/external/chromium/chrome/browser/ui/gtk/ |
crypto_module_password_dialog.cc | 27 const std::string& server) 30 server_(server), 86 const std::string& server, 107 const std::string& server, 128 const string16& server16 = UTF8ToUTF16(server); 217 const std::string& server, 219 (new CryptoModulePasswordDialog(slot_name, retry, reason, server, 226 const std::string& server) { 227 return new CryptoModuleBlockingDialogDelegate(reason, server);
|
/external/chromium/chrome/common/extensions/docs/examples/apps/hello-php/lib/lightopenid/ |
openid.php | 36 * If the server supports only SREG or OpenID 1.1, these are automaticaly 37 * mapped to SREG names, so that user doesn't have to know anything about the server. 53 protected $server, $version, $trustRoot, $aliases, $identifier_select = false 208 # Found an XRDS document, now let's find the server, and optionally delegate. 216 if ($m[2] == 'server') $this->identifier_select = true; 218 preg_match('#<URI.*?>(.*)</URI>#', $content, $server); 220 if (empty($server)) { 223 # Does the server advertise support for either AX or SREG? 228 $server = $server[1] variable 232 $this->server = $server; variable 250 $server = $server[1]; variable 254 $this->server = $server; variable 279 $server = $this->htmlTag($content, 'link', 'rel', 'openid2.provider', 'href'); variable 285 $server = $this->htmlTag($content, 'link', 'rel', 'openid.server', 'href'); variable 296 $this->server = $server; variable 462 $server = $this->discover($this->data['openid_identity']); variable [all...] |
/external/chromium/net/base/ |
listen_socket_unittest.h | 82 // Release the connection and server sockets 86 // verify the send/read from client to server 90 // verify a send/read from server to client 96 virtual void DidAccept(ListenSocket *server, ListenSocket *connection);
|
/external/chromium/net/socket/ |
ssl_server_socket_nss.h | 28 // |cert| - The certificate to be used by the server. 32 // |key| - The private key used by the server. 120 // Certificate for the server. 123 // Private key used by the server.
|
/external/chromium/net/tools/fetch/ |
http_session.h | 13 // An HttpSession encapsulates a server-side HTTP listen socket.
|
/external/chromium/net/udp/ |
datagram_client_socket.h | 20 // Initialize this socket as a client socket to server at |address|.
|
/external/chromium-trace/trace-viewer/ |
run_dev_server.py | 79 if self.server.next_deps_check < current_time: 82 self.server.deps = deps_generator.generate_deps_js() 95 self.server.next_deps_check = current_time + DEPS_CHECK_DELAY 99 self.send_header('Content-Length', len(self.server.deps)) 101 self.wfile.write(self.server.deps) 142 class Server(SocketServer.ThreadingMixIn, BaseHTTPServer.HTTPServer): 156 server = Server(('', options.port), Handler) 158 server.serve_forever()
|
/external/chromium_org/android_webview/native/ |
aw_dev_tools_server.h | 19 // This class controls WebView-specific Developer Tools remote debugging server.
|
/external/chromium_org/build/android/pylib/ |
fake_dns.py | 29 """Starts the fake_dns server that replies all name queries 127.0.0.1. 43 """Configures the system to point to a DNS server that replies 127.0.0.1. 46 traffic to a replay server. 54 time.sleep(2) # Time for server to start and the setprop to take effect.
|
/external/chromium_org/chrome/browser/download/ |
download_extensions.h | 23 // Tests if we think the server means for this mime_type to be executable.
|
/external/chromium_org/chrome/browser/metrics/proto/ |
trials_seed.proto | 13 // The TrialsSeed is a protobuf response from the server that contains the list
|
/external/chromium_org/chrome/browser/plugins/ |
plugins_resource_service.h | 14 // from a remote server and updates local state and PluginFinder.
