/frameworks/base/docs/html/training/articles/ |
security-ssl.jd | 20 <li><a href="#CommonHostnameProbs">Common Problems with Hostname Verification</a></li> 336 <h2 id="CommonHostnameProbs">Common Problems with Hostname Verification</h2> 346 java.io.IOException: Hostname 'example.com' was not verified 369 server for more than one hostname with HTTP, the web server can tell from the HTTP/1.1 request 370 which target hostname the client is looking for. Unfortunately this is complicated with 375 hostname to the server so the proper certificate can be returned.</p> 385 hostname of your virtual host, but the one returned by the server by default.</p> 392 <p>If you are still sure you want to override hostname verification, here is an example 394 with one that still verifies that the hostname is at least on expected by the app:</p> 397 // Create an HostnameVerifier that hardwires the expected hostname [all...] |
/external/chromium_org/net/dns/ |
host_resolver_impl.cc | 150 bool ResemblesNetBIOSName(const std::string& hostname) { 151 return (hostname.size() < 16) && (hostname.find('.') == std::string::npos); 154 // True if |hostname| ends with either ".local" or ".local.". 155 bool ResemblesMulticastDNSName(const std::string& hostname) { 156 DCHECK(!hostname.empty()); 160 if (hostname[hostname.size() - 1] == '.') { 161 return hostname.size() > kSuffixLen && 162 !hostname.compare(hostname.size() - kSuffixLen, kSuffixLen, kSuffix) 2080 std::string hostname = StringToLowerASCII(key.hostname); local [all...] |
/external/lldb/tools/debugserver/source/ |
RNBSocket.cpp | 34 ResolveIPV4HostName (const char *hostname, in_addr_t &addr) 36 if (hostname == NULL || 37 hostname[0] == '\0' || 38 strcmp(hostname, "localhost") == 0 || 39 strcmp(hostname, "127.0.0.1") == 0) 44 else if (strcmp(hostname, "*") == 0) 52 int inet_pton_result = ::inet_pton (AF_INET, hostname, &addr); 57 struct hostent *host_entry = gethostbyname (hostname); 76 // Now figure out the hostname that will be attaching and palce it into
|
/external/tcpdump/tests/ |
QinQpacketv.out | 13 Hostname Option 12, length 17: "6731i00085D230C3F" 26 Hostname Option 12, length 17: "6731i00085D230C3F" 40 Hostname Option 12, length 17: "6731i00085D230C3F" 53 Hostname Option 12, length 17: "6731i00085D230C3F" 66 Hostname Option 12, length 17: "6731i00085D230C3F" 79 Hostname Option 12, length 17: "6731i00085D230C3F" 92 Hostname Option 12, length 17: "6731i00085D230C3F" 105 Hostname Option 12, length 17: "6731i00085D230C3F" 123 Hostname Option 12, length 17: "6731i00085D230C3F" 136 Hostname Option 12, length 17: "6731i00085D230C3F [all...] |
/external/chromium_org/net/cert/ |
multi_threaded_cert_verifier.cc | 219 const std::string& hostname, 226 hostname_(hostname), 457 const std::string& hostname, 466 if (callback.is_null() || !verify_result || hostname.empty()) { 479 hostname, flags, additional_trust_anchors); 503 hostname, 545 : hostname(hostname_arg), 559 // |hostname| under assumption that integer comparisons are faster than 563 if (hostname != other.hostname) [all...] |
/external/chromium_org/tools/real_world_impact/ |
real_world_impact.py | 155 hostname = entry.strip().split(',')[1] 156 if not '/' in hostname: # Skip Alexa 1,000,000 entries that have paths. 157 url = "http://%s/" % hostname 185 host_dir = os.path.join(output_dir, "data", url_parts.hostname) 214 download_path = os.path.join(host_dir, url_parts.hostname, "index.html") 232 host_dir = os.path.join(output_dir, "data", url_parts.hostname) 233 download_path = os.path.join(host_dir, url_parts.hostname, "index.html") 257 host_dir = os.path.join(output_dir, "data", url_parts.hostname) 258 html_path = os.path.join(host_dir, url_parts.hostname, "index.html") 261 nojs_path = os.path.join(host_dir, url_parts.hostname, "index-nojs.html" [all...] |
