/external/robolectric/lib/main/ |
H A D | h2-1.2.147.jar | ... updateTopic (java.lang.String, org.h2.server.web.DbContextRule) public java.util.ArrayList ... |
/external/chromium_org/third_party/mesa/src/src/gallium/state_trackers/glx/xlib/ |
H A D | glx_api.c | 43 /* This indicates the server-side GLX decoder version. 2251 glXCreateGLXVideoSourceSGIX(Display *dpy, int screen, VLServer server, argument 2256 (void) server;
|
/external/chromium_org/third_party/mesa/src/src/mesa/drivers/x11/ |
H A D | fakeglx.c | 63 /* This indicates the server-side GLX decoder version. 2457 Fake_glXCreateGLXVideoSourceSGIX(Display *dpy, int screen, VLServer server, VLPath path, int nodeClass, VLNode drainNode) argument 2461 (void) server;
|
/external/chromium_org/third_party/openssl/openssl/ssl/ |
H A D | ssl_lib.c | 219 s->state=SSL_ST_BEFORE|((s->server)?SSL_ST_ACCEPT:SSL_ST_CONNECT); 373 s->server=(ctx->method->ssl_accept == ssl_undefined_function)?0:1; 857 * certificate; if we are a server, it does not. */ 1510 fprintf(stderr, "SCSV received by server\n"); 1586 * 1) If the server doesn't support NPN then this is indicated to the 1590 * 2) If the server supports NPN, but advertises an empty list then the 1594 * 3) Otherwise, the client finds the first protocol in the server's list 1596 * assumed that the server has better information about which protocol 1599 * 4) If the client doesn't support any of the server's advertised 1606 int SSL_select_next_proto(unsigned char **out, unsigned char *outlen, const unsigned char *server, unsigne argument [all...] |
H A D | ssl.h | 397 unsigned long algorithm_auth; /* server authentication */ 464 * Ticket_lifetime_hint [9] EXPLICIT INTEGER, -- server's lifetime hint for session ticket 593 /* As server, disallow session resumption on renegotiation */ 606 /* Set on servers to choose the cipher according to the server's 609 /* If set, a server will allow a client to issue a SSLv3.0 version number 631 /* Make server add server-hello extension from early version of 759 * server. Return value should be zero on an error, non-zero to proceed. Also, 989 /* For a server, this contains a callback function by which the set of 995 * next protocol from the list provided by the server 1186 int server; /* are we the server side? - mostly used by SSL_clear*/ member in struct:ssl_st [all...] |
/external/chromium_org/v8/tools/ |
H A D | grokdump.py | 1973 return self.server.get_dump_formatter(name) 1990 self.server.output_dumps(self.wfile) 2032 if self.server.set_dump_desc(name, description): 2080 self.server = http_server 2169 self.server.output_dump_desc_field(f, self.dumpfilename) 3127 help="start a web server on localhost:%i" % PORT_NUMBER) 3148 server = InspectionWebServer(PORT_NUMBER, options, args[0]) variable 3151 server.serve_forever() 3153 print '^C received, shutting down the web server' 3154 server [all...] |
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/org.apache.ant_1.7.1.v20090120-1145/lib/ |
H A D | ant-commons-net.jar | META-INF/ META-INF/MANIFEST.MF org/ org/apache/ org/apache/tools/ org/apache/tools/ant/ ... |
H A D | ant-starteam.jar | ... .ant.BuildException com.starbase.starteam.Server s
protected com.starbase.starteam.Server getServer ... |
/external/mesa3d/src/gallium/state_trackers/glx/xlib/ |
H A D | glx_api.c | 43 /* This indicates the server-side GLX decoder version. 2251 glXCreateGLXVideoSourceSGIX(Display *dpy, int screen, VLServer server, argument 2256 (void) server;
|
/external/mesa3d/src/mesa/drivers/x11/ |
H A D | fakeglx.c | 63 /* This indicates the server-side GLX decoder version. 2457 Fake_glXCreateGLXVideoSourceSGIX(Display *dpy, int screen, VLServer server, VLPath path, int nodeClass, VLNode drainNode) argument 2461 (void) server;
|
/external/netperf/ |
H A D | nettest_bsd.c | 1445 /* Tell the remote end to do a listen. The server alters the 1506 /* we have to make sure that the server port number is in 2140 /* Tell the remote end to do a listen. The server alters the 2202 /* we have to make sure that the server port number is in 2873 /* Tell the remote end to do a listen. The server alters the socket */ 2932 /* we have to make sure that the server port number is in */ 3499 struct sockaddr_in server; 3540 bzero((char *)&server, 3541 sizeof(server)); 3674 /* Tell the remote end to do a listen. The server alter 3489 struct sockaddr_in server; local 9111 struct sockaddr_in server; local 10181 struct sockaddr_storage server; local [all...] |
