/aosp_15_r20/external/scapy/scapy/contrib/ |
H A D | bgp.py | 54 # By default, set to True in order to behave like an OLD speaker (RFC 6793) 65 # RFC 4271: "The maximum message size is 4096 octets. All implementations are 69 # RFC 4271: "Each message has a fixed-size header." Marker (16 bytes) + 73 # Marker included in every message (RFC 4271: "This 16-octet field is 77 # extended-length flag (RFC 4271 4.3. UPDATE Message Format - 81 # RFC 5492 (at least 2 bytes : code + length) 84 # RFC 5492 (at least 3 bytes : type code + length) 318 25: "AFI for L2VPN information", # RFC 6074 319 26: "MPLS-TP Section Endpoint Identifier", # RFC 7212 320 27: "MPLS-TP LSP Endpoint Identifier", # RFC 7212 [all …]
|
/aosp_15_r20/external/cronet/net/data/fuzzer_dictionaries/ |
H A D | net_get_domain_and_registry_fuzzer.dict | 71 # using net_get_domain_and_registry_fuzzer binary, RFC 1034 and RFC 1035. 79 "[RFC-799]" 105 "[RFC-1035]." 109 "RFC-1031," 120 "[RFC-1031]." 122 "[RFC-742]" 127 "RFC-793," 139 "[RFC-821]" 149 "[RFC-1032]." 156 "[RFC-973]" [all …]
|
H A D | net_dns_hosts_parse_fuzzer.dict | 83 # using net_dns_hosts_parse_fuzzer binary, RFC 1034 and RFC 1035. 91 "[RFC-799]" 117 "[RFC-1035]." 121 "RFC-1031," 132 "[RFC-1031]." 134 "[RFC-742]" 139 "RFC-793," 151 "[RFC-821]" 161 "[RFC-1032]." 168 "[RFC-973]" [all …]
|
H A D | net_dns_record_fuzzer.dict | 137 # using net_dns_record_fuzzer binary, RFC 1034 and RFC 1035. 145 "[RFC-799]" 171 "[RFC-1035]." 175 "RFC-1031," 186 "[RFC-1031]." 188 "[RFC-742]" 193 "RFC-793," 205 "[RFC-821]" 215 "[RFC-1032]." 222 "[RFC-973]" [all …]
|
H A D | net_host_resolver_manager_fuzzer.dict | 103 # using net_host_resolver_impl_fuzzer binary, RFC 1034 and RFC 1035. 116 "[RFC-799]" 169 "RFC-1031," 187 "[RFC-742]" 198 "[RFC-" 201 "RFC-793," 210 "[RFC-952," 219 "RFC-822." 252 "[RFC-1032]." 300 "[RFC-953]" [all …]
|
/aosp_15_r20/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_common.h | 37 TLS_HANDSHAKE_TYPE_NEW_SESSION_TICKET = 4 /* RFC 4507 */, 45 TLS_HANDSHAKE_TYPE_CERTIFICATE_URL = 21 /* RFC 4366 */, 46 TLS_HANDSHAKE_TYPE_CERTIFICATE_STATUS = 22 /* RFC 4366 */ 50 #define TLS_NULL_WITH_NULL_NULL 0x0000 /* RFC 2246 */ 51 #define TLS_RSA_WITH_NULL_MD5 0x0001 /* RFC 2246 */ 52 #define TLS_RSA_WITH_NULL_SHA 0x0002 /* RFC 2246 */ 53 #define TLS_RSA_EXPORT_WITH_RC4_40_MD5 0x0003 /* RFC 2246 */ 54 #define TLS_RSA_WITH_RC4_128_MD5 0x0004 /* RFC 2246 */ 55 #define TLS_RSA_WITH_RC4_128_SHA 0x0005 /* RFC 2246 */ 56 #define TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 0x0006 /* RFC 2246 */ [all …]
|
/aosp_15_r20/prebuilts/go/linux-x86/src/net/http/ |
