Searched defs:server (Results 1 - 25 of 89) sorted by relevance

1234

/vbox/src/VBox/ExtPacks/VBoxDTrace/onnv/cmd/dtrace/test/tst/common/mib/
H A Dtst.tcp.ksh79 server() function
143 server &
/vbox/src/VBox/Additions/x11/x11include/xorg-server-1.3.0.0/
H A Dcards.h17 char *server; /* Server identifier. */ member in struct:__anon7344
/vbox/src/VBox/Additions/x11/x11include/xorg-server-1.4.2/
H A Dcards.h62 char *server; /* Server identifier. */ member in struct:__anon7720
/vbox/src/VBox/Additions/x11/x11include/xorg-server-1.5.3/
H A Dcards.h10 char *server; /* Server identifier. */ member in struct:__anon8081
/vbox/src/VBox/HostServices/SharedOpenGL/expando/
H A Dexpandospu.h26 CRServer *server; member in struct:__anon16462
34 * We only collect client-side state; we ignore all server-side
/vbox/src/VBox/Additions/x11/x11include/xorg-server-1.1.0/
H A Dcards.h18 char *server; /* Server identifier. */ member in struct:__anon4490
/vbox/src/VBox/Additions/x11/x11include/xorg-server-1.0.1/
H A Dcards.h18 char *server; /* Server identifier. */ member in struct:__anon4049
/vbox/src/libs/libxml2-2.6.31/include/libxml/
H A Duri.h37 char *server; /* the server part */ member in struct:_xmlURI
/vbox/src/libs/xpcom18a4/python/test/
H A Dtest_weakreferences.py40 import xpcom.server, xpcom.client namespace
63 ob = xpcom.server.WrapObject( koTestSimple(), components.interfaces.nsIInputStream)
82 ob = xpcom.server.WrapObject( koTestSimple(), components.interfaces.nsISupports)
H A Dtest_streams.py78 import xpcom.server, xpcom.client namespace
79 ob = xpcom.server.WrapObject( koTestSimpleStream(), _xpcom.IID_nsISupports)
H A Dtest_misc.py40 import xpcom.server namespace
217 pyob = xpcom.server.UnwrapObject(ob)
225 self.failUnlessRaises(ValueError, xpcom.server.UnwrapObject, ob)
H A Dtest_isupports_primitives.py45 import xpcom.server, xpcom.client namespace
127 ob = xpcom.server.WrapObject( NoSupportsString(), components.interfaces.nsISupports)
132 ob = xpcom.server.WrapObject( ImplicitSupportsString(), components.interfaces.nsISupports)
136 ob = xpcom.server.WrapObject( ExplicitSupportsString(), components.interfaces.nsISupports)
140 ob = xpcom.server.WrapObject( ImplicitSupportsUnicode(), components.interfaces.nsISupports)
144 ob = xpcom.server.WrapObject( ExplicitSupportsUnicode(), components.interfaces.nsISupports)
149 ob = xpcom.server.WrapObject( ExplicitSupportsString(), components.interfaces.nsISupports)
153 ob = xpcom.server.WrapObject( ExplicitSupportsInt(), components.interfaces.nsISupports)
158 ob = xpcom.server.WrapObject( ImplicitSupportsInt(), components.interfaces.nsISupports)
163 ob = xpcom.server
[all...]
/vbox/src/libs/xpcom18a4/python/tools/
H A Dtracer_demo.py38 # This is a demo is how to use the xpcom.server "tracer" facility.
94 import xpcom.server, xpcom.components namespace
95 xpcom.server.tracer = MakeTracer
/vbox/src/VBox/Devices/PC/ipxe/src/net/tcp/
H A Dsyslogs.c49 /** The encrypted syslog server */
191 /** Encrypted syslog server setting */
194 .description = "Encrypted syslog server",
206 char *server; local
211 /* Fetch log server */
212 len = fetch_string_setting_copy ( NULL, &syslogs_setting, &server );
218 /* Do nothing unless log server has changed */
219 if ( ( ( server == NULL ) && ( old_server == NULL ) ) ||
220 ( ( server != NULL ) && ( old_server != NULL ) &&
221 ( strcmp ( server, old_serve
[all...]
H A Dftp.c363 * alone; the server will send a completion message via the control
422 struct sockaddr_tcpip server; local
446 memset ( &server, 0, sizeof ( server ) );
447 server.st_port = htons ( uri_port ( uri, FTP_PORT ) );
449 ( struct sockaddr * ) &server,
/vbox/src/VBox/RDP/client-1.8.3/
H A Diso.c212 iso_connect(char *server, char *username, char *domain, char *password, argument
236 if (!tcp_connect(server))
273 reason = "SSL with user authentication required by server";
276 reason = "SSL not allowed by server";