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/http/ |
H A D | URLConnectionTest.java | 105 private MockWebServer server = new MockWebServer(); field in class:URLConnectionTest 114 hostName = server.getHostName(); 115 server.setNpnEnabled(false); 126 server.shutdown(); 134 server.enqueue(new MockResponse()); 135 server.play(); 137 connection = client.open(server.getUrl("/")); 171 RecordedRequest request = server.takeRequest(); 197 server.play(); 198 connection = client.open(server 3083 connect(MockWebServer server, OkHttpClient client, URL url) argument [all...] |
/external/openssl/ssl/ |
H A D | ssl_lib.c | 219 s->state=SSL_ST_BEFORE|((s->server)?SSL_ST_ACCEPT:SSL_ST_CONNECT); 384 s->server=(ctx->method->ssl_accept == ssl_undefined_function)?0:1; 882 * certificate; if we are a server, it does not. */ 1539 fprintf(stderr, "SCSV received by server\n"); 1615 * 1) If the server doesn't support NPN then this is indicated to the 1619 * 2) If the server supports NPN, but advertises an empty list then the 1623 * 3) Otherwise, the client finds the first protocol in the server's list 1625 * assumed that the server has better information about which protocol 1628 * 4) If the client doesn't support any of the server's advertised 1635 int SSL_select_next_proto(unsigned char **out, unsigned char *outlen, const unsigned char *server, unsigne argument [all...] |
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | tls_openssl.c | 101 /* SessionTicket received from OpenSSL hello_extension_cb (server) */ 1440 "server certificate data"); 1499 wpa_printf(MSG_DEBUG, "OpenSSL: Reject server certificate " 1570 wpa_printf(MSG_DEBUG, "OpenSSL: Probe for server certificate " 1580 if (os_strncmp(pos, "server/sha256/", 14) != 0) { 1597 wpa_printf(MSG_DEBUG, "OpenSSL: Checking only server " 1602 "cannot validate server certificate hash"); 1701 /* No ca_cert configured - do not try to verify server 1812 * since not all areas of the server code are ready for it (e.g., 2553 int server) 2552 openssl_handshake(struct tls_connection *conn, const struct wpabuf *in_data, int server) argument 2656 openssl_connection_handshake(struct tls_connection *conn, const struct wpabuf *in_data, struct wpabuf **appl_data, int server) argument [all...] |
/external/wpa_supplicant_8/src/crypto/ |
H A D | tls_openssl.c | 101 /* SessionTicket received from OpenSSL hello_extension_cb (server) */ 1440 "server certificate data"); 1499 wpa_printf(MSG_DEBUG, "OpenSSL: Reject server certificate " 1570 wpa_printf(MSG_DEBUG, "OpenSSL: Probe for server certificate " 1580 if (os_strncmp(pos, "server/sha256/", 14) != 0) { 1597 wpa_printf(MSG_DEBUG, "OpenSSL: Checking only server " 1602 "cannot validate server certificate hash"); 1701 /* No ca_cert configured - do not try to verify server 1812 * since not all areas of the server code are ready for it (e.g., 2553 int server) 2552 openssl_handshake(struct tls_connection *conn, const struct wpabuf *in_data, int server) argument 2656 openssl_connection_handshake(struct tls_connection *conn, const struct wpabuf *in_data, struct wpabuf **appl_data, int server) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | tls_openssl.c | 101 /* SessionTicket received from OpenSSL hello_extension_cb (server) */ 1440 "server certificate data"); 1499 wpa_printf(MSG_DEBUG, "OpenSSL: Reject server certificate " 1570 wpa_printf(MSG_DEBUG, "OpenSSL: Probe for server certificate " 1580 if (os_strncmp(pos, "server/sha256/", 14) != 0) { 1597 wpa_printf(MSG_DEBUG, "OpenSSL: Checking only server " 1602 "cannot validate server certificate hash"); 1701 /* No ca_cert configured - do not try to verify server 1812 * since not all areas of the server code are ready for it (e.g., 2553 int server) 2552 openssl_handshake(struct tls_connection *conn, const struct wpabuf *in_data, int server) argument 2656 openssl_connection_handshake(struct tls_connection *conn, const struct wpabuf *in_data, struct wpabuf **appl_data, int server) argument [all...] |
/external/chromium_org/third_party/libevent/ |
