/external/apache-http/src/org/apache/http/conn/routing/ |
D | RouteTracker.java | 81 /** Whether the route is secure. */ 82 private boolean secure; field in RouteTracker 119 * @param secure <code>true</code> if the route is secure, 122 public final void connectTarget(boolean secure) { in connectTarget() argument 127 this.secure = secure; in connectTarget() 135 * @param secure <code>true</code> if the route is secure, 138 public final void connectProxy(HttpHost proxy, boolean secure) { in connectProxy() argument 147 this.secure = secure; in connectProxy() 154 * @param secure <code>true</code> if the route is secure, 157 public final void tunnelTarget(boolean secure) { in tunnelTarget() argument [all …]
|
D | HttpRoute.java | 76 /** Whether the route is (supposed to be) secure. */ 77 private final boolean secure; field in HttpRoute 93 * @param secure <code>true</code> if the route is (to be) secure, 102 boolean secure, in HttpRoute() argument 122 this.secure = secure; in HttpRoute() 136 * @param secure <code>true</code> if the route is (to be) secure, 142 boolean secure, TunnelType tunnelled, LayerType layered) { in HttpRoute() argument 143 this(local, target, toChain(proxies), secure, tunnelled, layered); in HttpRoute() 155 * @param secure <code>true</code> if the route is (to be) secure, 165 boolean secure, TunnelType tunnelled, LayerType layered) { in HttpRoute() argument [all …]
|
/external/chromium-trace/trace-viewer/tracing/ |
D | app.yaml | 13 secure: always 17 secure: always 21 secure: always 25 secure: always 29 secure: always 33 secure: always 38 secure: always 43 secure: always 48 secure: always 53 secure: always
|
/external/chromium-trace/trace-viewer/third_party/WebOb/webob/ |
D | cookies.py | 254 secure = cookie_property(b'secure', bool) variable in Morsel 276 if self.secure: 277 add(b'secure') 427 _c_keys.update([b'expires', b'secure', b'httponly']) 431 secure=False, httponly=False, comment=None): argument 460 if secure: 461 morsel.secure = True 618 ``secure`` 619 The 'secure' flag of the session cookie. Default: ``False``. 644 secure=False, argument [all …]
|
/external/vboot_reference/firmware/2lib/include/ |
D | 2secdata.h | 5 * Secure non-volatile storage routines 31 /* Secure data area */ 59 * Check the CRC of the secure storage context. 61 * Use this if reading from secure storage may be flaky, and you want to retry 72 * Create fresh data in the secure storage context. 74 * Use this only when initializing the secure storage context on a new machine 76 * (or any other API in this library) fails; that could allow the secure data 84 * Initialize the secure storage context and verify its CRC. 94 * Read a secure storage value. 106 * Write a secure storage value.
|
D | 2api.h | 34 /* Size of secure data used by vboot */ 125 * Secure data. Caller must fill this from some secure non-volatile 127 * function returns, caller must save the data back to the secure 236 * Sanity-check the contents of the secure storage context. 238 * Use this if reading from secure storage may be flaky, and you want to retry 249 * Create fresh data in the secure storage context. 251 * Use this only when initializing the secure storage context on a new machine 253 * (or any other API in this library) fails; that could allow the secure data
|
/external/kernel-headers/original/uapi/linux/ |
D | nfc.h | 67 * @NFC_CMD_ENABLE_SE: Enable the physical link to a specific secure element. 68 * Once enabled a secure element will handle card emulation mode, i.e. 69 * starting a poll from a device which has a secure element enabled means 71 * @NFC_CMD_DISABLE_SE: Disable the physical link to a specific secure element. 74 * @NFC_EVENT_SE_ADDED: Event emitted when a new secure element is discovered. 77 * @NFC_EVENT_SE_REMOVED: Event emitted when a secure element is removed from 79 * @NFC_EVENT_SE_CONNECTIVITY: This event is emitted whenever a secure element 87 * @NFC_CMD_GET_SE: Dump all discovered secure elements from an NFC controller. 88 * @NFC_CMD_SE_IO: Send/Receive APDUs to/from the selected secure element. 147 * @NFC_ATTR_SE: Available Secure Elements [all …]
|
/external/chromium-trace/trace-viewer/third_party/Paste/paste/auth/ |
D | auth_tkt.py | 44 # mimic hashlib (will work for md5, fail for secure hashes) 66 whether to secure the cookie and the digest algorithm (for details 97 secure=False, digest_algo=DEFAULT_DIGEST): argument 110 self.secure = secure 133 if self.secure: 134 c[self.cookie_name]['secure'] = 'true' 242 ``secure``: 243 If the cookie should be set as 'secure' (only sent over SSL) and if 281 def __init__(self, app, secret, cookie_name='auth_tkt', secure=False, argument 288 self.secure = secure [all …]
