/external/chromium_org/net/test/android/javatests/src/org/chromium/net/test/util/ |
H A D | TestWebServer.java | 55 * Simple http test server for testing. 57 * This server runs in a thread in the current process, so it is convenient 91 // The Maps below are modified on both the client thread and the internal server thread, so 99 * Create and start a local HTTP server instance. 100 * @param ssl True if the server should be using secure sockets. 125 * Terminate the http server. 131 // request for shutdown and having the server's one thread 141 // Block until the server thread is done shutting down. 177 * Gets the URL on the server under which a particular request path will be accessible. 228 * @param base64EncodedResponse The response body that is base64 encoded. The actual server 479 ServerThread(TestWebServer server, boolean ssl) argument [all...] |
/external/chromium_org/sync/engine/net/ |
H A D | server_connection_manager.cc | 108 LOG(ERROR) << "Mismatched content lengths, server claimed " << 177 const string& server, 181 : sync_server_(server), 307 // Returns the current server parameters in server_url and port. 176 ServerConnectionManager( const string& server, int port, bool use_ssl, bool use_oauth2_token) argument
|
H A D | server_connection_manager.h | 65 // the server. 67 // TODO(idana): the server no longer returns RETRY so we should remove this 125 // Use this class to interact with the sync server. 165 void GetServerParams(std::string* server, argument 169 server->assign(scm_->sync_server_); 183 ServerConnectionManager(const std::string& server, 207 // Returns the current server parameters in server_url, port and use_ssl. 215 // communication with the server. 279 // The sync_server_ is the server that requests will be made to.
|
/external/chromium_org/third_party/libjingle/source/talk/app/webrtc/ |
H A D | peerconnectioninterface.h | 38 // points either to stun or turn server to generate ICE candidates and provide 308 : server(address, port) {} 309 // STUN server address and port. 310 talk_base::SocketAddress server; member in struct:webrtc::PortAllocatorFactoryInterface::StunConfiguration 320 : server(address, port), 325 talk_base::SocketAddress server; member in struct:webrtc::PortAllocatorFactoryInterface::TurnConfiguration
|
/external/chromium_org/third_party/libjingle/source/talk/examples/call/ |
H A D | call_main.cc | 224 DEFINE_string(s, "talk.google.com", "The connection server to use."); 228 DEFINE_bool(testserver, false, "Use test server."); 279 std::string server = FLAG_s; local 377 int colon = server.find(':'); 379 host = server; 382 host = server.substr(0, colon); 383 port = atoi(server.substr(colon + 1).c_str()); 489 Print(("Logging in to " + server + " as " + jid.Str() + "\n").c_str());
|
/external/chromium_org/third_party/libjingle/source/talk/examples/peerconnection/client/ |
H A D | conductor.cc | 102 webrtc::PeerConnectionInterface::IceServer server; local 103 server.uri = GetPeerConnectionString(); 104 servers.push_back(server); 303 void Conductor::StartLogin(const std::string& server, int port) { argument 306 server_ = server; 307 client_->Connect(server, port, GetPeerName()); 420 // This way we can be sure that messages are sent to the server
|
H A D | peer_connection_client.cc | 46 // Delay between server connection retries, in milliseconds 110 void PeerConnectionClient::Connect(const std::string& server, int port, argument 112 ASSERT(!server.empty()); 122 if (server.empty() || client_name.empty()) { 130 server_address_.SetIP(server); 344 LOG(LS_ERROR) << "No content length field specified by the server."; 358 // First response. Let's store our server assigned ID. 480 LOG(LS_ERROR) << "Received error from server";
|
/external/chromium_org/third_party/openssl/openssl/apps/ |
