/external/mdnsresponder/mDNSShared/ |
PlatformCommon.c | 106 mDNSexport void ReadDDNSSettingsFromConfFile(mDNS *const m, const char *const filename, domainname *const hostname, domainname *const domain, mDNSBool *DomainDiscoveryDisabled) 112 if (hostname) hostname->c[0] = 0; 119 if (hostname && GetConfigOption(buf, "hostname", f) && !MakeDomainNameFromDNSNameString(hostname, buf)) goto badf; 135 // for now we assume keyname = service reg domain and we use same key for service and hostname registration
|
/packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/ |
SSLSocketFactoryWrapper.java | 176 * Attempt to set the hostname of the socket. 178 * @param hostname the hostname 179 * @return true if able to set the hostname, false if not. 181 public static boolean potentiallyEnableSni(SSLSocket sslSocket, String hostname) { 187 sslSocket.getClass().getMethod("setHostname", String.class).invoke(sslSocket, hostname); 214 * Verify the hostname of the certificate used by the other end of a 215 * connected socket. You MUST call this if you did not supply a hostname 217 * redundantly if the hostname has already been verified. 220 * @param hostname The expected hostname of the remote serve [all...] |
/external/chromium_org/net/dns/ |
host_resolver_impl.cc | 151 bool ResemblesNetBIOSName(const std::string& hostname) { 152 return (hostname.size() < 16) && (hostname.find('.') == std::string::npos); 155 // True if |hostname| ends with either ".local" or ".local.". 156 bool ResemblesMulticastDNSName(const std::string& hostname) { 157 DCHECK(!hostname.empty()); 161 if (hostname[hostname.size() - 1] == '.') { 162 return hostname.size() > kSuffixLen && 163 !hostname.compare(hostname.size() - kSuffixLen, kSuffixLen, kSuffix) 2089 std::string hostname = base::StringToLowerASCII(key.hostname); local [all...] |
host_resolver_proc.h | 98 virtual int Resolve(const std::string& hostname,
|
/external/chromium_org/chrome/browser/chromeos/policy/ |
policy_cert_verifier.cc | 73 const std::string& hostname, 87 int error = delegate_->Verify(cert, hostname, flags, crl_set, verify_result,
|
/external/chromium_org/net/quic/crypto/ |
channel_id_test.cc | 227 const string hostname = "foo.example.com"; local 230 source->GetChannelIDKey(hostname, &channel_id_key, NULL);
|
proof_test.cc | 59 const string& hostname, 74 hostname, server_config, certs, proof, verify_context.get(), 117 const string hostname = "test.example.com"; local 122 ASSERT_TRUE(source->GetProof(hostname, server_config, false /* no ECDSA */, 124 ASSERT_TRUE(source->GetProof(hostname, server_config, false /* no ECDSA */, 132 verifier.get(), hostname, server_config, *certs, signature, true); 143 verifier.get(), hostname, server_config, *certs, corrupt_signature, 237 const string hostname = "test.example.com"; local 257 verifier.get(), hostname, server_config, certs, signature, true); 261 verifier.get(), hostname, server_config.substr(1, string::npos) 319 const string hostname = "test.example.com"; local [all...] |
/external/chromium_org/net/quic/test_tools/ |
crypto_test_utils_chromium.cc | 58 virtual bool GetProof(const std::string& hostname, 80 const std::string& hostname,
|
/external/chromium_org/third_party/WebKit/Source/core/frame/ |
Location.idl | 47 [SetterCallWith=(ActiveWindow,FirstWindow)] attribute DOMString hostname;
|
Location.cpp | 87 String Location::hostname() const function in class:blink::Location 91 return DOMURLUtilsReadOnly::hostname(url()); 171 void Location::setHostname(LocalDOMWindow* callingWindow, LocalDOMWindow* enteredWindow, const String& hostname) 176 url.setHost(hostname);
|
Location.h | 67 String hostname() const;
|
/external/chromium_org/third_party/mesa/src/src/gallium/auxiliary/util/ |
