/external/apache-http/src/org/apache/http/conn/routing/ |
D | RouteTracker.java | 81 /** Whether the route is secure. */ 82 private boolean secure; field in RouteTracker 119 * @param secure <code>true</code> if the route is secure, 122 public final void connectTarget(boolean secure) { in connectTarget() argument 127 this.secure = secure; in connectTarget() 135 * @param secure <code>true</code> if the route is secure, 138 public final void connectProxy(HttpHost proxy, boolean secure) { in connectProxy() argument 147 this.secure = secure; in connectProxy() 154 * @param secure <code>true</code> if the route is secure, 157 public final void tunnelTarget(boolean secure) { in tunnelTarget() argument [all …]
|
D | HttpRoute.java | 76 /** Whether the route is (supposed to be) secure. */ 77 private final boolean secure; field in HttpRoute 93 * @param secure <code>true</code> if the route is (to be) secure, 102 boolean secure, in HttpRoute() argument 122 this.secure = secure; in HttpRoute() 136 * @param secure <code>true</code> if the route is (to be) secure, 142 boolean secure, TunnelType tunnelled, LayerType layered) { in HttpRoute() argument 143 this(local, target, toChain(proxies), secure, tunnelled, layered); in HttpRoute() 155 * @param secure <code>true</code> if the route is (to be) secure, 165 boolean secure, TunnelType tunnelled, LayerType layered) { in HttpRoute() argument [all …]
|
/external/curl/tests/data/ |
D | test31 | 19 Set-Cookie: foobar=name; domain=anything.com; path=/ ; secure 23 Set-Cookie: sec1value=secure1 ; domain=127.0.0.1; path=/secure1/ ; secure 24 Set-Cookie: sec2value=secure2 ; domain=127.0.0.1; path=/secure2/ ; secure= 25 Set-Cookie: sec3value=secure3 ; domain=127.0.0.1; path=/secure3/ ; secure= 26 Set-Cookie: sec4value=secure4 ; secure=; domain=127.0.0.1; path=/secure4/ ; 27 Set-Cookie: sec5value=secure5 ; secure; domain=127.0.0.1; path=/secure5/ ; 28 Set-Cookie: sec6value=secure6 ; secure ; domain=127.0.0.1; path=/secure6/ ; 29 Set-Cookie: sec7value=secure7 ; secure ; domain=127.0.0.1; path=/secure7/ ; 30 Set-Cookie: sec8value=secure8 ; secure= ; domain=127.0.0.1; path=/secure8/ ; 31 Set-Cookie: secure=very1 ; secure=; domain=127.0.0.1; path=/secure9/; [all …]
|
/external/vboot_reference/firmware/2lib/include/ |
D | 2secdata.h | 5 * Secure non-volatile storage routines 31 /* Secure data area */ 59 * Check the CRC of the secure storage context. 61 * Use this if reading from secure storage may be flaky, and you want to retry 72 * Create fresh data in the secure storage context. 74 * Use this only when initializing the secure storage context on a new machine 76 * (or any other API in this library) fails; that could allow the secure data 84 * Initialize the secure storage context and verify its CRC. 94 * Read a secure storage value. 106 * Write a secure storage value.
|
/external/kernel-headers/original/uapi/linux/ |
D | nfc.h | 67 * @NFC_CMD_ENABLE_SE: Enable the physical link to a specific secure element. 68 * Once enabled a secure element will handle card emulation mode, i.e. 69 * starting a poll from a device which has a secure element enabled means 71 * @NFC_CMD_DISABLE_SE: Disable the physical link to a specific secure element. 74 * @NFC_EVENT_SE_ADDED: Event emitted when a new secure element is discovered. 77 * @NFC_EVENT_SE_REMOVED: Event emitted when a secure element is removed from 79 * @NFC_EVENT_SE_CONNECTIVITY: This event is emitted whenever a secure element 87 * @NFC_CMD_GET_SE: Dump all discovered secure elements from an NFC controller. 88 * @NFC_CMD_SE_IO: Send/Receive APDUs to/from the selected secure element. 152 * @NFC_ATTR_SE: Available Secure Elements [all …]
|
/external/python/cpython2/Doc/library/ |
D | sha.rst | 6 :synopsis: NIST's secure hash algorithm, SHA. 16 single: Secure Hash Algorithm 19 This module implements the interface to NIST's secure hash algorithm, known as 79 …`Secure Hash Standard <http://csrc.nist.gov/publications/fips/fips180-2/fips180-2withchangenotice.… 80 The Secure Hash Algorithm is defined by NIST document FIPS PUB 180-2: `Secure 85 `Cryptographic Toolkit (Secure Hashing) <http://csrc.nist.gov/CryptoToolkit/tkhash.html>`_ 86 Links from NIST to various information on secure hashing.
