/external/chromium_org/third_party/WebKit/Tools/Scripts/webkitpy/tool/commands/ |
abstractlocalservercommand.py | 32 server = None variable in class:AbstractLocalServerCommand 37 make_option("--httpd-port", action="store", type="int", default=8127, help="Port to use for the HTTP server"), 38 make_option("--no-show-results", action="store_false", default=True, dest="show_results", help="Don't launch a browser with the rebaseline server"), 49 print "Starting server at %s" % server_url 56 httpd = self.server(httpd_port=options.httpd_port, config=config) # pylint: disable=E1102
|
/external/chromium_org/third_party/libjingle/source/talk/base/ |
socketserver.h | 38 // class provides a nice wrapper on a socket server. 40 // The server is also a socket factory. The sockets it creates will be 41 // notified of asynchronous I/O from this server's Wait method. 44 // When the socket server is installed into a Thread, this function is 45 // called to allow the socket server to use the thread's message queue for
|
win32socketserver_unittest.cc | 13 Win32SocketServer server(NULL); 15 server.Wait(1000, true); 21 Win32SocketServer server(NULL); 22 SocketServerScope scope(&server); 24 server.Pump();
|
/external/chromium_org/third_party/libjingle/source/talk/examples/peerconnection/client/ |
flagdefs.h | 41 DEFINE_bool(autoconnect, false, "Connect to the server without user " 43 DEFINE_string(server, "localhost", "The server to connect to."); 45 "The port on which the server is listening."); 47 "the server without user intervention. Note: this flag should only be set "
|
/external/jmonkeyengine/engine/src/networking/com/jme3/network/ |
HostedConnection.java | 39 * hosted in a server instance. 47 * Returns the Server instance that is hosting this connection. 49 public Server getServer(); 52 * Returns the server-unique ID for this client. 65 * Closes and removes this connection from the server
|
/external/jmonkeyengine/engine/src/test/jme3test/network/ |
TestMessages.java | 53 System.out.println("Server: Received ping message!"); 71 Server server = Network.createServer(5110); local 72 server.start(); 77 server.addMessageListener(new ServerPingResponder(), PingMessage.class);
|
/external/libppp/src/ |
server.h | 26 * $FreeBSD: src/usr.sbin/ppp/server.h,v 1.9.40.1 2010/12/21 17:10:29 kensmith Exp $ 31 struct server { struct 53 ((d)->type == SERVER_DESCRIPTOR ? (struct server *)(d) : NULL) 55 extern struct server server;
|
/external/wpa_supplicant_8/hostapd/ |
defconfig | 32 # Driver interface for no driver (e.g., RADIUS server only) 50 # Integrated EAP server 53 # EAP-MD5 for the integrated EAP server 56 # EAP-TLS for the integrated EAP server 59 # EAP-MSCHAPv2 for the integrated EAP server 62 # EAP-PEAP for the integrated EAP server 65 # EAP-GTC for the integrated EAP server 68 # EAP-TTLS for the integrated EAP server 71 # EAP-SIM for the integrated EAP server 74 # EAP-AKA for the integrated EAP server [all...] |
/development/samples/KeyChainDemo/src/com/example/android/keychain/ |
SecureWebServer.java | 42 // File name of the image used in server response 48 // A flag to control whether the web server should be kept running 77 // Create the SSL server socket factory 84 // Create the base64 image string used in the server response 89 * This method starts the web server listening to the port 8080 97 Log.d(TAG, "Secure Web Server is starting up on port 8080"); 99 // Create the secure server socket 129 out.println("Server: Android KeyChainiDemo SSL Server"); 148 * This method stops the SSL web server [all...] |
/external/chromium/net/http/ |
http_auth_cache.h | 23 // - the origin server {protocol scheme, host, port} 42 // Find the realm entry on server |origin| for realm |realm| and 44 // |origin| - the {scheme, host, port} of the server. 52 // Find the entry on server |origin| whose protection space includes 55 // |origin| - the {scheme, host, port} of the server. 61 // Add an entry on server |origin| for realm |handler->realm()| and 65 // |origin| - the {scheme, host, port} of the server. 81 // Remove entry on server |origin| for realm |realm| and scheme |scheme| 83 // |origin| - the {scheme, host, port} of the server. 95 // Updates a stale digest entry on server |origin| for realm |realm| an [all...] |
