Home
last modified time | relevance | path

Searched full:rfc (Results 1 – 25 of 8900) sorted by relevance

12345678910>>...356

/aosp_15_r20/external/scapy/scapy/contrib/
H A Dbgp.py54 # By default, set to True in order to behave like an OLD speaker (RFC 6793)
65 # RFC 4271: "The maximum message size is 4096 octets. All implementations are
69 # RFC 4271: "Each message has a fixed-size header." Marker (16 bytes) +
73 # Marker included in every message (RFC 4271: "This 16-octet field is
77 # extended-length flag (RFC 4271 4.3. UPDATE Message Format -
81 # RFC 5492 (at least 2 bytes : code + length)
84 # RFC 5492 (at least 3 bytes : type code + length)
318 25: "AFI for L2VPN information", # RFC 6074
319 26: "MPLS-TP Section Endpoint Identifier", # RFC 7212
320 27: "MPLS-TP LSP Endpoint Identifier", # RFC 7212
[all …]
/aosp_15_r20/external/cronet/net/data/fuzzer_dictionaries/
H A Dnet_get_domain_and_registry_fuzzer.dict71 # using net_get_domain_and_registry_fuzzer binary, RFC 1034 and RFC 1035.
79 "[RFC-799]"
105 "[RFC-1035]."
109 "RFC-1031,"
120 "[RFC-1031]."
122 "[RFC-742]"
127 "RFC-793,"
139 "[RFC-821]"
149 "[RFC-1032]."
156 "[RFC-973]"
[all …]
H A Dnet_dns_hosts_parse_fuzzer.dict83 # using net_dns_hosts_parse_fuzzer binary, RFC 1034 and RFC 1035.
91 "[RFC-799]"
117 "[RFC-1035]."
121 "RFC-1031,"
132 "[RFC-1031]."
134 "[RFC-742]"
139 "RFC-793,"
151 "[RFC-821]"
161 "[RFC-1032]."
168 "[RFC-973]"
[all …]
H A Dnet_dns_record_fuzzer.dict137 # using net_dns_record_fuzzer binary, RFC 1034 and RFC 1035.
145 "[RFC-799]"
171 "[RFC-1035]."
175 "RFC-1031,"
186 "[RFC-1031]."
188 "[RFC-742]"
193 "RFC-793,"
205 "[RFC-821]"
215 "[RFC-1032]."
222 "[RFC-973]"
[all …]
H A Dnet_host_resolver_manager_fuzzer.dict103 # using net_host_resolver_impl_fuzzer binary, RFC 1034 and RFC 1035.
116 "[RFC-799]"
169 "RFC-1031,"
187 "[RFC-742]"
198 "[RFC-"
201 "RFC-793,"
210 "[RFC-952,"
219 "RFC-822."
252 "[RFC-1032]."