|
/external/apache-http/src/org/apache/http/conn/ |
D | OperatedClientConnection.java | 81 * Indicates whether this connection is secure. 86 * @return <code>true</code> if this connection is secure, 140 * @param secure <code>true</code> if this connection is secure, for 142 * <code>false</code> if it is not secure 147 void openCompleted(boolean secure, HttpParams params) in openCompleted() argument 169 * @param secure <code>true</code> if this connection is now secure, 170 * <code>false</code> if it is not secure 174 boolean secure, HttpParams params) in update() argument
|
D | ManagedClientConnection.java | 71 * Indicates whether this connection is secure. 75 * @return <code>true</code> if this connection is secure, 100 * Plain sockets may be considered secure, for example if they are 138 * @param secure <code>true</code> if the tunnel should be considered 139 * secure, <code>false</code> otherwise 144 void tunnelTarget(boolean secure, HttpParams params) in tunnelTarget() argument 163 * @param secure <code>true</code> if the connection should be 164 * considered secure, <code>false</code> otherwise 169 void tunnelProxy(HttpHost next, boolean secure, HttpParams params) in tunnelProxy() argument 180 * {@link #isSecure secure}.
|
/external/apache-http/src/org/apache/http/cookie/ |
D | CookieOrigin.java | 53 private final boolean secure; field in CookieOrigin 55 public CookieOrigin(final String host, int port, final String path, boolean secure) { in CookieOrigin() argument 79 this.secure = secure; in CookieOrigin() 95 return this.secure; in isSecure() 102 if (this.secure) { in toString() 103 buffer.append("(secure)"); in toString()
|
D | SetCookie.java | 96 * Sets the secure attribute of the cookie. 99 * using a secure protocol (https). This should only be set when 100 * the cookie's originating server used a secure protocol to set the 103 * @param secure The value of the secure attribute 107 void setSecure (boolean secure); in setSecure() argument
|
/external/apache-commons-math/src/main/java/org/apache/commons/math/random/ |
D | RandomData.java | 31 * secure. To generate cryptographically secure strings, use 48 * The generated integer will be random, but not cryptographically secure. 49 * To generate cryptographically secure integer sequences, use 69 * cryptographically secure. 70 * To generate cryptographically secure sequences of longs, use 86 * Generates a random string of hex characters from a secure random 104 * from a secure random sequence. 107 * cryptographically secure. If cryptographic security is not required, 112 * Secure Random Sequence</a></p> 131 * cryptographically secure. If cryptographic security is not required, [all …]
|
D | RandomDataImpl.java | 50 * instance to generate non-secure data and a {@link java.security.SecureRandom} 74 * The "secure" methods are *much* slower. These should be used only when a 75 * cryptographically secure random sequence is required. A secure random 84 * explicitly seed the default non-secure generator, it is seeded with the 85 * current time in milliseconds on first use. The same holds for the secure 93 * fully resets the initial state of the non-secure random number generator (so 96 * reinitialize the secure random number generator (so secure sequences started 113 /** underlying secure random number generator */ 124 * the source of (non-secure) random data. 127 * the source of (non-secure) random data [all …]
|
/external/apache-http/src/org/apache/http/impl/conn/ |
D | AbstractPoolEntry.java | 197 * @param secure <code>true</code> if the tunnel should be 198 * considered secure, <code>false</code> otherwise 203 public void tunnelTarget(boolean secure, HttpParams params) in tunnelTarget() argument 223 secure, params); in tunnelTarget() 224 this.tracker.tunnelTarget(secure); in tunnelTarget() 238 * @param secure <code>true</code> if the tunnel should be 239 * considered secure, <code>false</code> otherwise 244 public void tunnelProxy(HttpHost next, boolean secure, HttpParams params) in tunnelProxy() argument 263 this.connection.update(null, next, secure, params); in tunnelProxy() 264 this.tracker.tunnelProxy(next, secure); in tunnelProxy()
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/provider/crypto/ |
D | SHA1ImplTest.java | 35 * The input data and results of computing are defined in Secure Hash Standard, 68 // values defined in examples in Secure Hash Standard in testOneBlockMessage() 75 words[0] = 0x61626380; // constants from Secure Hash Standard in testOneBlockMessage() 104 // values defined in examples in Secure Hash Standard in testMultiBlockMessage() 107 // string defined in examples in Secure Hash Standard in testMultiBlockMessage() 128 // values defined in examples in Secure Hash Standard in testLongMessage() 162 * implements alternative algorithm described in the SECURE HASH STANDARD 166 // constants defined in Secure Hash Standard in alternateHash() 207 // computation defined in Secure Hash Standard in alternateHash()
