/frameworks/base/core/tests/coretests/src/android/net/http/ |
D | AbstractProxyTest.java | 43 private MockWebServer server = new MockWebServer(); field in AbstractProxyTest 55 server.shutdown(); in tearDown() 62 server.useHttps(testSSLContext.serverContext.getSocketFactory(), false); in testConnectToHttps() 63 server.enqueue(new MockResponse() in testConnectToHttps() 66 server.play(); in testConnectToHttps() 73 .register(new Scheme("https", sslSocketFactory, server.getPort())); in testConnectToHttps() 76 new HttpGet("https://localhost:" + server.getPort() + "/foo")); in testConnectToHttps() 79 RecordedRequest request = server.takeRequest(); in testConnectToHttps() 116 server.enqueue(mockResponse); in testConnectViaProxy() 117 server.play(); in testConnectViaProxy() [all …]
|
D | CookiesTest.java | 39 private MockWebServer server = new MockWebServer(); field in CookiesTest 42 server.shutdown(); in tearDown() 52 server.enqueue(new MockResponse() in testCookiesAreNotLogged() 54 server.play(); in testCookiesAreNotLogged() 62 client.execute(new HttpGet(server.getUrl("/").toURI())); in testCookiesAreNotLogged() 81 server = new MockWebServer(); in testCookiesWithNonMatchingCase() 82 server.enqueue(new MockResponse() in testCookiesWithNonMatchingCase() 87 server.enqueue(new MockResponse() in testCookiesWithNonMatchingCase() 89 server.play(); in testCookiesWithNonMatchingCase() 93 ConnRoutePNames.DEFAULT_PROXY, new HttpHost("localhost", server.getPort())); in testCookiesWithNonMatchingCase() [all …]
|
D | DefaultHttpClientTest.java | 44 private MockWebServer server = new MockWebServer(); field in DefaultHttpClientTest 47 server.shutdown(); in tearDown() 68 server.enqueue(new MockResponse() in testServerClosesOutput() 71 server.enqueue(new MockResponse() in testServerClosesOutput() 73 server.play(); in testServerClosesOutput() 77 HttpResponse a = client.execute(new HttpGet(server.getUrl("/a").toURI())); in testServerClosesOutput() 79 assertEquals(0, server.takeRequest().getSequenceNumber()); in testServerClosesOutput() 81 HttpResponse b = client.execute(new HttpGet(server.getUrl("/b").toURI())); in testServerClosesOutput() 84 assertEquals(0, server.takeRequest().getSequenceNumber()); in testServerClosesOutput()
|
D | HttpResponseCacheTest.java | 35 private MockWebServer server = new MockWebServer(); field in HttpResponseCacheTest 45 server.shutdown(); in tearDown() 115 server.enqueue(new MockResponse() in testStatisticsTracking() 118 server.play(); in testStatisticsTracking() 120 URLConnection c1 = server.getUrl("/").openConnection(); in testStatisticsTracking() 126 URLConnection c2 = server.getUrl("/").openConnection(); in testStatisticsTracking() 129 URLConnection c3 = server.getUrl("/").openConnection(); in testStatisticsTracking()
|
/frameworks/base/media/jni/ |
D | android_mtp_MtpServer.cpp | 64 MtpServer* server = new MtpServer(fd, getMtpDatabase(env, javaDatabase), in android_mtp_MtpServer_setup() local 66 env->SetLongField(thiz, field_MtpServer_nativeContext, (jlong)server); in android_mtp_MtpServer_setup() 75 MtpServer* server = getMtpServer(env, thiz); in android_mtp_MtpServer_run() local 76 if (server) in android_mtp_MtpServer_run() 77 server->run(); in android_mtp_MtpServer_run() 87 MtpServer* server = getMtpServer(env, thiz); in android_mtp_MtpServer_cleanup() local 88 if (server) { in android_mtp_MtpServer_cleanup() 89 delete server; in android_mtp_MtpServer_cleanup() 101 MtpServer* server = getMtpServer(env, thiz); in android_mtp_MtpServer_send_object_added() local 102 if (server) in android_mtp_MtpServer_send_object_added() [all …]
|
/frameworks/base/packages/services/Proxy/src/com/android/proxyhandler/ |
