/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/ |
H A D | Connection.java | 97 private final String hostname; field in class:Connection 113 * Same as {@link #Connection(String, int) Connection(hostname, 22)}. 115 * @param hostname the hostname of the SSH-2 server. 117 public Connection(String hostname) argument 119 this(hostname, 22); 126 * @param hostname 131 public Connection(String hostname, int port) argument 133 this.hostname = hostname; 137 Connection(String hostname, int port, String identification) argument [all...] |
/external/openssh/ |
H A D | loginrec.c | 340 const char *hostname, const char *line) 345 login_init_entry(newli, pid, username, hostname, line); 368 const char *hostname, const char *line) 390 if (hostname) 391 strlcpy(li->hostname, hostname, sizeof(li->hostname)); 466 !sys_auth_record_login(li->username,li->hostname,li->line, 697 strncpy(ut->ut_host, li->hostname, 698 MIN_SIZEOF(ut->ut_host, li->hostname)); 339 login_alloc_entry(pid_t pid, const char *username, const char *hostname, const char *line) argument 367 login_init_entry(struct logininfo *li, pid_t pid, const char *username, const char *hostname, const char *line) argument 1659 record_failed_login(const char *username, const char *hostname, const char *ttyn) argument [all...] |
H A D | readconf.h | 81 char *hostname; /* Real host to connect. */ member in struct:__anon8319 82 char *host_key_alias; /* hostname alias for .ssh/known_hosts */
|
H A D | sshconnect.c | 360 fatal("%s: Could not resolve hostname %.100s: %s", __progname, 627 * Prepare the hostname and ip address strings that are used to lookup 631 get_hostfile_hostname_ipaddr(char *hostname, struct sockaddr *hostaddr, argument 679 *hostfile_hostname = put_host_port(hostname, port); 692 check_host_key(char *hostname, struct sockaddr *hostaddr, u_short port, argument 727 * Prepare the hostname and address strings used for hostkey lookup. 730 get_hostfile_hostname_ipaddr(hostname, hostaddr, port, &host, &ip); 734 * command or if we don't have a hostname to compare with 737 strcmp(hostname, ip) == 0 || options.proxy_command != NULL)) 769 * localhost, looking for a certificate, or the hostname wa [all...] |
/external/qemu/telephony/ |
H A D | sysdeps_posix.c | 609 sys_channel_create_tcp_client( const char* hostname, int port ) argument 616 hp = gethostbyname(hostname); 618 fprintf(stderr, "unknown host: %s\n", hostname);
|
/external/quake/quake/src/WinQuake/ |
H A D | net_main.cpp | 67 cvar_t hostname = CVAR2("hostname", "UNNAMED"); variable 854 Cvar_RegisterVariable (&hostname);
|
/external/bluetooth/glib/glib/ |
H A D | gconvert.c | 1552 g_escape_file_uri (const gchar *hostname, argument 1576 if (hostname && *hostname != '\0') 1578 escaped_hostname = g_escape_uri_string (hostname, UNSAFE_HOST); 1691 hostname_validate (const char *hostname) argument 1696 p = hostname; 1728 * @hostname: Location to store hostname for the URI, or %NULL. 1729 * If there is no hostname in the URI, %NULL will be 1742 gchar **hostname, 1741 g_filename_from_uri(const gchar *uri, gchar **hostname, GError **error) argument 1866 g_filename_from_uri(const gchar *uri, gchar **hostname, GError **error) argument 1900 g_filename_to_uri(const gchar *filename, const gchar *hostname, GError **error) argument 1941 g_filename_to_uri(const gchar *filename, const gchar *hostname, GError **error) argument [all...] |
/external/chromium/chrome/browser/ |
H A D | process_singleton_linux.cc | 22 // The destination is a string containing the hostname and process id of 27 // If writing to the socket fails, the hostname in the lock is checked to see if 29 // etc.) If the hostname differs an error is displayed and the second process 271 // Extract the hostname and pid from the lock symlink. 274 std::string* hostname, 285 *hostname = ""; 290 *hostname = real_path.substr(0, pos); 300 const std::string& hostname, 305 ASCIIToUTF16(hostname), 343 std::string hostname; local 273 ParseLockPath(const FilePath& path, std::string* hostname, int* pid) argument 299 DisplayProfileInUseError(const std::string& lock_path, const std::string& hostname, int pid) argument 785 std::string hostname; local [all...] |