300 "[RFC-953]"
[all …]
/aosp_15_r20/external/wpa_supplicant_8/src/tls/
H A Dtlsv1_common.h37 TLS_HANDSHAKE_TYPE_NEW_SESSION_TICKET = 4 /* RFC 4507 */,
45 TLS_HANDSHAKE_TYPE_CERTIFICATE_URL = 21 /* RFC 4366 */,
46 TLS_HANDSHAKE_TYPE_CERTIFICATE_STATUS = 22 /* RFC 4366 */
50 #define TLS_NULL_WITH_NULL_NULL 0x0000 /* RFC 2246 */
51 #define TLS_RSA_WITH_NULL_MD5 0x0001 /* RFC 2246 */
52 #define TLS_RSA_WITH_NULL_SHA 0x0002 /* RFC 2246 */
53 #define TLS_RSA_EXPORT_WITH_RC4_40_MD5 0x0003 /* RFC 2246 */
54 #define TLS_RSA_WITH_RC4_128_MD5 0x0004 /* RFC 2246 */
55 #define TLS_RSA_WITH_RC4_128_SHA 0x0005 /* RFC 2246 */
56 #define TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 0x0006 /* RFC 2246 */
[all …]
/aosp_15_r20/prebuilts/go/linux-x86/src/net/http/
Dstatus.go10 StatusContinue = 100 // RFC 9110, 15.2.1
11 StatusSwitchingProtocols = 101 // RFC 9110, 15.2.2
12 StatusProcessing = 102 // RFC 2518, 10.1
13 StatusEarlyHints = 103 // RFC 8297
15 StatusOK = 200 // RFC 9110, 15.3.1
16 StatusCreated = 201 // RFC 9110, 15.3.2
17 StatusAccepted = 202 // RFC 9110, 15.3.3
18 StatusNonAuthoritativeInfo = 203 // RFC 9110, 15.3.4
19 StatusNoContent = 204 // RFC 9110, 15.3.5
20 StatusResetContent = 205 // RFC 9110, 15.3.6
[all …]
/aosp_15_r20/external/python/cpython3/Doc/library/
Dhttp.rst62 ``100`` ``CONTINUE`` HTTP/1.1 :rfc:`7231`, Section 6.2.1
63 ``101`` ``SWITCHING_PROTOCOLS`` HTTP/1.1 :rfc:`7231`, Section 6.2.2
64 ``102`` ``PROCESSING`` WebDAV :rfc:`2518`, Section 10.1
65 ``103`` ``EARLY_HINTS`` An HTTP Status Code for Indicating Hints :rfc:`8297`
66 ``200`` ``OK`` HTTP/1.1 :rfc:`7231`, Section 6.3.1
67 ``201`` ``CREATED`` HTTP/1.1 :rfc:`7231`, Section 6.3.2
68 ``202`` ``ACCEPTED`` HTTP/1.1 :rfc:`7231`, Section 6.3.3
69 ``203`` ``NON_AUTHORITATIVE_INFORMATION`` HTTP/1.1 :rfc:`7231`, Section 6.3.4
70 ``204`` ``NO_CONTENT`` HTTP/1.1 :rfc:`7231`, Section 6.3.5
71 ``205`` ``RESET_CONTENT`` HTTP/1.1 :rfc:`7231`, Section 6.3.6
[all …]
/aosp_15_r20/packages/modules/Bluetooth/system/stack/rfcomm/
Drfc_port_fsm.cc80 if (p_port->rfc.state != RFC_STATE_OPENED) { in rfc_port_sm_execute()
82 rfcomm_port_state_text(p_port->rfc.state), rfcomm_port_event_text(event)); in rfc_port_sm_execute()
84 switch (p_port->rfc.state) { in rfc_port_sm_execute()
125 p_port->rfc.state = RFC_STATE_ORIG_WAIT_SEC_CHECK; in rfc_port_sm_state_closed()
126 btm_sec_mx_access_request(p_port->rfc.p_mcb->bd_addr, true, p_port->sec_mask, in rfc_port_sm_state_closed()
143 rfc_timer_stop(p_port->rfc.p_mcb); in rfc_port_sm_state_closed()
146 p_port->rfc.state = RFC_STATE_TERM_WAIT_SEC_CHECK; in rfc_port_sm_state_closed()
147 btm_sec_mx_access_request(p_port->rfc.p_mcb->bd_addr, false, p_port->sec_mask, in rfc_port_sm_state_closed()
161 rfc_send_dm(p_port->rfc.p_mcb, p_port->dlci, false); in rfc_port_sm_state_closed()
165 rfc_send_dm(p_port->rfc.p_mcb, p_port->dlci, false); in rfc_port_sm_state_closed()
[all …]
/aosp_15_r20/external/apache-http/src/org/apache/http/
H A DHttpStatus.java55 /** <tt>100 Continue</tt> (HTTP/1.1 - RFC 2616) */