H A D | s_socket.c | 328 struct sockaddr_in server; local 333 memset((char *)&server,0,sizeof(server)); 334 server.sin_family=AF_INET; 335 server.sin_port=htons((unsigned short)port); 337 server.sin_addr.s_addr=INADDR_ANY; 341 memcpy(&server.sin_addr.s_addr,ip,4); 343 memcpy(&server.sin_addr,ip,4); 359 if (bind(s,(struct sockaddr *)&server,sizeof(server)) [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/bio/ |
H A D | b_sock.c | 631 } server,client; local 708 addrlen = res->ai_addrlen <= (socklen_t)sizeof(server) ? 710 (socklen_t)sizeof(server); 711 memcpy(&server, res->ai_addr, (size_t)addrlen); 720 memset((char *)&server,0,sizeof(server)); 721 server.sa_in.sin_family=AF_INET; 722 server.sa_in.sin_port=htons(port); 723 addrlen = (socklen_t)sizeof(server.sa_in); 726 server [all...] |
/external/chromium_org/tools/android/forwarder/ |
H A D | forwarder.cc | 94 : server(a_server), 97 Server* server; member in struct:__anon14055::ForwarderThreadInfo 193 Server* server = thread_info->server; local 196 ForwarderInfo* info = server->GetForwarderInfo(index); 250 server->DisposeForwarderInfo(index); 254 // Listens to a server socket. On incoming request, forward it to the host. 257 Server* server = reinterpret_cast<Server*>(arg); local 259 int forwarder_index = server->GetFreeForwarderIndex(); 267 int socket = HANDLE_EINTR(accept(server [all...] |
/external/dnsmasq/contrib/wrt/ |
H A D | dhcp_release.c | 17 to tell the local DHCP server to delete a particular lease. 250 struct in_addr server, lease; local 276 a DHCP server */ 286 server = find_interface(lease, nl, if_nametoindex(argv[1])); 305 *(p++) = sizeof(server); 306 memcpy(p, &server, sizeof(server)); 307 p += sizeof(server); 321 dest.sin_addr = server;
|
/external/openssh/ |
H A D | kex.c | 286 choose_enc(Enc *enc, char *client, char *server) argument 288 char *name = match_list(client, server, NULL); 290 fatal("no matching cipher found: client %s server %s", 291 client, server); 303 choose_mac(Mac *mac, char *client, char *server) argument 305 char *name = match_list(client, server, NULL); 307 fatal("no matching mac found: client %s server %s", 308 client, server); 320 choose_comp(Comp *comp, char *client, char *server) argument 322 char *name = match_list(client, server, NUL 338 choose_kex(Kex *k, char *client, char *server) argument 366 choose_hostkeyalg(Kex *k, char *client, char *server) argument [all...] |
H A D | kex.h | 122 int server; member in struct:Kex
|
/external/openssl/apps/ |
H A D | s_socket.c | 328 struct sockaddr_in server; local 333 memset((char *)&server,0,sizeof(server)); 334 server.sin_family=AF_INET; 335 server.sin_port=htons((unsigned short)port); 337 server.sin_addr.s_addr=INADDR_ANY; 341 memcpy(&server.sin_addr.s_addr,ip,4); 343 memcpy(&server.sin_addr,ip,4); 359 if (bind(s,(struct sockaddr *)&server,sizeof(server)) [all...] |
/external/openssl/crypto/bio/ |
H A D | b_sock.c | 631 } server,client; local 708 addrlen = res->ai_addrlen <= (socklen_t)sizeof(server) ? 710 (socklen_t)sizeof(server); 711 memcpy(&server, res->ai_addr, (size_t)addrlen); 720 memset((char *)&server,0,sizeof(server)); 721 server.sa_in.sin_family=AF_INET; 722 server.sa_in.sin_port=htons(port); 723 addrlen = (socklen_t)sizeof(server.sa_in); 726 server [all...] |
/external/ppp/pppd/ |
H A D | chap-new.c | 102 } server; variable in typeref:struct:chap_server_state 145 memset(&server, 0, sizeof(server)); 173 struct chap_server_state *ss = &server; 185 struct chap_server_state *ss = &server; 201 struct chap_server_state *ss = &server; 517 struct chap_server_state *ss = &server; 548 struct chap_server_state *ss = &server;
|
/external/qemu/audio/ |
H A D | paaudio.c | 30 DYNLINK_FUNC(pa_simple*,pa_simple_new,(const char* server,const char* name, pa_stream_direction_t dir, const char* dev, const char* stream_name, const pa_sample_spec* ss, const pa_channel_map* map, const pa_buffer_attr *attr, int *error)) \ 68 char *server; member in struct:__anon24196 339 conf.server, 393 conf.server, 516 conf.server, 573 .valp = &conf.server, 574 .descr = "server address"
