HomeSort by relevance Sort by last modified time
    Searched refs:hostname (Results 351 - 375 of 779) sorted by null

<<11121314151617181920>>

  /external/autotest/scheduler/
rdb_hosts.py 143 self.hostname)
202 self.hostname, self.status, payload, self.dbg_str)
208 '%s through rdb on behalf of %s: %s', self.hostname,
223 'hostname': self.hostname,
prejob_task.py 193 logging.info("starting verify on %s", self.host.hostname)
231 logging.info("starting cleanup task for host: %s", self.host.hostname)
286 self.host.hostname)
343 return autoserv_utils._autoserv_command_line(self.host.hostname,
351 logging.info("starting provision task for host: %s", self.host.hostname)
host_scheduler_unittests.py 91 host = self.db_helper.get_host(hostname='h1')[0]
111 host = self.db_helper.get_host(hostname='h1')[0]
134 host = self.db_helper.get_host(hostname='h1')[0]
141 self.assertTrue(self.db_helper.get_host(hostname='h1')[0].leased == 0)
189 self.assertTrue(self.db_helper.get_host(hostname='h')[0].leased == 1 and
190 self.db_helper.get_host(hostname='h1')[0].leased == 1)
272 host = self.db_helper.get_host(hostname='h1')[0]
scheduler_models.py 63 # can just set the hostname in a single place in the config file.
65 'SERVER', 'hostname')
67 logging.critical('[SERVER] hostname missing from the config file.')
389 _fields = ('id', 'hostname', 'locked', 'synch_id', 'status',
397 logging.info('%s -> %s', self.hostname, status)
430 A comparison function for sorting Host objects by hostname.
441 This hopefully satisfy most people's hostname sorting needs regardless
445 lower_a = a.hostname.lower()
446 lower_b = b.hostname.lower()
530 logging.info('Assigning host %s to entry %s', host.hostname, self
    [all...]
rdb_testing_utils.py 46 def __init__(self, hostname, host_id, **kwargs):
47 kwargs.update({'hostname': hostname, 'id': host_id})
139 """Create a shard with the given hostname if one doesn't already exist.
141 @param shard_hostname: The hostname of the shard.
143 shard = cls.get_shard(hostname=shard_hostname)
144 return (models.Shard.objects.create(hostname=shard_hostname)
176 @param shard_hostname: The hostname of a shard to assign the job.
210 @param name: The hostname.
226 hostname=name, status=status, locked=locked
    [all...]
  /external/autotest/server/cros/chaos_lib/
chaos_runner.py 22 # Webdriver master hostname
57 @param capturer_hostname: a string or None, hostname or IP of capturer.
60 @param work_client_hostname: a string or None, hostname of work client
71 lock_manager, hostname=capturer_hostname)
99 lock_manager, hostname=work_client_hostname)
126 hosts.create_host(self._host.hostname),
  /external/autotest/server/cros/
sonic_client_utils.py 147 @return: A string specifying the hostname of a locked sonic host.
175 def __init__(self, hostname):
177 @param hostname: The name of the host for this sonic proxy.
179 self._sonic_server = 'http://%s:%s' % (hostname, self.SONIC_SERVER_PORT)
180 self._hostname = hostname
telemetry_runner.py 278 self._host.hostname)
280 self._host.hostname)
343 '--remote=%s' % self._host.hostname])
  /external/autotest/server/
lab_status_unittest.py 309 'SERVER', 'hostname').AndReturn('not-cautotest')
315 'SERVER', 'hostname').AndReturn('cautotest')
329 'SERVER', 'hostname').AndReturn('cautotest')
  /external/autotest/server/site_tests/buffet_PrivetSetupFlow/
buffet_PrivetSetupFlow.py 49 client_hostname=host.hostname,
129 hostname=privet_record.address,
185 host=host, hostname=managed_netblock.addr,
  /external/autotest/server/site_tests/firmware_FWupdate/
firmware_FWupdate.py 114 def repack_shellball(self, hostname):
117 @param hostname: hostname of DUT.
126 dut_access = remote_access.RemoteDevice(hostname, username='root')
172 self.repack_shellball(host.hostname)
  /external/autotest/site_utils/deployment/
commandline.py 199 def _validate_hostname(hostname):
200 """Return whether a given hostname is valid for the test lab.
210 @param hostname The host name to be checked.
211 @return Return a true value iff the hostname is valid.