|
/external/chromium_org/chrome/browser/resources/sync_internals/ |
traffic.js | 15 trafficData += 'Client Server Traffic\n';
|
/external/chromium_org/chrome/browser/ui/ |
crypto_module_password_dialog.cc | 27 const std::string& server) 30 server_(server), 94 const std::string& server) { 95 return new CryptoModuleBlockingDialogDelegate(reason, server);
|
/external/chromium_org/chrome/common/extensions/docs/examples/apps/hello-php/lib/lightopenid/ |
openid.php | 36 * If the server supports only SREG or OpenID 1.1, these are automaticaly 37 * mapped to SREG names, so that user doesn't have to know anything about the server. 53 protected $server, $version, $trustRoot, $aliases, $identifier_select = false 208 # Found an XRDS document, now let's find the server, and optionally delegate. 216 if ($m[2] == 'server') $this->identifier_select = true; 218 preg_match('#<URI.*?>(.*)</URI>#', $content, $server); 220 if (empty($server)) { 223 # Does the server advertise support for either AX or SREG? 228 $server = $server[1] variable 232 $this->server = $server; variable 250 $server = $server[1]; variable 254 $this->server = $server; variable 279 $server = $this->htmlTag($content, 'link', 'rel', 'openid2.provider', 'href'); variable 285 $server = $this->htmlTag($content, 'link', 'rel', 'openid.server', 'href'); variable 296 $this->server = $server; variable 462 $server = $this->discover($this->data['openid_identity']); variable [all...] |
/external/chromium_org/chrome/common/net/ |
x509_certificate_model_unittest.cc | 49 // Test mozilla_security_manager::GetCertType with server certs and default 52 // tell server certs even if they have no trust bits set. 57 // Test GetCertType with server certs and explicit trust. 64 // Test GetCertType with server certs and explicit distrust.
|
/external/chromium_org/chrome/test/functional/ |
prefetch.py | 6 """This functional test spawns a web server, and runs chrome to point 7 at that web server. 29 # this class handles IPC retrieving server "logs" from our integral 30 # server. Each test should clear() the log, and then run asserts on 33 # at startup, the server puts an int in the queue which is its port, 69 # The next few classes run a simple web server that returns log information 114 server = HTTPServer(('',0), PrefetchServerHandler) 115 queue.put(server.server_port) 116 server.serve_forever()
|
/external/chromium_org/chrome/test/security_tests/ |
ipc_security_tests.h | 8 // Impersonates a chrome server pipe. See the implementation for details.
|
/external/chromium_org/chromeos/test/data/network/ |
certificate-server.onc | 8 "Type": "Server",
|
/external/chromium_org/cloud_print/gcp20/prototype/ |
printer.h | 22 // This class maintains work of DNS-SD server, HTTP server and others. 54 DEV_REG_REGISTRATION_ERROR, // Is set when server error was occurred. 144 // Method for trying to reconnecting to server on start or after network fail. 158 // Ask CloudPrint server for new local sendings. 161 // Ask CloudPrint server for printjobs. 196 // Changes state and update info in DNS server. 201 // Contains DNS-SD server. 204 // Contains Privet HTTP server.
|
/external/chromium_org/components/autofill/content/browser/wallet/ |
form_field_error.h | 18 // Class for representing a single Wallet server side validation error. 21 // The validation error returned from the server. 76 // The type of error as defined by the Wallet server. 79 // The location of the error as defined by the Wallet server.
|
/external/chromium_org/components/autofill/core/browser/ |
autofill_field_unittest.cc | 28 // Set the server type and check it. 33 // Remove the server type to make sure the heuristic type is preserved. 71 // Server type does not affect FieldSignature. 87 // Only server type is set.
|
autofill_server_field_info.h | 15 // The predicted type returned by the Autofill server for this field.
|
/external/chromium_org/content/test/data/npapi/ |
plugin_url_request_404.html | 15 This test fetches a URL which results in the server sending back a 404
|
/external/chromium_org/google_apis/cup/ |
client_update_protocol.h | 48 // formatted in the way that the Omaha server expects: omit the scheme and 66 // by the server. |server_proof| contains the Base64-encoded server proof, 103 // The server keeps multiple private keys; a version must be sent so that 110 // locally, but sends the server an encrypted copy of the key source to 115 // the server's public key. The client sends this, along with the version of 116 // the keypair that was used, to the server. The server decrypts it using its 123 // SignRequest(), and used by ValidateResponse() to confirm that the server
|