/external/chromium/net/base/ |
H A D | host_resolver_impl_unittest.cc | 48 const std::string& hostname, 50 HostResolver::RequestInfo info(HostPortPair(hostname, 80)); 57 const std::string& hostname, 60 HostResolver::RequestInfo info(HostPortPair(hostname, 80)); 72 CaptureEntry(const std::string& hostname, AddressFamily address_family) argument 73 : hostname(hostname), address_family(address_family) {} 74 std::string hostname; member in struct:net::__anon2388::CapturingHostResolverProc::CaptureEntry 88 virtual int Resolve(const std::string& hostname, argument 96 capture_list_.push_back(CaptureEntry(hostname, address_famil 47 CreateResolverRequest( const std::string& hostname, RequestPriority priority) argument 56 CreateResolverRequestForAddressFamily( const std::string& hostname, RequestPriority priority, AddressFamily address_family) argument 135 Resolve(const std::string& hostname, AddressFamily address_family, HostResolverFlags host_resolver_flags, AddressList* addrlist, int* os_error) argument 164 ResolveRequest(HostResolver* resolver, const std::string& hostname, int port, Delegate* delegate) argument 195 const std::string& hostname() const { function in class:net::__anon2388::ResolveRequest [all...] |
H A D | net_util_unittest.cc | 1085 // to the hostname. If this behavior is not desirable, we'd better 1464 std::string hostname = GetHostName(); local 1465 EXPECT_FALSE(hostname.empty()); 1586 // -------- omit trailing slash on bare hostname --------
|
H A D | x509_certificate_nss.cc | 764 int X509Certificate::Verify(const std::string& hostname, argument 774 // Make sure that the hostname matches with the common name of the cert. 775 SECStatus status = CERT_VerifyCertName(cert_handle_, hostname.c_str()); 808 LOG(ERROR) << "CERT_PKIXVerifyCert for " << hostname 847 bool X509Certificate::VerifyNameMatch(const std::string& hostname) const { 848 return CERT_VerifyCertName(cert_handle_, hostname.c_str()) == SECSuccess;
|
H A D | x509_certificate_win.cc | 666 int X509Certificate::Verify(const std::string& hostname, argument 790 std::wstring wstr_hostname = ASCIIToWide(hostname);
|
H A D | x509_certificate_mac.cc | 108 bool OverrideHostnameMismatch(const std::string& hostname, argument 111 // hostname is provided as, say, 127.0.0.1, then the error 116 // hostname is an IP address, so IPv6 and hex addresses go through 120 for (std::string::const_iterator c = hostname.begin(); 121 c != hostname.end() && is_dotted_ip; ++c) 126 override_hostname_mismatch = (*name == hostname); 292 // validate a certificate for an SSL peer. |hostname| contains the name of 297 OSStatus CreateTrustPolicies(const std::string& hostname, int flags, argument 299 // Create an SSL SecPolicyRef, and configure it to perform hostname 300 // validation. The hostname chec 786 Verify(const std::string& hostname, int flags, CertVerifyResult* verify_result) const argument [all...] |
/external/chromium/net/http/ |
H A D | http_auth_handler_ntlm_portable.cc | 453 const std::string& hostname, 525 // Get workstation name (use local machine's hostname). 528 // hostname is ASCII, so we can do a simple zero-pad expansion: 529 ucs_host_buf.assign(hostname.begin(), hostname.end()); 537 host_ptr = hostname.data(); 538 host_len = hostname.length(); 701 std::string hostname = get_host_name_proc_(); local 702 if (hostname.empty()) 706 rv = GenerateType3Msg(domain_, username_, password_, hostname, rand_bu 450 GenerateType3Msg(const string16& domain, const string16& username, const string16& password, const std::string& hostname, const void* rand_8_bytes, const void* in_buf, uint32 in_len, void** out_buf, uint32* out_len) argument [all...] |
H A D | http_cache.cc | 300 virtual SSLHostInfo* GetForHost(const std::string& hostname, argument 303 hostname, ssl_config, cert_verifier_, http_cache_);
|
/external/libxml2/ |