214 if p.match(hostname):
217 'Hostname %s doesn\'t match a valid location name.\n' %
218 hostname)
343 sys.stderr.write('Must provide at least one hostname.\n')
405 parser.add_argument('hostnames', nargs='*', metavar='HOSTNAME',
  /external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/manage/
cmdshell.py 76 self._ssh_client.connect(self.server.hostname,
90 print("%s has an entry in ~/.ssh/known_hosts and it doesn't match" % self.server.hostname)
362 self.hostname = instance.dns_name
  /external/okhttp/website/static/
jquery.smooth-scroll.min.js 7 (function(l){function t(l){return l.replace(/(:|\.)/g,"\\$1")}var e="1.4.10",o={exclude:[],excludeWithin:[],offset:0,direction:"top",scrollElement:null,scrollTarget:null,beforeScroll:function(){},afterScroll:function(){},easing:"swing",speed:400,autoCoefficent:2},r=function(t){var e=[],o=!1,r=t.dir&&"left"==t.dir?"scrollLeft":"scrollTop";return this.each(function(){if(this!=document&&this!=window){var t=l(this);t[r]()>0?e.push(this):(t[r](1),o=t[r]()>0,o&&e.push(this),t[r](0))}}),e.length||this.each(function(){"BODY"===this.nodeName&&(e=[this])}),"first"===t.el&&e.length>1&&(e=[e[0]]),e};l.fn.extend({scrollable:function(l){var t=r.call(this,{dir:l});return this.pushStack(t)},firstScrollable:function(l){var t=r.call(this,{el:"first",dir:l});return this.pushStack(t)},smoothScroll:function(e){e=e||{};var o=l.extend({},l.fn.smoothScroll.defaults,e),r=l.smoothScroll.filterPath(location.pathname);return this.unbind("click.smoothscroll").bind("click.smoothscroll",function(e){var n=this,s=l(this),c=o.exclude,i=o.excludeWithin,a=0,f=0,h=!0,u={},d=location.hostname===n.hostname||!n.hostname,m=o.scrollTarget||(l.smoothScroll.filterPath(n.pathname)||r)===r,p=t(n.hash);if(o.scrollTarget||d& (…)
  /packages/apps/Email/provider_src/com/android/email/mail/transport/
MailTransport.java 121 // After the socket connects to an SSL server, confirm that the hostname is as expected
159 * NOTE: No explicit hostname verification is required here, because it's handled automatically
198 * Verify the hostname of the certificate used by the other end of a
199 * connected socket. You MUST call this if you did not supply a hostname
201 * redundantly if the hostname has already been verified.
203 * <p>Wildcard certificates are allowed to verify any matching hostname,
208 * @param hostname The expected hostname of the remote server
212 private static void verifyHostname(Socket socket, String hostname) throws IOException {
226 if (!HOSTNAME_VERIFIER.verify(hostname, session))
    [all...]
  /external/autotest/frontend/client/src/autotest/tko/
ExistingGraphsFrontend.java 40 private TextBox hostname = new TextBox(); field in class:ExistingGraphsFrontend
41 private SuggestBox hostnameSuggest = new SuggestBox(oracle, hostname);
68 addBenchmarkItem("(Please select a hostname first)");
85 addControl("Hostname:", hostnameSuggest);
127 args.put("hostname", hostname.getText());
145 hostname.setText(args.get("hostname"));
203 hostname.setEnabled(enabled);
  /external/autotest/frontend/tko/
rpc_interface.py 288 'test_name', 'hostname', 'machine_idx').distinct()
290 hostname = result_dict['hostname']
293 host_info.setdefault(hostname, {})
294 host_info[hostname].setdefault('tests', [])
295 host_info[hostname]['tests'].append(test)
296 host_info[hostname]['id'] = machine_idx
482 ['Hostname', 'hostname'],
  /external/conscrypt/src/main/java/org/conscrypt/
OpenSSLSocketImpl.java 138 * The peer's DNS hostname if it was supplied during creation. Note that
190 protected OpenSSLSocketImpl(String hostname, int port, SSLParametersImpl sslParameters)
192 super(hostname, port);
194 this.peerHostname = hostname;
211 protected OpenSSLSocketImpl(String hostname, int port,
214 super(hostname, port, clientAddress, clientPort);
216 this.peerHostname = hostname;
237 protected OpenSSLSocketImpl(Socket socket, String hostname, int port,
240 this.peerHostname = hostname;
256 * Try to extract the peer's hostname if it's available from the endpoint address
    [all...]
