Searched defs:server (Results 251 - 275 of 297) sorted by relevance

<<1112

/external/libvncserver/x11vnc/
H A Denc.h57 * your VNC viewer or server to discard (or insert) this extra data.
64 * any-client <=> ultravnc_dsm_helper <--network--> ultravnc_dsm_helper(reverse mode) <=> any-server
66 * e.g. to connect a non-ultra-dsm-vnc viewer to a non-ultra-dsm-vnc server
133 " used as a server RSA keystore in this mode. If 'keyfile' does not\n"
135 " hash of it is shown) If 'keyfile' already exists the server key\n"
148 " (i.e. if you want to use it for a vnc server, not vnc viewer)\n"
167 " remotehost:port: host and port to connect to. (e.g. ultravnc server)\n"
733 * reverse mode, e.g. we help a vnc server instead of a viewer.
797 "UVNC Single Click server.\n", prog, n);
1164 fprintf(stderr, "checkserver_rsa: MD5 sum of server ke
1239 int server = reverse ? conn1 : conn2; local
1673 struct sockaddr_in client, server; local
[all...]
/external/mesa3d/src/mesa/drivers/x11/
H A Dglxapi.c691 glXCreateGLXVideoSourceSGIX(Display *dpy, int screen, VLServer server, VLPath path, int nodeClass, VLNode drainNode) argument
697 return (t->CreateGLXVideoSourceSGIX)(dpy, screen, server, path, nodeClass, drainNode);
H A Dfakeglx.c63 /* This indicates the server-side GLX decoder version.
2457 Fake_glXCreateGLXVideoSourceSGIX(Display *dpy, int screen, VLServer server, VLPath path, int nodeClass, VLNode drainNode) argument
2461 (void) server;
/external/okhttp/okhttp-android-support/src/test/java/com/squareup/okhttp/internal/huc/
H A DResponseCacheTest.java107 private MockWebServer server; field in class:ResponseCacheTest
113 server = serverRule.get();
114 server.setProtocolNegotiationEnabled(false);
194 server = new MockWebServer();
206 server.enqueue(mockResponse);
207 server.start();
209 URL url = server.getUrl("/");
222 server.shutdown(); // tearDown() isn't sufficient; this test starts multiple servers
247 server.enqueue(mockResponse);
250 HttpURLConnection urlConnection = openConnection(server
[all...]
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/
H A DCacheTest.java85 private MockWebServer server; field in class:CacheTest
91 server = serverRule.get();
92 server.setProtocolNegotiationEnabled(false);
163 server = new MockWebServer();
175 server.enqueue(mockResponse);
176 server.start();
179 .url(server.getUrl("/"))
194 server.shutdown(); // tearDown() isn't sufficient; this test starts multiple servers
219 server.enqueue(mockResponse);
222 Request request = new Request.Builder().url(server
[all...]
/external/okhttp/okhttp-urlconnection/src/test/java/com/squareup/okhttp/
H A DUrlConnectionCacheTest.java90 private MockWebServer server; field in class:UrlConnectionCacheTest
96 server = serverRule.get();
97 server.setProtocolNegotiationEnabled(false);
172 server = new MockWebServer();
184 server.enqueue(response);
185 server.start();
187 URL url = server.getUrl("/");
201 server.shutdown(); // tearDown() isn't sufficient; this test starts multiple servers
226 server.enqueue(response);
229 HttpURLConnection urlConnection = client.open(server
[all...]
/external/ppp/pppd/plugins/radius/
H A Dradiusclient.h54 typedef struct server { struct
352 char *server; /* Name/addrress of RADIUS server */ member in struct:send_data
/external/regex-re2/lib/codereview/
H A Dcodereview.py28 server = codereview.appspot.com
30 The server should be running Rietveld; see http://code.google.com/p/rietveld/.
68 server = "codereview.appspot.com" variable
190 # where nnnnnn is the number assigned by the code review server.
191 # Most data about a change list is stored on the code review server
528 return None, "cannot load CL %s from server" % (name,)
530 return None, "malformed response loading CL data from code review server"
1388 """log in to code review server
1390 Logs in to the code review server, saving a cookie in
1404 """import a patch from the code review server
[all...]
/external/toybox/toys/pending/
H A Ddhcp.c32 -O Request option OPT from server (cumulative)
36 -F Ask server to update DNS mapping for NAME
207 in_addr_t server = 0; variable
868 // adds server id to dhcp packet.
1022 case DHCPREQUEST: // Send REQUEST message to the server that sent the *first* OFFER
1026 rqsd.s_addr = htonl(server);
1036 case DHCPRELEASE: // Send RELEASE message to the server.
1038 rqsd.s_addr = htonl(server);
1239 temp_addr.s_addr = htonl(server);
1341 server
[all...]