D | ProxyService.java | 31 private static ProxyServer server = null; field in ProxyService 43 if (server == null) { in onCreate() 44 server = new ProxyServer(); in onCreate() 45 server.startServer(); in onCreate() 51 if (server != null) { in onDestroy() 52 server.stopServer(); in onDestroy() 53 server = null; in onDestroy() 62 if (server != null) { in onBind() 65 server.setCallback(portListener); in onBind()
|
D | ProxyServer.java | 112 Socket server = null; in run() local 119 server = new Socket(inetSocketAddress.getHostName(), in run() 121 sendLine(server, requestLine); in run() 123 server = new Socket(host, port); in run() 129 sendLine(server, requestLine); in run() 135 if (server != null) { in run() 139 if (server == null) { in run() 140 server = new Socket(host, port); in run() 146 sendLine(server, requestLine); in run() 150 SocketConnect.connect(connection, server); in run()
|
/frameworks/base/docs/html/google/gcm/ |
D | gcm.jd | 23 that there is new data to be fetched from the server (for instance, a "new email" 53 3rd-party app server and the client app.</td> 57 <td>A GCM-enabled client app that communicates with a 3rd-party app server.</td> 61 <td>An app server that you write as part of implementing 62 GCM. The 3rd-party app server sends data to a client app via 63 the GCM connection server.</td> 73 3rd-party app server that is permitted to send messages to the client app.</td> 78 server that gives the app server authorized access to Google services. 102 connection server, a 3rd-party app server that interacts with the connection 103 server, and a GCM-enabled client app. For example, this diagram shows GCM [all …]
|
D | demo.jd | 12 …server.html">GCM Server</a> and <a href="client.html">GCM Client</a></strong>. Please use the <a h… 27 <li>Understand how to set up both the client and server sides of a GCM app.</li> 37 <li><a href="#server-setup">Setting Up the Server</a> 39 <li><a href="#webserver-setup">Using a standard web server</a></li> 56 <li>A web server containing a page where you can send messages.</li> 59 …oogle/android/gcm/package-summary.html">reference</a> for the client and server helper libraries u… 64 <p>For the web server:</p> 69 …<li>A running web server compatible with Servlets API version 2.5, such as <a href="http://tomcat.… 82 <p>Before proceeding with the server and client setup, it's necessary to register a Google account … 86 <h2 id="server-setup">Setting Up the Server</h2> [all …]
|
D | http.jd | 20 <li><a href="#app-server">Implementing an HTTP-Based App Server</a> 26 <li><a href="server-ref.html">Server Reference</a></li> 38 connection server. Connection servers 40 application server and sending them to the device.</p> 47 <a href="server-ref.html">Server Reference</a> for a list of all the message 48 parameters and which connection server(s) supports them.</p> 53 <p>To send a message, the application server issues a POST request. For example:</p> 83 <a href="server-ref.html#params">the Server Reference</a> for a list of all the 90 the <a href="server-ref.html#table1">Server Reference</a> for a complete 156 <li>The GCM server rejects the request. The HTTP response contains a [all …]
|
D | index.jd | 17 from your server to your users' Android-powered device, and also to receive messages from 29 <h4>Send data from your server to users' Android-powered devices</h4> 32 server (for instance, a movie uploaded by a friend), or it could be a message containing 38 application to sync data from the server. For example, suppose you have an email 39 application. When a user receives new email on the server, the server pings the mobile 40 application with a "New mail" message. This tells the application to sync to the server 58 message was sent to a device. Your 3rd-party app server receives the receipt notification
|