  /external/conscrypt/src/platform/java/org/conscrypt/
TrustManagerImpl.java 237 * For backward compatibility with older Android API that used String for the hostname only.
240 String hostname) throws CertificateException {
241 return checkTrusted(chain, authType, hostname, true);
283 * For backward compatibility with older Android API that used String for the hostname only.
286 String hostname) throws CertificateException {
287 return checkTrusted(chain, authType, hostname, false);
364 final String hostname = (session != null) ? session.getPeerHost() : null; local
370 if (!verifier.verify(hostname, session)) {
375 return checkTrusted(certs, authType, hostname, clientAuth);
    [all...]
  /external/autotest/frontend/afe/
rpc_utils.py 323 failing_hosts = (set(host.hostname for host in host_objects) -
324 set(host.hostname for host in ok_hosts))
407 possible_hosts.update(h.hostname for h in label.host_set.all())
411 hosts_in_label = (h.hostname for h in label.host_set.all())
419 host_set = set(host.hostname for host in host_objects)
430 hosts_in_meta_host = (h.hostname for h in meta_host.host_set.all())
473 (host.hostname, host.locked_by, host.lock_time)})
476 'locked': 'Host %s already unlocked.' % host.hostname})
480 host.hostname})
560 duplicate_hostnames.add(host.hostname)
    [all...]
  /bionic/tests/
unistd_test.cpp 498 char hostname[HOST_NAME_MAX + 1]; local
499 memset(hostname, 0, sizeof(hostname));
501 // Can we get the hostname with a big buffer?
502 ASSERT_EQ(0, gethostname(hostname, HOST_NAME_MAX));
504 // Can we get the hostname with a right-sized buffer?
506 ASSERT_EQ(0, gethostname(hostname, strlen(hostname) + 1));
511 ASSERT_EQ(0, strncmp(hostname, buf.nodename, SYS_NMLN));
512 ASSERT_GT(strlen(hostname), 0U)
    [all...]
  /external/autotest/server/cros/dynamic_suite/
job_status_unittest.py 53 'host': {'hostname': h}} for h in expected_hosts]
67 'host': {'hostname': h}} for h in expected_hosts]
82 'host': {'hostname': h}} for h in expected_hosts]
192 manager.lock([h.hostname for h in running_hosts])
568 jobs = [FakeJob(0, [FakeStatus('FAIL', 'T0', '', hostname='h0'),
569 FakeStatus('FAIL', 'T1', 'bad', hostname='h0')]),
571 FakeStatus('GOOD', 'T1', '', hostname='h1')]),
572 FakeJob(2, [FakeStatus('TEST_NA', 'T0', 'no', hostname='h2')]),
573 FakeJob(3, [FakeStatus('FAIL', 'T0', 'broken', hostname='h3')]),
575 FakeJob(5, [FakeStatus('GOOD', 'T0', 'Yay', hostname='h5')])
    [all...]
  /external/libxml2/
nanoftp.c 124 char *hostname; /* the host name */ member in struct:xmlNanoFTPCtxt
184 * and get the hostname
312 if (ctxt->hostname != NULL) {
313 xmlFree(ctxt->hostname);
314 ctxt->hostname = NULL;
332 ctxt->hostname = xmlMemStrdup(uri->server);
362 * protocol, hostname, port or other information, the
380 if (ctxt->hostname == NULL)
392 (strcmp(ctxt->hostname, uri->server)) ||
511 if (ctxt->hostname != NULL) xmlFree(ctxt->hostname)
    [all...]
  /external/autotest/site_utils/
server_manager_unittest.py 63 attrs={'hostname': 'primary_drone_hostname',
69 attrs={'hostname': 'backup_drone_hostname',
75 attrs={'hostname': 'primary_scheduler_hostname',
81 attrs={'hostname': 'backup_scheduler_hostname',
107 ping_runner.PingRunner().simple_ping(self.BACKUP_DRONE.hostname
110 hostname=self.BACKUP_DRONE.hostname
113 hostname=mox.IgnoreArg(), status=mox.IgnoreArg(),
120 drone = server_manager.create(hostname=self.BACKUP_DRONE.hostname,
    [all...]
  /external/autotest/server/cros/network/
chaos_clique_utils.py 21 def allocate_packet_capturer(lock_manager, hostname):
28 @param hostname string optional hostname of a packet capture machine.
32 if hostname is not None:
33 return hosts.SSHHost(hostname)
49 @return string hostname of locked webdriver instance

Completed in 793 milliseconds

<<11121314151617181920>>