/external/javassist/src/main/javassist/ |
URLClassPath.java | 29 protected String hostname; field in class:URLClassPath 61 hostname = host; 68 return hostname + ":" + port + directory; 90 return fetchClass0(hostname, port, jarname);
|
/external/chromium_org/net/url_request/ |
url_request_filter.h | 44 const std::string& hostname, 48 const std::string& hostname, 51 const std::string& hostname); 75 // scheme,hostname -> URLRequestInterceptor
|
test_url_request_interceptor.cc | 49 const std::string& hostname, 53 hostname_(hostname), 65 const std::string& hostname) { 67 hostname); 71 // hostname and scheme of |url| must match the corresponding parameters 142 const std::string& hostname, 146 hostname_(hostname), 149 hostname,
|
/external/chromium_org/third_party/WebKit/Source/core/dom/ |
DOMURLUtilsReadOnly.h | 58 static String hostname(const KURL& url) { return url.host(); } function in class:blink::DOMURLUtilsReadOnly 59 String hostname() { return hostname(url()); } function in class:blink::DOMURLUtilsReadOnly
|
/external/lldb/test/pexpect-2.4/examples/ |
astat.py | 6 -s : hostname of the remote server to login to. 44 hostname = options['-s'] 46 hostname = raw_input('hostname: ') 60 p.login(hostname, username, password)
|
/external/chromium_org/chrome/browser/net/ |
chrome_fraudulent_certificate_reporter.cc | 39 static std::string BuildReport(const std::string& hostname, 44 request.set_hostname(hostname); 72 const std::string& hostname, 76 if (!net::TransportSecurityState::IsGooglePinnedProperty(hostname)) { 80 std::string report = BuildReport(hostname, ssl_info);
|
chrome_fraudulent_certificate_reporter_unittest.cc | 83 // Passes if invoked with a good SSLInfo and for a hostname that is a Google 85 virtual void SendReport(const std::string& hostname, 88 EXPECT_TRUE(net::TransportSecurityState::IsGooglePinnedProperty(hostname)); 106 // Passes if invoked with a bad SSLInfo and for a hostname that is not a 108 virtual void SendReport(const std::string& hostname, 111 EXPECT_FALSE(net::TransportSecurityState::IsGooglePinnedProperty(hostname)); 131 const std::string& hostname, 133 DCHECK(!hostname.empty()); 135 ChromeFraudulentCertificateReporter::SendReport(hostname, ssl_info);
|
/external/chromium_org/content/common/ |
database_identifier_unittest.cc | 47 // This tests the encoding of a hostname including every character in the range 51 std::string hostname; member in struct:content::__anon12198::Case 156 GURL origin("http://" + cases[i].hostname); 160 << "test case " << i << " :\"" << cases[i].hostname << "\""; 165 << "test case " << i << " :\"" << cases[i].hostname << "\""; 211 EXPECT_EQ(valid_cases[i].expected_host, identifier.hostname())
|
/external/chromium_org/third_party/WebKit/Source/platform/weborigin/ |
DatabaseIdentifierTest.cpp | 76 // This tests the encoding of a hostname including every character in the range [\x1f, \x80]. 80 String hostname; member in struct:__anon15981::Case 192 RefPtr<SecurityOrigin> origin = SecurityOrigin::create("http", cases[i].hostname, 80); 194 EXPECT_EQ(cases[i].expected, identifier) << "test case " << i << ": \"" << cases[i].hostname << "\""; 197 EXPECT_EQ(cases[i].hostname.lower(), parsedOrigin->host()) << "test case " << i << ": \"" << cases[i].hostname << "\"";
|
/external/chromium_org/third_party/webrtc/base/ |
socketaddress_unittest.cc | 40 EXPECT_EQ("", addr.hostname()); 48 EXPECT_EQ("", addr.hostname()); 57 EXPECT_EQ("1.2.3.4", addr.hostname()); 68 EXPECT_EQ(kTestV6AddrString, addr2.hostname()); 78 EXPECT_EQ("255.255.255.255", addr.hostname()); 87 EXPECT_EQ("a.b.com", addr.hostname()); 97 EXPECT_EQ("1.2.3.4", addr.hostname()); 108 EXPECT_EQ("1.2.3.4", addr.hostname()); 119 EXPECT_EQ("", addr.hostname()); 130 EXPECT_EQ("1.2.3.4", addr.hostname()); [all...] |
socketaddress.cc | 45 SocketAddress::SocketAddress(const std::string& hostname, int port) { 46 SetIP(hostname); 103 void SocketAddress::SetIP(const std::string& hostname) { 104 hostname_ = hostname; 105 literal_ = IPFromString(hostname, &ip_); 140 // If the hostname was a literal IP string, it may need to have square 152 // If the hostname was a literal IP string, it may need to have square 316 bool SocketAddress::StringToIP(const std::string& hostname, uint32* ip) { 318 if (rtc::inet_pton(AF_INET, hostname.c_str(), &addr) == 0) 324 bool SocketAddress::StringToIP(const std::string& hostname, IPAddress* ip) [all...] |
/external/chromium_org/storage/common/database/ |
