/external/openssh/ |
logintest.c | 68 "hostname\t'%s'\n\texit\t\t%d\n\ttermination\t%d\n\t" 77 li->username, li->hostname, li->exit, 103 /* gethostname(hostname, sizeof(hostname)); */ 116 printf("Couldn't set hostname(lookup failed)\n"); 123 strlcpy(li1->hostname, "localhost", sizeof(li1->hostname));
|
/external/chromium_org/remoting/client/plugin/ |
pepper_port_allocator.cc | 153 std::string hostname = stun_address_.hostname(); local 160 hostname, port, hint, 171 << stun_address_.hostname() << ": " << result; 177 << stun_address_.hostname(); 185 << stun_address_.hostname();
|
/external/chromium/googleurl/src/ |
url_parse.h | 274 Component* hostname, 280 Component* hostname,
|
/external/chromium_org/chrome/browser/chromeos/policy/ |
policy_cert_verifier.cc | 75 const std::string& hostname, 85 int error = delegate_->Verify(cert, hostname, flags, crl_set, verify_result,
|
/external/chromium_org/chrome/browser/extensions/ |
ad_view_browsertest.cc | 143 std::string hostname = url.host(); local 145 content::URLRequestPrepackagedInterceptor interceptor(scheme, hostname);
|
/external/chromium_org/native_client_sdk/src/examples/api/socket/ |
example.js | 31 var hostname = document.getElementById('hostname').value; 38 common.naclModule.postMessage(msgTcpCreate + hostname); 41 common.naclModule.postMessage(msgUdpCreate + hostname);
|
/external/chromium_org/net/dns/ |
host_resolver_impl.cc | 154 bool ResemblesNetBIOSName(const std::string& hostname) { 155 return (hostname.size() < 16) && (hostname.find('.') == std::string::npos); 158 // True if |hostname| ends with either ".local" or ".local.". 159 bool ResemblesMulticastDNSName(const std::string& hostname) { 160 DCHECK(!hostname.empty()); 164 if (hostname[hostname.size() - 1] == '.') { 165 return hostname.size() > kSuffixLen && 166 !hostname.compare(hostname.size() - kSuffixLen, kSuffixLen, kSuffix) 1958 std::string hostname = StringToLowerASCII(key.hostname); local [all...] |
host_resolver_proc.h | 98 virtual int Resolve(const std::string& hostname,
|
/external/chromium_org/net/http/ |
transport_security_state.h | 151 const std::string& hostname() const { return iterator_->first; } function in class:net::TransportSecurityState::Iterator 280 // Converts |hostname| from dotted form ("www.google.com") to the form 283 static std::string CanonicalizeHost(const std::string& hostname);
|
/external/chromium_org/net/quic/crypto/ |
crypto_utils.cc | 49 // TODO(rtenneti): Support RFC2396 hostname. 52 // would consider valid. By far the most common hostname character NOT 62 string CryptoUtils::NormalizeHostname(const char* hostname) { 64 string host(CanonicalizeHost(hostname, &host_info));
|
proof_verifier_chromium.h | 43 const std::string& hostname, 72 // |hostname| specifies the hostname for which |certs| is a valid chain.
|
/external/chromium_org/third_party/WebKit/Source/core/html/ |
HTMLAnchorElement.idl | 37 [TreatNullAs=NullString] attribute DOMString hostname;
|
/external/chromium_org/third_party/WebKit/Source/core/page/ |
Location.idl | 41 [SetterCallWith=ActiveWindow&FirstWindow] attribute DOMString hostname;
|
Location.h | 62 String hostname() const;
|
/external/chromium_org/third_party/mesa/src/src/gallium/auxiliary/util/ |
u_network.c | 110 u_socket_connect(const char *hostname, uint16_t port) 118 host = gethostbyname(hostname);
|
/external/dropbear/ |
loginrec.c | 236 const char *hostname, const char *line) 241 (void)login_init_entry(newli, pid, username, hostname, line); 264 const char *hostname, const char *line) 285 if (hostname) 286 strlcpy(li->hostname, hostname, sizeof(li->hostname)); 541 strncpy(ut->ut_host, li->hostname, MIN_SIZEOF(ut->ut_host, li->hostname)); 621 strncpy(utx->ut_host, li->hostname, MIN_SIZEOF(utx->ut_host, li->hostname)) [all...] |
/external/mesa3d/src/gallium/auxiliary/util/ |
u_network.c | 110 u_socket_connect(const char *hostname, uint16_t port) 118 host = gethostbyname(hostname);
|
/bionic/libc/netbsd/net/ |
getaddrinfo.c | 51 * when globbing NULL hostname (to loopback, or wildcard). Is it the right 55 * (1) what should we do against numeric hostname (2) what should we do 56 * against NULL hostname (3) what is AI_ADDRCONFIG itself. AF not ready? 252 "Address family for hostname not supported", /* EAI_ADDRFAMILY */ 258 "No address associated with hostname", /* EAI_NODATA */ 259 "hostname nor servname provided, or not known", /* EAI_NONAME */ 409 const char *hostname, const char *servname, 424 if ((hostname != NULL && 425 strcspn(hostname, " \n\r\t^'\"") != strlen(hostname)) || [all...] |
/bionic/libc/netbsd/resolv/ |
res_data.c | 312 local_hostname_length(const char *hostname) { 317 len_host = strlen(hostname); 320 !strcasecmp(hostname + len_host - len_domain, _nres.defdname) && 321 hostname[len_host - len_domain - 1] == '.')
|
/external/chromium/chrome/browser/sync/util/ |
cryptographer.h | 24 std::string hostname; member in struct:browser_sync::KeyParams
|
nigori.h | 34 // Initialize the client with the given |hostname|, |username| and |password|. 35 bool InitByDerivation(const std::string& hostname, 45 // Derives a secure lookup name from |type| and |name|. If |hostname|,
|
/external/chromium/net/base/ |
ssl_config_service.h | 130 // Returns true if the given hostname is known to be incompatible with TLS 132 static bool IsKnownFalseStartIncompatibleServer(const std::string& hostname);
|
/external/chromium/third_party/libjingle/source/talk/base/ |
openssladapter.h | 51 virtual int StartSSL(const char* hostname, bool restartable);
|
/external/chromium_org/net/cert/ |
x509_util_mac.h | 31 // Providing the hostname is necessary in order to locate certain user or 35 OSStatus NET_EXPORT CreateSSLServerPolicy(const std::string& hostname,
|
/external/chromium_org/sync/util/ |
nigori.h | 37 // Initialize the client with the given |hostname|, |username| and |password|. 38 bool InitByDerivation(const std::string& hostname, 48 // Derives a secure lookup name from |type| and |name|. If |hostname|,
|