/external/lldb/test/pexpect-2.4/examples/ |
cgishell.cgi | 9 --hostname : sets the remote host name to open an ssh connection to. 30 If port > 0 then host is an inet hostname. 43 def server (hostname, username, password, socket_filename='/tmp/server_sock', daemon_mode = True, verbose=False): 59 child.login (hostname, username, password, login_naked=True) 295 optlist, args = getopt.getopt(sys.argv[1:], 'h?d', ['help','h','?', 'hostname=', 'username=', 'password=', 'port=', 'watch']) 306 hostname = "127.0.0.1" 317 if '--hostname' in options: 318 hostname = options['--hostname'] 328 server (hostname, username, password, '/tmp/mysock', daemon_mode [all...] |
/external/apache-http/src/org/apache/http/conn/ssl/ |
AbstractVerifier.java | 147 // establish the socket to the hostname in the certificate. 148 String hostName = host.trim().toLowerCase(Locale.ENGLISH); 171 match = hostName.endsWith(cn.substring(1)); 175 match = countDots(hostName) == countDots(cn); 178 match = hostName.equals(cn); 185 throw new SSLException("hostname in certificate didn't match: <" + host + "> !=" + buf);
|
/external/chromium_org/remoting/client/plugin/ |
pepper_port_allocator.cc | 150 std::string hostname = stun_address_.hostname(); local 158 int result = stun_address_resolver_.Resolve(hostname.c_str(), 168 << stun_address_.hostname() << ": " << result; 174 << stun_address_.hostname(); 181 << stun_address_.hostname();
|
/external/chromium_org/third_party/WebKit/Source/platform/weborigin/ |
DatabaseIdentifierTest.cpp | 76 // This tests the encoding of a hostname including every character in the range [\x1f, \x80]. 80 String hostname; member in struct:__anon15248::Case 192 RefPtr<SecurityOrigin> origin = SecurityOrigin::create("http", cases[i].hostname, 80); 194 EXPECT_EQ(cases[i].expected, identifier) << "test case " << i << ": \"" << cases[i].hostname << "\""; 197 EXPECT_EQ(cases[i].hostname.lower(), parsedOrigin->host()) << "test case " << i << ": \"" << cases[i].hostname << "\"";
|
/external/ppp/pppd/plugins/radius/ |
config.c | 404 * Purpose: see if ip_addr is one of the ip addresses of hostname 410 static int find_match (UINT4 *ip_addr, char *hostname) 416 if (rc_good_ipaddr (hostname) == 0) 418 if (*ip_addr == ntohl(inet_addr (hostname))) 425 if ((hp = gethostbyname (hostname)) == (struct hostent *) NULL) 480 if ((h = strtok (buffer, " \t\n")) == NULL) /* first hostname */
|
/external/smack/src/org/xbill/DNS/ |
Address.java | 255 * @param name The hostname to look up 257 * @exception UnknownHostException The hostname does not have any addresses 271 * @param name The hostname to look up 273 * @exception UnknownHostException The hostname does not have any addresses 329 * Determines the hostname for an address 332 * @exception UnknownHostException There is no hostname for the address
|
/external/dhcpcd/ |
if-options.c | 66 {"hostname", optional_argument, NULL, 'h'}, 362 s = parse_string(ifo->hostname, 365 syslog(LOG_ERR, "hostname: %m"); 368 if (s != 0 && ifo->hostname[0] == '.') { 370 "hostname cannot begin with ."); 373 ifo->hostname[s] = '\0'; 375 if (ifo->hostname[0] == '\0') 810 gethostname(ifo->hostname, HOSTNAME_MAX_LEN); 811 /* Ensure that the hostname is NULL terminated */ 812 ifo->hostname[HOSTNAME_MAX_LEN] = '\0' [all...] |
