Searched refs:server (Results 226 - 250 of 550) sorted by relevance

1234567891011>>

/external/skia/experimental/Networking/
H A DSkSockets.cpp316 hostent* server = gethostbyname(hostname); local
317 if (server) {
319 memcpy((char*)&fServerAddr.sin_addr.s_addr, (char*)server->h_addr,
320 server->h_length);
356 SkDebugf("Succesfully reached server\n");
/external/chromium_org/net/
H A Dhttp_server.target.darwin-arm.mk26 net/server/http_connection.cc \
27 net/server/http_server.cc \
28 net/server/http_server_request_info.cc \
29 net/server/http_server_response_info.cc \
30 net/server/web_socket.cc
H A Dhttp_server.target.darwin-arm64.mk26 net/server/http_connection.cc \
27 net/server/http_server.cc \
28 net/server/http_server_request_info.cc \
29 net/server/http_server_response_info.cc \
30 net/server/web_socket.cc
H A Dhttp_server.target.darwin-mips.mk26 net/server/http_connection.cc \
27 net/server/http_server.cc \
28 net/server/http_server_request_info.cc \
29 net/server/http_server_response_info.cc \
30 net/server/web_socket.cc
H A Dhttp_server.target.darwin-mips64.mk26 net/server/http_connection.cc \
27 net/server/http_server.cc \
28 net/server/http_server_request_info.cc \
29 net/server/http_server_response_info.cc \
30 net/server/web_socket.cc
H A Dhttp_server.target.darwin-x86.mk26 net/server/http_connection.cc \
27 net/server/http_server.cc \
28 net/server/http_server_request_info.cc \
29 net/server/http_server_response_info.cc \
30 net/server/web_socket.cc
H A Dhttp_server.target.darwin-x86_64.mk26 net/server/http_connection.cc \
27 net/server/http_server.cc \
28 net/server/http_server_request_info.cc \
29 net/server/http_server_response_info.cc \
30 net/server/web_socket.cc
H A Dhttp_server.target.linux-arm.mk26 net/server/http_connection.cc \
27 net/server/http_server.cc \
28 net/server/http_server_request_info.cc \
29 net/server/http_server_response_info.cc \
30 net/server/web_socket.cc
H A Dhttp_server.target.linux-arm64.mk26 net/server/http_connection.cc \
27 net/server/http_server.cc \
28 net/server/http_server_request_info.cc \
29 net/server/http_server_response_info.cc \
30 net/server/web_socket.cc
H A Dhttp_server.target.linux-mips.mk26 net/server/http_connection.cc \
27 net/server/http_server.cc \
28 net/server/http_server_request_info.cc \
29 net/server/http_server_response_info.cc \
30 net/server/web_socket.cc
H A Dhttp_server.target.linux-mips64.mk26 net/server/http_connection.cc \
27 net/server/http_server.cc \
28 net/server/http_server_request_info.cc \
29 net/server/http_server_response_info.cc \
30 net/server/web_socket.cc
H A Dhttp_server.target.linux-x86.mk26 net/server/http_connection.cc \
27 net/server/http_server.cc \
28 net/server/http_server_request_info.cc \
29 net/server/http_server_response_info.cc \
30 net/server/web_socket.cc
H A Dhttp_server.target.linux-x86_64.mk26 net/server/http_connection.cc \
27 net/server/http_server.cc \
28 net/server/http_server_request_info.cc \
29 net/server/http_server_response_info.cc \
30 net/server/web_socket.cc
/external/chromium_org/net/url_request/
H A Durl_request_throttler_simulation_unittest.cc6 // a) That a server experiencing overload will actually benefit from the
9 // b) That "well-behaved" clients of a server under DDoS attack actually
118 // Represents a web server in a simulation of a server under attack by
149 // We pretend the server fails for the next several ticks after it
162 // the server.
169 // queries seen by the server (assuming a front-end reverse proxy
171 // visualize the traffic spike seen by the server when it comes up,
407 Server* server,
412 server_(server),
405 Requester(MockURLRequestThrottlerEntry* throttler_entry, const TimeDelta& time_between_requests, Server* server, RequesterResults* results) argument
497 SimulateAttack(Server* server, RequesterResults* attacker_results, RequesterResults* client_results, bool enable_throttling) argument
[all...]
/external/iputils/
H A Dclockdiff.c104 struct sockaddr_in server; variable in typeref:struct:sockaddr_in
616 memset(&server, 0, sizeof(server));
617 server.sin_family = hp->h_addrtype;
618 memcpy(&(server.sin_addr.s_addr), hp->h_addr, 4);
620 if (connect(sock_raw, (struct sockaddr*)&server, sizeof(server)) == -1) {
639 ((__u32*)(rspace+4))[1*2] = server.sin_addr.s_addr;
642 ((__u32*)(rspace+4))[2*2] = server.sin_addr.s_addr;
652 if ((measure_status = (ip_opt_len ? measure_opt : measure)(&server)) <
[all...]
/external/netperf/
H A Dnettest_xti.c540 struct sockaddr_in server;
564 bzero((char *)&server,
565 sizeof(server));
585 (char *)&server.sin_addr,
587 server.sin_family = hp->h_addrtype;
592 server.sin_addr.s_addr = addr;
593 server.sin_family = AF_INET;
724 /* Tell the remote end to do a listen. The server alters the socket */
811 /* we have to make sure that the server port number is in */
813 server
536 struct sockaddr_in server; local
1741 struct sockaddr_in server; local
2469 struct sockaddr_in server; local
3461 struct sockaddr_in server, myaddr_in; local
5022 struct sockaddr_in server; local
[all...]
/external/chromium_org/chrome/browser/password_manager/