280 reason = "no valid authentication certificate on server";
287 reason = "SSL required by server";
290 reason = "CredSSP required by server";
334 if (!cssp_connect(server, username, domain, password, s))
H A Dmcs.c320 mcs_connect_start(char *server, char *username, char *domain, char *password, argument
323 return iso_connect(server, username, domain, password, reconnect, selected_protocol);
H A Dtcp.c380 /* Get public key from server of TLS 1.0 connection */
429 tcp_connect(char *server) argument
447 if ((n = getaddrinfo(server, tcp_port_rdp_s, &hints, &res)))
471 error("%s: unable to connect\n", server);
480 if ((nslookup = gethostbyname(server)) != NULL)
484 else if ((servaddr.sin_addr.s_addr = inet_addr(server)) == INADDR_NONE)
486 error("%s: unable to resolve host\n", server);
/vbox/src/libs/xpcom18a4/nsprpub/pr/tests/
H A Dpeek.c104 fprintf(stderr, "server: peeked expected data\n");
124 fprintf(stderr, "server: peeked expected data\n");
144 fprintf(stderr, "server: received expected data\n");
325 PRThread *server, *client; local
327 server = PR_CreateThread(PR_USER_THREAD, ServerB, listenSock,
329 if (NULL == server) {
341 if (PR_JoinThread(server) == PR_FAILURE) {
/vbox/src/VBox/Main/src-server/win/
H A Dsvcmain.cpp3 * SVCMAIN - COM out-of-proc server main entry
276 L"/RegServer:\tregister COM out-of-proc server\n"
277 L"/UnregServer:\tunregister COM out-of-proc server\n"
278 L"/ReregServer:\tunregister and register COM server\n"
279 L"no options:\trun the server";
312 /** @todo Merge this code with server.cpp (use Logging.cpp?). */
368 SVCHlpServer server; local
369 vrc = server.open(pszPipeName);
371 vrc = server.run();
404 Log(("SVCMAIN: Returning, COM server proces
[all...]
/vbox/src/VBox/Devices/PC/ipxe/src/net/udp/
H A Dslam.c43 * and implemented by Eric Biederman. A server implementation is
85 /** Default SLAM server port */
175 * server.
269 * on the SLAM server, which will otherwise just blast the
682 struct sockaddr_tcpip server; local
713 memset ( &server, 0, sizeof ( server ) );
714 server.st_port = htons ( uri_port ( uri, SLAM_DEFAULT_PORT ) );
716 ( struct sockaddr * ) &server,
/vbox/src/VBox/Devices/Serial/
H A DDrvTCP.cpp79 /** Pointer to the TCP server address:port or port only. (Freed by MM) */
81 /** Flag whether VirtualBox represents the server or client side. */
84 /** Socket handle of the TCP socket for server. */
416 struct hostent *server; local
419 server = gethostbyname(token);
421 (char *)server->h_addr,
422 server->h_length);
437 LogRel(("DrvTCP: %s, %s\n", pThis->pszLocation, pThis->fIsServer ? "server" : "client"));
/vbox/src/libs/xpcom18a4/python/
H A Dcomponents.py42 import xpcom.server namespace
230 xpcom.server._shutdown()
236 _shutdownObserver = xpcom.server.WrapObject(_ShutdownObserver(), interfaces.nsIObserver)
/vbox/src/libs/xpcom18a4/python/server/
H A Dpolicy.py41 import xpcom.server namespace
104 if xpcom.server.tracer_unwrap is not None:
105 ob = xpcom.server.tracer_unwrap(ob)
110 ci = xpcom.server.WrapObject(ci, _xpcom.IID_nsIClassInfo, bWrapClient = 0)
170 return xpcom.server.WrapObject(self._obj_, iid, bWrapClient = 0)
194 return xpcom.server.WrapObject(SupportsPrimitive(iid, self._obj_, attr, cvt), iid, bWrapClient = 0)
/vbox/src/VBox/Devices/Network/lwip/src/netif/ppp/
H A Dauth.c595 * for authenticating the given client on the given server.
596 * (We could be either client or server).
601 char *server,
619 AUTHDEBUG((LOG_ERR, "Secret for %s on %s is too long\n", client, server));
643 AUTHDEBUG((LOG_ERR, "Secret for %s on %s is too long\n", client, server));
848 * on `server'. Either can be the null string, meaning we don't
851 static int have_chap_secret(char *client, char *server, u32_t remote) argument
854 (void)server;
598 get_secret( int unit, char *client, char *server, char *secret, int *secret_len, int save_addrs ) argument

Completed in 188 milliseconds

1234