/external/chromium_org/net/http/ |
http_auth_cache.h | 22 // - the origin server {protocol scheme, host, port} 41 // Find the realm entry on server |origin| for realm |realm| and 43 // |origin| - the {scheme, host, port} of the server. 51 // Find the entry on server |origin| whose protection space includes 54 // |origin| - the {scheme, host, port} of the server. 60 // Add an entry on server |origin| for realm |handler->realm()| and 64 // |origin| - the {scheme, host, port} of the server. 78 // Remove entry on server |origin| for realm |realm| and scheme |scheme| 80 // |origin| - the {scheme, host, port} of the server. 90 // Updates a stale digest entry on server |origin| for realm |realm| an [all...] |
/external/chromium_org/third_party/tlslite/tlslite/integration/ |
XMLRPCTransport.py | 10 """Handles an HTTPS transaction to an XML-RPC server.""" 28 server = ServerProxy("https://localhost", transport) 36 For server authentication, you can either rely on the 38 shared-keys, or you can do certificate-based server 44 Certificate-based server authentication is compatible with 51 server. Thus you should be prepared to handle TLS-specific 81 @param cryptoID: cryptoID for server authentication. Mutually 85 @param protocol: cryptoID protocol URI for server 90 server authentication. Mutually exclusive with the 'cryptoID' 102 must match this value. For a web server, this is typically [all...] |
/external/chromium_org/v8/tools/testrunner/server/ |
local_handler.py | 62 with self.server.daemon.peer_list_lock: 63 response = [ p.Pack() for p in self.server.daemon.peers 68 self.server.daemon.DeletePeer(data[1]) 71 compression.Send([action, self.server.daemon.pubkey_fingerprint], 78 fingerprint = self.server.daemon.CopyToTrusted(data[1]) 86 self.server.daemon.AddPerfData(test_key, test_duration, arch, mode) 91 self.server.daemon.UpdatePeerPerformance(data[1], data[2]) 99 with self.server.daemon.peer_list_lock: 100 for p in self.server.daemon.peers: 103 (self.server.daemon.jobs, self.server.daemon.relative_perf) [all...] |
presence_handler.py | 63 trusted = self.server.daemon.IsTrusted(pubkey_fingerprint) 64 response = [STARTUP_RESPONSE, self.server.daemon.jobs, 65 self.server.daemon.relative_perf, 66 self.server.daemon.pubkey_fingerprint, trusted] 68 self.server.SendTo(self.client_address[0], response) 72 self.server.daemon.AddPeer(p) 79 p.trusted = self.server.daemon.IsTrusted(pubkey_fingerprint) 81 self.server.daemon.AddPeer(p) 84 self.server.daemon.DeletePeer(self.client_address[0]) 85 if self.client_address[0] == self.server.daemon.ip [all...] |
/external/dnsmasq/dbus/ |
DBus-interface | 16 the server settings in dnsmasq should re-invoke the SetServers method 48 Each server address may be followed by one or more STRINGS, which are 49 the domains for which the preceding server should be used. 58 --server=<address1> --server=<address2> 67 --server=<address1> --server=/somedomain.com/<address2> 78 --server=<address1> 79 --server=/somedomain.com/<address2> 80 --server=/anotherdomain.com/thirddomain.com/<address3 [all...] |
/external/smack/src/org/jivesoftware/smack/packet/ |
StreamError.java | 23 * Represents a stream error packet. Stream errors are unrecoverable errors where the server
32 * <tr><td> bad-namespace-prefix </td><td> Remote Server Timeout </td></tr>
33 * <tr><td> conflict </td><td> the server is closing the active stream for this entity
40 * the server. </td></tr>
43 * hosted by the server. </td></tr>
46 * <tr><td> internal-server-error </td><td> the server has experienced a
58 * <tr><td> remote-connection-failed </td><td> Rthe server is unable to properly connect
60 * <tr><td> resource-constraint </td><td> Rthe server lacks the system resources necessary
64 * <tr><td> see-other-host </td><td> the server will not provide service to the initiating [all...] |
/external/wpa_supplicant_8/src/radius/ |
