HomeSort by relevance Sort by last modified time
    Searched refs:hostname (Results 51 - 75 of 375) sorted by null

1 23 4 5 6 7 8 91011>>

  /external/javassist/src/main/javassist/
URLClassPath.java 29 protected String hostname; field in class:URLClassPath
61 hostname = host;
68 return hostname + ":" + port + directory;
90 return fetchClass0(hostname, port, jarname);
  /external/chromium_org/net/url_request/
url_request_filter.h 44 const std::string& hostname,
48 const std::string& hostname,
51 const std::string& hostname);
75 // scheme,hostname -> URLRequestInterceptor
test_url_request_interceptor.cc 49 const std::string& hostname,
53 hostname_(hostname),
65 const std::string& hostname) {
67 hostname);
71 // hostname and scheme of |url| must match the corresponding parameters
142 const std::string& hostname,
146 hostname_(hostname),
149 hostname,
  /external/chromium_org/third_party/WebKit/Source/core/dom/
DOMURLUtilsReadOnly.h 58 static String hostname(const KURL& url) { return url.host(); } function in class:blink::DOMURLUtilsReadOnly
59 String hostname() { return hostname(url()); } function in class:blink::DOMURLUtilsReadOnly
  /external/lldb/test/pexpect-2.4/examples/
astat.py 6 -s : hostname of the remote server to login to.
44 hostname = options['-s']
46 hostname = raw_input('hostname: ')
60 p.login(hostname, username, password)
  /external/chromium_org/chrome/browser/net/
chrome_fraudulent_certificate_reporter.cc 39 static std::string BuildReport(const std::string& hostname,
44 request.set_hostname(hostname);
72 const std::string& hostname,
76 if (!net::TransportSecurityState::IsGooglePinnedProperty(hostname)) {
80 std::string report = BuildReport(hostname, ssl_info);
chrome_fraudulent_certificate_reporter_unittest.cc 83 // Passes if invoked with a good SSLInfo and for a hostname that is a Google
85 virtual void SendReport(const std::string& hostname,
88 EXPECT_TRUE(net::TransportSecurityState::IsGooglePinnedProperty(hostname));
106 // Passes if invoked with a bad SSLInfo and for a hostname that is not a
108 virtual void SendReport(const std::string& hostname,
111 EXPECT_FALSE(net::TransportSecurityState::IsGooglePinnedProperty(hostname));
131 const std::string& hostname,
133 DCHECK(!hostname.empty());
135 ChromeFraudulentCertificateReporter::SendReport(hostname, ssl_info);
  /external/chromium_org/content/common/
database_identifier_unittest.cc 47 // This tests the encoding of a hostname including every character in the range
51 std::string hostname; member in struct:content::__anon12198::Case
156 GURL origin("http://" + cases[i].hostname);
160 << "test case " << i << " :\"" << cases[i].hostname << "\"";
165 << "test case " << i << " :\"" << cases[i].hostname << "\"";
211 EXPECT_EQ(valid_cases[i].expected_host, identifier.hostname())
  /external/chromium_org/third_party/WebKit/Source/platform/weborigin/
DatabaseIdentifierTest.cpp 76 // This tests the encoding of a hostname including every character in the range [\x1f, \x80].
80 String hostname; member in struct:__anon15981::Case
192 RefPtr<SecurityOrigin> origin = SecurityOrigin::create("http", cases[i].hostname, 80);
194 EXPECT_EQ(cases[i].expected, identifier) << "test case " << i << ": \"" << cases[i].hostname << "\"";
197 EXPECT_EQ(cases[i].hostname.lower(), parsedOrigin->host()) << "test case " << i << ": \"" << cases[i].hostname << "\"";
  /external/chromium_org/third_party/webrtc/base/
socketaddress_unittest.cc 40 EXPECT_EQ("", addr.hostname());
48 EXPECT_EQ("", addr.hostname());
57 EXPECT_EQ("1.2.3.4", addr.hostname());
68 EXPECT_EQ(kTestV6AddrString, addr2.hostname());
78 EXPECT_EQ("255.255.255.255", addr.hostname());
87 EXPECT_EQ("a.b.com", addr.hostname());
97 EXPECT_EQ("1.2.3.4", addr.hostname());
108 EXPECT_EQ("1.2.3.4", addr.hostname());
119 EXPECT_EQ("", addr.hostname());
130 EXPECT_EQ("1.2.3.4", addr.hostname());
    [all...]
socketaddress.cc 45 SocketAddress::SocketAddress(const std::string& hostname, int port) {
46 SetIP(hostname);
103 void SocketAddress::SetIP(const std::string& hostname) {
104 hostname_ = hostname;
105 literal_ = IPFromString(hostname, &ip_);
140 // If the hostname was a literal IP string, it may need to have square
152 // If the hostname was a literal IP string, it may need to have square
316 bool SocketAddress::StringToIP(const std::string& hostname, uint32* ip) {
318 if (rtc::inet_pton(AF_INET, hostname.c_str(), &addr) == 0)
324 bool SocketAddress::StringToIP(const std::string& hostname, IPAddress* ip)
    [all...]
  /external/chromium_org/storage/common/database/
database_identifier.cc 93 std::string hostname(identifier.data() + first_underscore + 1,