57 /** <tt>101 Switching Protocols</tt> (HTTP/1.1 - RFC 2616)*/
59 /** <tt>102 Processing</tt> (WebDAV - RFC 2518) */
64 /** <tt>200 OK</tt> (HTTP/1.0 - RFC 1945) */
66 /** <tt>201 Created</tt> (HTTP/1.0 - RFC 1945) */
68 /** <tt>202 Accepted</tt> (HTTP/1.0 - RFC 1945) */
70 /** <tt>203 Non Authoritative Information</tt> (HTTP/1.1 - RFC 2616) */
72 /** <tt>204 No Content</tt> (HTTP/1.0 - RFC 1945) */
74 /** <tt>205 Reset Content</tt> (HTTP/1.1 - RFC 2616) */
76 /** <tt>206 Partial Content</tt> (HTTP/1.1 - RFC 2616) */
[all …]
/aosp_15_r20/external/mbedtls/tests/suites/
H A Dtest_suite_ecdsa.data41 ECDSA primitive rfc 4754 p256
45 ECDSA primitive rfc 4754 p384
49 ECDSA primitive rfc 4754 p521
93 ECDSA deterministic test vector rfc 6979 p192 sha1 [#1]
97 ECDSA deterministic test vector rfc 6979 p192 sha224 [#1]
101 ECDSA deterministic test vector rfc 6979 p192 sha256 [#1]
105 ECDSA deterministic test vector rfc 6979 p192 sha384 [#1]
109 ECDSA deterministic test vector rfc 6979 p192 sha512 [#1]
113 ECDSA deterministic test vector rfc 6979 p192 sha1 [#2]
117 ECDSA deterministic test vector rfc 6979 p192 sha224 [#2]
[all …]
/aosp_15_r20/external/openthread/third_party/mbedtls/repo/tests/suites/
H A Dtest_suite_ecdsa.data41 ECDSA primitive rfc 4754 p256
45 ECDSA primitive rfc 4754 p384
49 ECDSA primitive rfc 4754 p521
93 ECDSA deterministic test vector rfc 6979 p192 sha1 [#1]
97 ECDSA deterministic test vector rfc 6979 p192 sha224 [#1]
101 ECDSA deterministic test vector rfc 6979 p192 sha256 [#1]
105 ECDSA deterministic test vector rfc 6979 p192 sha384 [#1]
109 ECDSA deterministic test vector rfc 6979 p192 sha512 [#1]
113 ECDSA deterministic test vector rfc 6979 p192 sha1 [#2]
117 ECDSA deterministic test vector rfc 6979 p192 sha224 [#2]
[all …]
/aosp_15_r20/external/tcpdump/
H A Dprint-domain.c221 * No RFC explicitly says that, but BIND's in fqdn_print()
481 { T_A, "A" }, /* RFC 1035 */
482 { T_NS, "NS" }, /* RFC 1035 */
483 { T_MD, "MD" }, /* RFC 1035 */
484 { T_MF, "MF" }, /* RFC 1035 */
485 { T_CNAME, "CNAME" }, /* RFC 1035 */
486 { T_SOA, "SOA" }, /* RFC 1035 */
487 { T_MB, "MB" }, /* RFC 1035 */
488 { T_MG, "MG" }, /* RFC 1035 */
489 { T_MR, "MR" }, /* RFC 1035 */
[all …]
/aosp_15_r20/external/scapy/scapy/layers/tls/
H A Dextensions.py21 _tls_ext = { 0: "server_name", # RFC 4366
22 1: "max_fragment_length", # RFC 4366
23 2: "client_certificate_url", # RFC 4366
24 3: "trusted_ca_keys", # RFC 4366
25 4: "truncated_hmac", # RFC 4366
26 5: "status_request", # RFC 4366
27 6: "user_mapping", # RFC 4681
28 7: "client_authz", # RFC 5878
29 8: "server_authz", # RFC 5878
30 9: "cert_type", # RFC 6091
[all …]
/aosp_15_r20/external/rust/android-crates-io/crates/etherparse/src/transport/icmpv4/
Dmod.rs19 /// ICMPv4 type value indicating a "Echo Reply" message (defined in [RFC 792](https://tools.ietf.or…
22 /// ICMPv4 type value indicating a "Destination Unreachable" message (defined in [RFC 792](https://…