radius_server.h | 2 * RADIUS authentication server 16 * struct radius_server_conf - RADIUS server configuration 20 * auth_port - UDP port to listen to as an authentication server 47 * This is passed to the EAP-SIM/AKA server implementation as a 55 * This is passed to the EAP server implementation as a callback 89 * example, this could be the enterprise and server names in 115 * This is a soft limit on the PAC-Key. The server will automatically 147 * server_id - Server identity 154 * If WPS is used with an external RADIUS server (which is quite 161 * ipv6 - Whether to enable IPv6 support in the RADIUS server [all...] |
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/ |
test_kqueue.py | 97 server, addr = serverSocket.accept() 102 ev = select.kevent(server.fileno(), 106 ev = select.kevent(server.fileno(), 123 (server.fileno(), select.KQ_FILTER_WRITE)])) 126 server.send("world!!!") 141 (server.fileno(), select.KQ_FILTER_WRITE), 142 (server.fileno(), select.KQ_FILTER_READ)])) 144 # Remove completely client, and server read part 153 ev = select.kevent(server.fileno(), 161 (server.fileno(), select.KQ_FILTER_WRITE)]) [all...] |
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/ |
test_kqueue.py | 97 server, addr = serverSocket.accept() 102 ev = select.kevent(server.fileno(), 106 ev = select.kevent(server.fileno(), 123 (server.fileno(), select.KQ_FILTER_WRITE)])) 126 server.send("world!!!") 141 (server.fileno(), select.KQ_FILTER_WRITE), 142 (server.fileno(), select.KQ_FILTER_READ)])) 144 # Remove completely client, and server read part 153 ev = select.kevent(server.fileno(), 161 (server.fileno(), select.KQ_FILTER_WRITE)]) [all...] |
/external/apache-harmony/luni/src/test/api/common/org/apache/harmony/luni/tests/internal/net/www/protocol/https/ |
HttpsURLConnectionTest.java | 121 * Checks if HTTPS connection performs initial SSL handshake with the server 131 // create the SSL server socket acting as a server 160 * Checks if HTTPS connection performs initial SSL handshake with the server 171 // create the SSL server socket acting as a server 209 // create the SSL server socket acting as a server 246 // create the SSLServerSocket which will be used by server side 295 // create the SSLServerSocket which will be used by server sid 1002 ServerWork server = new ServerWork(serverSocket, responseCode, local [all...] |
/cts/tests/tests/net/src/android/net/cts/ |
LocalSocketTest.java | 33 // create client and server socket 37 // establish connection between client and server 47 // send data from client to server 53 //send data from server to client 82 //shutdown input stream of server 86 //shutdown output stream of server 104 //close server socket
|
/external/chromium/chrome/common/extensions/docs/static/ |
hosting.html | 5 on your own server. 24 by the Chrome Web Store or by a custom server—as 41 A server that hosts <code>.crx</code> files 83 is that the server sends the header 86 is that the server sends an unknown content type—one 89 either change the configuration of the server 90 or try hosting the <code>.crx</code> file at another server.
|
/external/chromium/net/proxy/ |
proxy_info.h | 25 // Uses the same proxy server as the given |proxy_info|. 31 // Uses a specific proxy server, of the form: 53 // Returns true if the first valid proxy server is an https proxy. 60 // Returns true if the first valid proxy server is an http proxy. 67 // Returns true if the first valid proxy server is a socks server. 79 // Returns the first valid proxy server. is_empty() must be false to be able
|
/external/chromium_org/chrome/browser/safe_browsing/ |
two_phase_testserver.py | 58 put_url = 'http://%s:%d/put?%s,%s,%s' % (self.server.server_address[0], 59 self.server.server_port, 95 server = BaseHTTPServer.HTTPServer((self.options.host, self.options.port), 97 print 'server started on port %d...' % server.server_port 98 server_data['port'] = server.server_port 100 return server
|
/external/chromium_org/chrome/common/extensions/docs/templates/articles/ |
hosting.html | 5 on your own server. 17 by the Chrome Web Store or by a custom server—as 34 A server that hosts <code>.crx</code> files 76 is that the server sends the header 79 is that the server sends an unknown content type—one 82 either change the configuration of the server 83 or try hosting the <code>.crx</code> file at another server.
|