/external/mesa3d/src/gallium/state_trackers/glx/xlib/ |
H A D | glx_api.c | 43 /* This indicates the server-side GLX decoder version. 2251 glXCreateGLXVideoSourceSGIX(Display *dpy, int screen, VLServer server, argument 2256 (void) server;
|
/external/mesa3d/src/mesa/drivers/x11/ |
H A D | fakeglx.c | 63 /* This indicates the server-side GLX decoder version. 2457 Fake_glXCreateGLXVideoSourceSGIX(Display *dpy, int screen, VLServer server, VLPath path, int nodeClass, VLNode drainNode) argument 2461 (void) server;
|
/external/netperf/ |
H A D | nettest_bsd.c | 1445 /* Tell the remote end to do a listen. The server alters the 1506 /* we have to make sure that the server port number is in 2140 /* Tell the remote end to do a listen. The server alters the 2202 /* we have to make sure that the server port number is in 2873 /* Tell the remote end to do a listen. The server alters the socket */ 2932 /* we have to make sure that the server port number is in */ 3499 struct sockaddr_in server; 3540 bzero((char *)&server, 3541 sizeof(server)); 3674 /* Tell the remote end to do a listen. The server alter 3489 struct sockaddr_in server; local 9111 struct sockaddr_in server; local 10181 struct sockaddr_storage server; local [all...] |
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/http/ |
H A D | URLConnectionTest.java | 106 private MockWebServer server = new MockWebServer(); field in class:URLConnectionTest 115 hostName = server.getHostName(); 116 server.setNpnEnabled(false); 127 server.shutdown(); 135 server.enqueue(new MockResponse()); 136 server.play(); 138 connection = client.open(server.getUrl("/")); 172 RecordedRequest request = server.takeRequest(); 198 server.play(); 199 connection = client.open(server 3140 connect(MockWebServer server, OkHttpClient client, URL url) argument [all...] |
/external/openssl/ssl/ |
H A D | ssl_lib.c | 219 s->state=SSL_ST_BEFORE|((s->server)?SSL_ST_ACCEPT:SSL_ST_CONNECT); 384 s->server=(ctx->method->ssl_accept == ssl_undefined_function)?0:1; 882 * certificate; if we are a server, it does not. */ 1545 fprintf(stderr, "SCSV received by server\n"); 1622 * 1) If the server doesn't support NPN then this is indicated to the 1626 * 2) If the server supports NPN, but advertises an empty list then the 1630 * 3) Otherwise, the client finds the first protocol in the server's list 1632 * assumed that the server has better information about which protocol 1635 * 4) If the client doesn't support any of the server's advertised 1642 int SSL_select_next_proto(unsigned char **out, unsigned char *outlen, const unsigned char *server, unsigne argument [all...] |
H A D | ssl.h | 397 unsigned long algorithm_auth; /* server authentication */ 462 * Ticket_lifetime_hint [9] EXPLICIT INTEGER, -- server's lifetime hint for session ticket 600 /* As server, disallow session resumption on renegotiation */ 613 /* Set on servers to choose the cipher according to the server's 616 /* If set, a server will allow a client to issue a SSLv3.0 version number 638 /* Make server add server-hello extension from early version of 776 * server. Return value should be zero on an error, non-zero to proceed. Also, 1006 /* For a server, this contains a callback function by which the set of 1012 * next protocol from the list provided by the server 1247 int server; /* are we the server side? - mostly used by SSL_clear*/ member in struct:ssl_st [all...] |
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | tls_openssl.c | 113 /* SessionTicket received from OpenSSL hello_extension_cb (server) */ 1454 "server certificate data"); 1513 wpa_printf(MSG_DEBUG, "OpenSSL: Reject server certificate " 1584 wpa_printf(MSG_DEBUG, "OpenSSL: Probe for server certificate " 1594 if (os_strncmp(pos, "server/sha256/", 14) != 0) { 1611 wpa_printf(MSG_DEBUG, "OpenSSL: Checking only server " 1616 "cannot validate server certificate hash"); 1715 /* No ca_cert configured - do not try to verify server 1826 * since not all areas of the server code are ready for it (e.g., 2567 int server) 2566 openssl_handshake(struct tls_connection *conn, const struct wpabuf *in_data, int server) argument 2670 openssl_connection_handshake(struct tls_connection *conn, const struct wpabuf *in_data, struct wpabuf **appl_data, int server) argument [all...] |