25 …uench (Deprecated)" message (defined in in [RFC 792](https://tools.ietf.org/html/rfc792), deprecat…
28 /// ICMPv4 type value indicating a "Redirect" message (defined in [RFC 792](https://tools.ietf.org/…
31 …indicating a "Alternate Host Address (Deprecated)" message (deprecated in [RFC 6918](https://tools…
34 /// ICMPv4 type value indicating a "Echo Request" message (defined in [RFC 792](https://tools.ietf.…
37 /// ICMPv4 type value indicating a "Router Advertisement" message (defined in [RFC 1256](https://to…
40 /// ICMPv4 type value indicating a "Router Solicitation" message (defined in [RFC 1256](https://too…
43 /// ICMPv4 type value indicating a "Time Exceeded" message (defined in [RFC 792](https://tools.ietf…
46 /// ICMPv4 type value indicating a "Parameter Problem" message (defined in [RFC 792](https://tools.…
[all …]
/aosp_15_r20/external/scapy/scapy/layers/
H A Dradius.py224 Implements a RADIUS attribute (RFC 2865). Every specific RADIUS attribute
322 """RFC 2865"""
327 """RFC 2865"""
332 """RFC 2865"""
337 """RFC 2865"""
342 """RFC 2865"""
347 """RFC 2865"""
352 """RFC 2865"""
357 """RFC 2866"""
362 """RFC 2866"""
[all …]
/aosp_15_r20/external/libogg/doc/
H A Drfc5334.txt28 these types. This document obsoletes RFC 3534.
33 2. Changes Since RFC 3534 . . . . . . . . . . . . . . . . . . 2
60 RFC 5334 Ogg Media Types September 2008
94 2. Changes Since RFC 3534
116 RFC 5334 Ogg Media Types September 2008
172 RFC 5334 Ogg Media Types September 2008
228 RFC 5334 Ogg Media Types September 2008
284 RFC 5334 Ogg Media Types September 2008
340 RFC 5334 Ogg Media Types September 2008
375 Optional parameters: codecs, whose syntax is defined in RFC 4281.
[all …]
/aosp_15_r20/external/python/pyasn1-modules/
DCHANGES.txt12 - Updated the handling of maps for use with openType for RFC 3279
46 - Added maps for use with openType to RFC 3565
68 RFC 2634, RFC 3274, RFC 3779, RFC 4073, RFC 4108, RFC 5035, RFC 5083,
69 RFC 5084, RFC 5480, RFC 5940, RFC 5958, RFC 6019, and RFC 8520
71 RFC 5958 to use the rfc5652.cmsAttributesMap
120 - Added openType support to RFC 2986 by importing definitions from
121 the RFC 5280 module so that the same maps are used.
122 - Added maps for use with openType to RFC 2634, RFC 3274, RFC 3709,
123 RFC 3779, RFC 4055, RFC 4073, RFC 4108, RFC 5035, RFC 5083, RFC 5480,
124 RFC 5940, RFC 5958, RFC 6010, RFC 6019, RFC 6402, RFC 7191, RFC 8226,
[all …]
/aosp_15_r20/external/rust/android-crates-io/crates/quiche/deps/boringssl/src/include/openssl/
Dtls1.h132 * support (see RFC 4279) to OpenSSL.
184 // ExtensionType values from RFC 6066
188 // ExtensionType values from RFC 4492
191 // ExtensionType values from RFC 5246
194 // ExtensionType value from RFC 5764
197 // ExtensionType value from RFC 7301
200 // ExtensionType value from RFC 7685
203 // ExtensionType value from RFC 7627
213 // ExtensionType value from RFC 9000
222 // ExtensionType value from RFC 8879
[all …]
/aosp_15_r20/prebuilts/vndk/v33/arm64/include/external/boringssl/src/include/openssl/
Dtls1.h132 * support (see RFC 4279) to OpenSSL.