95 GURL url(scheme + "://" + hostname + "/");
98 hostname = "";
101 if (!url.is_valid() || url.scheme() != scheme || url.host() != hostname)
104 return DatabaseIdentifier(scheme, hostname, port, false /* unique */, false);
114 const std::string& hostname,
119 hostname_(base::StringToLowerASCII(hostname)),
  /external/dnsmasq/src/
helper.c 113 char *p, *action_str, *hostname = NULL; local
255 hostname = (char *)buf;
256 hostname[data.hostname_len - 1] = 0;
257 if (!legal_hostname(hostname))
258 hostname = NULL;
259 else if ((dot = strchr(hostname, '.')))
266 if (data.action == ACTION_OLD_HOSTNAME && hostname)
268 my_setenv("DNSMASQ_OLD_HOSTNAME", hostname, &err);
269 hostname = NULL;
282 action_str, daemon->dhcp_buff, inet_ntoa(data.addr), hostname, (char*)NULL)
    [all...]
  /external/conscrypt/src/test/java/org/conscrypt/
TrustManagerImplTest.java 153 // test without a hostname, expecting failure
155 // test without a hostname, expecting success
157 // test an unpinned hostname that should fail
159 // test an unpinned hostname that should succeed
161 // test a pinned hostname that should fail
163 // test a pinned hostname that should succeed
166 // test a pinned hostname that chains to user installed that should succeed
183 private TrustManagerImpl trustManager(X509Certificate ca, String hostname, X509Certificate pin)
186 CertPinManager cm = certManager(hostname, pin);
194 X509Certificate caKeyStore, X509Certificate caUserStore, String hostname,
284 private final String hostname; field in class:TrustManagerImplTest.MySSLSession
    [all...]
  /external/chromium_org/chrome/browser/ui/views/
crypto_module_password_dialog_view.cc 25 const std::string& hostname,
28 Init(hostname, slot_name, reason);
80 void CryptoModulePasswordDialogView::Init(const std::string& hostname,
85 const base::string16& hostname16 = base::UTF8ToUTF16(hostname);
157 const std::string& hostname,
161 new CryptoModulePasswordDialogView(slot_name, reason, hostname, callback);
  /external/chromium_org/extensions/test/data/api_test/dns/api/
background.js 18 chrome.test.succeed("hostname resolved");
27 chrome.test.succeed("hostname correctly failed to resolve");
29 chrome.dns.resolve("this.hostname.is.bogus", callback);
  /external/nist-sip/java/gov/nist/core/
HostNameParser.java 175 String hostname; local
179 hostname = ipv6Reference();
187 hostname
192 //IPv4 address or hostname
196 hostname = lexer.getBuffer().substring(startPtr, lexer.getPtr());
199 if (hostname.length() == 0)
204 return new Host(hostname);
307 " Illegal character in hostname:" + lexer.lookAhead(0),
  /bionic/libc/kernel/uapi/linux/
nfs4_mount.h 44 struct nfs_string hostname; member in struct:nfs4_mount_data
  /development/ndk/platforms/android-L/include/linux/
nfs4_mount.h 44 struct nfs_string hostname; member in struct:nfs4_mount_data
  /external/chromium_org/net/dns/
dns_transaction.h 31 // Returns the original |hostname|.
49 // original |hostname| as a result of suffix search.
56 // Creates DnsTransaction for the given |hostname| and |qtype| (assuming
57 // QCLASS is IN). |hostname| should be in the dotted form. A dot at the end
59 // search. |hostname| should not be an IP literal.
64 const std::string& hostname,
  /external/chromium_org/net/quic/crypto/
proof_verifier.h 61 // that |certs| is a valid chain for |hostname|. On success, it returns
76 virtual QuicAsyncStatus VerifyProof(const std::string& hostname,
  /external/chromium_org/third_party/boringssl/src/crypto/bio/
bio_test.c 35 char hostname[80], buf[5]; local
61 snprintf(hostname, sizeof(hostname), "%s:%d", "127.0.0.1",
63 bio = BIO_new_connect(hostname);
  /external/chromium_org/tools/findit/common/
http_client_local.py 39 def _DNSNameMatch(dn, hostname, max_wildcards=1):
63 return dn.lower() == hostname.lower()
72 elif leftmost.startswith('xn--') or hostname.startswith('xn--'):
87 return pat.match(hostname)
90 def _MatchHostname(cert, hostname):
92 SSLSocket.getpeercert()) matches the *hostname*. RFC 2818 and RFC 6125
93 rules are followed, but IP addresses are not accepted for *hostname*.
106 if _DNSNameMatch(value, hostname):
117 if _DNSNameMatch(value, hostname):
121 raise CertificateError('hostname %r doesn\'t match either of %s
    [all...]
  /external/kernel-headers/original/uapi/linux/
nfs4_mount.h 45 struct nfs_string hostname; /* 1 */ member in struct:nfs4_mount_data
  /device/generic/goldfish/opengl/shared/OpenglCodecCommon/
TcpStream.cpp 86 int TcpStream::connect(const char* hostname, unsigned short port)
88 m_sock = socket_network_client(hostname, port, SOCK_STREAM);

Completed in 818 milliseconds

1 23 4 5 6 7 8 91011>>