D | status.go | 10 StatusContinue = 100 // RFC 9110, 15.2.1 11 StatusSwitchingProtocols = 101 // RFC 9110, 15.2.2 12 StatusProcessing = 102 // RFC 2518, 10.1 13 StatusEarlyHints = 103 // RFC 8297 15 StatusOK = 200 // RFC 9110, 15.3.1 16 StatusCreated = 201 // RFC 9110, 15.3.2 17 StatusAccepted = 202 // RFC 9110, 15.3.3 18 StatusNonAuthoritativeInfo = 203 // RFC 9110, 15.3.4 19 StatusNoContent = 204 // RFC 9110, 15.3.5 20 StatusResetContent = 205 // RFC 9110, 15.3.6 [all …]
|
/aosp_15_r20/external/python/cpython3/Doc/library/ |
D | http.rst | 62 ``100`` ``CONTINUE`` HTTP/1.1 :rfc:`7231`, Section 6.2.1 63 ``101`` ``SWITCHING_PROTOCOLS`` HTTP/1.1 :rfc:`7231`, Section 6.2.2 64 ``102`` ``PROCESSING`` WebDAV :rfc:`2518`, Section 10.1 65 ``103`` ``EARLY_HINTS`` An HTTP Status Code for Indicating Hints :rfc:`8297` 66 ``200`` ``OK`` HTTP/1.1 :rfc:`7231`, Section 6.3.1 67 ``201`` ``CREATED`` HTTP/1.1 :rfc:`7231`, Section 6.3.2 68 ``202`` ``ACCEPTED`` HTTP/1.1 :rfc:`7231`, Section 6.3.3 69 ``203`` ``NON_AUTHORITATIVE_INFORMATION`` HTTP/1.1 :rfc:`7231`, Section 6.3.4 70 ``204`` ``NO_CONTENT`` HTTP/1.1 :rfc:`7231`, Section 6.3.5 71 ``205`` ``RESET_CONTENT`` HTTP/1.1 :rfc:`7231`, Section 6.3.6 [all …]
|
/aosp_15_r20/packages/modules/Bluetooth/system/stack/rfcomm/ |
D | rfc_port_fsm.cc | 80 if (p_port->rfc.state != RFC_STATE_OPENED) { in rfc_port_sm_execute() 82 rfcomm_port_state_text(p_port->rfc.state), rfcomm_port_event_text(event)); in rfc_port_sm_execute() 84 switch (p_port->rfc.state) { in rfc_port_sm_execute() 125 p_port->rfc.state = RFC_STATE_ORIG_WAIT_SEC_CHECK; in rfc_port_sm_state_closed() 126 btm_sec_mx_access_request(p_port->rfc.p_mcb->bd_addr, true, p_port->sec_mask, in rfc_port_sm_state_closed() 143 rfc_timer_stop(p_port->rfc.p_mcb); in rfc_port_sm_state_closed() 146 p_port->rfc.state = RFC_STATE_TERM_WAIT_SEC_CHECK; in rfc_port_sm_state_closed() 147 btm_sec_mx_access_request(p_port->rfc.p_mcb->bd_addr, false, p_port->sec_mask, in rfc_port_sm_state_closed() 161 rfc_send_dm(p_port->rfc.p_mcb, p_port->dlci, false); in rfc_port_sm_state_closed() 165 rfc_send_dm(p_port->rfc.p_mcb, p_port->dlci, false); in rfc_port_sm_state_closed() [all …]
|
/aosp_15_r20/external/apache-http/src/org/apache/http/ |
H A D | HttpStatus.java | 55 /** <tt>100 Continue</tt> (HTTP/1.1 - RFC 2616) */ 57 /** <tt>101 Switching Protocols</tt> (HTTP/1.1 - RFC 2616)*/ 59 /** <tt>102 Processing</tt> (WebDAV - RFC 2518) */ 64 /** <tt>200 OK</tt> (HTTP/1.0 - RFC 1945) */ 66 /** <tt>201 Created</tt> (HTTP/1.0 - RFC 1945) */ 68 /** <tt>202 Accepted</tt> (HTTP/1.0 - RFC 1945) */ 70 /** <tt>203 Non Authoritative Information</tt> (HTTP/1.1 - RFC 2616) */ 72 /** <tt>204 No Content</tt> (HTTP/1.0 - RFC 1945) */ 74 /** <tt>205 Reset Content</tt> (HTTP/1.1 - RFC 2616) */ 76 /** <tt>206 Partial Content</tt> (HTTP/1.1 - RFC 2616) */ [all …]
|
/aosp_15_r20/external/mbedtls/tests/suites/ |