|
D | hashlib.rst | 1 :mod:`hashlib` --- Secure hashes and message digests 5 :synopsis: Secure hash and message digest algorithms. 14 single: secure hash algorithm, SHA1, SHA224, SHA256, SHA384, SHA512 20 This module implements a common interface to many different secure hash and 21 message digest algorithms. Included are the FIPS secure hash algorithms SHA1, 23 algorithm (defined in Internet :rfc:`1321`). The terms secure hash and message 25 modern term is secure hash. 159 Key derivation and key stretching algorithms are designed for secure password 205 The FIPS 180-2 publication on Secure Hash Algorithms.
|
/external/python/cpython2/Lib/ |
D | _MozillaCookieJar.py | 70 domain, domain_specified, path, secure, expires, name, value = \ 72 secure = (secure == "TRUE") 94 secure, 127 if cookie.secure: secure = "TRUE" 128 else: secure = "FALSE" 146 secure, expires, name, value])+
|
/external/apache-http/src/org/apache/http/conn/ |
D | OperatedClientConnection.java | 81 * Indicates whether this connection is secure. 86 * @return <code>true</code> if this connection is secure, 140 * @param secure <code>true</code> if this connection is secure, for 142 * <code>false</code> if it is not secure 147 void openCompleted(boolean secure, HttpParams params) in openCompleted() argument 169 * @param secure <code>true</code> if this connection is now secure, 170 * <code>false</code> if it is not secure 174 boolean secure, HttpParams params) in update() argument
|
D | ManagedClientConnection.java | 71 * Indicates whether this connection is secure. 75 * @return <code>true</code> if this connection is secure, 100 * Plain sockets may be considered secure, for example if they are 138 * @param secure <code>true</code> if the tunnel should be considered 139 * secure, <code>false</code> otherwise 144 void tunnelTarget(boolean secure, HttpParams params) in tunnelTarget() argument 163 * @param secure <code>true</code> if the connection should be 164 * considered secure, <code>false</code> otherwise 169 void tunnelProxy(HttpHost next, boolean secure, HttpParams params) in tunnelProxy() argument 180 * {@link #isSecure secure}.
|
/external/python/cpython2/Lib/test/ |
D | test_cookie.py | 100 C['Customer']['secure'] = True 103 'Set-Cookie: Customer="WILE_E_COYOTE"; httponly; secure') 109 self.assertFalse(C['eggs']['secure']) 114 C.load('eggs=scrambled; httponly; secure; Path=/bacon') 116 self.assertTrue(C['eggs']['secure']) 122 C.load('eggs=scrambled; httponly=foo; secure=bar; Path=/bacon') 124 self.assertTrue(C['eggs']['secure']) 128 self.assertEqual(C['eggs']['secure'], 'bar') 139 C.load('eggs = scrambled ; secure ; path = bar ; foo=foo ') 141 'Set-Cookie: eggs=scrambled; Path=bar; secure\r\nSet-Cookie: foo=foo')
|
/external/apache-http/src/org/apache/http/cookie/ |
D | CookieOrigin.java | 53 private final boolean secure; field in CookieOrigin 55 public CookieOrigin(final String host, int port, final String path, boolean secure) { in CookieOrigin() argument 79 this.secure = secure; in CookieOrigin() 95 return this.secure; in isSecure() 102 if (this.secure) { in toString() 103 buffer.append("(secure)"); in toString()
|
D | SetCookie.java | 96 * Sets the secure attribute of the cookie. 99 * using a secure protocol (https). This should only be set when 100 * the cookie's originating server used a secure protocol to set the 103 * @param secure The value of the secure attribute 107 void setSecure (boolean secure); in setSecure() argument
|
/external/apache-commons-math/src/main/java/org/apache/commons/math/random/ |
D | RandomData.java | 31 * secure. To generate cryptographically secure strings, use 48 * The generated integer will be random, but not cryptographically secure. 49 * To generate cryptographically secure integer sequences, use 69 * cryptographically secure. 70 * To generate cryptographically secure sequences of longs, use 86 * Generates a random string of hex characters from a secure random 104 * from a secure random sequence. 107 * cryptographically secure. If cryptographic security is not required, 112 * Secure Random Sequence</a></p> 131 * cryptographically secure. If cryptographic security is not required, [all …]
|
/external/wpa_supplicant_8/src/drivers/ |
D | driver_macsec_linux.c | 616 * @sa: secure association 638 * @sa: secure association 658 * @sa: secure association 701 * macsec_drv_create_receive_sc - Create secure channel for receiving 703 * @sc: secure channel 704 * @sci_addr: secure channel identifier - address 705 * @sci_port: secure channel identifier - port 744 * macsec_drv_delete_receive_sc - Delete secure connection for receiving 746 * @sc: secure channel 780 * macsec_drv_create_receive_sa - Create secure association for receive [all …]
|
/external/apache-http/src/org/apache/http/impl/conn/ |
D | AbstractPoolEntry.java | 197 * @param secure <code>true</code> if the tunnel should be 198 * considered secure, <code>false</code> otherwise 203 public void tunnelTarget(boolean secure, HttpParams params) in tunnelTarget() argument 223 secure, params); in tunnelTarget() 224 this.tracker.tunnelTarget(secure); in tunnelTarget() 238 * @param secure <code>true</code> if the tunnel should be 239 * considered secure, <code>false</code> otherwise 244 public void tunnelProxy(HttpHost next, boolean secure, HttpParams params) in tunnelProxy() argument 263 this.connection.update(null, next, secure, params); in tunnelProxy() 264 this.tracker.tunnelProxy(next, secure); in tunnelProxy()
|
/external/libese/tools/ese_ls_provision/ |
D | README.md | 3 Runs on Android host and uploads scripts to the secure element loader service. 7 PN80T and later secure elements include a "loader service" which runs signed, encrypted scripts to 8 perform high-privilege operations like installing and deleting applets in a secure way. The result 12 them to the secure element.