u_network.c | 110 u_socket_connect(const char *hostname, uint16_t port) 118 host = gethostbyname(hostname);
|
/external/conscrypt/src/main/java/org/conscrypt/ |
OpenSSLSocketImplWrapper.java | 33 protected OpenSSLSocketImplWrapper(Socket socket, String hostname, int port, 35 super(socket, hostname, port, autoClose, sslParameters);
|
OpenSSLSocketImpl.java | 132 * The peer's DNS hostname if it was supplied during creation. 137 * The DNS hostname from reverse lookup on the socket. Should never be used 184 protected OpenSSLSocketImpl(String hostname, int port, SSLParametersImpl sslParameters) 186 super(hostname, port); 188 this.peerHostname = hostname; 205 protected OpenSSLSocketImpl(String hostname, int port, 208 super(hostname, port, clientAddress, clientPort); 210 this.peerHostname = hostname; 231 protected OpenSSLSocketImpl(Socket socket, String hostname, int port, 234 this.peerHostname = hostname; [all...] |
/external/mesa3d/src/gallium/auxiliary/util/ |
u_network.c | 110 u_socket_connect(const char *hostname, uint16_t port) 118 host = gethostbyname(hostname);
|
/bionic/libc/dns/net/ |
getaddrinfo.c | 51 * when globbing NULL hostname (to loopback, or wildcard). Is it the right 55 * (1) what should we do against numeric hostname (2) what should we do 56 * against NULL hostname (3) what is AI_ADDRCONFIG itself. AF not ready? 255 "Address family for hostname not supported", /* EAI_ADDRFAMILY */ 261 "No address associated with hostname", /* EAI_NODATA */ 262 "hostname nor servname provided, or not known", /* EAI_NONAME */ 414 const char *hostname, const char *servname, 429 if ((hostname != NULL && 430 strcspn(hostname, " \n\r\t^'\"") != strlen(hostname)) || [all...] |
/bionic/libc/dns/resolv/ |
res_data.c | 312 local_hostname_length(const char *hostname) { 317 len_host = strlen(hostname); 320 !strcasecmp(hostname + len_host - len_domain, _nres.defdname) && 321 hostname[len_host - len_domain - 1] == '.')
|
/bionic/libc/kernel/uapi/linux/ |
nfs_mount.h | 46 char hostname[NFS_MAXNAMLEN + 1]; member in struct:nfs_mount_data
|
/development/ndk/platforms/android-L/include/linux/ |
nfs_mount.h | 46 char hostname[NFS_MAXNAMLEN + 1]; member in struct:nfs_mount_data
|
/external/chromium_org/chrome/browser/ssl/ |
ssl_error_classification.h | 71 // Returns true if the hostname has a known Top Level Domain. 74 // Returns true if the site's hostname differs from one of the DNS 95 // Returns true if |hostname| is too broad for the scope of a wildcard 100 bool IsSubDomainOutsideWildcard(const Tokens& hostname) const;
|
/external/chromium_org/chrome/common/extensions/docs/examples/api/downloads/download_filename_controller/ |
bg.js | 8 if (rule.matcher == 'hostname') { 11 var host = (rule.match_param.indexOf(':') < 0) ? link.hostname : link.host;
|
/external/chromium_org/net/cert/ |
x509_util_mac.h | 31 // Providing the hostname is necessary in order to locate certain user or 35 OSStatus NET_EXPORT CreateSSLServerPolicy(const std::string& hostname,
|
/external/chromium_org/net/test/url_request/ |
url_request_mock_http_job.h | 50 // Respond to all HTTP requests of |hostname| with contents of the file 53 const std::string& hostname,
|
/external/chromium_org/sync/util/ |
nigori.h | 37 // Initialize the client with the given |hostname|, |username| and |password|. 38 bool InitByDerivation(const std::string& hostname, 48 // Derives a secure lookup name from |type| and |name|. If |hostname|,
|
/external/chromium_org/third_party/boringssl/src/tool/ |
client.cc | 46 "The hostname and port of the server to connect to, e.g. foo.com:443", 58 std::string hostname, port; local 61 hostname = hostname_and_port; 64 hostname = hostname_and_port.substr(0, colon_offset); 73 int ret = getaddrinfo(hostname.c_str(), port.c_str(), &hint, &result);
|