H A D | test_suite_ecdsa.data | 41 ECDSA primitive rfc 4754 p256 45 ECDSA primitive rfc 4754 p384 49 ECDSA primitive rfc 4754 p521 93 ECDSA deterministic test vector rfc 6979 p192 sha1 [#1] 97 ECDSA deterministic test vector rfc 6979 p192 sha224 [#1] 101 ECDSA deterministic test vector rfc 6979 p192 sha256 [#1] 105 ECDSA deterministic test vector rfc 6979 p192 sha384 [#1] 109 ECDSA deterministic test vector rfc 6979 p192 sha512 [#1] 113 ECDSA deterministic test vector rfc 6979 p192 sha1 [#2] 117 ECDSA deterministic test vector rfc 6979 p192 sha224 [#2] [all …]
|
/aosp_15_r20/external/openthread/third_party/mbedtls/repo/tests/suites/ |
H A D | test_suite_ecdsa.data | 41 ECDSA primitive rfc 4754 p256 45 ECDSA primitive rfc 4754 p384 49 ECDSA primitive rfc 4754 p521 93 ECDSA deterministic test vector rfc 6979 p192 sha1 [#1] 97 ECDSA deterministic test vector rfc 6979 p192 sha224 [#1] 101 ECDSA deterministic test vector rfc 6979 p192 sha256 [#1] 105 ECDSA deterministic test vector rfc 6979 p192 sha384 [#1] 109 ECDSA deterministic test vector rfc 6979 p192 sha512 [#1] 113 ECDSA deterministic test vector rfc 6979 p192 sha1 [#2] 117 ECDSA deterministic test vector rfc 6979 p192 sha224 [#2] [all …]
|
/aosp_15_r20/external/tcpdump/ |
H A D | print-domain.c | 221 * No RFC explicitly says that, but BIND's in fqdn_print() 481 { T_A, "A" }, /* RFC 1035 */ 482 { T_NS, "NS" }, /* RFC 1035 */ 483 { T_MD, "MD" }, /* RFC 1035 */ 484 { T_MF, "MF" }, /* RFC 1035 */ 485 { T_CNAME, "CNAME" }, /* RFC 1035 */ 486 { T_SOA, "SOA" }, /* RFC 1035 */ 487 { T_MB, "MB" }, /* RFC 1035 */ 488 { T_MG, "MG" }, /* RFC 1035 */ 489 { T_MR, "MR" }, /* RFC 1035 */ [all …]
|
/aosp_15_r20/external/scapy/scapy/layers/tls/ |
H A D | extensions.py | 21 _tls_ext = { 0: "server_name", # RFC 4366 22 1: "max_fragment_length", # RFC 4366 23 2: "client_certificate_url", # RFC 4366 24 3: "trusted_ca_keys", # RFC 4366 25 4: "truncated_hmac", # RFC 4366 26 5: "status_request", # RFC 4366 27 6: "user_mapping", # RFC 4681 28 7: "client_authz", # RFC 5878 29 8: "server_authz", # RFC 5878 30 9: "cert_type", # RFC 6091 [all …]
|
/aosp_15_r20/external/rust/android-crates-io/crates/etherparse/src/transport/icmpv4/ |
D | mod.rs | 19 /// ICMPv4 type value indicating a "Echo Reply" message (defined in [RFC 792](https://tools.ietf.or… 22 /// ICMPv4 type value indicating a "Destination Unreachable" message (defined in [RFC 792](https://… 25 …uench (Deprecated)" message (defined in in [RFC 792](https://tools.ietf.org/html/rfc792), deprecat… 28 /// ICMPv4 type value indicating a "Redirect" message (defined in [RFC 792](https://tools.ietf.org/… 31 …indicating a "Alternate Host Address (Deprecated)" message (deprecated in [RFC 6918](https://tools… 34 /// ICMPv4 type value indicating a "Echo Request" message (defined in [RFC 792](https://tools.ietf.… 37 /// ICMPv4 type value indicating a "Router Advertisement" message (defined in [RFC 1256](https://to… 40 /// ICMPv4 type value indicating a "Router Solicitation" message (defined in [RFC 1256](https://too… 43 /// ICMPv4 type value indicating a "Time Exceeded" message (defined in [RFC 792](https://tools.ietf… 46 /// ICMPv4 type value indicating a "Parameter Problem" message (defined in [RFC 792](https://tools.… [all …]
