Searched
full:protocols (Results
651 -
675 of
1555) sorted by null
<<21222324252627282930>>
/prebuilts/go/darwin-x86/src/crypto/rsa/ |
pkcs1v15.go | 30 // is dangerous. Use RSA OAEP in new protocols. 87 // See ``Chosen Ciphertext Attacks Against Protocols Based on the RSA
|
/prebuilts/go/linux-x86/src/crypto/rsa/ |
pkcs1v15.go | 30 // is dangerous. Use RSA OAEP in new protocols. 87 // See ``Chosen Ciphertext Attacks Against Protocols Based on the RSA
|
/toolchain/binutils/binutils-2.25/bfd/ |
elfxx-target.h | 840 Chapter 7 (Formats & Protocols), Archive section sets this as 15. */ 938 Chapter 7 (Formats & Protocols), Archive section sets this as 15. */
|
/bionic/libc/include/ |
netdb.h | 73 #define _PATH_PROTOCOLS "/system/etc/protocols"
|
/cts/apps/CtsVerifier/src/com/android/cts/verifier/streamquality/ |
StreamingVideoActivity.java | 46 * different protocols for a short amount of time, after which users can mark Pass/Fail depending
|
/external/apache-http/src/org/apache/http/impl/ |
EnglishReasonPhraseCatalog.java | 199 "Switching Protocols");
|
/external/autotest/server/cros/ap_configurators/ |
ap_spec.py | 15 # List of valid 802.11 protocols (modes).
|
/external/avahi/avahi-client/ |
publish.h | 89 AvahiProtocol protocol /**< The protocol this service shall be announced with, i.e. MDNS over IPV4 or MDNS over IPV6. We recommend to pass AVAHI_PROTO_UNSPEC here, to announce this service on all protocols the daemon supports. */,
|
/external/avahi/avahi-core/ |
lookup.h | 69 AvahiProtocol protocol, /**< Protocol number to use when looking for the record, or AVAHI_PROTO_UNSPEC to look on all protocols */
|
publish.h | 81 AvahiProtocol protocol, /**< A protocol family to attach this record to. One of the AVAHI_PROTO_xxx constants. Use AVAHI_PROTO_UNSPEC to make this record available on all protocols (wich means on both IPv4 and IPv6). */
|
/external/chromium-trace/catapult/third_party/Paste/paste/util/ |
mimeparse.py | 7 http://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html#sec14.1
|
/external/clang/test/SemaObjC/ |
instancetype.m | 55 // instancetype on class methods using protocols
|
/external/clang/test/SemaObjCXX/ |
instancetype.mm | 55 // instancetype on class methods using protocols
|
/external/conscrypt/src/main/java/org/conscrypt/ |
PSKKeyManager.java | 47 * are specific to application-level protocols.</p>
|
/external/iproute2/include/linux/ |
in.h | 26 /* Standard well-defined IP protocols. */
|
/external/iproute2/man/man8/ |
tc-sfb.8 | 74 if possible, and also supports tunneling protocols.
|
tc-sfq.8 | 66 Packets with other protocols are hashed based on the 32bits representation of their
|
tc-stab.8 | 127 In rare cases, FCS might be preserved on protocols that include Ethernet frames
|
/external/jetty/src/java/org/eclipse/jetty/client/ |
AsyncHttpConnection.java | 210 // handle switched protocols
|
BlockingHttpConnection.java | 258 // handle switched protocols
|
/external/kernel-headers/original/uapi/linux/ |
in.h | 26 /* Standard well-defined IP protocols. */
|
/external/libchrome/sandbox/linux/seccomp-bpf-helpers/ |
syscall_parameters_restrictions.cc | 216 // few protocols actually support socketpair(2). The scary call that we're
|
/external/libnfc-nci/src/nfa/ce/ |
nfa_ce_api.c | 132 /* If any protocols are specified, then NDEF buffer pointer must be non-NULL */
|
/external/libnfc-nxp/inc/ |
phNfcTypes.h | 288 * The <em> Supported Protocols Structure </em> holds all protocol supported by the current NFC 320 * protocols supported in Reader and emulation mode 340 phNfc_sSupProtocol_t ReaderSupProtocol; /**< Supported protocols 342 phNfc_sSupProtocol_t EmulationSupProtocol; /**< Supported protocols [all...] |
/external/owasp/sanitizer/src/tests/org/owasp/html/ |
HtmlPolicyBuilderTest.java | 126 // We haven't allowed any protocols so only relative URLs are OK.
|
Completed in 1212 milliseconds
<<21222324252627282930>>