D | server.jd | 39 <li><a href="server-ref.html">Server Reference</a></li> 52 <p>The server side of Google Cloud Messaging (GCM) consists of two components:</p> 55 take messages from a <a href="{@docRoot}google/gcm/server.html#role">3rd-party app server</a> 60 <li>A <strong>3rd-party application server</strong> that you must implement. This application 61 server sends data to a GCM-enabled client app via the chosen GCM connection server.</li> 65 <p>A full GCM implementation requires both a client implementation and a server 74 have an application server that meets the following criteria:</p> 78 <li>Able to fire off properly formatted requests to the GCM server.</li> 88 <p>Here are the basic steps you follow to implement your 3rd-party app server:</p> 91 <li>Decide which GCM connection server(s) you want to use. Note that if you want to use [all …]
|
D | gs.jd | 68 <li>In the resulting configuration dialog, supply your server's IP address. For testing 74 You will need the API key later on to perform authentication in your app server.</li> 87 <li>Implement an app server (the "3rd-party app server") to interact 88 with your chosen GCM connection server. The app server sends data to a 89 GCM-enabled Android client app via the GCM connection server. For more 90 information about implementing the server side, see <a href="server.html">
|
/frameworks/base/services/java/com/android/server/ |
D | SystemServer.java | 17 package com.android.server; 59 import com.android.server.accessibility.AccessibilityManagerService; 60 import com.android.server.accounts.AccountManagerService; 61 import com.android.server.am.ActivityManagerService; 62 import com.android.server.am.BatteryStatsService; 63 import com.android.server.clipboard.ClipboardService; 64 import com.android.server.content.ContentService; 65 import com.android.server.devicepolicy.DevicePolicyManagerService; 66 import com.android.server.display.DisplayManagerService; 67 import com.android.server.dreams.DreamManagerService; [all …]
|
/frameworks/native/opengl/libs/GLES_trace/src/ |
D | gltrace_transport.cpp | 42 struct sockaddr_un server, client; in acceptClientConnection() local 44 memset(&server, 0, sizeof server); in acceptClientConnection() 45 server.sun_family = AF_UNIX; in acceptClientConnection() 47 strcpy(server.sun_path + 1, sockname); in acceptClientConnection() 50 socklen_t sockaddr_len = sizeof(server.sun_family) + strlen(sockname) + 1; in acceptClientConnection() 51 if (bind(serverSocket, (struct sockaddr *) &server, sockaddr_len) < 0) { in acceptClientConnection()
|
/frameworks/base/docs/html/training/secure-file-sharing/ |
D | request-file.jd | 32 usually sends a request to the app sharing the files (the server). In most cases, the request 33 starts an {@link android.app.Activity} in the server app that displays the files it can share. 34 The user picks a file, after which the server app returns the file's content URI to the 38 This lesson shows you how a client app requests a file from a server app, receives the file's 39 content URI from the server app, and opens the file using the content URI. 44 To request a file from the server app, the client app calls 52 {@link android.content.Intent} to a server app in order to start the 73 * server app. 84 The server app sends the file's content URI back to the client app in an 94 can't discover and open any other files in the server app. Only the client app gets access to [all …]
|
/frameworks/base/services/appwidget/java/com/android/server/appwidget/ |
D | AppWidgetService.java | 17 package com.android.server.appwidget; 21 import com.android.server.AppWidgetBackupBridge; 22 import com.android.server.SystemService;
|
/frameworks/base/services/core/java/com/android/server/job/controllers/ |
D | StateController.java | 17 package com.android.server.job.controllers; 21 import com.android.server.job.JobSchedulerService; 22 import com.android.server.job.StateChangedListener;
|
/frameworks/base/core/java/android/util/ |