|
/external/openssh/ |
D | ssh.1 | 10 .\" called by a name other than "ssh" or "Secure Shell". 74 It is intended to provide secure encrypted communications between 78 sockets can also be forwarded over the secure channel. 193 connection is forwarded over the secure channel, and the application 372 connection is forwarded over the secure channel, and a connection is 632 connection is forwarded over the secure channel, and a connection 688 as a secure transport for other applications (e.g.\& 726 over the secure channel. 1098 Forwarding of arbitrary TCP connections over the secure channel can 1100 One possible application of TCP forwarding is a secure connection to a [all …]
|
D | ssh.0 | 17 executing commands on a remote machine. It is intended to provide secure 20 can also be forwarded over the secure channel. 82 the secure channel, and the application protocol is then used to 174 socket, the connection is forwarded over the secure channel, and 348 port or Unix socket, the connection is forwarded over the secure 377 system. Subsystems facilitate the use of SSH as a secure 397 forwarded to host on port over the secure channel. Implies -N, 594 Forwarding of arbitrary TCP connections over the secure channel can be 596 possible application of TCP forwarding is a secure connection to a mail 752 value to forward X11 connections over the secure [all …]
|
/external/wpa_supplicant_8/src/common/ |
D | ieee802_1x_defs.h | 18 * Should secure sessions. 19 * This accepts key server's advice to determine whether to secure the 25 * Disabled MACsec - do not secure sessions. 30 * Should secure sessions, and try to use encryption.
|
/external/curl/docs/libcurl/opts/ |
D | CURLOPT_HTTPAUTH.3 | 51 is a more secure way to do authentication over public networks than the 55 defined in RFC2617 and is a more secure way to do authentication over public 61 in RFC 4559 and is the most secure way to perform authentication over HTTP. 88 secure. 92 it finds most secure.
|
/external/apache-http/src/org/apache/http/impl/cookie/ |
D | BasicClientCookie.java | 237 * @return <code>true</code> if this cookie should only be sent over secure connections. 245 * Sets the secure attribute of the cookie. 248 * using a secure protocol (https). This should only be set when 249 * the cookie's originating server used a secure protocol to set the 252 * @param secure The value of the secure attribute 256 public void setSecure (boolean secure) { in setSecure() argument 257 isSecure = secure; in setSecure() 374 /** My secure flag. */
|
/external/webrtc/webrtc/base/ |
D | httpcommon_unittest.cc | 26 EXPECT_FALSE(url.secure()); in TEST() 40 EXPECT_FALSE(url.secure()); in TEST() 51 EXPECT_FALSE(url.secure()); in TEST() 63 EXPECT_FALSE(url.secure()); in TEST() 105 EXPECT_TRUE(url.secure()); in TEST() 115 EXPECT_TRUE(url.secure()); in TEST()
|
/external/selinux/libselinux/man/man5/ |
D | securetty_types.5 | 3 securetty_types \- The SELinux secure tty type configuration file 8 file contains a list of types associated to secure tty type that are defined in the policy for use … 29 One or more type entries that are defined in the policy for secure tty devices.
|
/external/chromium-trace/catapult/devil/devil/android/ |
D | settings.py | 22 ('settings/secure', [ 35 ('settings/secure', [ 42 ('settings/secure', [ 48 ('settings/secure', [ 75 ('settings/secure', [ 187 http://developer.android.com/reference/android/provider/Settings.Secure.html 243 locksettings = get_lock_settings('secure') + get_lock_settings('system')
|