|
/aosp_15_r20/external/scapy/scapy/layers/ |
H A D | radius.py | 224 Implements a RADIUS attribute (RFC 2865). Every specific RADIUS attribute 322 """RFC 2865""" 327 """RFC 2865""" 332 """RFC 2865""" 337 """RFC 2865""" 342 """RFC 2865""" 347 """RFC 2865""" 352 """RFC 2865""" 357 """RFC 2866""" 362 """RFC 2866""" [all …]
|
/aosp_15_r20/external/libogg/doc/ |
H A D | rfc5334.txt | 28 these types. This document obsoletes RFC 3534. 33 2. Changes Since RFC 3534 . . . . . . . . . . . . . . . . . . 2 60 RFC 5334 Ogg Media Types September 2008 94 2. Changes Since RFC 3534 116 RFC 5334 Ogg Media Types September 2008 172 RFC 5334 Ogg Media Types September 2008 228 RFC 5334 Ogg Media Types September 2008 284 RFC 5334 Ogg Media Types September 2008 340 RFC 5334 Ogg Media Types September 2008 375 Optional parameters: codecs, whose syntax is defined in RFC 4281. [all …]
|
/aosp_15_r20/external/python/pyasn1-modules/ |
D | CHANGES.txt | 12 - Updated the handling of maps for use with openType for RFC 3279 46 - Added maps for use with openType to RFC 3565 68 RFC 2634, RFC 3274, RFC 3779, RFC 4073, RFC 4108, RFC 5035, RFC 5083, 69 RFC 5084, RFC 5480, RFC 5940, RFC 5958, RFC 6019, and RFC 8520 71 RFC 5958 to use the rfc5652.cmsAttributesMap 120 - Added openType support to RFC 2986 by importing definitions from 121 the RFC 5280 module so that the same maps are used. 122 - Added maps for use with openType to RFC 2634, RFC 3274, RFC 3709, 123 RFC 3779, RFC 4055, RFC 4073, RFC 4108, RFC 5035, RFC 5083, RFC 5480, 124 RFC 5940, RFC 5958, RFC 6010, RFC 6019, RFC 6402, RFC 7191, RFC 8226, [all …]
|
/aosp_15_r20/external/rust/android-crates-io/crates/quiche/deps/boringssl/src/include/openssl/ |
D | tls1.h | 132 * support (see RFC 4279) to OpenSSL. 184 // ExtensionType values from RFC 6066 188 // ExtensionType values from RFC 4492 191 // ExtensionType values from RFC 5246 194 // ExtensionType value from RFC 5764 197 // ExtensionType value from RFC 7301 200 // ExtensionType value from RFC 7685 203 // ExtensionType value from RFC 7627 213 // ExtensionType value from RFC 9000 222 // ExtensionType value from RFC 8879 [all …]
|
/aosp_15_r20/prebuilts/vndk/v33/arm64/include/external/boringssl/src/include/openssl/ |
D | tls1.h | 132 * support (see RFC 4279) to OpenSSL. 184 // ExtensionType values from RFC 6066 188 // ExtensionType values from RFC 4492 191 // ExtensionType values from RFC 5246 194 // ExtensionType value from RFC 5764 197 // ExtensionType value from RFC 7301 200 // ExtensionType value from RFC 7685 203 // ExtensionType value from RFC 7627 213 // ExtensionType value from RFC 9000 222 // ExtensionType value from RFC 8879 [all …]