H A Dpassword_store_mac.cc48 void Init(const char* server,
79 void KeychainSearch::Init(const char* server, argument
96 if (server != NULL) {
99 search_attributes_.attr[entries].length = strlen(server);
101 const_cast<void*>(static_cast<const void*>(server));
309 std::string server; local
323 server.assign(static_cast<const char *>(attr.data), attr.length);
373 form->origin = URLFromComponents(form->ssl_valid, server, port, path);
552 std::string* server,
563 if (server)
551 ExtractSignonRealmComponents(const std::string& signon_realm, std::string* server, UInt32* port, bool* is_secure, std::string* security_domain) argument
581 std::string server; local
694 std::string server; local
796 std::string server; local
[all...]
/external/ppp/pppd/
H A Dauth.c256 static int have_srp_secret __P((char *client, char *server, int need_ip,
1816 * on `server'. Either can be the null string, meaning we don't
1820 have_chap_secret(client, server, need_ip, lacks_ipp)
1822 char *server;
1845 else if (server != NULL && server[0] == 0)
1846 server = NULL;
1848 ret = scan_authfile(f, client, server, NULL, &addrs, NULL, filename, 0);
1865 * on `server'. Either can be the null string, meaning we don't
1869 have_srp_secret(client, server, need_i
[all...]
/external/chromium_org/chrome/browser/printing/cloud_print/test/
H A Dcloud_print_proxy_process_browsertest.cc208 typedef base::Callback<void(MockServiceIPCServer* server)>
248 MockServiceIPCServer server(state->GetServiceProcessChannel());
251 set_expectations.Run(&server);
253 EXPECT_TRUE(server.Init());
276 if (!Mock::VerifyAndClearExpectations(&server))
283 void SetServiceEnabledExpectations(MockServiceIPCServer* server) { argument
284 server->SetServiceEnabledExpectations();
292 void SetServiceWillBeDisabledExpectations(MockServiceIPCServer* server) { argument
293 server->SetWillBeDisabledExpectations();
/external/chromium_org/gpu/tools/
H A Dcheck_gpu_bots.py37 server = smtplib.SMTP(Emailer.GMAIL_SMTP_SERVER)
38 server.starttls()
39 server.login(self.email_from, self.email_password)
40 server.sendmail(self.email_from, self.email_to, message)
41 server.quit()
46 server = smtplib.SMTP(Emailer.GMAIL_SMTP_SERVER)
47 server.starttls()
48 server.login(self.email_from, self.email_password)
49 server.quit()
580 'the server i
[all...]
/external/guava/guava/src/com/google/common/net/
H A DInetAddresses.java673 private final Inet4Address server; field in class:InetAddresses.TeredoInfo
681 * <p>Both server and client can be {@code null}, in which case the
689 public TeredoInfo(@Nullable Inet4Address server, argument
697 if (server != null) {
698 this.server = server;
700 this.server = ANY4;
714 return server;
759 Inet4Address server = getInet4Address(copyOfRange(bytes, 4, 8));
773 return new TeredoInfo(server, clien
[all...]
/external/qemu/ui/
H A Dvnc-android.c377 /* server surface */
378 if (!vs->server.ds)
379 vs->server.ds = g_malloc0(sizeof(*vs->server.ds));
380 if (vs->server.ds->data)
381 g_free(vs->server.ds->data);
382 *(vs->server.ds) = *(ds->surface);
383 vs->server.ds->data = g_malloc0(vs->server.ds->linesize *
384 vs->server
[all...]
H A Dvnc.c369 /* server surface */
370 if (!vs->server.ds)
371 vs->server.ds = g_malloc0(sizeof(*vs->server.ds));
372 if (vs->server.ds->data)
373 g_free(vs->server.ds->data);
374 *(vs->server.ds) = *(ds->surface);
375 vs->server.ds->data = g_malloc0(vs->server.ds->linesize *
376 vs->server
[all...]
/external/bluetooth/bluedroid/btif/src/
H A Dbtif_sock_rfc.c77 int server : 1; member in struct:__anon1094
242 static rfc_slot_t* alloc_rfc_slot(const bt_bdaddr_t *addr, const char* name, const uint8_t* uuid, int channel, int flags, BOOLEAN server) argument
246 security |= server ? BTM_SEC_IN_ENCRYPT : BTM_SEC_OUT_ENCRYPT;
248 security |= server ? BTM_SEC_IN_AUTHENTICATE : BTM_SEC_OUT_AUTHENTICATE;
274 rs->f.server = server;
286 accept_rs->f.server = FALSE;
293 //now update listen rfc_handle of server slot
485 if(rs->f.server && !rs->f.closing && rs->rfc_handle)
490 if(rs->f.server)
[all...]
/external/chromium_org/ipc/
H A Dipc_sync_channel_unittest.cc588 // Tests a server calling Send while another Send is pending.
736 // This class provides server side functionality to test the case where
881 void NestedCallback(Worker* server) { argument
884 server->SendAnswerToLife(true, true);
1025 ServerSendAfterClose server; local
1026 server.Start();
1028 server.done_event()->Wait();
1029 server.done_event()->Reset();
1031 server.SendDummy();
1032 server
1115 RestrictedDispatchClient(WaitableEvent* sent_ping_event, RestrictedDispatchServer* server, NonRestrictedDispatchServer* server2, int* success) argument
1221 RestrictedDispatchServer* server = local
1322 RestrictedDispatchDeadlockClient2(RestrictedDispatchDeadlockServer* server, WaitableEvent* server_ready_event, WaitableEvent** events) argument
1380 RestrictedDispatchDeadlockClient1(RestrictedDispatchDeadlockServer* server, RestrictedDispatchDeadlockClient2* peer, WaitableEvent* server_ready_event, WaitableEvent** events) argument
[all...]

Completed in 651 milliseconds

1234567891011>>