/external/libvncserver/x11vnc/ |
H A D | enc.h | 57 * your VNC viewer or server to discard (or insert) this extra data. 64 * any-client <=> ultravnc_dsm_helper <--network--> ultravnc_dsm_helper(reverse mode) <=> any-server 66 * e.g. to connect a non-ultra-dsm-vnc viewer to a non-ultra-dsm-vnc server 133 " used as a server RSA keystore in this mode. If 'keyfile' does not\n" 135 " hash of it is shown) If 'keyfile' already exists the server key\n" 148 " (i.e. if you want to use it for a vnc server, not vnc viewer)\n" 167 " remotehost:port: host and port to connect to. (e.g. ultravnc server)\n" 733 * reverse mode, e.g. we help a vnc server instead of a viewer. 797 "UVNC Single Click server.\n", prog, n); 1164 fprintf(stderr, "checkserver_rsa: MD5 sum of server ke 1239 int server = reverse ? conn1 : conn2; local 1673 struct sockaddr_in client, server; local [all...] |
/external/mesa3d/src/mesa/drivers/x11/ |
H A D | glxapi.c | 691 glXCreateGLXVideoSourceSGIX(Display *dpy, int screen, VLServer server, VLPath path, int nodeClass, VLNode drainNode) argument 697 return (t->CreateGLXVideoSourceSGIX)(dpy, screen, server, path, nodeClass, drainNode);
|
H A D | fakeglx.c | 63 /* This indicates the server-side GLX decoder version. 2457 Fake_glXCreateGLXVideoSourceSGIX(Display *dpy, int screen, VLServer server, VLPath path, int nodeClass, VLNode drainNode) argument 2461 (void) server;
|
/external/okhttp/okhttp-android-support/src/test/java/com/squareup/okhttp/internal/huc/ |
H A D | ResponseCacheTest.java | 107 private MockWebServer server; field in class:ResponseCacheTest 113 server = serverRule.get(); 114 server.setProtocolNegotiationEnabled(false); 194 server = new MockWebServer(); 206 server.enqueue(mockResponse); 207 server.start(); 209 URL url = server.getUrl("/"); 222 server.shutdown(); // tearDown() isn't sufficient; this test starts multiple servers 247 server.enqueue(mockResponse); 250 HttpURLConnection urlConnection = openConnection(server [all...] |
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/ |
H A D | CacheTest.java | 85 private MockWebServer server; field in class:CacheTest 91 server = serverRule.get(); 92 server.setProtocolNegotiationEnabled(false); 163 server = new MockWebServer(); 175 server.enqueue(mockResponse); 176 server.start(); 179 .url(server.getUrl("/")) 194 server.shutdown(); // tearDown() isn't sufficient; this test starts multiple servers 219 server.enqueue(mockResponse); 222 Request request = new Request.Builder().url(server [all...] |
/external/okhttp/okhttp-urlconnection/src/test/java/com/squareup/okhttp/ |
H A D | UrlConnectionCacheTest.java | 90 private MockWebServer server; field in class:UrlConnectionCacheTest 96 server = serverRule.get(); 97 server.setProtocolNegotiationEnabled(false); 172 server = new MockWebServer(); 184 server.enqueue(response); 185 server.start(); 187 URL url = server.getUrl("/"); 201 server.shutdown(); // tearDown() isn't sufficient; this test starts multiple servers 226 server.enqueue(response); 229 HttpURLConnection urlConnection = client.open(server [all...] |
/external/ppp/pppd/plugins/radius/ |
H A D | radiusclient.h | 54 typedef struct server { struct 352 char *server; /* Name/addrress of RADIUS server */ member in struct:send_data
|
/external/regex-re2/lib/codereview/ |
H A D | codereview.py | 28 server = codereview.appspot.com 30 The server should be running Rietveld; see http://code.google.com/p/rietveld/. 68 server = "codereview.appspot.com" variable 190 # where nnnnnn is the number assigned by the code review server. 191 # Most data about a change list is stored on the code review server 528 return None, "cannot load CL %s from server" % (name,) 530 return None, "malformed response loading CL data from code review server" 1388 """log in to code review server 1390 Logs in to the code review server, saving a cookie in 1404 """import a patch from the code review server [all...] |
/external/toybox/toys/pending/ |
H A D | dhcp.c | 32 -O Request option OPT from server (cumulative) 36 -F Ask server to update DNS mapping for NAME 207 in_addr_t server = 0; variable 868 // adds server id to dhcp packet. 1022 case DHCPREQUEST: // Send REQUEST message to the server that sent the *first* OFFER 1026 rqsd.s_addr = htonl(server); 1036 case DHCPRELEASE: // Send RELEASE message to the server. 1038 rqsd.s_addr = htonl(server); 1239 temp_addr.s_addr = htonl(server); 1341 server [all...] |
/external/wpa_supplicant_8/hostapd/src/radius/ |
H A D | radius_server.c | 2 * RADIUS authentication server 44 * struct radius_server_counters - RADIUS server statistics counters 67 * struct radius_session - Internal RADIUS server data for a session 72 struct radius_server_data *server; member in struct:radius_session 95 * struct radius_client - Internal RADIUS server data for a client 112 * struct radius_server_data - Internal RADIUS server data 150 * This is passed to the EAP-SIM/AKA server implementation as a 158 * This is passed to the EAP server implementation as a callback 192 * example, this could be the enterprise and server names in 218 * This is a soft limit on the PAC-Key. The server wil [all...] |