D | NtpTrustedTime.java | 51 private NtpTrustedTime(String server, long timeout) { in NtpTrustedTime() argument 52 if (LOGD) Log.d(TAG, "creating NtpTrustedTime using " + server); in NtpTrustedTime() 53 mServer = server; in NtpTrustedTime() 72 final String server = secureServer != null ? secureServer : defaultServer; in getInstance() local 73 sSingleton = new NtpTrustedTime(server, timeout); in getInstance()
|
/frameworks/base/docs/html/training/articles/ |
D | security-ssl.jd | 16 <li><a href="#SelfSigned">Self-signed server certificate</a></li> 51 <p>In a typical SSL usage scenario, a server is configured with a certificate containing a 53 and server, the server proves it has the private key by signing its certificate with <a 57 doesn't prove anything about the server other than that the server knows the private key that 60 server is not to be trusted.</p> 65 is essentially a server configuration change. This is especially problematic if the server 75 in each release. Similar to a server, a CA has a certificate and a private key. When issuing 76 a certificate for a server, the CA <a 78 the server certificate using its private key. The 79 client can then verify that the server has a certificate issued by a CA known to the platform.</p> [all …]
|
/frameworks/base/services/core/java/com/android/server/net/ |
D | LockdownVpnTracker.java | 17 package com.android.server.net; 46 import com.android.server.ConnectivityService; 47 import com.android.server.EventLogTags; 48 import com.android.server.connectivity.Vpn; 231 mNetService.setFirewallEgressDestRule(mProfile.server, 500, true); in initLocked() 232 mNetService.setFirewallEgressDestRule(mProfile.server, 4500, true); in initLocked() 233 mNetService.setFirewallEgressDestRule(mProfile.server, 1701, true); in initLocked() 257 mNetService.setFirewallEgressDestRule(mProfile.server, 500, false); in shutdownLocked() 258 mNetService.setFirewallEgressDestRule(mProfile.server, 4500, false); in shutdownLocked() 259 mNetService.setFirewallEgressDestRule(mProfile.server, 1701, false); in shutdownLocked()
|
/frameworks/base/services/core/java/com/android/server/hdmi/ |
D | VolumeControlAction.java | 17 package com.android.server.hdmi; 19 import static com.android.server.hdmi.Constants.MESSAGE_FEATURE_ABORT; 20 import static com.android.server.hdmi.Constants.MESSAGE_REPORT_AUDIO_STATUS; 21 import static com.android.server.hdmi.Constants.MESSAGE_USER_CONTROL_PRESSED; 22 import static com.android.server.hdmi.HdmiConfig.IRT_MS;
|
/frameworks/base/services/tests/servicestests/src/com/android/server/ |
D | NativeDaemonConnectorTest.java | 17 package com.android.server; 19 import static com.android.server.NativeDaemonConnector.appendEscaped; 20 import static com.android.server.NativeDaemonConnector.makeCommand; 25 import com.android.server.NativeDaemonConnector.SensitiveArg;
|
/frameworks/base/docs/html/google/play/licensing/ |
D | licensing-reference.jd | 14 <li><a href="#server-response-codes">Server Response Codes</a></li> 59 licensing server to manage local storage of license data, license validity, 65 license response from the server only. No caching or request retry.</td> 88 backend server and may cause the user to lose access to licensed applications, 105 server.</td> 125 asynchronous response from the licensing server.</td> 132 <h2 id="server-response-codes">Server Response Codes</h2> 135 licensing server. In general, an application should handle all of these response 140 returned by the Google Play server in a license response.</p> 183 licensing server, possibly because of network availability problems. </td> [all …]
|
/frameworks/base/core/java/com/android/internal/net/ |
D | VpnProfile.java | 52 public String server = ""; // 2 field in VpnProfile 77 server = in.readString(); in VpnProfile() 98 out.writeString(server); in writeToParcel() 132 profile.server = values[2]; in decode() 157 builder.append('\0').append(server); in encode() 180 InetAddress.parseNumericAddress(server); in isValidLockdownProfile()
|