/external/wpa_supplicant_8/hostapd/src/radius/
H A Dradius_server.c2 * RADIUS authentication server
44 * struct radius_server_counters - RADIUS server statistics counters
67 * struct radius_session - Internal RADIUS server data for a session
72 struct radius_server_data *server; member in struct:radius_session
95 * struct radius_client - Internal RADIUS server data for a client
112 * struct radius_server_data - Internal RADIUS server data
150 * This is passed to the EAP-SIM/AKA server implementation as a
158 * This is passed to the EAP server implementation as a callback
192 * example, this could be the enterprise and server names in
218 * This is a soft limit on the PAC-Key. The server wil
[all...]
/external/wpa_supplicant_8/src/radius/
H A Dradius_server.c2 * RADIUS authentication server
44 * struct radius_server_counters - RADIUS server statistics counters
67 * struct radius_session - Internal RADIUS server data for a session
72 struct radius_server_data *server; member in struct:radius_session
95 * struct radius_client - Internal RADIUS server data for a client
112 * struct radius_server_data - Internal RADIUS server data
150 * This is passed to the EAP-SIM/AKA server implementation as a
158 * This is passed to the EAP server implementation as a callback
192 * example, this could be the enterprise and server names in
218 * This is a soft limit on the PAC-Key. The server wil
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/radius/
H A Dradius_server.c2 * RADIUS authentication server
44 * struct radius_server_counters - RADIUS server statistics counters
67 * struct radius_session - Internal RADIUS server data for a session
72 struct radius_server_data *server; member in struct:radius_session
95 * struct radius_client - Internal RADIUS server data for a client
112 * struct radius_server_data - Internal RADIUS server data
150 * This is passed to the EAP-SIM/AKA server implementation as a
158 * This is passed to the EAP server implementation as a callback
192 * example, this could be the enterprise and server names in
218 * This is a soft limit on the PAC-Key. The server wil
[all...]
/external/robolectric/lib/main/
H A Dh2-1.2.147.jar ... updateTopic (java.lang.String, org.h2.server.web.DbContextRule) public java.util.ArrayList ...
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/org.apache.ant_1.7.1.v20090120-1145/lib/
H A Dant-commons-net.jarMETA-INF/ META-INF/MANIFEST.MF org/ org/apache/ org/apache/tools/ org/apache/tools/ant/ ...
/external/mesa3d/src/gallium/state_trackers/glx/xlib/
H A Dglx_api.c43 /* This indicates the server-side GLX decoder version.
2251 glXCreateGLXVideoSourceSGIX(Display *dpy, int screen, VLServer server, argument
2256 (void) server;
/external/netperf/
H A Dnettest_bsd.c1445 /* Tell the remote end to do a listen. The server alters the
1506 /* we have to make sure that the server port number is in
2140 /* Tell the remote end to do a listen. The server alters the
2202 /* we have to make sure that the server port number is in
2873 /* Tell the remote end to do a listen. The server alters the socket */
2932 /* we have to make sure that the server port number is in */
3499 struct sockaddr_in server;
3540 bzero((char *)&server,
3541 sizeof(server));
3674 /* Tell the remote end to do a listen. The server alter
3489 struct sockaddr_in server; local
9111 struct sockaddr_in server; local
10181 struct sockaddr_storage server; local
[all...]
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/http/
H A DURLConnectionTest.java119 @Rule public final MockWebServerRule server = new MockWebServerRule(); field in class:URLConnectionTest
128 server.get().setProtocolNegotiationEnabled(false);
147 server.enqueue(new MockResponse());
149 connection = client.open(server.getUrl("/"));
183 RecordedRequest request = server.takeRequest();
208 connection = client.open(server.getUrl("/"));
215 server.enqueue(new MockResponse().setStatus("HTTP/1.0 200 Fantastic")
221 connection = client.open(server.getUrl("/"));
248 server.enqueue(new MockResponse().setStatus("HTP/1.1 200 OK"));
250 connection = client.open(server
3235 connect( MockWebServer server, OkUrlFactory streamHandlerFactory, URL url) argument
[all...]
/external/v8/tools/
H A Dgrokdump.py1973 return self.server.get_dump_formatter(name)
1990 self.server.output_dumps(self.wfile)
2032 if self.server.set_dump_desc(name, description):
2080 self.server = http_server
2169 self.server.output_dump_desc_field(f, self.dumpfilename)
3130 help="start a web server on localhost:%i" % PORT_NUMBER)
3151 server = InspectionWebServer(PORT_NUMBER, options, args[0]) variable
3154 server.serve_forever()
3156 print '^C received, shutting down the web server'
3157 server
[all...]
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dtls_openssl.c98 /* SessionTicket received from OpenSSL hello_extension_cb (server) */
1552 * invalid pinned server certificates.