/external/wpa_supplicant_8/src/radius/ |
H A D | radius_server.c | 2 * RADIUS authentication server 44 * struct radius_server_counters - RADIUS server statistics counters 67 * struct radius_session - Internal RADIUS server data for a session 72 struct radius_server_data *server; member in struct:radius_session 95 * struct radius_client - Internal RADIUS server data for a client 112 * struct radius_server_data - Internal RADIUS server data 150 * This is passed to the EAP-SIM/AKA server implementation as a 158 * This is passed to the EAP server implementation as a callback 192 * example, this could be the enterprise and server names in 218 * This is a soft limit on the PAC-Key. The server wil [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/radius/ |
H A D | radius_server.c | 2 * RADIUS authentication server 44 * struct radius_server_counters - RADIUS server statistics counters 67 * struct radius_session - Internal RADIUS server data for a session 72 struct radius_server_data *server; member in struct:radius_session 95 * struct radius_client - Internal RADIUS server data for a client 112 * struct radius_server_data - Internal RADIUS server data 150 * This is passed to the EAP-SIM/AKA server implementation as a 158 * This is passed to the EAP server implementation as a callback 192 * example, this could be the enterprise and server names in 218 * This is a soft limit on the PAC-Key. The server wil [all...] |
/external/robolectric/lib/main/ |
H A D | h2-1.2.147.jar | ... updateTopic (java.lang.String, org.h2.server.web.DbContextRule) public java.util.ArrayList ... |
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/org.apache.ant_1.7.1.v20090120-1145/lib/ |
H A D | ant-commons-net.jar | META-INF/ META-INF/MANIFEST.MF org/ org/apache/ org/apache/tools/ org/apache/tools/ant/ ... |
/external/mesa3d/src/gallium/state_trackers/glx/xlib/ |
H A D | glx_api.c | 43 /* This indicates the server-side GLX decoder version. 2251 glXCreateGLXVideoSourceSGIX(Display *dpy, int screen, VLServer server, argument 2256 (void) server;
|
/external/netperf/ |
H A D | nettest_bsd.c | 1445 /* Tell the remote end to do a listen. The server alters the 1506 /* we have to make sure that the server port number is in 2140 /* Tell the remote end to do a listen. The server alters the 2202 /* we have to make sure that the server port number is in 2873 /* Tell the remote end to do a listen. The server alters the socket */ 2932 /* we have to make sure that the server port number is in */ 3499 struct sockaddr_in server; 3540 bzero((char *)&server, 3541 sizeof(server)); 3674 /* Tell the remote end to do a listen. The server alter 3489 struct sockaddr_in server; local 9111 struct sockaddr_in server; local 10181 struct sockaddr_storage server; local [all...] |
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/http/ |
H A D | URLConnectionTest.java | 119 @Rule public final MockWebServerRule server = new MockWebServerRule(); field in class:URLConnectionTest 128 server.get().setProtocolNegotiationEnabled(false); 147 server.enqueue(new MockResponse()); 149 connection = client.open(server.getUrl("/")); 183 RecordedRequest request = server.takeRequest(); 208 connection = client.open(server.getUrl("/")); 215 server.enqueue(new MockResponse().setStatus("HTTP/1.0 200 Fantastic") 221 connection = client.open(server.getUrl("/")); 248 server.enqueue(new MockResponse().setStatus("HTP/1.1 200 OK")); 250 connection = client.open(server 3235 connect( MockWebServer server, OkUrlFactory streamHandlerFactory, URL url) argument [all...] |
/external/v8/tools/ |
H A D | grokdump.py | 1973 return self.server.get_dump_formatter(name) 1990 self.server.output_dumps(self.wfile) 2032 if self.server.set_dump_desc(name, description): 2080 self.server = http_server 2169 self.server.output_dump_desc_field(f, self.dumpfilename) 3130 help="start a web server on localhost:%i" % PORT_NUMBER) 3151 server = InspectionWebServer(PORT_NUMBER, options, args[0]) variable 3154 server.serve_forever() 3156 print '^C received, shutting down the web server' 3157 server [all...] |