|
/external/openssh/ |
D | ssh.1 | 10 .\" called by a name other than "ssh" or "Secure Shell". 74 and provide secure encrypted communications between 78 sockets can also be forwarded over the secure channel. 183 connection is forwarded over the secure channel, and the application 312 connection is forwarded over the secure channel, and a connection is 531 connection is forwarded over the secure channel, and a connection is 583 of SSH as a secure transport for other applications (eg.\& 616 over the secure channel. 974 Forwarding of arbitrary TCP connections over the secure channel can 976 One possible application of TCP forwarding is a secure connection to a [all …]
|
D | ssh.0 | 19 and rsh, and provide secure encrypted communications between two 21 ports and UNIX-domain sockets can also be forwarded over the secure 85 the secure channel, and the application protocol is then used to 164 the secure channel, and a connection is made to host port 324 connection is forwarded over the secure channel, and a connection 353 facilitate the use of SSH as a secure transport for other 373 forwarded to host on port over the secure channel. Implies -N, 573 Forwarding of arbitrary TCP connections over the secure channel can be 575 possible application of TCP forwarding is a secure connection to a mail 727 value to forward X11 connections over the secure [all …]
|
/external/apache-http/src/org/apache/http/impl/cookie/ |
D | BasicClientCookie.java | 237 * @return <code>true</code> if this cookie should only be sent over secure connections. 245 * Sets the secure attribute of the cookie. 248 * using a secure protocol (https). This should only be set when 249 * the cookie's originating server used a secure protocol to set the 252 * @param secure The value of the secure attribute 256 public void setSecure (boolean secure) { in setSecure() argument 257 isSecure = secure; in setSecure() 374 /** My secure flag. */
|
/external/selinux/libselinux/man/man5/ |
D | securetty_types.5 | 3 securetty_types \- The SELinux secure tty type configuration file 8 file contains a list of types associated to secure tty type that are defined in the policy for use … 29 One or more type entries that are defined in the policy for secure tty devices.
|
/external/robolectric/src/test/java/com/xtremelabs/robolectric/shadows/ |
D | SettingsTest.java | 60 assertThat(Settings.Secure.getInt(contentResolver, "property", 0), equalTo(0)); in testSecureGetInt() 61 assertThat(Settings.Secure.getInt(contentResolver, "property", 2), equalTo(2)); in testSecureGetInt() 63 Settings.Secure.putInt(contentResolver, "property", 1); in testSecureGetInt() 64 assertThat(Settings.Secure.getInt(contentResolver, "property", 0), equalTo(1)); in testSecureGetInt()
|
/external/wpa_supplicant_8/src/common/ |
D | ieee802_1x_defs.h | 18 * Should secure sessions. 19 * This accepts key server's advice to determine whether to secure the 25 * Disabled MACsec - do not secure sessions.
|
/external/jetty/src/java/org/eclipse/jetty/http/ |
D | HttpCookie.java | 80 …tring name, String value, String domain, String path, int maxAge, boolean httpOnly, boolean secure) in HttpCookie() argument 89 _secure = secure; in HttpCookie() 95 …value, String domain, String path, int maxAge, boolean httpOnly, boolean secure, String comment, i… in HttpCookie() argument 104 _secure = secure; in HttpCookie() 164 /** Get the secure. 165 * @return the secure
|
/external/openssh/contrib/suse/ |
D | openssh.spec | 14 Summary: OpenSSH, a free Secure Shell (SSH) protocol implementation 51 Ssh (Secure Shell) is a program for logging into a remote machine and for 53 rlogin and rsh, and provide secure encrypted communications between 55 arbitrary TCP/IP ports can also be forwarded over the secure channel. 65 Ssh (Secure Shell) is a program for logging into a remote machine and for 67 rlogin and rsh, and provide secure encrypted communications between 69 arbitrary TCP/IP ports can also be forwarded over the secure channel.
|
/external/google-tv-pairing-protocol/java/src/com/google/polo/json/ |
D | Cookie.java | 71 * name=value (except the secure property, which does not have a value). 93 if (n.equals("secure")) { in toJSONObject() 111 * If the JSONObject contains "expires", "domain", "path", or "secure" 136 if (o.optBoolean("secure")) { in toString() 137 sb.append(";secure"); in toString()
|