/external/wpa_supplicant_8/src/crypto/ |
H A D | tls_openssl.c | 113 /* SessionTicket received from OpenSSL hello_extension_cb (server) */ 1454 "server certificate data"); 1513 wpa_printf(MSG_DEBUG, "OpenSSL: Reject server certificate " 1584 wpa_printf(MSG_DEBUG, "OpenSSL: Probe for server certificate " 1594 if (os_strncmp(pos, "server/sha256/", 14) != 0) { 1611 wpa_printf(MSG_DEBUG, "OpenSSL: Checking only server " 1616 "cannot validate server certificate hash"); 1715 /* No ca_cert configured - do not try to verify server 1826 * since not all areas of the server code are ready for it (e.g., 2567 int server) 2566 openssl_handshake(struct tls_connection *conn, const struct wpabuf *in_data, int server) argument 2670 openssl_connection_handshake(struct tls_connection *conn, const struct wpabuf *in_data, struct wpabuf **appl_data, int server) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | tls_openssl.c | 113 /* SessionTicket received from OpenSSL hello_extension_cb (server) */ 1454 "server certificate data"); 1513 wpa_printf(MSG_DEBUG, "OpenSSL: Reject server certificate " 1584 wpa_printf(MSG_DEBUG, "OpenSSL: Probe for server certificate " 1594 if (os_strncmp(pos, "server/sha256/", 14) != 0) { 1611 wpa_printf(MSG_DEBUG, "OpenSSL: Checking only server " 1616 "cannot validate server certificate hash"); 1715 /* No ca_cert configured - do not try to verify server 1826 * since not all areas of the server code are ready for it (e.g., 2567 int server) 2566 openssl_handshake(struct tls_connection *conn, const struct wpabuf *in_data, int server) argument 2670 openssl_connection_handshake(struct tls_connection *conn, const struct wpabuf *in_data, struct wpabuf **appl_data, int server) argument [all...] |
/external/chromium_org/third_party/libevent/ |
H A D | evdns.c | 169 struct nameserver *ns; /* the server which we last sent it */ 215 int failed_times; /* number of times which we have given this server a chance */ 221 /* when we next probe this server. */ 223 char state; /* zero if we think that this server is down */ 224 char choked; /* true if we have an EAGAIN from this server's socket */ 257 /* Represents a request that we've received as a DNS server, and holds */ 310 static int global_max_reissues = 1; /* a reissue occurs when we get some errors from the server */ 312 /* number of timeouts in a row before we consider this server to be down */ 511 /* a different server. Requests in the waiting queue don't have a */ 524 /* to another server */ 1914 evdns_request_transmit_to(struct request *req, struct nameserver *server) argument 2041 const struct nameserver *server = server_head; local 2056 struct nameserver *server = server_head, *started_at = server_head; local 2116 const struct nameserver *server = server_head, *const started_at = server_head; local 3036 struct nameserver *server, *server_next; local [all...] |
/external/dnsmasq/src/ |
H A D | dnsmasq.h | 308 #define SERV_NO_ADDR 2 /* no server, this domain is local only */ 309 #define SERV_LITERAL_ADDRESS 4 /* addr is the answer, not the server */ 310 #define SERV_HAS_DOMAIN 8 /* server for one domain only */ 312 #define SERV_FOR_NODOTS 32 /* server for names with no domain part only */ 332 struct server { struct 336 char *domain; /* set if this server only handles a domain. */ 340 struct server *next; 385 struct server *sentto; /* NULL means free */ 504 struct in_addr server; member in struct:pxe_service 622 struct server *server [all...] |
/external/chromium_org/third_party/libjingle/source/talk/app/webrtc/java/jni/ |
H A D | peerconnection_jni.cc | 2953 PeerConnectionInterface::IceServer server; local 2954 server.uri = JavaToStdString(jni, uri); 2955 server.username = JavaToStdString(jni, username); 2956 server.password = JavaToStdString(jni, password); 2957 ice_servers->push_back(server);
|
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
H A D | org.eclipse.ecf_3.1.0.v20100529-0735.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
H A D | org.mortbay.jetty.server_6.1.23.v201004211559.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
H A D | org.eclipse.help.base_3.5.2.v201011171123.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
