/external/dnsmasq/src/ |
helper.c | 113 char *p, *action_str, *hostname = NULL; local 255 hostname = (char *)buf; 256 hostname[data.hostname_len - 1] = 0; 257 if (!legal_hostname(hostname)) 258 hostname = NULL; 259 else if ((dot = strchr(hostname, '.'))) 266 if (data.action == ACTION_OLD_HOSTNAME && hostname) 268 my_setenv("DNSMASQ_OLD_HOSTNAME", hostname, &err); 269 hostname = NULL; 282 action_str, daemon->dhcp_buff, inet_ntoa(data.addr), hostname, (char*)NULL) [all...] |
dhcp.c | 535 a particular hwaddr/clientid/hostname in our configuration. 666 int hw_type, char *hostname) 695 if (hostname && context) 698 hostname_isequal(config->hostname, hostname) && 747 free(config->hostname); 809 if ((config->flags & CONFIG_NAME) && hostname_isequal(config->hostname, host)) 848 config->hostname = host; 906 if ((configs->flags & CONFIG_NAME) && (domain = strip_hostname(configs->hostname))) 933 (crec = cache_find_by_name(NULL, config->hostname, 0, F_IPV4)) & 965 char *hostname = NULL; local [all...] |
/external/chromium_org/chrome/browser/policy/cloud/ |
test_request_interceptor.cc | 147 const std::string& hostname, 150 "http", hostname, interceptor.Pass()); 157 Delegate(const std::string& hostname, 180 const std::string& hostname, 182 : hostname_(hostname), io_task_runner_(io_task_runner) {} 219 TestRequestInterceptor::TestRequestInterceptor(const std::string& hostname, 221 : hostname_(hostname),
|
/external/chromium_org/net/dns/ |
host_resolver.h | 59 // The parameters for doing a Resolve(). A hostname and port are 71 const std::string& hostname() const { return host_port_pair_.host(); } function in class:net::HostResolver::RequestInfo 95 // The hostname to resolve, and the port to use in resulting sockaddrs. 130 // Resolves the given hostname (or IP address literal), filling out the 134 // ERR_NAME_NOT_RESOLVED if hostname is invalid, or if it is an 155 // Resolves the given hostname (or IP address literal) out of cache or HOSTS 157 // This acts like |Resolve()| if the hostname is IP literal, or cached value
|
dns_hosts.cc | 17 // Parses the contents of a hosts file. Returns one token (IP or hostname) at 30 // Advances to the next token (IP or hostname). Returns whether another 77 // hostname (false).
|
/external/mdnsresponder/mDNSShared/ |
PlatformCommon.c | 106 mDNSexport void ReadDDNSSettingsFromConfFile(mDNS *const m, const char *const filename, domainname *const hostname, domainname *const domain, mDNSBool *DomainDiscoveryDisabled) 112 if (hostname) hostname->c[0] = 0; 119 if (hostname && GetConfigOption(buf, "hostname", f) && !MakeDomainNameFromDNSNameString(hostname, buf)) goto badf; 135 // for now we assume keyname = service reg domain and we use same key for service and hostname registration
|
/external/chromium_org/native_client_sdk/src/build_tools/sdk_tools/third_party/fancy_urllib/ |
__init__.py | 26 """Raised when a certificate is provided with an invalid hostname.""" 32 host: The hostname the connection was made to. 116 def _validate_certificate_hostname(self, cert, hostname): 117 """Validates that a given hostname is valid for an SSL certificate. 121 hostname: The hostname to test. 123 bool: Whether or not the hostname is valid for this certificate. 127 # Convert the glob-style hostname expression (eg, '*.google.com') into a 130 if re.search('^%s$' % (host_re,), hostname, re.I): 155 hostname = self.host.split(':', 0)[0 [all...] |
/external/chromium_org/chrome/browser/ui/webui/net_internals/ |
net_internals_ui_browsertest.cc | 48 // Called on IO thread. Adds an entry to the cache for the specified hostname. 51 const std::string& hostname, 60 net::HostCache::Key key(hostname, net::ADDRESS_FAMILY_UNSPECIFIED, 0); 67 int rv = net::ParseAddressList(ip_literal, hostname, &address_list); 74 cache->Set(net::HostCache::Key(hostname, net::ADDRESS_FAMILY_UNSPECIFIED, 0), 102 // hostname by posting a task to the IO thread. Takes the host name, 189 std::string hostname; local 193 ASSERT_TRUE(list_value->GetString(0, &hostname)); 203 hostname,
|
/libcore/luni/src/main/java/javax/net/ssl/ |
HttpsURLConnection.java | 119 * Sets the default hostname verifier to be used by new instances. 122 * the new default hostname verifier 134 * Returns the default hostname verifier. 136 * @return the default hostname verifier. 168 * the default hostname verifier 256 * Sets the hostname verifier for this instance. 259 * the hostname verifier for this instance. 271 * Returns the hostname verifier used by this instance. 273 * @return the hostname verifier used by this instance.