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | tls_internal.c | 23 int server; member in struct:tls_global 30 struct tlsv1_server *server; member in struct:tls_connection 90 if (!global->server) { 99 if (global->server) { 100 conn->server = tlsv1_server_init(global->server_cred); 101 if (conn->server == NULL) { 121 if (conn->server) 122 tlsv1_server_deinit(conn->server); 135 if (conn->server) 136 return tlsv1_server_established(conn->server); [all...] |
/external/wpa_supplicant_8/src/crypto/ |
H A D | tls_internal.c | 23 int server; member in struct:tls_global 30 struct tlsv1_server *server; member in struct:tls_connection 90 if (!global->server) { 99 if (global->server) { 100 conn->server = tlsv1_server_init(global->server_cred); 101 if (conn->server == NULL) { 121 if (conn->server) 122 tlsv1_server_deinit(conn->server); 135 if (conn->server) 136 return tlsv1_server_established(conn->server); [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | tls_internal.c | 23 int server; member in struct:tls_global 30 struct tlsv1_server *server; member in struct:tls_connection 90 if (!global->server) { 99 if (global->server) { 100 conn->server = tlsv1_server_init(global->server_cred); 101 if (conn->server == NULL) { 121 if (conn->server) 122 tlsv1_server_deinit(conn->server); 135 if (conn->server) 136 return tlsv1_server_established(conn->server); [all...] |
/external/antlr/antlr-3.4/runtime/C/src/ |
H A D | antlr3debughandlers.c | 202 // and the server while we accept a connection. 205 ANTLR3_SOCKADDRT server; local 248 // Create the server socket, we are the server because we just wait until 260 server.sin_port = htons((unsigned short)delboy->port); 261 server.sin_family = AF_INET; 262 server.sin_addr.s_addr = htonl (INADDR_ANY); 269 if (bind(serverSocket, (pANTLR3_SOCKADDRC)&server, sizeof(server)) == -1)
|
/external/chromium/chrome/browser/ |
H A D | bug_report_util.cc | 112 // successful post to the feedback server. 139 error_stream << "No connection to server."; 150 LOG(WARNING) << "FEEDBACK: Submission to feedback server (" << url 184 void BugReportUtil::SetFeedbackServer(const std::string& server) { argument 185 feedback_server_ = server; 376 // We have the body of our POST, so send it off to the server with 0 delay
|
/external/chromium/chrome/browser/debugger/ |
H A D | devtools_http_protocol_handler.cc | 27 #include "net/server/http_server_request_info.h" 40 net::HttpServer* server, 42 : server_(server), 39 DevToolsClientHostImpl( net::HttpServer* server, int connection_id) argument
|
/external/chromium/chrome/browser/password_manager/ |
H A D | password_store_mac.cc | 39 void Init(const char* server, const UInt32& port, 66 void KeychainSearch::Init(const char* server, const UInt32& port, argument 80 if (server != NULL) { 83 search_attributes_.attr[entries].length = strlen(server); 85 const_cast<void*>(reinterpret_cast<const void*>(server)); 271 std::string server; 285 server.assign(static_cast<const char *>(attr.data), attr.length); 334 form->origin = URLFromComponents(form->ssl_valid, server, port, path); 545 std::string server; local 549 if (!ExtractSignonRealmComponents(form.signon_realm, &server, 647 std::string server; local 671 ExtractSignonRealmComponents( const std::string& signon_realm, std::string* server, int* port, bool* is_secure, std::string* security_domain) argument [all...] |
/external/chromium/chrome/browser/sync/engine/net/ |
H A D | server_connection_manager.h | 70 // All the following connection codes are valid responses from the server. 71 // Means the server is up. If you update this list, be sure to also update 78 // the server. 80 // TODO(idana): the server no longer returns RETRY so we should remove this 162 // Use this class to interact with the sync server. 166 // one instance for every server that you need to talk to. 209 void GetServerParams(std::string* server, argument 213 server->assign(scm_->sync_server_); 227 ServerConnectionManager(const std::string& server, 241 // Checks the time on the server [all...] |