H A D | org.mortbay.jetty.util_6.1.23.v201004211559.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
H A D | org.eclipse.pde.core_3.6.1.v20100902_r361.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
H A D | org.apache.commons.httpclient_3.1.0.v201005080502.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
/external/mdnsresponder/mDNSCore/ |
H A D | mDNS.c | 928 // The records might already be registered with the server and hence could have NAT state. 1486 // from the server. In that case, if the records have been part of a group update, clear the 2465 // For Unicast, when we get the response from the server, we will call CompleteDeregistration 3443 // When this question penalizes a DNS server and has no more DNS servers to pick, we normally 3447 // that time, we need to make sure that we have a valid DNS server. Otherwise, we will deliver 3448 // a negative cache response without trying the server. 3637 // When a question changes DNS server, it is marked with deliverAddEvents if we find any 3638 // cache entry corresponding to the new DNS server. Before we deliver the ADD event, the 3731 // then 95-97% of the TTL. If the DNS server does not respond, then we will remove the cache entry 3732 // before we pick a new DNS server 7752 PenaltyTimeForServer(mDNS *m, DNSServer *server) argument [all...] |
/external/chromium_org/net/third_party/nss/ssl/ |
H A D | sslimpl.h | 350 /* Configuration state for server sockets */ 603 ssl3KeyMaterial server; member in struct:__anon9711 607 SECItem srvVirtName; /* for server: name that was negotiated 668 /* values that are copied into the server's on-disk SID cache. */ 685 /* The following values are NOT restored from the server's on-disk 717 * handshake prior to the server's final flow. This is either a 818 /* registered callbacks that send server hello extensions */ 920 PRBool usedStepDownKey; /* we did a server key exchange. */ 934 TLSFinished tFinished[2]; /* client, then server */ 1022 /* used by server [all...] |
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/org.apache.ant_1.7.1.v20090120-1145/lib/ |
H A D | ant-starteam.jar | ... .ant.BuildException com.starbase.starteam.Server s
protected com.starbase.starteam.Server getServer ... |
H A D | ant-nodeps.jar | META-INF/ META-INF/MANIFEST.MF org/ org/apache/ org/apache/tools/ org/apache/tools/ant/ ... |
/external/chromium_org/third_party/boringssl/src/include/openssl/ |
H A D | ssl.h | 315 unsigned long algorithm_auth; /* server authentication */ 378 * Ticket_lifetime_hint [9] EXPLICIT INTEGER, -- server's lifetime hint for session ticket 385 * ocsp_response [16] EXPLICIT OCTET STRING, -- optional saved OCSP response from the server 497 /* As server, disallow session resumption on renegotiation */ 597 /* Client CA issuer names match (always set for server cert) */ 599 /* Cert type matches client types (always set for server cert) */ 700 * server. Return value should be zero on an error, non-zero to proceed. Also, 715 * early on during the server handshake. At this point, much of the SSL* 754 * server picks the cipher and groups cannot be expressed on the wire. However, 797 * in use. This only applies to server connection 1261 int server; /* are we the server side? - mostly used by SSL_clear*/ member in struct:ssl_st [all...] |
/external/openssl/include/openssl/ |
H A D | ssl.h | 397 unsigned long algorithm_auth; /* server authentication */ 462 * Ticket_lifetime_hint [9] EXPLICIT INTEGER, -- server's lifetime hint for session ticket 600 /* As server, disallow session resumption on renegotiation */ 613 /* Set on servers to choose the cipher according to the server's 616 /* If set, a server will allow a client to issue a SSLv3.0 version number 638 /* Make server add server-hello extension from early version of 776 * server. Return value should be zero on an error, non-zero to proceed. Also, 1006 /* For a server, this contains a callback function by which the set of 1012 * next protocol from the list provided by the server 1247 int server; /* are we the server side? - mostly used by SSL_clear*/ member in struct:ssl_st [all...] |
/external/qemu/qapi-auto-generated/ |
H A D | qapi-types.h | 2921 bool server; member in struct:ChardevSocket
|