H A D | evdns.c | 169 struct nameserver *ns; /* the server which we last sent it */ 215 int failed_times; /* number of times which we have given this server a chance */ 221 /* when we next probe this server. */ 223 char state; /* zero if we think that this server is down */ 224 char choked; /* true if we have an EAGAIN from this server's socket */ 257 /* Represents a request that we've received as a DNS server, and holds */ 310 static int global_max_reissues = 1; /* a reissue occurs when we get some errors from the server */ 312 /* number of timeouts in a row before we consider this server to be down */ 511 /* a different server. Requests in the waiting queue don't have a */ 524 /* to another server */ 1914 evdns_request_transmit_to(struct request *req, struct nameserver *server) argument 2041 const struct nameserver *server = server_head; local 2056 struct nameserver *server = server_head, *started_at = server_head; local 2116 const struct nameserver *server = server_head, *const started_at = server_head; local 3036 struct nameserver *server, *server_next; local [all...] |
/external/chromium_org/third_party/libjingle/source/talk/app/webrtc/java/jni/ |
H A D | peerconnection_jni.cc | 2142 PeerConnectionInterface::IceServer server; local 2143 server.uri = JavaToStdString(jni, uri); 2144 server.username = JavaToStdString(jni, username); 2145 server.password = JavaToStdString(jni, password); 2146 ice_servers->push_back(server);
|
/external/dnsmasq/src/ |
H A D | dnsmasq.h | 308 #define SERV_NO_ADDR 2 /* no server, this domain is local only */ 309 #define SERV_LITERAL_ADDRESS 4 /* addr is the answer, not the server */ 310 #define SERV_HAS_DOMAIN 8 /* server for one domain only */ 312 #define SERV_FOR_NODOTS 32 /* server for names with no domain part only */ 332 struct server { struct 336 char *domain; /* set if this server only handles a domain. */ 340 struct server *next; 385 struct server *sentto; /* NULL means free */ 504 struct in_addr server; member in struct:pxe_service 622 struct server *server [all...] |
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
H A D | org.eclipse.ecf_3.1.0.v20100529-0735.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
H A D | org.mortbay.jetty.server_6.1.23.v201004211559.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
H A D | org.eclipse.help.base_3.5.2.v201011171123.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
/external/mdnsresponder/mDNSCore/ |
H A D | mDNS.c | 928 // The records might already be registered with the server and hence could have NAT state. 1486 // from the server. In that case, if the records have been part of a group update, clear the 2465 // For Unicast, when we get the response from the server, we will call CompleteDeregistration 3443 // When this question penalizes a DNS server and has no more DNS servers to pick, we normally 3447 // that time, we need to make sure that we have a valid DNS server. Otherwise, we will deliver 3448 // a negative cache response without trying the server. 3637 // When a question changes DNS server, it is marked with deliverAddEvents if we find any 3638 // cache entry corresponding to the new DNS server. Before we deliver the ADD event, the 3731 // then 95-97% of the TTL. If the DNS server does not respond, then we will remove the cache entry 3732 // before we pick a new DNS server 7752 PenaltyTimeForServer(mDNS *m, DNSServer *server) argument [all...] |
/external/chromium_org/net/third_party/nss/ssl/ |
H A D | sslimpl.h | 350 /* Configuration state for server sockets */ 603 ssl3KeyMaterial server; member in struct:__anon9096 607 SECItem srvVirtName; /* for server: name that was negotiated 668 /* values that are copied into the server's on-disk SID cache. */ 685 /* The following values are NOT restored from the server's on-disk 717 * handshake prior to the server's final flow. This is either a 818 /* registered callbacks that send server hello extensions */ 920 PRBool usedStepDownKey; /* we did a server key exchange. */ 934 TLSFinished tFinished[2]; /* client, then server */ 1022 /* used by server [all...] |
/external/chromium_org/third_party/openssl/openssl/include/openssl/ |
H A D | ssl.h | 397 unsigned long algorithm_auth; /* server authentication */ 464 * Ticket_lifetime_hint [9] EXPLICIT INTEGER, -- server's lifetime hint for session ticket 593 /* As server, disallow session resumption on renegotiation */ 606 /* Set on servers to choose the cipher according to the server's 609 /* If set, a server will allow a client to issue a SSLv3.0 version number 631 /* Make server add server-hello extension from early version of 759 * server. Return value should be zero on an error, non-zero to proceed. Also, 989 /* For a server, this contains a callback function by which the set of 995 * next protocol from the list provided by the server 1186 int server; /* are we the server side? - mostly used by SSL_clear*/ member in struct:ssl_st [all...] |