Searched defs:server (Results 201 - 225 of 241) sorted by relevance

12345678910

/external/robolectric/lib/main/
H A Dh2-1.2.147.jar ... updateTopic (java.lang.String, org.h2.server.web.DbContextRule) public java.util.ArrayList ...
/external/chromium_org/third_party/mesa/src/src/gallium/state_trackers/glx/xlib/
H A Dglx_api.c43 /* This indicates the server-side GLX decoder version.
2251 glXCreateGLXVideoSourceSGIX(Display *dpy, int screen, VLServer server, argument
2256 (void) server;
/external/chromium_org/third_party/mesa/src/src/mesa/drivers/x11/
H A Dfakeglx.c63 /* This indicates the server-side GLX decoder version.
2457 Fake_glXCreateGLXVideoSourceSGIX(Display *dpy, int screen, VLServer server, VLPath path, int nodeClass, VLNode drainNode) argument
2461 (void) server;
/external/chromium_org/third_party/openssl/openssl/ssl/
H A Dssl_lib.c219 s->state=SSL_ST_BEFORE|((s->server)?SSL_ST_ACCEPT:SSL_ST_CONNECT);
373 s->server=(ctx->method->ssl_accept == ssl_undefined_function)?0:1;
857 * certificate; if we are a server, it does not. */
1510 fprintf(stderr, "SCSV received by server\n");
1586 * 1) If the server doesn't support NPN then this is indicated to the
1590 * 2) If the server supports NPN, but advertises an empty list then the
1594 * 3) Otherwise, the client finds the first protocol in the server's list
1596 * assumed that the server has better information about which protocol
1599 * 4) If the client doesn't support any of the server's advertised
1606 int SSL_select_next_proto(unsigned char **out, unsigned char *outlen, const unsigned char *server, unsigne argument
[all...]
H A Dssl.h397 unsigned long algorithm_auth; /* server authentication */
464 * Ticket_lifetime_hint [9] EXPLICIT INTEGER, -- server's lifetime hint for session ticket
593 /* As server, disallow session resumption on renegotiation */
606 /* Set on servers to choose the cipher according to the server's
609 /* If set, a server will allow a client to issue a SSLv3.0 version number
631 /* Make server add server-hello extension from early version of
759 * server. Return value should be zero on an error, non-zero to proceed. Also,
989 /* For a server, this contains a callback function by which the set of
995 * next protocol from the list provided by the server
1186 int server; /* are we the server side? - mostly used by SSL_clear*/ member in struct:ssl_st
[all...]
/external/chromium_org/v8/tools/
H A Dgrokdump.py1973 return self.server.get_dump_formatter(name)
1990 self.server.output_dumps(self.wfile)
2032 if self.server.set_dump_desc(name, description):
2080 self.server = http_server
2169 self.server.output_dump_desc_field(f, self.dumpfilename)
3127 help="start a web server on localhost:%i" % PORT_NUMBER)
3148 server = InspectionWebServer(PORT_NUMBER, options, args[0]) variable
3151 server.serve_forever()
3153 print '^C received, shutting down the web server'
3154 server
[all...]
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/org.apache.ant_1.7.1.v20090120-1145/lib/
H A Dant-commons-net.jarMETA-INF/ META-INF/MANIFEST.MF org/ org/apache/ org/apache/tools/ org/apache/tools/ant/ ...
H A Dant-starteam.jar ... .ant.BuildException com.starbase.starteam.Server s protected com.starbase.starteam.Server getServer ...
/external/mesa3d/src/gallium/state_trackers/glx/xlib/
H A Dglx_api.c43 /* This indicates the server-side GLX decoder version.
2251 glXCreateGLXVideoSourceSGIX(Display *dpy, int screen, VLServer server, argument
2256 (void) server;
/external/mesa3d/src/mesa/drivers/x11/
H A Dfakeglx.c63 /* This indicates the server-side GLX decoder version.
2457 Fake_glXCreateGLXVideoSourceSGIX(Display *dpy, int screen, VLServer server, VLPath path, int nodeClass, VLNode drainNode) argument
2461 (void) server;
/external/netperf/
H A Dnettest_bsd.c1445 /* Tell the remote end to do a listen. The server alters the
1506 /* we have to make sure that the server port number is in
2140 /* Tell the remote end to do a listen. The server alters the
2202 /* we have to make sure that the server port number is in
2873 /* Tell the remote end to do a listen. The server alters the socket */
2932 /* we have to make sure that the server port number is in */
3499 struct sockaddr_in server;
3540 bzero((char *)&server,
3541 sizeof(server));
3674 /* Tell the remote end to do a listen. The server alter
3489 struct sockaddr_in server; local
9111 struct sockaddr_in server; local
10181 struct sockaddr_storage server; local
[all...]
