/external/chromium-trace/catapult/common/lab/ |
keychain_unlock.sh | 9 for hostname in "$@" 11 ssh -t "$hostname" 'security unlock-keychain login.keychain
|
/external/toybox/toys/lsb/ |
hostname.c | 0 /* hostname.c - Get/Set the hostname 5 * http://refspecs.linuxfoundation.org/LSB_4.1.0/LSB-Core-generic/LSB-Core-generic/hostname.html 7 USE_HOSTNAME(NEWTOY(hostname, "bF:", TOYFLAG_BIN)) 9 config HOSTNAME 10 bool "hostname" 13 usage: hostname [-b] [-F FILENAME] [newname] 15 Get/Set the current hostname 17 -b Set hostname to 'localhost' if otherwise unset 18 -F Set hostname to contents of FILENAM 30 char *hostname = *toys.optargs; local [all...] |
/system/core/adb/ |
socket_spec_test.cpp | 24 std::string hostname, error; local 26 EXPECT_TRUE(parse_tcp_socket_spec("tcp:5037", &hostname, &port, &error)); 27 EXPECT_EQ("", hostname); 31 EXPECT_FALSE(parse_tcp_socket_spec("tcp:", &hostname, &port, &error)); 32 EXPECT_FALSE(parse_tcp_socket_spec("tcp:-1", &hostname, &port, &error)); 33 EXPECT_FALSE(parse_tcp_socket_spec("tcp:65536", &hostname, &port, &error)); 35 EXPECT_TRUE(parse_tcp_socket_spec("tcp:localhost:1234", &hostname, &port, &error)); 36 EXPECT_EQ("localhost", hostname); 39 EXPECT_FALSE(parse_tcp_socket_spec("tcp:localhost", &hostname, &port, &error)); 40 EXPECT_FALSE(parse_tcp_socket_spec("tcp:localhost:", &hostname, &port, &error)) [all...] |
/frameworks/base/core/java/android/security/net/config/ |
Domain.java | 23 * Lower case hostname for this domain rule. 25 public final String hostname; field in class:Domain 32 public Domain(String hostname, boolean subdomainsIncluded) { 33 if (hostname == null) { 34 throw new NullPointerException("Hostname must not be null"); 36 this.hostname = hostname.toLowerCase(Locale.US); 42 return hostname.hashCode() ^ (subdomainsIncluded ? 1231 : 1237); 55 otherDomain.hostname.equals(this.hostname); [all...] |
ApplicationConfig.java | 29 * configuration to be used for communicating with a specific hostname.</p> 59 * Get the {@link NetworkSecurityConfig} corresponding to the provided hostname. 64 * {@code hostname}. Subsequent calls with the same hostname will always return the same 68 * the network security configuration for connections to {@code hostname}. 70 public NetworkSecurityConfig getConfigForHostname(String hostname) { 72 if (hostname == null || hostname.isEmpty() || mConfigs == null) { 75 if (hostname.charAt(0) == '.') { 76 throw new IllegalArgumentException("hostname must not begin with a .") [all...] |
ConfigNetworkSecurityPolicy.java | 37 public boolean isCleartextTrafficPermitted(String hostname) { 38 return mConfig.isCleartextTrafficPermitted(hostname); 42 public boolean isCertificateTransparencyVerificationRequired(String hostname) {
|
/external/mdnsresponder/mDNSShared/ |
PlatformCommon.h | 18 extern void ReadDDNSSettingsFromConfFile(mDNS *const m, const char *const filename, domainname *const hostname, domainname *const domain, mDNSBool *DomainDiscoveryDisabled);
|
/external/conscrypt/libcore-stub/src/main/java/libcore/net/ |
NetworkSecurityPolicy.java | 67 * without TLS or STARTTLS) is permitted for communicating with {@code hostname} for this 72 public abstract boolean isCleartextTrafficPermitted(String hostname); 76 * the server and verified by the client in TLS connections to {@code hostname}. 80 public abstract boolean isCertificateTransparencyVerificationRequired(String hostname); 89 public boolean isCleartextTrafficPermitted(String hostname) { 94 public boolean isCertificateTransparencyVerificationRequired(String hostname) {
|
/external/curl/lib/ |
hostcheck.h | 29 int Curl_cert_hostcheck(const char *match_pattern, const char *hostname);
|
hostcheck.c | 41 * Match a hostname against a wildcard pattern. 60 static int hostmatch(char *hostname, char *pattern) 70 /* normalize pattern and hostname by stripping off trailing dots */ 71 size_t len = strlen(hostname); 72 if(hostname[len-1]=='.') 73 hostname[len-1]=0; 80 return strcasecompare(pattern, hostname) ? 83 /* detect IP address as hostname and fail the match if so */ 84 if(Curl_inet_pton(AF_INET, hostname, &ignored) > 0) 87 else if(Curl_inet_pton(AF_INET6, hostname, &si6.sin6_addr) > 0 [all...] |
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/ |
Dns.java | 37 @Override public List<InetAddress> lookup(String hostname) throws UnknownHostException { 38 if (hostname == null) throw new UnknownHostException("hostname == null"); 39 return Arrays.asList(InetAddress.getAllByName(hostname)); 44 * Returns the IP addresses of {@code hostname}, in the order they will be attempted by OkHttp. 49 List<InetAddress> lookup(String hostname) throws UnknownHostException;
|
/libcore/luni/src/main/java/libcore/net/ |
