mobile/android/base/tests/simpleservice.xml

Wed, 31 Dec 2014 06:09:35 +0100

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Wed, 31 Dec 2014 06:09:35 +0100
changeset 0
6474c204b198
permissions
-rw-r--r--

Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.

michael@0 1 <?xml version="1.0"?>
michael@0 2 <root xmlns="urn:schemas-upnp-org:device-1-0">
michael@0 3 <specVersion>
michael@0 4 <major>1</major>
michael@0 5 <minor>0</minor>
michael@0 6 </specVersion>
michael@0 7 <URLBase>http://example.com</URLBase>
michael@0 8 <device>
michael@0 9 <deviceType>urn:dial-multiscreen-org:device:dial:1</deviceType>
michael@0 10 <friendlyName>Pretend Device</friendlyName>
michael@0 11 <manufacturer>Copy Cat Inc.</manufacturer>
michael@0 12 <modelName>Eureka Dongle</modelName>
michael@0 13 <UDN>uuid:5ec9ff92-e8b2-4a94-a72c-76b34e6dabb1</UDN>
michael@0 14 </device>
michael@0 15 </root>

mercurial