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/http/
H A DURLConnectionTest.java105 private MockWebServer server = new MockWebServer(); field in class:URLConnectionTest
114 hostName = server.getHostName();
115 server.setNpnEnabled(false);
126 server.shutdown();
134 server.enqueue(new MockResponse());
135 server.play();
137 connection = client.open(server.getUrl("/"));
171 RecordedRequest request = server.takeRequest();
197 server.play();
198 connection = client.open(server
3083 connect(MockWebServer server, OkHttpClient client, URL url) argument
[all...]
/external/openssl/ssl/
H A Dssl_lib.c219 s->state=SSL_ST_BEFORE|((s->server)?SSL_ST_ACCEPT:SSL_ST_CONNECT);
384 s->server=(ctx->method->ssl_accept == ssl_undefined_function)?0:1;
882 * certificate; if we are a server, it does not. */
1539 fprintf(stderr, "SCSV received by server\n");
1615 * 1) If the server doesn't support NPN then this is indicated to the
1619 * 2) If the server supports NPN, but advertises an empty list then the
1623 * 3) Otherwise, the client finds the first protocol in the server's list
1625 * assumed that the server has better information about which protocol
1628 * 4) If the client doesn't support any of the server's advertised
1635 int SSL_select_next_proto(unsigned char **out, unsigned char *outlen, const unsigned char *server, unsigne argument
[all...]
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dtls_openssl.c101 /* SessionTicket received from OpenSSL hello_extension_cb (server) */
1440 "server certificate data");
1499 wpa_printf(MSG_DEBUG, "OpenSSL: Reject server certificate "
1570 wpa_printf(MSG_DEBUG, "OpenSSL: Probe for server certificate "
1580 if (os_strncmp(pos, "server/sha256/", 14) != 0) {
1597 wpa_printf(MSG_DEBUG, "OpenSSL: Checking only server "
1602 "cannot validate server certificate hash");
1701 /* No ca_cert configured - do not try to verify server
1812 * since not all areas of the server code are ready for it (e.g.,
2553 int server)
2552 openssl_handshake(struct tls_connection *conn, const struct wpabuf *in_data, int server) argument
2656 openssl_connection_handshake(struct tls_connection *conn, const struct wpabuf *in_data, struct wpabuf **appl_data, int server) argument
[all...]
/external/wpa_supplicant_8/src/crypto/
H A Dtls_openssl.c101 /* SessionTicket received from OpenSSL hello_extension_cb (server) */
1440 "server certificate data");
1499 wpa_printf(MSG_DEBUG, "OpenSSL: Reject server certificate "
1570 wpa_printf(MSG_DEBUG, "OpenSSL: Probe for server certificate "
1580 if (os_strncmp(pos, "server/sha256/", 14) != 0) {
1597 wpa_printf(MSG_DEBUG, "OpenSSL: Checking only server "
1602 "cannot validate server certificate hash");
1701 /* No ca_cert configured - do not try to verify server
1812 * since not all areas of the server code are ready for it (e.g.,
2553 int server)
2552 openssl_handshake(struct tls_connection *conn, const struct wpabuf *in_data, int server) argument
2656 openssl_connection_handshake(struct tls_connection *conn, const struct wpabuf *in_data, struct wpabuf **appl_data, int server) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dtls_openssl.c101 /* SessionTicket received from OpenSSL hello_extension_cb (server) */
1440 "server certificate data");
1499 wpa_printf(MSG_DEBUG, "OpenSSL: Reject server certificate "
1570 wpa_printf(MSG_DEBUG, "OpenSSL: Probe for server certificate "
1580 if (os_strncmp(pos, "server/sha256/", 14) != 0) {
1597 wpa_printf(MSG_DEBUG, "OpenSSL: Checking only server "
1602 "cannot validate server certificate hash");
1701 /* No ca_cert configured - do not try to verify server
1812 * since not all areas of the server code are ready for it (e.g.,
2553 int server)
2552 openssl_handshake(struct tls_connection *conn, const struct wpabuf *in_data, int server) argument
2656 openssl_connection_handshake(struct tls_connection *conn, const struct wpabuf *in_data, struct wpabuf **appl_data, int server) argument
[all...]