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | tls_openssl.c | 98 /* SessionTicket received from OpenSSL hello_extension_cb (server) */ 1552 * invalid pinned server certificates. 1559 "server certificate data"); 1578 "OpenSSL: Ignore validation issues for a pinned server certificate"); 1634 wpa_printf(MSG_DEBUG, "OpenSSL: Reject server certificate " 1706 wpa_printf(MSG_DEBUG, "OpenSSL: Probe for server certificate " 1716 if (os_strncmp(pos, "server/sha256/", 14) != 0) { 1733 wpa_printf(MSG_DEBUG, "OpenSSL: Checking only server " 1738 "cannot validate server certificate hash"); 1839 /* No ca_cert configured - do not try to verify server 2811 openssl_handshake(struct tls_connection *conn, const struct wpabuf *in_data, int server) argument 2915 openssl_connection_handshake(struct tls_connection *conn, const struct wpabuf *in_data, struct wpabuf **appl_data, int server) argument [all...] |
/external/wpa_supplicant_8/src/crypto/ |
H A D | tls_openssl.c | 98 /* SessionTicket received from OpenSSL hello_extension_cb (server) */ 1552 * invalid pinned server certificates. 1559 "server certificate data"); 1578 "OpenSSL: Ignore validation issues for a pinned server certificate"); 1634 wpa_printf(MSG_DEBUG, "OpenSSL: Reject server certificate " 1706 wpa_printf(MSG_DEBUG, "OpenSSL: Probe for server certificate " 1716 if (os_strncmp(pos, "server/sha256/", 14) != 0) { 1733 wpa_printf(MSG_DEBUG, "OpenSSL: Checking only server " 1738 "cannot validate server certificate hash"); 1839 /* No ca_cert configured - do not try to verify server 2811 openssl_handshake(struct tls_connection *conn, const struct wpabuf *in_data, int server) argument 2915 openssl_connection_handshake(struct tls_connection *conn, const struct wpabuf *in_data, struct wpabuf **appl_data, int server) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | tls_openssl.c | 98 /* SessionTicket received from OpenSSL hello_extension_cb (server) */ 1552 * invalid pinned server certificates. 1559 "server certificate data"); 1578 "OpenSSL: Ignore validation issues for a pinned server certificate"); 1634 wpa_printf(MSG_DEBUG, "OpenSSL: Reject server certificate " 1706 wpa_printf(MSG_DEBUG, "OpenSSL: Probe for server certificate " 1716 if (os_strncmp(pos, "server/sha256/", 14) != 0) { 1733 wpa_printf(MSG_DEBUG, "OpenSSL: Checking only server " 1738 "cannot validate server certificate hash"); 1839 /* No ca_cert configured - do not try to verify server 2811 openssl_handshake(struct tls_connection *conn, const struct wpabuf *in_data, int server) argument 2915 openssl_connection_handshake(struct tls_connection *conn, const struct wpabuf *in_data, struct wpabuf **appl_data, int server) argument [all...] |
/external/boringssl/src/ssl/ |
H A D | ssl_lib.c | 188 if (ssl->server) { 796 * are a server, it does not. */ 1397 if (ssl->server || !session || !session->tlsext_signed_cert_timestamp_list) { 1411 if (ssl->server || !session || !session->ocsp_response) { 1428 * 1) If the server doesn't support NPN then this is indicated to the 1432 * 2) If the server supports NPN, but advertises an empty list then the 1436 * 3) Otherwise, the client finds the first protocol in the server's list 1438 * assumed that the server has better information about which protocol 1441 * 4) If the client doesn't support any of the server's advertised 1448 int SSL_select_next_proto(uint8_t **out, uint8_t *outlen, const uint8_t *server, argument [all...] |
/external/dnsmasq/src/ |
H A D | dnsmasq.h | 308 #define SERV_NO_ADDR 2 /* no server, this domain is local only */ 309 #define SERV_LITERAL_ADDRESS 4 /* addr is the answer, not the server */ 310 #define SERV_HAS_DOMAIN 8 /* server for one domain only */ 312 #define SERV_FOR_NODOTS 32 /* server for names with no domain part only */ 332 struct server { struct 336 char *domain; /* set if this server only handles a domain. */ 340 struct server *next; 385 struct server *sentto; /* NULL means free */ 504 struct in_addr server; member in struct:pxe_service 622 struct server *server [all...] |
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
H A D | org.eclipse.ecf_3.1.0.v20100529-0735.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
/external/mdnsresponder/mDNSCore/ |
H A D | mDNS.c | 928 // The records might already be registered with the server and hence could have NAT state. 1486 // from the server. In that case, if the records have been part of a group update, clear the 2465 // For Unicast, when we get the response from the server, we will call CompleteDeregistration 3443 // When this question penalizes a DNS server and has no more DNS servers to pick, we normally 3447 // that time, we need to make sure that we have a valid DNS server. Otherwise, we will deliver 3448 // a negative cache response without trying the server. 3637 // When a question changes DNS server, it is marked with deliverAddEvents if we find any 3638 // cache entry corresponding to the new DNS server. Before we deliver the ADD event, the 3731 // then 95-97% of the TTL. If the DNS server does not respond, then we will remove the cache entry 3732 // before we pick a new DNS server 7752 PenaltyTimeForServer(mDNS *m, DNSServer *server) argument [all...] |