpython2/Lib/test/
Dtest_cookie.py100 C['Customer']['secure'] = True
103 'Set-Cookie: Customer="WILE_E_COYOTE"; httponly; secure')
109 self.assertFalse(C['eggs']['secure'])
114 C.load('eggs=scrambled; httponly; secure; Path=/bacon')
116 self.assertTrue(C['eggs']['secure'])
122 C.load('eggs=scrambled; httponly=foo; secure=bar; Path=/bacon')
124 self.assertTrue(C['eggs']['secure'])
128 self.assertEqual(C['eggs']['secure'], 'bar')
139 C.load('eggs = scrambled ; secure ; path = bar ; foo=foo ')
141 'Set-Cookie: eggs=scrambled; Path=bar; secure\r\nSet-Cookie: foo=foo')
/external/apache-http/src/org/apache/http/cookie/
DCookieOrigin.java53 private final boolean secure; field in CookieOrigin
55 public CookieOrigin(final String host, int port, final String path, boolean secure) { in CookieOrigin() argument
79 this.secure = secure; in CookieOrigin()
95 return this.secure; in isSecure()
102 if (this.secure) { in toString()
103 buffer.append("(secure)"); in toString()
DSetCookie.java96 * Sets the secure attribute of the cookie.
99 * using a secure protocol (https). This should only be set when
100 * the cookie's originating server used a secure protocol to set the
103 * @param secure The value of the secure attribute
107 void setSecure (boolean secure); in setSecure() argument
/external/apache-commons-math/src/main/java/org/apache/commons/math/random/
DRandomData.java31 * secure. To generate cryptographically secure strings, use
48 * The generated integer will be random, but not cryptographically secure.
49 * To generate cryptographically secure integer sequences, use
69 * cryptographically secure.
70 * To generate cryptographically secure sequences of longs, use
86 * Generates a random string of hex characters from a secure random
104 * from a secure random sequence.
107 * cryptographically secure. If cryptographic security is not required,
112 * Secure Random Sequence</a></p>
131 * cryptographically secure. If cryptographic security is not required,
[all …]
/external/wpa_supplicant_8/src/drivers/
Ddriver_macsec_linux.c616 * @sa: secure association
638 * @sa: secure association
658 * @sa: secure association
701 * macsec_drv_create_receive_sc - Create secure channel for receiving
703 * @sc: secure channel
704 * @sci_addr: secure channel identifier - address
705 * @sci_port: secure channel identifier - port
744 * macsec_drv_delete_receive_sc - Delete secure connection for receiving
746 * @sc: secure channel
780 * macsec_drv_create_receive_sa - Create secure association for receive
[all …]
/external/apache-http/src/org/apache/http/impl/conn/
DAbstractPoolEntry.java197 * @param secure <code>true</code> if the tunnel should be
198 * considered secure, <code>false</code> otherwise
203 public void tunnelTarget(boolean secure, HttpParams params) in tunnelTarget() argument
223 secure, params); in tunnelTarget()
224 this.tracker.tunnelTarget(secure); in tunnelTarget()
238 * @param secure <code>true</code> if the tunnel should be
239 * considered secure, <code>false</code> otherwise
244 public void tunnelProxy(HttpHost next, boolean secure, HttpParams params) in tunnelProxy() argument
263 this.connection.update(null, next, secure, params); in tunnelProxy()
264 this.tracker.tunnelProxy(next, secure); in tunnelProxy()
/external/libese/tools/ese_ls_provision/
DREADME.md3 Runs on Android host and uploads scripts to the secure element loader service.
7 PN80T and later secure elements include a "loader service" which runs signed, encrypted scripts to
8 perform high-privilege operations like installing and deleting applets in a secure way. The result
12 them to the secure element.
/external/openssh/
Dssh.110 .\" called by a name other than "ssh" or "Secure Shell".
74 It is intended to provide secure encrypted communications between
78 sockets can also be forwarded over the secure channel.
193 connection is forwarded over the secure channel, and the application
372 connection is forwarded over the secure channel, and a connection is
632 connection is forwarded over the secure channel, and a connection
688 as a secure transport for other applications (e.g.\&
726 over the secure channel.
1098 Forwarding of arbitrary TCP connections over the secure channel can
1100 One possible application of TCP forwarding is a secure connection to a
[all …]
Dssh.017 executing commands on a remote machine. It is intended to provide secure
20 can also be forwarded over the secure channel.
82 the secure channel, and the application protocol is then used to
174 socket, the connection is forwarded over the secure channel, and
348 port or Unix socket, the connection is forwarded over the secure
377 system. Subsystems facilitate the use of SSH as a secure
397 forwarded to host on port over the secure channel. Implies -N,
594 Forwarding of arbitrary TCP connections over the secure channel can be
596 possible application of TCP forwarding is a secure connection to a mail
752 value to forward X11 connections over the secure
[all …]
/external/wpa_supplicant_8/src/common/
Dieee802_1x_defs.h18 * Should secure sessions.
19 * This accepts key server's advice to determine whether to secure the
25 * Disabled MACsec - do not secure sessions.
30 * Should secure sessions, and try to use encryption.
/external/curl/docs/libcurl/opts/
DCURLOPT_HTTPAUTH.351 is a more secure way to do authentication over public networks than the
55 defined in RFC2617 and is a more secure way to do authentication over public
61 in RFC 4559 and is the most secure way to perform authentication over HTTP.
88 secure.
92 it finds most secure.
/external/apache-http/src/org/apache/http/impl/cookie/
DBasicClientCookie.java237 * @return <code>true</code> if this cookie should only be sent over secure connections.
245 * Sets the secure attribute of the cookie.
248 * using a secure protocol (https). This should only be set when
249 * the cookie's originating server used a secure protocol to set the
252 * @param secure The value of the secure attribute
256 public void setSecure (boolean secure) { in setSecure() argument
257 isSecure = secure; in setSecure()
374 /** My secure flag. */
/external/webrtc/webrtc/base/
Dhttpcommon_unittest.cc26 EXPECT_FALSE(url.secure()); in TEST()
40 EXPECT_FALSE(url.secure()); in TEST()
51 EXPECT_FALSE(url.secure()); in TEST()
63 EXPECT_FALSE(url.secure()); in TEST()
105 EXPECT_TRUE(url.secure()); in TEST()
115 EXPECT_TRUE(url.secure()); in TEST()
/external/selinux/libselinux/man/man5/
Dsecuretty_types.53 securetty_types \- The SELinux secure tty type configuration file
8 file contains a list of types associated to secure tty type that are defined in the policy for use …
29 One or more type entries that are defined in the policy for secure tty devices.
/external/chromium-trace/catapult/devil/devil/android/
Dsettings.py22 ('settings/secure', [
35 ('settings/secure', [
42 ('settings/secure', [
48 ('settings/secure', [
75 ('settings/secure', [
187 http://developer.android.com/reference/android/provider/Settings.Secure.html
243 locksettings = get_lock_settings('secure') + get_lock_settings('system')

12345678910>>...40