H A D | nanoftp.c | 124 char *hostname; /* the host name */ member in struct:xmlNanoFTPCtxt 184 * and get the hostname 312 if (ctxt->hostname != NULL) { 313 xmlFree(ctxt->hostname); 314 ctxt->hostname = NULL; 332 ctxt->hostname = xmlMemStrdup(uri->server); 362 * protocol, hostname, port or other information, the 380 if (ctxt->hostname == NULL) 392 (strcmp(ctxt->hostname, uri->server)) || 511 if (ctxt->hostname ! [all...] |
H A D | nanohttp.c | 136 char *hostname; /* the host name */ member in struct:xmlNanoHTTPCtxt 289 if (ctxt->hostname != NULL) { 290 xmlFree(ctxt->hostname); 291 ctxt->hostname = NULL; 313 ctxt->hostname = xmlMemStrdup(uri->server); 412 if (ctxt->hostname != NULL) xmlFree(ctxt->hostname); 788 xmlStrcat(tmp_http, (const xmlChar *) ctxt->hostname); 1373 if (ctxt->hostname == NULL) { 1381 blen = strlen(ctxt->hostname) * [all...] |
/external/quake/quake/src/QW/server/ |
H A D | sv_main.c | 75 cvar_t hostname = {"hostname","unnamed", false, true}; variable 1323 Cvar_RegisterVariable (&hostname);
|
/external/tcpdump/ |
H A D | print-pptp.c | 108 u_char hostname[64]; member in struct:pptp_msg_sccrq 120 u_char hostname[64]; member in struct:pptp_msg_sccrp 252 2 u_char hostname[64]; 412 pptp_hostname_print(const u_char *hostname) argument 414 printf(" HOSTNAME(%.64s)", hostname); 604 TCHECK(ptr->hostname); 605 pptp_hostname_print(&ptr->hostname[0]); 634 TCHECK(ptr->hostname); 635 pptp_hostname_print(&ptr->hostname[0]);
|
/external/chromium/net/socket/ |
H A D | ssl_client_socket_nss.cc | 400 const std::string& hostname, 437 if (!DNSDomainFromDot(hostname, &dns_hostname)) 1000 // Tell SSL the hostname we're trying to connect to. 399 CheckDNSSECChain( const std::string& hostname, CERTCertificate* server_cert_nss) argument
|
/external/chromium/third_party/libevent/ |
H A D | http.c | 154 fake_getaddrinfo(const char *hostname, struct addrinfo *ai) argument 158 if (hostname) { 159 he = gethostbyname(hostname); 1671 * Although this interface accepts a hostname, it is intended to take 2537 char *hostname = NULL, *portname = NULL; local 2539 name_from_addr(sa, salen, &hostname, &portname); 2540 if (hostname == NULL || portname == NULL) { 2541 if (hostname) free(hostname); 2547 __func__, hostname, portnam [all...] |
/external/chromium/third_party/libjingle/source/talk/base/ |
H A D | proxydetect.cc | 216 // hostname:443 976 std::string hostname; local 992 converted = p_convertHostCFStringRefToCPPString(hostCFStr, hostname); 997 // we have something enabled, with a hostname and a port. 1000 proxy->address.SetIP(hostname);
|
/external/dnsmasq/src/ |
H A D | rfc2131.c | 104 char *hostname, 133 char *hostname = NULL, *offer_hostname = NULL, *client_hostname = NULL, *domain = NULL; local 390 hostname = config->hostname; 480 if (hostname) 481 lease_set_hostname(lease, hostname, 1); 489 do_options(context, mess, end, NULL, hostname, get_domain(mess->yiaddr), 562 hostname = config->hostname; 565 /* be careful not to send an OFFER with a hostname no 2014 do_options(struct dhcp_context *context, struct dhcp_packet *mess, unsigned char *end, unsigned char *req_options, char *hostname, char *domain, char *config_domain, struct dhcp_netid *netid, struct in_addr subnet_addr, unsigned char fqdn_flags, int null_term, int pxe_arch, unsigned char *uuid) argument [all...] |
/external/iptables/iptables/ |
H A D | xtables.c | 1370 * m{^($hostname|$networkname|$ipaddr)(/$mask)?} 1371 * "1.2.3.4/5", "1.2.3.4", "hostname", "networkname" 1422 static char hostname[NI_MAXHOST]; local 1431 hostname, sizeof(hostname) - 1, NULL, 0, 0); 1440 fprintf (stderr, "\naddr2host: %s\n", hostname); 1442 return hostname;
|
/external/mdnsresponder/Clients/ |
H A D | dns-sd.c | 784 static void DNSSD_API addrinfo_reply(DNSServiceRef sdref, DNSServiceFlags flags, uint32_t interfaceIndex, DNSServiceErrorType errorCode, const char *hostname, const struct sockaddr *address, uint32_t ttl, void *context) argument 812 printf("%s%6X%3d %-25s %-44s %d", op, flags, interfaceIndex, hostname, addr, ttl); 1321 fprintf(stderr, "%s -G v4/v6/v4v6 <Hostname> (Get address information for hostname)\n", a0);
|