HomeSort by relevance Sort by last modified time
    Searched refs:hostname (Results 251 - 275 of 1117) sorted by null

<<11121314151617181920>>

  /external/curl/docs/cmdline-opts/
socks5-hostname.d 1 Long: socks5-hostname
13 hostname proxy with --proxy using a socks5h:// protocol prefix.
  /external/curl/lib/
asyn.h 134 * Returns name information about the given hostname and port number. If
143 const char *hostname,
  /external/ltp/testcases/network/rpc/rpc-tirpc/tests_pack/rpc_suite/tirpc/tirpc_expertlevel_rpcb_rmtcall/
tirpc_rpcb_rmtcall_complex.c 48 char *hostname; variable
103 if (!rpcb_getaddr(progNum, VERSNUM, nconf, &svcaddr, hostname)) {
119 rpcb_rmtcall(nconf, hostname, progNum, VERSNUM, CALCTHREADPROC,
138 //Program parameters : argc[1] : HostName or Host IP
153 hostname = argc[1];
tirpc_rpcb_rmtcall_scalability.c 52 char *hostname; variable
87 if (!rpcb_getaddr(progNum, VERSNUM, nconf, &svcaddr, hostname)) {
94 rpcb_rmtcall(nconf, hostname, progNum, VERSNUM, PROCNUM,
105 //Program parameters : argc[1] : HostName or Host IP
136 hostname = (char *)argc[1];
  /external/tensorflow/tensorflow/core/platform/cloud/
http_request.h 67 /// Note: because GCS is available over HTTPS, we cannot replace the hostname
70 virtual void AddResolveOverride(const string& hostname, int64 port,
  /frameworks/base/core/java/android/security/net/config/
RootTrustManager.java 32 * <p>This trust manager delegates to the specific trust manager for the hostname being used for
36 * Note that if the {@code ApplicationConfig} has per-domain configurations the hostname aware
90 // Not an SSLSocket, use the hostname unaware checkServerTrusted.
112 "Domain specific configurations require that hostname aware"
120 * Hostname aware version of {@link #checkServerTrusted(X509Certificate[], String)}.
125 String hostname) throws CertificateException {
126 if (hostname == null && mConfig.hasPerDomainConfigs()) {
128 "Domain specific configurations require that the hostname be provided");
130 NetworkSecurityConfig config = mConfig.getConfigForHostname(hostname);
131 return config.getTrustManager().checkServerTrusted(certs, authType, hostname);
    [all...]
  /hardware/libhardware/include/hardware/
gps_internal.h 91 int (*set_server)( AGpsType type, const char* hostname, int port );
  /prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/x86_64-w64-mingw32/include/
ndfapi.h 26 LPCWSTR hostname,
  /system/core/fastboot/
udp.h 42 // Returns a newly allocated Transport object connected to |hostname|:|port|. On failure, |error| is
44 std::unique_ptr<Transport> Connect(const std::string& hostname, int port, std::string* error);
  /test/framework/harnesses/host_controller/tfc/
tfc_client.py 43 def LeaseHostTasks(self, cluster_id, next_cluster_ids, hostname, device_infos):
50 hostname: A string, the name of the TradeFed host.
57 lease = {"hostname": hostname,
86 def CreateDeviceSnapshot(cluster_id, hostname, dev_infos):
91 hostname: A string, the name of the TradeFed host.
100 "hostname": hostname,
  /test/vti/test_serving/gae/webapp/src/dashboard/
device_list.py 39 devices, key=lambda x: (x.hostname, x.product, x.status),
  /external/autotest/server/hosts/
testbed.py 46 def __init__(self, hostname='localhost', afe_host=None, adb_serials=None,
53 @param hostname: Hostname of the test station connected to the duts.
58 logging.info('Initializing TestBed centered on host: %s', hostname)
59 self.hostname = hostname
65 hostname=hostname, afe_host=self._afe_host, **dargs)
77 hostname=hostname, teststation=self.teststation
    [all...]
  /external/autotest/site_utils/
job_history.py 20 AUTOTEST_SERVER = CONFIG.get_config_value('SERVER', 'hostname', type=str)
23 JOB_URL = LOG_BASE_URL + '%(job_id)s-%(owner)s/%(hostname)s'
24 LOG_PATH_FMT = 'hosts/%(hostname)s/%(task_id)d-%(task_name)s'
49 'hostname': self.hostname,
72 hostname: hostname of the DUT that runs the special task.
88 self.hostname = task.host.hostname
93 'hostname': self.hostname
    [all...]
  /device/generic/goldfish-opengl/shared/OpenglCodecCommon/
TcpStream.cpp 118 int TcpStream::connect(const char* hostname, unsigned short port)
120 m_sock = socket_network_client(hostname, port, SOCK_STREAM);
  /external/autotest/contrib/
dhcp_failed_machines.py 32 hostname = d['ddns-hostname'].replace('"', '').replace(';', '') variable
33 lookups[d['fixed-address'].replace(';', '')] = hostname
run-stable-update 21 SERVER_STATUS=$(cli/atest server list $(hostname) 2>&1 |
  /external/autotest/server/
adb_utils.py 44 host.hostname).url()
54 (host.hostname, host.job_repo_url_attribute))
standalone_profiler.py 31 def generate_test(machines, hostname, profilers, timeout_start, timeout_stop,
38 @param hostname: hostname of the machine running the generated control file
59 hostname, _PROF_MASTER, machines))
  /external/autotest/server/control_segments/
get_network_stats 18 if utils.ping(dut.hostname, tries=1, timeout=3) != 0:
  /external/autotest/server/cros/packet_generation/
IP_utils.py 36 ap_sshhost = ssh_host.SSHHost(hostname=self.host.hostname)
  /external/boringssl/src/crypto/bio/
socket_helper.c 42 const char *hostname,
53 ret = getaddrinfo(hostname, port_str, &hint, &result);
  /hardware/qcom/gps/msm8998/android/
AGnss.cpp 102 const hidl_string& hostname,
122 config.assistanceServer.hostName = strdup(hostname.c_str());
  /prebuilts/go/darwin-x86/src/net/smtp/
example_test.go 58 // hostname is used by PlainAuth to validate the TLS certificate.
59 hostname := "mail.example.com"
60 auth := smtp.PlainAuth("", "user@example.com", "password", hostname)
62 err := smtp.SendMail(hostname+":25", auth, from, recipients, msg)
  /prebuilts/go/darwin-x86/src/os/
sys_plan9.go 9 func hostname() (name string, err error) { func
  /prebuilts/go/linux-x86/src/net/smtp/
example_test.go 58 // hostname is used by PlainAuth to validate the TLS certificate.
59 hostname := "mail.example.com"
60 auth := smtp.PlainAuth("", "user@example.com", "password", hostname)
62 err := smtp.SendMail(hostname+":25", auth, from, recipients, msg)

Completed in 495 milliseconds

<<11121314151617181920>>