NetworkSecurityPolicy.java | 67 * without TLS or STARTTLS) is permitted for communicating with {@code hostname} for this 72 public abstract boolean isCleartextTrafficPermitted(String hostname); 76 * the server and verified by the client in TLS connections to {@code hostname}. 80 public abstract boolean isCertificateTransparencyVerificationRequired(String hostname); 89 public boolean isCleartextTrafficPermitted(String hostname) { 94 public boolean isCertificateTransparencyVerificationRequired(String hostname) {
|
/libcore/ojluni/src/main/java/javax/net/ssl/ |
HostnameVerifier.java | 29 * This class is the base interface for hostname verification. 31 * During handshaking, if the URL's hostname and 32 * the server's identification hostname mismatch, the 39 * These callbacks are used when the default rules for URL hostname 51 * @param hostname the host name 55 public boolean verify(String hostname, SSLSession session);
|
SNIHostName.java | 45 * "HostName" contains the fully qualified DNS hostname of the server, as 46 * understood by the client. The encoded server name value of a hostname is 63 private final String hostname; field in class:SNIHostName 66 * Creates an {@code SNIHostName} using the specified hostname. 69 * the encoded server name value of a hostname is 71 * {@code hostname} can be a user-friendly Internationalized Domain Name 77 * translate the {@code hostname} into ASCII Compatible Encoding (ACE), as: 79 * IDN.toASCII(hostname, IDN.USE_STD3_ASCII_RULES); 82 * The {@code hostname} argument is illegal if it 369 SNIHostName hostname; local [all...] |
/external/libcups/cups/ |
testcreds.c | 33 hostname[HTTP_MAX_URI], /* Hostname from URI */ local 52 puts("Usage: ./testcreds hostname"); 53 puts(" ./testcreds https://hostname[:port]"); 63 if (httpSeparateURI(HTTP_URI_CODING_MOST, argv[1], scheme, sizeof(scheme), username, sizeof(username), hostname, sizeof(hostname), &port, resource, sizeof(resource)) < HTTP_URI_STATUS_OK) 69 if ((http = httpConnect2(hostname, port, NULL, AF_UNSPEC, HTTP_ENCRYPTION_ALWAYS, 1, 30000, NULL)) == NULL) 71 printf("ERROR: Unable to connect to \"%s\" on port %d: %s\n", hostname, port, cupsLastErrorString()); 78 trust = httpCredentialsGetTrust(hcreds, hostname); 88 printf(" IsValidName: %d\n", httpCredentialsAreValidForName(hcreds, hostname)); [all...] |
/external/nist-sip/java/gov/nist/core/ |
Host.java | 43 * Stores hostname. 68 protected static final int HOSTNAME = 1; 72 /** hostName field 74 protected String hostname; field in class:Host 86 addressType = HOSTNAME; 94 public Host(String hostName) throws IllegalArgumentException { 95 if (hostName == null) 101 setHost(hostName, IPV4ADDRESS); 124 if (addressType == IPV6ADDRESS && !isIPv6Reference(hostname)) { 125 buffer.append('[').append(hostname).append(']') [all...] |
/external/toolchain-utils/automation/common/ |
machine.py | 11 def __init__(self, hostname, label, cpu, cores, os, username): 12 self.hostname = hostname 40 self.hostname) 44 ['Machine Information:', 'Hostname: %s' % self.hostname, 'Label: %s' % 52 def __init__(self, hostname='*', label='*', os='*', lock_required=False): 53 self.hostname = hostname 64 return all([not machine.locked, fnmatch(machine.hostname, self.hostname) [all...] |
/external/conscrypt/android-stub/src/main/java/javax/net/ssl/ |
SNIHostName.java | 23 public SNIHostName(String hostname) {
|
/external/ltp/testcases/kernel/containers/utsname/ |
runutstests_noltp.sh | 22 oldhostname=`hostname` 40 hostname "$oldhostname"
|
/external/toolchain-utils/dejagnu/ |
chromeos.exp.in | 5 set hostname [board_info $board hostname] 11 eval "exec ssh -N -f $ssh_options root@$hostname &" 12 local_exec "ssh -n $ssh_options root@$hostname sh -c 'mkdir -p $tmpdir'" \ 21 set hostname [board_info $board hostname] 25 local_exec "ssh $ssh_options -O exit root@$hostname" {} {} 10 27 local_exec "ssh -n $ssh_options root@$hostname sh -c 'rm -fr $tmpdir'" \ 35 set hostname [board_info $board hostname] [all...] |
/external/autotest/server/site_tests/platform_GCC/boards/ |
chromeos-machine.exp | 3 # Set hostname and username. # Make sure SSH keys are set up prior to run. 4 set_board_info hostname $env(DEJAGNU_HOSTNAME)
|
/external/dhcpcd-6.8.2/ |
dhcpcd.conf | 13 # Inform the DHCP server of our hostname for DDNS. 14 hostname 47 # A hook script is provided to lookup the hostname if not set by the DHCP 49 #nohook lookup-hostname
|
/external/okhttp/okhttp-testing-support/src/main/java/com/squareup/okhttp/testing/ |
RecordingHostnameVerifier.java | 26 public boolean verify(String hostname, SSLSession session) { 27 calls.add("verify " + hostname);
|
/external/toolchain-utils/dejagnu/boards/ |
chromeos-machine.exp | 6 # Set hostname and username. # Make sure SSH keys are set up prior to run. 7 set_board_info hostname $env(DEJAGNU_HOSTNAME)
|
/frameworks/base/core/java/android/security/ |
FrameworkNetworkSecurityPolicy.java | 37 public boolean isCleartextTrafficPermitted(String hostname) { 42 public boolean isCertificateTransparencyVerificationRequired(String hostname) {
|