/external/chromium_org/third_party/libevent/
H A Devdns.c169 struct nameserver *ns; /* the server which we last sent it */
215 int failed_times; /* number of times which we have given this server a chance */
221 /* when we next probe this server. */
223 char state; /* zero if we think that this server is down */
224 char choked; /* true if we have an EAGAIN from this server's socket */
257 /* Represents a request that we've received as a DNS server, and holds */
310 static int global_max_reissues = 1; /* a reissue occurs when we get some errors from the server */
312 /* number of timeouts in a row before we consider this server to be down */
511 /* a different server. Requests in the waiting queue don't have a */
524 /* to another server */
1914 evdns_request_transmit_to(struct request *req, struct nameserver *server) argument
2041 const struct nameserver *server = server_head; local
2056 struct nameserver *server = server_head, *started_at = server_head; local
2116 const struct nameserver *server = server_head, *const started_at = server_head; local
3036 struct nameserver *server, *server_next; local
[all...]
/external/chromium_org/third_party/libjingle/source/talk/app/webrtc/java/jni/
H A Dpeerconnection_jni.cc2142 PeerConnectionInterface::IceServer server; local
2143 server.uri = JavaToStdString(jni, uri);
2144 server.username = JavaToStdString(jni, username);
2145 server.password = JavaToStdString(jni, password);
2146 ice_servers->push_back(server);
/external/dnsmasq/src/
H A Ddnsmasq.h308 #define SERV_NO_ADDR 2 /* no server, this domain is local only */
309 #define SERV_LITERAL_ADDRESS 4 /* addr is the answer, not the server */
310 #define SERV_HAS_DOMAIN 8 /* server for one domain only */
312 #define SERV_FOR_NODOTS 32 /* server for names with no domain part only */
332 struct server { struct
336 char *domain; /* set if this server only handles a domain. */
340 struct server *next;
385 struct server *sentto; /* NULL means free */
504 struct in_addr server; member in struct:pxe_service
622 struct server *server
[all...]
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/
H A Dorg.eclipse.ecf_3.1.0.v20100529-0735.jarMETA-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ...
H A Dorg.mortbay.jetty.server_6.1.23.v201004211559.jarMETA-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ...
H A Dorg.eclipse.help.base_3.5.2.v201011171123.jarMETA-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ...
/external/mdnsresponder/mDNSCore/
H A DmDNS.c928 // The records might already be registered with the server and hence could have NAT state.
1486 // from the server. In that case, if the records have been part of a group update, clear the
2465 // For Unicast, when we get the response from the server, we will call CompleteDeregistration
3443 // When this question penalizes a DNS server and has no more DNS servers to pick, we normally
3447 // that time, we need to make sure that we have a valid DNS server. Otherwise, we will deliver
3448 // a negative cache response without trying the server.
3637 // When a question changes DNS server, it is marked with deliverAddEvents if we find any
3638 // cache entry corresponding to the new DNS server. Before we deliver the ADD event, the
3731 // then 95-97% of the TTL. If the DNS server does not respond, then we will remove the cache entry
3732 // before we pick a new DNS server
7752 PenaltyTimeForServer(mDNS *m, DNSServer *server) argument
[all...]
/external/chromium_org/net/third_party/nss/ssl/
H A Dsslimpl.h350 /* Configuration state for server sockets */
603 ssl3KeyMaterial server; member in struct:__anon9096
607 SECItem srvVirtName; /* for server: name that was negotiated
668 /* values that are copied into the server's on-disk SID cache. */
685 /* The following values are NOT restored from the server's on-disk
717 * handshake prior to the server's final flow. This is either a
818 /* registered callbacks that send server hello extensions */
920 PRBool usedStepDownKey; /* we did a server key exchange. */
934 TLSFinished tFinished[2]; /* client, then server */
1022 /* used by server
[all...]
/external/chromium_org/third_party/openssl/openssl/include/openssl/
H A Dssl.h397 unsigned long algorithm_auth; /* server authentication */
464 * Ticket_lifetime_hint [9] EXPLICIT INTEGER, -- server's lifetime hint for session ticket
593 /* As server, disallow session resumption on renegotiation */
606 /* Set on servers to choose the cipher according to the server's
609 /* If set, a server will allow a client to issue a SSLv3.0 version number
631 /* Make server add server-hello extension from early version of
759 * server. Return value should be zero on an error, non-zero to proceed. Also,
989 /* For a server, this contains a callback function by which the set of
995 * next protocol from the list provided by the server
1186 int server; /* are we the server side? - mostly used by SSL_clear*/ member in struct:ssl_st
[all...]

Completed in 844 milliseconds

12345678910