/external/apache-harmony/luni/src/test/api/common/org/apache/harmony/luni/tests/internal/net/www/protocol/https/ |
HttpsURLConnectionTest.java | 136 // create the HostnameVerifier to check hostname verification 176 // create the HostnameVerifier to check hostname verification 214 // create the HostnameVerifier to check hostname verification 259 // create the HostnameVerifier to check hostname verification 277 assertTrue("Hostname verification was not done", hnv.verified); 279 "Hostname verification should not be done by this verifier", 300 // create the HostnameVerifier to check hostname verification 322 assertTrue("Hostname verification was not done", hnv.verified); 324 "Hostname verification should not be done by this verifier", 387 // create the HostnameVerifier to check that Hostname verificatio [all...] |
/external/chromium_org/chrome/browser/chromeos/policy/ |
policy_cert_verifier.cc | 73 const std::string& hostname, 87 int error = delegate_->Verify(cert, hostname, flags, crl_set, verify_result,
|
/external/chromium_org/chrome/utility/importer/ |
firefox_importer_unittest.cc | 64 "CREATE TABLE moz_logins (id INTEGER PRIMARY KEY, hostname TEXT NOT " 72 "CREATE TABLE moz_disabledHosts (id INTEGER PRIMARY KEY, hostname TEXT "
|
/external/chromium_org/native_client_sdk/src/tests/nacl_io_test/fake_ppapi/ |
fake_host_resolver_interface.cc | 50 const char* hostname, 58 if (!fake_hostname.empty() && fake_hostname == hostname) {
|
/external/chromium_org/net/base/ |
host_port_pair_unittest.cc | 62 // Test empty hostname. 72 // Test hostname with null character.
|
/external/chromium_org/net/quic/crypto/ |
proof_verifier.h | 57 // that |certs| is a valid chain for |hostname|. On success, it returns 72 virtual QuicAsyncStatus VerifyProof(const std::string& hostname,
|
/external/chromium_org/net/socket/ |
socks5_client_socket.cc | 279 // Since we only have 1 byte to send the hostname length in, if the 280 // URL has a hostname longer than 255 characters we can't send it. 281 if (0xFF < host_request_info_.hostname().size()) { 367 DCHECK_GE(static_cast<size_t>(0xFF), host_request_info_.hostname().size()); 369 // First add the size of the hostname, followed by the hostname. 371 host_request_info_.hostname().size())); 372 handshake->append(host_request_info_.hostname());
|
socks5_client_socket.h | 31 // |req_info| contains the hostname and port to which the socket above will 35 // always pass it a hostname. This means the DNS resolving is done
|
socks_client_socket.h | 30 // |req_info| contains the hostname and port to which the socket above will 127 // Used to resolve the hostname to which the SOCKS proxy will connect.
|
/external/chromium_org/third_party/libjingle/source/talk/base/ |
fakenetwork.h | 112 scoped_ptr<Network> net(new Network(it->hostname(), 113 it->hostname(),
|
/external/chromium_org/third_party/mesa/src/src/gallium/auxiliary/util/ |
u_network.c | 110 u_socket_connect(const char *hostname, uint16_t port) 118 host = gethostbyname(hostname);
|
/external/chromium_org/third_party/npapi/npspy/extern/nspr/ |
prnetdb.h | 91 ** char *hostname Character string defining the host name of interest 107 const char *hostname, char *buf, PRIntn bufsize, PRHostEnt *hostentry); 116 ** char *hostname Character string defining the host name of interest 143 const char *hostname, 395 ** char *hostname Character string defining the host name of interest 409 const char *hostname, PRUint16 af, PRIntn flags); 454 ** Extracts the canonical name of the hostname passed to 462 ** const char * A const pointer to the canonical hostname stored
|