|
/aosp_15_r20/external/rust/crates/quiche/deps/boringssl/src/include/openssl/ |
D | tls1.h | 132 * support (see RFC 4279) to OpenSSL. 184 // ExtensionType values from RFC 6066 188 // ExtensionType values from RFC 4492 191 // ExtensionType values from RFC 5246 194 // ExtensionType value from RFC 5764 197 // ExtensionType value from RFC 7301 200 // ExtensionType value from RFC 7685 203 // ExtensionType value from RFC 7627 213 // ExtensionType value from RFC 9000 222 // ExtensionType value from RFC 8879 [all …]
|
/aosp_15_r20/prebuilts/vndk/v33/x86_64/include/external/boringssl/src/include/openssl/ |
D | tls1.h | 132 * support (see RFC 4279) to OpenSSL. 184 // ExtensionType values from RFC 6066 188 // ExtensionType values from RFC 4492 191 // ExtensionType values from RFC 5246 194 // ExtensionType value from RFC 5764 197 // ExtensionType value from RFC 7301 200 // ExtensionType value from RFC 7685 203 // ExtensionType value from RFC 7627 213 // ExtensionType value from RFC 9000 222 // ExtensionType value from RFC 8879 [all …]
|
/aosp_15_r20/prebuilts/vndk/v33/x86/include/external/boringssl/src/include/openssl/ |
D | tls1.h | 132 * support (see RFC 4279) to OpenSSL. 184 // ExtensionType values from RFC 6066 188 // ExtensionType values from RFC 4492 191 // ExtensionType values from RFC 5246 194 // ExtensionType value from RFC 5764 197 // ExtensionType value from RFC 7301 200 // ExtensionType value from RFC 7685 203 // ExtensionType value from RFC 7627 213 // ExtensionType value from RFC 9000 222 // ExtensionType value from RFC 8879 [all …]
|
/aosp_15_r20/prebuilts/vndk/v33/arm/include/external/boringssl/src/include/openssl/ |
D | tls1.h | 132 * support (see RFC 4279) to OpenSSL. 184 // ExtensionType values from RFC 6066 188 // ExtensionType values from RFC 4492 191 // ExtensionType values from RFC 5246 194 // ExtensionType value from RFC 5764 197 // ExtensionType value from RFC 7301 200 // ExtensionType value from RFC 7685 203 // ExtensionType value from RFC 7627 213 // ExtensionType value from RFC 9000 222 // ExtensionType value from RFC 8879 [all …]
|
/aosp_15_r20/external/cronet/third_party/boringssl/src/pki/ |
H A D | parse_certificate.h | 30 // Returns true if the given serial number (CertificateSerialNumber in RFC 5280) 45 // For reference, here is what RFC 5280 section 4.1.2.2 says: 63 // Consumes a "Time" value (as defined by RFC 5280) from |parser|. On success 67 // From RFC 5280: 75 // Parses a DER-encoded "Validity" as specified by RFC 5280. Returns true on 95 // Parses a DER-encoded "Certificate" as specified by RFC 5280. Returns true on 112 // from RFC 5280: 120 // "signatureAlgorithm" from RFC 5280: 128 // RFC 5280: 137 // Parses a DER-encoded "TBSCertificate" as specified by RFC 5280. Returns true [all …]
|