database_identifier.cc | 93 std::string hostname(identifier.data() + first_underscore + 1, 95 GURL url(scheme + "://" + hostname + "/"); 98 hostname = ""; 101 if (!url.is_valid() || url.scheme() != scheme || url.host() != hostname) 104 return DatabaseIdentifier(scheme, hostname, port, false /* unique */, false); 114 const std::string& hostname, 119 hostname_(base::StringToLowerASCII(hostname)),
|
/external/dnsmasq/src/ |
helper.c | 113 char *p, *action_str, *hostname = NULL; local 255 hostname = (char *)buf; 256 hostname[data.hostname_len - 1] = 0; 257 if (!legal_hostname(hostname)) 258 hostname = NULL; 259 else if ((dot = strchr(hostname, '.'))) 266 if (data.action == ACTION_OLD_HOSTNAME && hostname) 268 my_setenv("DNSMASQ_OLD_HOSTNAME", hostname, &err); 269 hostname = NULL; 282 action_str, daemon->dhcp_buff, inet_ntoa(data.addr), hostname, (char*)NULL) [all...] |
/external/conscrypt/src/test/java/org/conscrypt/ |
TrustManagerImplTest.java | 153 // test without a hostname, expecting failure 155 // test without a hostname, expecting success 157 // test an unpinned hostname that should fail 159 // test an unpinned hostname that should succeed 161 // test a pinned hostname that should fail 163 // test a pinned hostname that should succeed 166 // test a pinned hostname that chains to user installed that should succeed 183 private TrustManagerImpl trustManager(X509Certificate ca, String hostname, X509Certificate pin) 186 CertPinManager cm = certManager(hostname, pin); 194 X509Certificate caKeyStore, X509Certificate caUserStore, String hostname, 284 private final String hostname; field in class:TrustManagerImplTest.MySSLSession [all...] |
/external/chromium_org/chrome/browser/ui/views/ |
crypto_module_password_dialog_view.cc | 25 const std::string& hostname, 28 Init(hostname, slot_name, reason); 80 void CryptoModulePasswordDialogView::Init(const std::string& hostname, 85 const base::string16& hostname16 = base::UTF8ToUTF16(hostname); 157 const std::string& hostname, 161 new CryptoModulePasswordDialogView(slot_name, reason, hostname, callback);
|
/external/chromium_org/extensions/test/data/api_test/dns/api/ |
background.js | 18 chrome.test.succeed("hostname resolved"); 27 chrome.test.succeed("hostname correctly failed to resolve"); 29 chrome.dns.resolve("this.hostname.is.bogus", callback);
|
/external/nist-sip/java/gov/nist/core/ |
HostNameParser.java | 175 String hostname; local 179 hostname = ipv6Reference(); 187 hostname 192 //IPv4 address or hostname 196 hostname = lexer.getBuffer().substring(startPtr, lexer.getPtr()); 199 if (hostname.length() == 0) 204 return new Host(hostname); 307 " Illegal character in hostname:" + lexer.lookAhead(0),
|
/bionic/libc/kernel/uapi/linux/ |
nfs4_mount.h | 44 struct nfs_string hostname; member in struct:nfs4_mount_data
|
/development/ndk/platforms/android-L/include/linux/ |
nfs4_mount.h | 44 struct nfs_string hostname; member in struct:nfs4_mount_data
|
/external/chromium_org/net/dns/ |
dns_transaction.h | 31 // Returns the original |hostname|. 49 // original |hostname| as a result of suffix search. 56 // Creates DnsTransaction for the given |hostname| and |qtype| (assuming 57 // QCLASS is IN). |hostname| should be in the dotted form. A dot at the end 59 // search. |hostname| should not be an IP literal. 64 const std::string& hostname,
|
/external/chromium_org/net/quic/crypto/ |
proof_verifier.h | 61 // that |certs| is a valid chain for |hostname|. On success, it returns 76 virtual QuicAsyncStatus VerifyProof(const std::string& hostname,
|
/external/chromium_org/third_party/boringssl/src/crypto/bio/ |
bio_test.c | 35 char hostname[80], buf[5]; local 61 snprintf(hostname, sizeof(hostname), "%s:%d", "127.0.0.1", 63 bio = BIO_new_connect(hostname);
|
/external/chromium_org/tools/findit/common/ |
http_client_local.py | 39 def _DNSNameMatch(dn, hostname, max_wildcards=1): 63 return dn.lower() == hostname.lower() 72 elif leftmost.startswith('xn--') or hostname.startswith('xn--'): 87 return pat.match(hostname) 90 def _MatchHostname(cert, hostname): 92 SSLSocket.getpeercert()) matches the *hostname*. RFC 2818 and RFC 6125 93 rules are followed, but IP addresses are not accepted for *hostname*. 106 if _DNSNameMatch(value, hostname): 117 if _DNSNameMatch(value, hostname): 121 raise CertificateError('hostname %r doesn\'t match either of %s [all...] |
/external/kernel-headers/original/uapi/linux/ |
nfs4_mount.h | 45 struct nfs_string hostname; /* 1 */ member in struct:nfs4_mount_data
|
/device/generic/goldfish/opengl/shared/OpenglCodecCommon/ |
TcpStream.cpp | 86 int TcpStream::connect(const char* hostname, unsigned short port) 88 m_sock = socket_network_client(hostname, port, SOCK_STREAM);
|