/external/chromium_org/webkit/common/database/ |
database_identifier.cc | 86 std::string hostname(identifier.data() + first_underscore + 1, 88 GURL url(scheme + "://" + hostname + "/"); 91 hostname = ""; 94 if (!url.is_valid() || url.scheme() != scheme || url.host() != hostname) 97 return DatabaseIdentifier(scheme, hostname, port, false /* unique */, false); 107 const std::string& hostname, 112 hostname_(StringToLowerASCII(hostname)),
|
database_identifier.h | 33 std::string hostname() const { return hostname_; } function in class:webkit_database::DatabaseIdentifier 40 const std::string& hostname,
|
/external/chromium_org/chrome/browser/net/ |
predictor_browsertest.cc | 46 bool HasHostBeenRequested(const std::string& hostname) { 50 hostname) != requested_hostnames_.end(); 53 void WaitUntilHostHasBeenRequested(const std::string& hostname) { 56 if (HasHostBeenRequested(hostname)) 58 waiting_for_hostname_ = hostname; 66 void AddToHistory(const std::string& hostname) { 68 requested_hostnames_.push_back(hostname); 69 if (is_waiting_for_hostname_ && waiting_for_hostname_ == hostname) { 76 // The hostname which WaitUntilHostHasBeenRequested is currently waiting for 80 // Whether WaitUntilHostHasBeenRequested is waiting for a hostname to b [all...] |
chrome_fraudulent_certificate_reporter.cc | 38 static std::string BuildReport(const std::string& hostname, 43 request.set_hostname(hostname); 67 const std::string& hostname, 72 if (!net::TransportSecurityState::IsGooglePinnedProperty(hostname, 77 std::string report = BuildReport(hostname, ssl_info);
|
/external/openssh/ |
dns.c | 141 * Check if hostname is numerical. 142 * Returns -1 if hostname is numeric, 0 otherwise 145 is_numeric_hostname(const char *hostname) 153 if (hostname == NULL) { 154 error("is_numeric_hostname called with NULL hostname"); 162 if (getaddrinfo(hostname, NULL, &hints, &ai) == 0) { 171 * Verify the given hostname, address and host key using DNS. 175 verify_host_key_dns(const char *hostname, struct sockaddr *address, 198 if (is_numeric_hostname(hostname)) { 199 debug("skipped DNS lookup for numerical hostname"); [all...] |
sshlogin.c | 78 strlcpy(buf, li.hostname, bufsize); 90 char *time_string, hostname[MAXHOSTNAMELEN] = "", buf[512]; local 103 last_login_time = get_last_login_time(uid, user, hostname, 104 sizeof(hostname)); 109 if (strcmp(hostname, "") == 0) 114 time_string, hostname);
|
audit-linux.c | 44 const char *hostname, const char *ip, const char *ttyn, int success) 58 username == NULL ? uid : -1, hostname, ip, ttyn, success); 88 if (linux_audit_record_event(li->uid, NULL, li->hostname,
|
loginrec.h | 70 char hostname[LINFO_HOSTSIZE]; /* remote hostname */ member in struct:logininfo 90 const char *hostname, const char *line); 95 const char *hostname, const char *line);
|
/external/chromium/net/url_request/ |
url_request_filter.h | 36 // scheme,hostname -> ProtocolFactory 50 const std::string& hostname, 53 const std::string& hostname);
|
/external/chromium_org/net/cert/ |
cert_verify_proc.h | 32 // Verifies the certificate against the given hostname as an SSL server 58 const std::string& hostname, 80 const std::string& hostname,
|
cert_verifier.h | 75 // Verifies the given certificate against the given hostname as an SSL server. 105 const std::string& hostname,
|
single_request_cert_verifier.h | 28 const std::string& hostname,
|
/external/chromium_org/third_party/WebKit/Source/core/workers/ |
WorkerLocation.idl | 35 readonly attribute DOMString hostname;
|
/external/ganymed-ssh2/examples/ |
PortForwarding.java | 26 String hostname = "127.0.0.1"; local 36 Connection conn = new Connection(hostname);
|
/libcore/crypto/src/main/java/org/conscrypt/ |