184 // ExtensionType values from RFC 6066
188 // ExtensionType values from RFC 4492
191 // ExtensionType values from RFC 5246
194 // ExtensionType value from RFC 5764
197 // ExtensionType value from RFC 7301
200 // ExtensionType value from RFC 7685
203 // ExtensionType value from RFC 7627
213 // ExtensionType value from RFC 9000
222 // ExtensionType value from RFC 8879
[all …]
/aosp_15_r20/external/rust/crates/quiche/deps/boringssl/src/include/openssl/
Dtls1.h132 * support (see RFC 4279) to OpenSSL.
184 // ExtensionType values from RFC 6066
188 // ExtensionType values from RFC 4492
191 // ExtensionType values from RFC 5246
194 // ExtensionType value from RFC 5764
197 // ExtensionType value from RFC 7301
200 // ExtensionType value from RFC 7685
203 // ExtensionType value from RFC 7627
213 // ExtensionType value from RFC 9000
222 // ExtensionType value from RFC 8879
[all …]
/aosp_15_r20/prebuilts/vndk/v33/x86_64/include/external/boringssl/src/include/openssl/
Dtls1.h132 * support (see RFC 4279) to OpenSSL.
184 // ExtensionType values from RFC 6066
188 // ExtensionType values from RFC 4492
191 // ExtensionType values from RFC 5246
194 // ExtensionType value from RFC 5764
197 // ExtensionType value from RFC 7301
200 // ExtensionType value from RFC 7685
203 // ExtensionType value from RFC 7627
213 // ExtensionType value from RFC 9000
222 // ExtensionType value from RFC 8879
[all …]
/aosp_15_r20/prebuilts/vndk/v33/x86/include/external/boringssl/src/include/openssl/
Dtls1.h132 * support (see RFC 4279) to OpenSSL.
184 // ExtensionType values from RFC 6066
188 // ExtensionType values from RFC 4492
191 // ExtensionType values from RFC 5246
194 // ExtensionType value from RFC 5764
197 // ExtensionType value from RFC 7301
200 // ExtensionType value from RFC 7685
203 // ExtensionType value from RFC 7627
213 // ExtensionType value from RFC 9000
222 // ExtensionType value from RFC 8879
[all …]
/aosp_15_r20/prebuilts/vndk/v33/arm/include/external/boringssl/src/include/openssl/
Dtls1.h132 * support (see RFC 4279) to OpenSSL.
184 // ExtensionType values from RFC 6066
188 // ExtensionType values from RFC 4492
191 // ExtensionType values from RFC 5246
194 // ExtensionType value from RFC 5764
197 // ExtensionType value from RFC 7301
200 // ExtensionType value from RFC 7685
203 // ExtensionType value from RFC 7627
213 // ExtensionType value from RFC 9000
222 // ExtensionType value from RFC 8879
[all …]
/aosp_15_r20/external/cronet/third_party/boringssl/src/pki/
H A Dparse_certificate.h30 // Returns true if the given serial number (CertificateSerialNumber in RFC 5280)
45 // For reference, here is what RFC 5280 section 4.1.2.2 says:
63 // Consumes a "Time" value (as defined by RFC 5280) from |parser|. On success
67 // From RFC 5280:
75 // Parses a DER-encoded "Validity" as specified by RFC 5280. Returns true on
95 // Parses a DER-encoded "Certificate" as specified by RFC 5280. Returns true on
112 // from RFC 5280:
120 // "signatureAlgorithm" from RFC 5280:
128 // RFC 5280:
137 // Parses a DER-encoded "TBSCertificate" as specified by RFC 5280. Returns true
[all …]

12345678910>>...356