|
/external/chromium_org/chrome/common/extensions/docs/templates/intros/ |
contentSettings.html | 54 <li>Wildcards in the hostname (for example 60 hostname, scheme, port. For example, the following patterns are ordered by 64 Specifies the hostname and scheme.</li> 66 Not as high, because although it specifies the hostname, it doesn't specify 70 in the hostname.</li>
|
/libcore/benchmarks/src/benchmarks/regression/ |
HostnameVerifierBenchmark.java | 48 private String hostname; field in class:HostnameVerifierBenchmark 57 public boolean verify(String hostname, SSLSession sslSession) { 63 HostnameVerifierBenchmark.this.hostname = hostname; 79 hostnameVerifier.verify(hostname, sslSession);
|
/bionic/libc/dns/net/ |
getaddrinfo.c | 51 * when globbing NULL hostname (to loopback, or wildcard). Is it the right 55 * (1) what should we do against numeric hostname (2) what should we do 56 * against NULL hostname (3) what is AI_ADDRCONFIG itself. AF not ready? 255 "Address family for hostname not supported", /* EAI_ADDRFAMILY */ 261 "No address associated with hostname", /* EAI_NODATA */ 262 "hostname nor servname provided, or not known", /* EAI_NONAME */ 414 const char *hostname, const char *servname, 429 if ((hostname != NULL && 430 strcspn(hostname, " \n\r\t^'\"") != strlen(hostname)) || [all...] |
/cts/tests/tests/net/src/android/net/cts/ |
SSLCertificateSocketFactoryTest.java | 98 * b/2807618 Make sure that hostname verifcation in cases were it 114 * b/2807618 Make sure that hostname verifcation in cases were it 132 * b/2807618 Make sure that hostname verifcation in cases were it
|
/external/chromium_org/chrome/browser/ui/views/location_bar/ |
origin_chip_view.h | 32 // icon, an optional EV cert name, and a hostname. The hostname is normally the 33 // hostname for the current page with any leading "www." removed, though for
|
/external/chromium_org/net/cert/ |
cert_verify_proc.h | 32 // Verifies the certificate against the given hostname as an SSL server 58 const std::string& hostname, 80 const std::string& hostname,
|
/external/chromium_org/net/quic/crypto/ |
channel_id.h | 46 // a ChannelIDKey for a given hostname. 51 // GetChannelIDKey looks up the ChannelIDKey for |hostname|. On success it 60 const std::string& hostname,
|
/external/chromium_org/net/url_request/ |
url_request_filter_unittest.cc | 89 // Check hostname matching. 106 // Check we can remove hostname matching. 111 // Check URLRequestInterceptor hostname matching.
|
/external/chromium_org/third_party/webrtc/base/ |
nethelpers.cc | 25 int ResolveHostname(const std::string& hostname, int family, 41 int ret = getaddrinfo(hostname.c_str(), NULL, &hints, &result); 84 error_ = ResolveHostname(addr_.hostname().c_str(), addr_.family(),
|
/external/mdnsresponder/mDNSPosix/ |
Identify.c | 69 static char hostname[MAX_ESCAPED_DOMAIN_NAME], hardware[256], software[256]; variable 115 ConvertDomainNameToCString(&answer->rdata->u.name, hostname); 304 hostname[0] = hardware[0] = software[0] = 0; 339 if (strlen(arg) >= sizeof(hostname)) { 340 fprintf(stderr, "hostname must be < %d characters\n", (int)sizeof(hostname)); 343 strcpy(hostname, arg); 347 if (hostname[0]) DoQuery(&q, hostname, kDNSQType_ANY, &target, InfoCallback); 355 else if (NumAnswers) printf("%s has no HINFO record\n", hostname); [all...] |
/external/stressapptest/ |
configure.ac | 86 hostname=$(uname -n) 88 AC_MSG_RESULT([$hostname]) 95 "$username @ $hostname on $timestamp",
|
/libcore/luni/src/main/java/java/net/ |
Inet4Address.java | 51 Inet4Address(byte[] ipaddress, String hostName) { 52 super(AF_INET, ipaddress, hostName); 129 return new Inet4Address(ipaddress, hostName);
|
/prebuilts/tools/common/proguard/proguard4.7/docs/ |
sections.html | 37 document.write(document.location.hostname == "proguard.sourceforge.net" ? 56 if (document.location.hostname == "proguard.sourceforge.net") 59 if (document.location.hostname == "proguard.sourceforge.net")
|
/external/chromium_org/chrome/android/java/src/org/chromium/chrome/browser/ |
SSLClientCertificateRequest.java | 154 CertAsyncTaskPKCS11(long nativePtr, String hostName, int port, 157 mHostName = hostName; 221 * @param hostName The server host name is available (empty otherwise). 228 final String[] keyTypes, byte[][] encodedPrincipals, final String hostName, 262 hostName, port, null); 275 new CertAsyncTaskPKCS11(nativePtr, hostName, port,
|
/external/chromium_org/content/common/ |
database_identifier_unittest.cc | 47 // This tests the encoding of a hostname including every character in the range 51 std::string hostname; member in struct:content::__anon11839::Case 156 GURL origin("http://" + cases[i].hostname); 160 << "test case " << i << " :\"" << cases[i].hostname << "\""; 165 << "test case " << i << " :\"" << cases[i].hostname << "\""; 211 EXPECT_EQ(valid_cases[i].expected_host, identifier.hostname())
|
/external/chromium_org/net/third_party/nss/ssl/ |
sslauth.c | 288 const char * hostname = NULL; local 322 * Now check the name field in the cert against the desired hostname. 325 hostname = ss->url; 326 if (hostname && hostname[0]) 327 rv = CERT_VerifyCertName(ss->sec.peerCert, hostname);
|