1559 "server certificate data");
1578 "OpenSSL: Ignore validation issues for a pinned server certificate");
1634 wpa_printf(MSG_DEBUG, "OpenSSL: Reject server certificate "
1706 wpa_printf(MSG_DEBUG, "OpenSSL: Probe for server certificate "
1716 if (os_strncmp(pos, "server/sha256/", 14) != 0) {
1733 wpa_printf(MSG_DEBUG, "OpenSSL: Checking only server "
1738 "cannot validate server certificate hash");
1839 /* No ca_cert configured - do not try to verify server
2811 openssl_handshake(struct tls_connection *conn, const struct wpabuf *in_data, int server) argument
2915 openssl_connection_handshake(struct tls_connection *conn, const struct wpabuf *in_data, struct wpabuf **appl_data, int server) argument
[all...]
/external/wpa_supplicant_8/src/crypto/
H A Dtls_openssl.c98 /* SessionTicket received from OpenSSL hello_extension_cb (server) */
1552 * invalid pinned server certificates.
1559 "server certificate data");
1578 "OpenSSL: Ignore validation issues for a pinned server certificate");
1634 wpa_printf(MSG_DEBUG, "OpenSSL: Reject server certificate "
1706 wpa_printf(MSG_DEBUG, "OpenSSL: Probe for server certificate "
1716 if (os_strncmp(pos, "server/sha256/", 14) != 0) {
1733 wpa_printf(MSG_DEBUG, "OpenSSL: Checking only server "
1738 "cannot validate server certificate hash");
1839 /* No ca_cert configured - do not try to verify server
2811 openssl_handshake(struct tls_connection *conn, const struct wpabuf *in_data, int server) argument
2915 openssl_connection_handshake(struct tls_connection *conn, const struct wpabuf *in_data, struct wpabuf **appl_data, int server) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dtls_openssl.c98 /* SessionTicket received from OpenSSL hello_extension_cb (server) */
1552 * invalid pinned server certificates.
1559 "server certificate data");
1578 "OpenSSL: Ignore validation issues for a pinned server certificate");
1634 wpa_printf(MSG_DEBUG, "OpenSSL: Reject server certificate "
1706 wpa_printf(MSG_DEBUG, "OpenSSL: Probe for server certificate "
1716 if (os_strncmp(pos, "server/sha256/", 14) != 0) {
1733 wpa_printf(MSG_DEBUG, "OpenSSL: Checking only server "
1738 "cannot validate server certificate hash");
1839 /* No ca_cert configured - do not try to verify server
2811 openssl_handshake(struct tls_connection *conn, const struct wpabuf *in_data, int server) argument
2915 openssl_connection_handshake(struct tls_connection *conn, const struct wpabuf *in_data, struct wpabuf **appl_data, int server) argument
[all...]
/external/boringssl/src/ssl/
H A Dssl_lib.c188 if (ssl->server) {
796 * are a server, it does not. */
1397 if (ssl->server || !session || !session->tlsext_signed_cert_timestamp_list) {
1411 if (ssl->server || !session || !session->ocsp_response) {
1428 * 1) If the server doesn't support NPN then this is indicated to the
1432 * 2) If the server supports NPN, but advertises an empty list then the
1436 * 3) Otherwise, the client finds the first protocol in the server's list
1438 * assumed that the server has better information about which protocol
1441 * 4) If the client doesn't support any of the server's advertised
1448 int SSL_select_next_proto(uint8_t **out, uint8_t *outlen, const uint8_t *server, argument
[all...]
/external/dnsmasq/src/
H A Ddnsmasq.h308 #define SERV_NO_ADDR 2 /* no server, this domain is local only */
309 #define SERV_LITERAL_ADDRESS 4 /* addr is the answer, not the server */
310 #define SERV_HAS_DOMAIN 8 /* server for one domain only */
312 #define SERV_FOR_NODOTS 32 /* server for names with no domain part only */
332 struct server { struct
336 char *domain; /* set if this server only handles a domain. */
340 struct server *next;
385 struct server *sentto; /* NULL means free */
504 struct in_addr server; member in struct:pxe_service
622 struct server *server
[all...]
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/
H A Dorg.eclipse.ecf_3.1.0.v20100529-0735.jarMETA-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ...
/external/mdnsresponder/mDNSCore/
H A DmDNS.c928 // The records might already be registered with the server and hence could have NAT state.
1486 // from the server. In that case, if the records have been part of a group update, clear the
2465 // For Unicast, when we get the response from the server, we will call CompleteDeregistration
3443 // When this question penalizes a DNS server and has no more DNS servers to pick, we normally
3447 // that time, we need to make sure that we have a valid DNS server. Otherwise, we will deliver
3448 // a negative cache response without trying the server.
3637 // When a question changes DNS server, it is marked with deliverAddEvents if we find any
3638 // cache entry corresponding to the new DNS server. Before we deliver the ADD event, the
3731 // then 95-97% of the TTL. If the DNS server does not respond, then we will remove the cache entry
3732 // before we pick a new DNS server
7752 PenaltyTimeForServer(mDNS *m, DNSServer *server) argument
[all...]

Completed in 725 milliseconds

<<1112