CertPinManager.java | 65 * Given a hostname and a certificate chain this verifies that the chain includes 71 public boolean chainIsNotPinned(String hostname, List<X509Certificate> chain) 74 PinListEntry entry = lookup(hostname); 125 private synchronized PinListEntry lookup(String hostname) throws PinManagerException { 137 // if so, check the hostname cache 138 String cn = hostnameCache.get(hostname); 145 cn = getMatchingCN(hostname); 147 hostnameCache.put(hostname, cn); 152 // if we got here, we don't have a matching CN for this hostname 160 private String getMatchingCN(String hostname) { [all...] |
/external/chromium/android/net/ |
android_network_library_impl.h | 24 const std::string& hostname,
|
/external/chromium/net/base/ |
android_network_library.h | 31 // |hostname| is validated against the supplied cert. |auth_type| is as per 35 const std::string& hostname,
|
/external/chromium/third_party/libjingle/source/talk/base/ |
socketaddress.cc | 64 SocketAddress::SocketAddress(const std::string& hostname, int port) { 65 SetIP(hostname); 104 void SocketAddress::SetIP(const std::string& hostname) { 105 hostname_ = hostname; 106 ip_ = StringToIP(hostname); 316 bool SocketAddress::StringToIP(const std::string& hostname, uint32* ip) { 318 if (inet_aton(hostname.c_str(), &addr) == 0) 324 uint32 SocketAddress::StringToIP(const std::string& hostname) { 326 StringToIP(hostname, &ip); 331 char hostname[256] local 340 const std::string hostname = GetHostname(); local [all...] |
ssladapter.h | 48 virtual int StartSSL(const char* hostname, bool restartable) = 0; 54 // If true, the server certificate need not match the configured hostname.
|
/external/chromium_org/third_party/libjingle/source/talk/base/ |
ssladapter.h | 48 virtual int StartSSL(const char* hostname, bool restartable) = 0; 54 // If true, the server certificate need not match the configured hostname.
|
/external/javassist/src/main/javassist/ |
URLClassPath.java | 29 protected String hostname; field in class:URLClassPath 61 hostname = host; 68 return hostname + ":" + port + directory; 90 return fetchClass0(hostname, port, jarname);
|
/external/chromium_org/chrome/test/functional/ |
chromeos_vpn.py | 21 def _PingTest(self, hostname, timeout=10): 29 str(timeout), hostname]) == 0 50 self.AddPrivateNetwork(hostname=vpn['hostname'],
|
/external/chromium_org/net/url_request/ |
url_request_filter.h | 39 // scheme,hostname -> ProtocolHandler 54 const std::string& hostname, 58 const std::string& hostname, 61 const std::string& hostname);
|
/packages/apps/Settings/src/com/android/settings/ |
ProxySelector.java | 118 String hostname = mHostnameField.getText().toString().trim(); local 121 String msg = getActivity().getString(validate(hostname, portStr, exclList)); 141 mHostnameField = (EditText)view.findViewById(R.id.hostname); 163 String hostname = ""; local 172 hostname = proxy.getHost(); 177 if (hostname == null) { 178 hostname = ""; 181 mHostnameField.setText(hostname); 202 * validate syntax of hostname and port entries 205 public static int validate(String hostname, String port, String exclList) 242 String hostname = mHostnameField.getText().toString().trim(); local [all...] |
/external/chromium_org/third_party/WebKit/Source/weborigin/ |
DatabaseIdentifierTest.cpp | 76 // This tests the encoding of a hostname including every character in the range [\x1f, \x80]. 80 String hostname; member in struct:__anon12873::Case 192 RefPtr<SecurityOrigin> origin = SecurityOrigin::create("http", cases[i].hostname, 80); 194 EXPECT_EQ(cases[i].expected, identifier) << "test case " << i << ": \"" << cases[i].hostname << "\""; 197 EXPECT_EQ(cases[i].hostname.lower(), parsedOrigin->host()) << "test case " << i << ": \"" << cases[i].hostname << "\"";
|